WorldWideScience

Sample records for applied key strategies

  1. Subsonic Transonic Applied Refinements By Using Key Strategies - STARBUKS In the NASA Langley Research Center National Transonic Facility

    Science.gov (United States)

    Paryz, Roman W.

    2014-01-01

    Several upgrade projects have been completed at the NASA Langley Research Center National Transonic Facility over the last 1.5 years in an effort defined as STARBUKS - Subsonic Transonic Applied Refinements By Using Key Strategies. This multi-year effort was undertaken to improve NTF's overall capabilities by addressing Accuracy and Validation, Productivity, and Reliability areas at the NTF. This presentation will give a brief synopsis of each of these efforts.

  2. APPLYING SUSTAINABLE MARKETING STRATEGIES – THE KEY TO OBTAINING COMPETITIVE ADVANTAGES ON THE INDUSTRIAL PRODUCTS MARKET

    OpenAIRE

    DURALIA Oana

    2014-01-01

    The crux of any marketing strategy is to give business an advantage in a competitive market. The success of implementing a strategy is measured in economic terms by: sales volume, market share, profits, listed stock prices etc. In general, managers attach too much importance to obtaining short-term profit and ignore or disregard the profit made by the company in the long run. If for a company the only objective is to achieve economic success in the short term, then the interest in the directi...

  3. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  4. State Key Laboratory of Applied Organic Chemistry

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    @@The State Key Laboratory of Applied Organic Chemistry (SKLAOC) was founded in 1987 with the approval of the State Planning Commission. Professor Liu Zhongli is the director of the Laboratory and Professor Zhang Lihe, an academician of the Chinese Academy of Sciences, is the chairman of its academic committee. There are 30 faculty members, among them 21 are professors, working in the Laboratory.

  5. Applying Evolutionary Algorithm to Public Key Cryptosystems

    Institute of Scientific and Technical Information of China (English)

    Tu Hang; Li Li; Wu Tao-jun; Li Yuan- xiang

    2003-01-01

    A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi degree parallel evolutionary algorithrn to evaluate synthetically the efficiency and security of the public key cryptography. The model con tributes to designing public key cryptography system too.

  6. Concurrent engineering applied to key industrial sectors

    OpenAIRE

    Juárez Varón, David; Segui Llinares, Vicente Jesús; MENGUAL RECUERDA, ANA; Ferrándiz Bou, Santiago

    2015-01-01

    The use of advanced techniques in work, such as concurrent engineering, on the development of projects implies that all areas involved participate from the start of the primary phases. Getting a correct product is the main target, with an estimated term and controlled and reduced costs. Working with a complex product within a context in design and manufacturing in a company in a highly competitive market, involves the problem domain as a key issue. In this paper, the development of concurren...

  7. Key performance indicators and companies logistic strategy evaluation

    OpenAIRE

    Galyna Tarasiuk; Oleg Rudkivskyi; Оlga Pohaydak

    2013-01-01

    In the article are proposed key performance indicators in company’s logistic strategy evaluation; defined a need to develop key performance indicators in company’s logistic strategy evaluation; disclosed the features of using key performance indicators in company’s logistic activity; proposed stages of key performance indicators system implementation in company’s logistic system; proposed use key performance indicators in accordance with the specific company’s logistic strategy (cost-oriented...

  8. Key performance indicators and companies logistic strategy evaluation

    Directory of Open Access Journals (Sweden)

    Galyna Tarasiuk

    2013-11-01

    Full Text Available In the article are proposed key performance indicators in company’s logistic strategy evaluation; defined a need to develop key performance indicators in company’s logistic strategy evaluation; disclosed the features of using key performance indicators in company’s logistic activity; proposed stages of key performance indicators system implementation in company’s logistic system; proposed use key performance indicators in accordance with the specific company’s logistic strategy (cost-oriented, quality-oriented, time-oriented, productivity-oriented and return on investment in logistics oriented, was developed key performance indicators system of in company’s logistic cost-oriented strategy evaluation (proposed four indicators blocks: financial, customer, internal, study and growth components of logistic strategy.

  9. TPM- A KEY STRATEGY FOR PRODUCTIVITY IMPROVEMENT

    OpenAIRE

    J.S. DUREJA; ANISH SACHDEVA; VSIHAL S. SHARMA; MANU DOGRA

    2011-01-01

    During high growth era companies are making technical progress in automation and centralization of the plants, which needs large amount of manual work to maintain the automation systems. The strategy of maintaining the equipment of a plant is crucial for the effectiveness of manufacturing. Total productive maintenance (TPM) is a maintenance program, which involves concepts for maintaining plant and equipments effectively. In this paper detailed implementation of TPM in the cold rolling plant ...

  10. TPM- A KEY STRATEGY FOR PRODUCTIVITY IMPROVEMENT

    Directory of Open Access Journals (Sweden)

    J.S. DUREJA

    2011-02-01

    Full Text Available During high growth era companies are making technical progress in automation and centralization of the plants, which needs large amount of manual work to maintain the automation systems. The strategy of maintaining the equipment of a plant is crucial for the effectiveness of manufacturing. Total productive maintenance (TPM is a maintenance program, which involves concepts for maintaining plant and equipments effectively. In this paper detailed implementation of TPM in the cold rolling plant is discussed. Results achieved are quite encouraging in terms of motivated employees, improvement in overall equipment effectiveness (OEE and reduction in no. of accidents on shop floor.

  11. Key Vocabulary Learning Strategies in ESP And EGP Course Books

    Directory of Open Access Journals (Sweden)

    Zahra Akbari

    2015-01-01

    Full Text Available An increasing body of research evidence is showing the advantages of using certain skills and behaviours called language learning strategies in general and vocabulary learning strategies (VLSs in particular in the process of L2 acquisition. University students who require reading English texts in their fields of study have to expand their vocabulary knowledge in a much more efficient way than ordinary ESL/EFL learners.  And ELT course books are a good place to incorporate learner training in this regard. The purpose of this study is to see how vocabulary learning strategies are treated in both the book designer's claims section and the exercises of English for Specific Purposes (ESP course books for students of medicine and para-medicine on the one hand and English for General Purposes (EGP course book used commonly by these students in Isfahan University of Medical Sciences, Isfahan, Iran on the other. In other words, the specified course books were analyzed based on the insights gained from VLS research to gauge the extent to which they have incorporated VLSs and training in using them. These books were published under the supervision of the center for studying and compiling university books in humanities (SAMT. Based on the review of the relevant literature, three key strategies were identified and an analytic framework was devised. The framework was then applied to the course books. It was found that the treatments in the specified course books were deemed unlikely to improve students’ abilities with these important skills and strategies.Keywords: Vocabulary Learning Strategies (VLSs, English for General Purposes (EGP, English for Specific Purposes (ESP, medical course books, paramedical course books, University students

  12. PROBABILISTIC CLONE-RESEND ATTACK STRATEGY IN QUANTUM KEY DISTRIBUTION

    Institute of Scientific and Technical Information of China (English)

    Zhao Shengmei; Li Fei; Zheng Baoyu

    2005-01-01

    A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.

  13. Key Drivers for a successful NPD launch strategy

    OpenAIRE

    Padwal, Smita

    2009-01-01

    The successful factors in new product strategy are identified. Product acceptance, the role of brand equity and pricing policy are particularly delved into. The importance of open innovation, outsourcing and networks in the new product development process is also discussed. Extensive literature around the new product development process and strategy is reviewed. Consumer research with regards to product acceptance, price and brand equity is also carried out. Thus finally the key drivers to a ...

  14. Key Elements of a Successful Drive toward Marketing Strategy Making

    Science.gov (United States)

    Cann, Cynthia W.; George, Marie A.

    2003-01-01

    A conceptual model is presented that depicts the relationship between an internal marketing function and an organization's readiness to learn. Learning and marketing orientations are identified as components to marketing strategy making. Key organizational functions, including communication and decision-making, are utilized in a framework for…

  15. Key Reading Recovery Strategies to Support Classroom Guided Reading Instruction

    Science.gov (United States)

    Lipp, Jamie R.; Helfrich, Sara R.

    2016-01-01

    Effective teachers are continuously striving to improve their instruction. Reading Recovery teachers have detailed and specific literacy training and expertise that can be of great value to classroom teachers, especially in the area of guided reading instruction. This article explores the ways in which key Reading Recovery strategies can be…

  16. Applying business strategy models in organizations

    OpenAIRE

    López Cuesta, Lidia; Franch Gutiérrez, Javier

    2014-01-01

    Increasing adoption of Open Source Software (OSS) in information system engineering has led to the emergence of different OSS business strate-gies that affect and shape organizations’ business models. In order to obtain the specific organizational model for a concrete organization that is adhering to a specific OSS business strategy, we need to instantiate the general knowledge included in this business strategy. This paper describe the process in which this general knowledge is instantiated ...

  17. Applying Learning Strategy Questionnaires: Problems and Possibilities

    Science.gov (United States)

    Schellings, Gonny

    2011-01-01

    This article discusses measuring learning strategies by means of questionnaires. In "multi-method" research, in which think-aloud measures are compared with questionnaires, low or moderate correlations are found. A conclusion often drawn is that learners are not able to verbally report on their learning activities. Alternative explanations concern…

  18. Applying a gaming approach to IP strategy.

    Science.gov (United States)

    Gasnier, Arnaud; Vandamme, Luc

    2010-02-01

    Adopting an appropriate IP strategy is an important but complex area, particularly in the pharmaceutical and biotechnology sectors, in which aspects such as regulatory submissions, high competitive activity, and public health and safety information requirements limit the amount of information that can be protected effectively through secrecy. As a result, and considering the existing time limits for patent protection, decisions on how to approach IP in these sectors must be made with knowledge of the options and consequences of IP positioning. Because of the specialized nature of IP, it is necessary to impart knowledge regarding the options and impact of IP to decision-makers, whether at the level of inventors, marketers or strategic business managers. This feature review provides some insight on IP strategy, with a focus on the use of a new 'gaming' approach for transferring the skills and understanding needed to make informed IP-related decisions; the game Patentopolis is discussed as an example of such an approach. Patentopolis involves interactive activities with IP-related business decisions, including the exploitation and enforcement of IP rights, and can be used to gain knowledge on the impact of adopting different IP strategies. PMID:20127561

  19. "Applied" Aspects of the Drug Resistance Strategies Project

    Science.gov (United States)

    Hecht, Michael L.; Miller-Day, Michelle A.

    2010-01-01

    This paper discusses the applied aspects of our Drug Resistance Strategies Project. We argue that a new definitional distinction is needed to expand the notion of "applied" from the traditional notion of utilizing theory, which we call "applied.1," in order to consider theory-grounded, theory testing and theory developing applied research. We…

  20. Tales from the Field: Search Strategies Applied in Web Searching

    Directory of Open Access Journals (Sweden)

    Soohyung Joo

    2010-08-01

    Full Text Available In their web search processes users apply multiple types of search strategies, which consist of different search tactics. This paper identifies eight types of information search strategies with associated cases based on sequences of search tactics during the information search process. Thirty-one participants representing the general public were recruited for this study. Search logs and verbal protocols offered rich data for the identification of different types of search strategies. Based on the findings, the authors further discuss how to enhance web-based information retrieval (IR systems to support each type of search strategy.

  1. A Study on the Key Management Strategy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon KO

    2015-05-01

    Full Text Available Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.

  2. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    International Nuclear Information System (INIS)

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  3. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Kern, Oliver

    2009-05-25

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  4. The Split-Apply-Combine Strategy for Data Analysis

    Directory of Open Access Journals (Sweden)

    Hadley Wickham

    2011-04-01

    Full Text Available Many data analysis problems involve the application of a split-apply-combine strategy, where you break up a big problem into manageable pieces, operate on each piece independently and then put all the pieces back together. This insight gives rise to a new R package that allows you to smoothly apply this strategy, without having to worry about the type of structure in which your data is stored.The paper includes two case studies showing how these insights make it easier to work with batting records for veteran baseball players and a large 3d array of spatio-temporal ozone measurements.

  5. The Strategy of Position as a Key to Success

    OpenAIRE

    Mirjana Prljevic

    2009-01-01

    In the beginning of the eighties when a kind of trade revolution began, there were first serious attempts to develop the strategy of positioning in trade. Practically, there were attempts to synthesize the differentiation strategy based on competition (the objective is to have more successful and profitable offer than the competitive one) and the segmentation strategy based on consumers (the objective is to create a unique package offer for a desired, target segment of consumers). The first a...

  6. Recognition: a key retention strategy for the mature nurse.

    Science.gov (United States)

    Bryant-Hampton, Linda; Walton, Ann Marie; Carroll, Tracy; Strickler, Laura

    2010-03-01

    Recognition of staff can be one of the easiest, cost-effective strategies to retain experienced mature nursing staff. The authors discuss the Senior and Generational Excellence initiative that identifies strategies and brings attention to the unique skills and needs of mature professional nurses.

  7. Characteristics of Key Update Strategies for Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Wireless sensor networks offer the advantages of simple and low-resource communication. Challenged by this simplicity and low-resources, security is of particular importance in many cases such as transmission of sensitive data or strict requirements of tamper-resistance. Updating the security keys...... is one of the essential points in security, which restrict the amount of data that may be exposed when a key is compromised. In this paper, we investigate key update methods that may be used in wireless sensor networks, and benefiting from stochastic model checking we derive characteristics...

  8. Development Strategies for Rural Key Circulation Service Network

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    The rural key circulation service network is an important channel for ensuring agricultural products’entry to market and urban industrial products’entry to rural areas.Through in-depth survey and research,we took a look at development changes and current situations of three circulation service networks,namely,circulation of nondurable consumer goods,circulation of agricultural means of production,and circulation of agricultural products.Based on several key problems in rural circulation service network,such as logistics problem,delivery problem,backward transaction mode,and the last kilometer information,we put forward corresponding development countermeasures.

  9. Sustainability as a key factor in modern marketing strategies

    OpenAIRE

    Masyk, Thomas

    2012-01-01

    The goal of this thesis is to show that sustainability has become the guiding principle in politics and business and therefore needs to be integrated as important factor in all marketing strategies. The protection of the planet's scarce natural resources and the necessity to preserve an intact environment for future generations are vital challenges that have been internalized by big successful entrepreneurs like BMW, HOCHTEF and HIPP. These three companies have been selected as examples for t...

  10. TEACHING ENGINEERING STUDENTS CREATIVITY: A REVIEW OF APPLIED STRATEGIES

    Directory of Open Access Journals (Sweden)

    Chunfang Zhou

    2012-06-01

    Full Text Available Recent studies have emphasized the necessity of educating creative engineers. This paper aims to provide a literature review by answering what strategies can be applied to develop creativity in engineering education. As the literature demonstrates, creativity has been studied by a diversity of perspectives such as psychology, social psychology and sociology. Studies on engineering creativity indicate the importance of problem-solving skills for engineers. For developing creativity, strategies such as using thinking tools, learning by solving problems and building learning environment conductive to creativity have been suggested in engineering education. Problem-Based Learning (PBL is a good example of fostering creative engineers, so characteristics of PBL, learning cycle in PBL and methods for enhancing group dynamics in PBL are discussed in this paper.

  11. Debenzylative Cycloetherification: An Overlooked Key Strategy for Complex Tetrahydrofuran Synthesis.

    Science.gov (United States)

    Tikad, Abdellatif; Delbrouck, Julien A; Vincent, Stéphane P

    2016-07-01

    Tetrahydrofuran (THF) is a major structural feature found in many synthetic and natural products displaying a variety of biological properties. This review summarizes the main synthetic approaches that have been developed to construct tetrahydrofuran moieties involving debenzylative cycloetherification reactions (DBCE). Interestingly, this reaction is regio- and stereoselective without the requirement of a selective protection/deprotection strategy. Many applications of this process have been reported, including carbafuranoside synthesis, regioselective deprotection of the benzyl group positioned γ to an alkene, and total synthesis of natural products. The stereochemical outcome and the mechanism of these interesting transformations are also discussed. PMID:27304427

  12. The VERB campaign: applying a branding strategy in public health.

    Science.gov (United States)

    Asbury, Lori D; Wong, Faye L; Price, Simani M; Nolin, Mary Jo

    2008-06-01

    A branding strategy was an integral component of the VERB Youth Media Campaign. Branding has a long history in commercial marketing, and recently it has also been applied to public health campaigns. This article describes the process that the CDC undertook to develop a physical activity brand that would resonate with children aged 9-13 years (tweens), to launch an unknown brand nationally, to build the brand's equity, and to protect and maintain the brand's integrity. Considerations for branding other public health campaigns are also discussed.

  13. The VERB campaign: applying a branding strategy in public health.

    Science.gov (United States)

    Asbury, Lori D; Wong, Faye L; Price, Simani M; Nolin, Mary Jo

    2008-06-01

    A branding strategy was an integral component of the VERB Youth Media Campaign. Branding has a long history in commercial marketing, and recently it has also been applied to public health campaigns. This article describes the process that the CDC undertook to develop a physical activity brand that would resonate with children aged 9-13 years (tweens), to launch an unknown brand nationally, to build the brand's equity, and to protect and maintain the brand's integrity. Considerations for branding other public health campaigns are also discussed. PMID:18471598

  14. Marketing strategy: a key leverage point for dietitians.

    Science.gov (United States)

    Jensen, T G; Brooks, B J

    1981-09-01

    The time is right for planned change in the profession of dietetics. The concept of the nutrition support team offers the clinical dietitian a means of increasing the visibility and effectiveness of dietetic services. Dietitians must take advantage of the renewed interest in nutrition and intervene assertively to improve nutritional care through role expansion. By focusing on a systematic marketing strategy to expand their current role, dietitians can become proactive participants in role change, rather than reactive victims to changes dictated by others. When goals, objectives, and plans are made explicit, definite progress toward desired role changes can be recognized. This case study demonstrates that this change in role is possible within the present state of health case systems and that physicians are willing and even eager to allow dietitians to assume a high degree of responsibility for nutritional care. PMID:7264112

  15. Applying real options analysis to assess cleaner energy development strategies

    International Nuclear Information System (INIS)

    The energy industry, accounts for the largest portion of CO2 emissions, is facing the issue of compliance with the national clean energy policy. The methodology for evaluating the energy mix policy is crucial because of the characteristics of lead time embedded with the power generation facilities investment and the uncertainty of future electricity demand. In this paper, a modified binomial model based on sequential compound options, which may account for the lead time and uncertainty as a whole is established, and a numerical example on evaluating the optional strategies and the strategic value of the cleaner energy policy is also presented. It is found that the optimal decision at some nodes in the binomial tree is path dependent, which is different from the standard sequential compound option model with lead time or time lag concept. The proposed modified binomial sequential compound real options model can be generalized and extensively applied to solve the general decision problems that deal with the long lead time of many government policies as well as capital intensive investments. - Highlights: → Introducing a flexible strategic management approach for government policy making. → Developing a modified binomial real options model based on sequential compound options. → Proposing an innovative model for managing the long term policy with lead time. → Applying to evaluate the options of various scenarios of cleaner energy strategies.

  16. Bussines strategy or bussines policy management applied in modern firms

    OpenAIRE

    Enea, C.

    2010-01-01

    In literature, the term widely used for all action levels of strategic management is that of strategy. For this reason, it is necessary to achieve a differentiation between corporate strategies (typical strategies), business strategies (with policies), operational strategies (business plans) and operational strategies (programs and tactics).In the same context, strategies become the basis for the definition and implementation of policies, which differ by time horizon that is lower and their h...

  17. Integrated preclinical photosafety testing strategy for systemically applied pharmaceuticals.

    Science.gov (United States)

    Schümann, Jens; Boudon, Stéphanie; Ulrich, Peter; Loll, Nathalie; Garcia, Déborah; Schaffner, René; Streich, Jeannine; Kittel, Birgit; Bauer, Daniel

    2014-05-01

    Phototoxic properties of systemically applied pharmaceuticals may be the cause of serious adverse drug reactions. Therefore, a reliable preclinical photosafety assessment strategy, combining in vitro and in vivo approaches in a quantitative manner, is important and has not been described so far. Here, we report the establishment of an optimized modified murine local lymph node assay (LLNA), adapted for phototoxicity assessment of systemically applied compounds, as well as the test results for 34 drug candidates in this in vivo photo-LLNA. The drug candidates were selected based on their ability to absorb ultraviolet/visible light and the photo irritation factors (PIFs) determined in the well-established in vitro 3T3 neutral red uptake phototoxicity test. An in vivo phototoxic potential was identified for 13 of these drug candidates. The use of multiple dose levels in the described murine in vivo phototoxicity studies enabled the establishment of no- and/or lowest-observed-adverse-effect levels (NOAELs/LOAELs), also supporting human photosafety assessment. An in vitro-in vivo correlation demonstrated that a drug candidate classified as "phototoxic" in vitro is not necessarily phototoxic in vivo. However, the probability for a drug candidate to cause phototoxicity in vivo clearly correlated with the magnitude of the phototoxicity identified in vitro.

  18. Computational Comminution and Its Key Technologies Applied to Materials Processing Procedure

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new concept named computational comminution is proposed in this paper, which is different from the traditional studies on materials processing procedure such as the study based on theoretic models, the study based on experiment models, which is based on information models. Some key technologies applied to materials processing procedure such as artificial neural networks, fuzzy sets, genetic algorithms and visualization technology are also presented, and a fusing methodology of these new technologies is studied. Application in the cement grinding process of Horomill shows that results in this paper are efficient.

  19. Resilience Analysis of Key Update Strategies for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    critical security issue. In this paper, we investigate the behaviour of different key update strategies under deviant network conditions. We consider resource-critical networks that employ symmetric cryptography and rely on (shared) network keys. We provide a methodology for quantitative security and...

  20. Key strategies for predictive exploration in mature environment: model innovation, exploration technology optimization and information integration

    Institute of Scientific and Technical Information of China (English)

    LIU Liang-ming; PENG Sheng-lin

    2005-01-01

    Prediction has become more and more difficult in mineral exploration, especially in the mature exploration environment such as Tongling copper district. For enhancing predictive discovery of hidden ore deposits in such mature environment, the key strategies which should be adopted include the innovation of the exploration models, application of the advanced exploration techniques and integration of multiple sets of information. The innovation of the exploration models should incorporate the new metallogenic concepts that are based on the geodynamic anatomization. The advanced techniques applied in the mature exploration environment should aim at the speciality and complexity of the geological setting and working environments. The information synthesis is to integrate multiple sets of data for giving a more credible and visual prospectivity map by using the geographic imformation system(GIS) and several mathematical methods, such as weight of evidence and fuzzy logic, which can extract useful information from every set of data as much as possible. Guided by these strategies, a predictive exploration in Fenghuangshan ore field of Tongling copper district was implemented, and a hidden ore deposit was discovered.

  1. Bussines strategy or bussines policy management applied in modern firms

    Directory of Open Access Journals (Sweden)

    Enea, C.

    2010-12-01

    Full Text Available In literature, the term widely used for all action levels of strategic management is that of strategy. For this reason, it is necessary to achieve a differentiation between corporate strategies (typical strategies, business strategies (with policies, operational strategies (business plans and operational strategies (programs and tactics.In the same context, strategies become the basis for the definition and implementation of policies, which differ by time horizon that is lower and their higher intake of detail. The latter are updated permanently, in order to remain set on, realistic, consistent with the changes that occur and detailing in concrete plans and programs as a logical scheme. So, strategic management is that management based on the application of strategies and policies with a view to setting and achieving goals.

  2. Localization Strategies in WSNs as applied to Landslide Monitoring (Invited)

    Science.gov (United States)

    Massa, A.; Robol, F.; Polo, A.; Giarola, E.; Viani, F.

    2013-12-01

    In the last years, heterogeneous integrated smart systems based on wireless sensor network (WSN) technology have been developed at the ELEDIA Research Center of the University of Trento [1]. One of the key features of WSNs as applied to distributed monitoring is that, while the capabilities of each single sensor node is limited, the implementation of cooperative schemes throughout the whole network enables the solution of even complex tasks, as the landslide monitoring. The capability of localizing targets respect to the position of the sensor nodes turns out to be fundamental in those application fields where relative movements arise. The main properties like the target typology, the movement characteristics, and the required localization resolution are different changing the reference scenario. However, the common key issue is still the localization of moving targets within the area covered by the sensor network. Many experiences were preparatory for the challenging activities in the field of landslide monitoring where the basic idea is mostly that of detecting slight soil movements. Among them, some examples of WSN-based systems experimentally applied to the localization of people [2] and wildlife [3] have been proposed. More recently, the WSN backbone as well as the investigated sensing technologies have been customized for monitoring superficial movements of the soil. The relative positions of wireless sensor nodes deployed where high probability of landslide exists is carefully monitored to forecast dangerous events. Multiple sensors like ultrasound, laser, high precision GPS, for the precise measurement of relative distances between the nodes of the network and the absolute positions respect to reference targets have been integrated in a prototype system. The millimeter accuracy in the position estimation enables the detection of small soil modifications and to infer the superficial evolution profile of the landslide. This information locally acquired also

  3. Active lubrication applied to internal combustion engines - evaluation of control strategies

    DEFF Research Database (Denmark)

    Estupinan, Edgar Alberto; Santos, Ilmar

    2009-01-01

    The performance of fluid film bearings in a combustion engine affects key functions such as durability, noise and vibration. Therefore, this work evaluates different control strategies for applying active radial oil injection in the main bearings of internal combustion engines with the aim...... of reducing friction losses and vibrations between the crankshaft and the bearings. The conventional hydrodynamic lubrication is combined with hydrostatic lubrication which is actively modified by radially injecting oil at controllable pressures, through orifices circumferentially located around the bearing...... surface. The behaviour of a main bearing of a medium size combustion engine, operating with radial oil injection and with four different control strategies is analyzed, giving some insights into the minimum fluid film thickness, maximum fluid film pressure, friction losses and maximum vibration levels...

  4. Assessing performance of orthology detection strategies applied to eukaryotic genomes.

    Directory of Open Access Journals (Sweden)

    Feng Chen

    Full Text Available Orthology detection is critically important for accurate functional annotation, and has been widely used to facilitate studies on comparative and evolutionary genomics. Although various methods are now available, there has been no comprehensive analysis of performance, due to the lack of a genomic-scale 'gold standard' orthology dataset. Even in the absence of such datasets, the comparison of results from alternative methodologies contains useful information, as agreement enhances confidence and disagreement indicates possible errors. Latent Class Analysis (LCA is a statistical technique that can exploit this information to reasonably infer sensitivities and specificities, and is applied here to evaluate the performance of various orthology detection methods on a eukaryotic dataset. Overall, we observe a trade-off between sensitivity and specificity in orthology detection, with BLAST-based methods characterized by high sensitivity, and tree-based methods by high specificity. Two algorithms exhibit the best overall balance, with both sensitivity and specificity>80%: INPARANOID identifies orthologs across two species while OrthoMCL clusters orthologs from multiple species. Among methods that permit clustering of ortholog groups spanning multiple genomes, the (automated OrthoMCL algorithm exhibits better within-group consistency with respect to protein function and domain architecture than the (manually curated KOG database, and the homolog clustering algorithm TribeMCL as well. By way of using LCA, we are also able to comprehensively assess similarities and statistical dependence between various strategies, and evaluate the effects of parameter settings on performance. In summary, we present a comprehensive evaluation of orthology detection on a divergent set of eukaryotic genomes, thus providing insights and guides for method selection, tuning and development for different applications. Many biological questions have been addressed by multiple

  5. Ecologically Significant Monitoring Strategies for Watershed Managers and Applied Ecohydrologists

    Science.gov (United States)

    Buchanan, B. P.; Walter, T.

    2007-12-01

    Upper Klamath Lake in Southern Oregon is home to a unique and increasingly rare strain of redband rainbow trout (Oncorhynchus mykiss newberrii). Populations connected to perennial lake systems such as the Upper Klamath have evolved adfluvial life histories and may possess unique adaptations that underscore their importance as units of conservation. Anthropogenic disturbance including stream channelization, timber harvest, livestock grazing and irrigation diversion have resulted in a 41 percent reduction in the redband's historic habitat and the disappearance of 11 redband trout populations throughout Oregon, Washington, and Idaho. In an effort to actively conserve this sensitive subspecies, a stream creation project was undertaken with the goal of increasing viable spawning and rearing habitat in Crooked Creek, a tributary to Upper Klamath Lake. A combination of analogue, empirical and analytical techniques were employed in the design of the created channel morphology (i.e. channel planform, profile, and cross-section), the sizing of bed substrate and spawning gravels and the design of in-stream habitat and scour structures. The project, completed in the fall of 1996, was qualitatively judged a success (e.g. trout were observed actively spawning and young-of-the-year were collected during unsystematic surveys). Unfortunately, as is often the case in the stream enhancement/restoration field, funding and personnel time were lacking for the implementation of a robust post-construction monitoring plan. Thus, project success was ascertained through cursory analyses and anecdotal reports. An opportunity to implement a similar stream creation project in a nearby watershed has afforded us the chance to return to the project site and conduct a more comprehensive, quantitative analysis of the project's success. A discussion of the original design methods and a review of several state of the art monitoring strategies are provided to assist watershed managers and applied

  6. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  7. International symposium on nuclear fuel cycle and reactor strategy: Adjusting to new realities. Key issue papers

    International Nuclear Information System (INIS)

    The key issue papers review the following issues: global energy outlook; present status and environmental implications of the different fuel cycles; future fuel cycle and reactor strategies; safety, health and environmental implications of the different fuel cycles; non-proliferation and safeguards aspects; international cooperation. Refs, figs, tabs

  8. Reading Comprehension Strategies as Applied by Iranian EFL Students

    Science.gov (United States)

    Shokrpour, Nasrin; Fotovatian, Sepide

    2006-01-01

    To enhance reading comprehension, several strategies have been identified in previous research conducted (Naiman et al. 1978; O'Malley & Chamot 1990; O'Malley, Chamot, Manzanares, Russo and Kypper 1985; Politzer and McGroarty 1985; Prokop 1989; Oxford 1990; Salataci and Akyel 2002; Tercanlioglu 2004). However, using different types of Reading…

  9. Applying change management metaphors to a national e-Health strategy.

    Science.gov (United States)

    Saunders, Chad; Scott, Richard E

    2014-01-01

    Recent attempts at a collective understanding of how to develop an e-Health strategy have addressed the individual organisation, collection of organisations, and national levels. At the national level the World Health Organisation's National eHealth Strategy Toolkit serves as an exemplar that consolidates knowledge in this area, guides practical implementations, and identifies areas for future research. A key implication of this toolkit is the considerable number of organisational changes required to successfully apply their ideas in practice. This study looks critically at the confluence of change management and e-Health strategy using metaphors that underpin established models of change management. Several of Morgan's organisational metaphors are presented (highlighting varied beliefs and assumptions regarding how change is enacted, who is responsible for the change, and guiding principles for that change), and used to provide a framework. Attention is then directed to several prominent models of change management that exemplify one or more of these metaphors, and these theoretical insights are applied to evaluate the World Health Organisation's National eHealth Strategy Toolkit. The paper presents areas for consideration when using the WHO/ITU toolkit, and suggestions on how to improve its use in practice. The goal is to seek insight regarding the optimal sequence of steps needed to ensure successful implementation and integration of e-health into health systems using change management models. No single model, toolkit, or guideline will offer all the needed answers, but clarity around the underlying metaphors informing the change management models being used provides valuable insight so potentially challenging areas can be avoided or mitigated.

  10. Key Parameters Estimation and Adaptive Warning Strategy for Rear-End Collision of Vehicle

    Directory of Open Access Journals (Sweden)

    Xiang Song

    2015-01-01

    Full Text Available The rear-end collision warning system requires reliable warning decision mechanism to adapt the actual driving situation. To overcome the shortcomings of existing warning methods, an adaptive strategy is proposed to address the practical aspects of the collision warning problem. The proposed strategy is based on the parameter-adaptive and variable-threshold approaches. First, several key parameter estimation algorithms are developed to provide more accurate and reliable information for subsequent warning method. They include a two-stage algorithm which contains a Kalman filter and a Luenberger observer for relative acceleration estimation, a Bayesian theory-based algorithm of estimating the road friction coefficient, and an artificial neural network for estimating the driver’s reaction time. Further, the variable-threshold warning method is designed to achieve the global warning decision. In the method, the safety distance is employed to judge the dangerous state. The calculation method of the safety distance in this paper can be adaptively adjusted according to the different driving conditions of the leading vehicle. Due to the real-time estimation of the key parameters and the adaptive calculation of the warning threshold, the strategy can adapt to various road and driving conditions. Finally, the proposed strategy is evaluated through simulation and field tests. The experimental results validate the feasibility and effectiveness of the proposed strategy.

  11. Applying medicinal chemistry strategies to understand odorant discrimination

    Science.gov (United States)

    Poivet, Erwan; Peterlin, Zita; Tahirova, Narmin; Xu, Lu; Altomare, Clara; Paria, Anne; Zou, Dong-Jing; Firestein, Stuart

    2016-01-01

    Associating an odorant's chemical structure with its percept is a long-standing challenge. One hindrance may come from the adoption of the organic chemistry scheme of molecular description and classification. Chemists classify molecules according to characteristics that are useful in synthesis or isolation, but which may be of little importance to a biological sensory system. Accordingly, we look to medicinal chemistry, which emphasizes biological function over chemical form, in an attempt to discern which among the many molecular features are most important for odour discrimination. Here we use medicinal chemistry concepts to assemble a panel of molecules to test how heteroaromatic ring substitution of the benzene ring will change the odour percept of acetophenone. This work allows us to describe an extensive rule in odorant detection by mammalian olfactory receptors. Whereas organic chemistry would have predicted the ring size and composition to be key features, our work reveals that the topological polar surface area is the key feature for the discrimination of these odorants. PMID:27040654

  12. Rethinking health systems strengthening: key systems thinking tools and strategies for transformational change

    OpenAIRE

    Swanson, R. Chad; Cattaneo, Adriano; Bradley, Elizabeth; Chunharas, Somsak; Atun, Rifat; Abbas, Kaja M.; Katsaliaki, Korina; Mustafee, Navonil; Mason Meier, Benjamin; Best, Allan

    2012-01-01

    While reaching consensus on future plans to address current global health challenges is far from easy, there is broad agreement that reductionist approaches that suggest a limited set of targeted interventions to improve health around the world are inadequate. We argue that a comprehensive systems perspective should guide health practice, education, research and policy. We propose key ‘systems thinking’ tools and strategies that have the potential for transformational change in health systems...

  13. Nuclear fuel cycle and reactor strategies: Adjusting to new realities. Key issue papers

    International Nuclear Information System (INIS)

    The international symposium ''Nuclear Fuel Cycle and Reactor Strategy: Adjusting to new Realities'' was organized to face the new realities in the nuclear fuel cycle and to consider options on how these new realities could be addressed. The Key Issue Papers treat the various subjects from both short and long term perspectives. In so doing, they address the likely development of all aspects concerning the nuclear fuel cycle up to the year 2050

  14. Development of a Nationally Coordinated Evaluation Plan for the Ghana National Strategy for Key Populations

    OpenAIRE

    Heidi W. Reynolds; Atuahene, Kyeremeh; Sutherland, Elizabeth; Amenyah, Richard; Kwao, Isaiah Doe; Larbi, Emmanuel Tettey

    2014-01-01

    Objective Just as HIV prevention programs need to be tailored to the local epidemic, so should evaluations be country-owned and country-led to ensure use of those results in decision making and policy. The objective of this paper is to describe the process undertaken in Ghana to develop a national evaluation plan for the Ghana national strategy for key populations. Methods This was a participatory process that involved meetings between the Ghana AIDS Commission (GAC), other partners in Ghana ...

  15. Constructing a strategy map for banking institutions with key performance indicators of the balanced scorecard.

    Science.gov (United States)

    Wu, Hung-Yi

    2012-08-01

    This study presents a structural evaluation methodology to link key performance indicators (KPIs) into a strategy map of the balanced scorecard (BSC) for banking institutions. Corresponding with the four BSC perspectives (finance, customer, internal business process, and learning and growth), the most important evaluation indicators of banking performance are synthesized from the relevant literature and screened by a committee of experts. The Decision Making Trial and Evaluation Laboratory (DEMATEL) method, a multiple criteria analysis tool, is then employed to determine the causal relationships between the KPIs, to identify the critical central and influential factors, and to establish a visualized strategy map with logical links to improve banking performance. An empirical application is provided as an example. According to the expert evaluations, the three most essential KPIs for banking performance are customer satisfaction, sales performance, and customer retention rate. The DEMATEL results demonstrate a clear road map to assist management in prioritizing the performance indicators and in focusing attention on the strategy-related activities of the crucial indicators. According to the constructed strategy map, management could better invest limited resources in the areas that need improvement most. Although these strategy maps of the BSC are not universal, the research results show that the presented approach is an objective and feasible way to construct strategy maps more justifiably. The proposed framework can be applicable to institutions in other industries as well. PMID:22410163

  16. Constructing a strategy map for banking institutions with key performance indicators of the balanced scorecard.

    Science.gov (United States)

    Wu, Hung-Yi

    2012-08-01

    This study presents a structural evaluation methodology to link key performance indicators (KPIs) into a strategy map of the balanced scorecard (BSC) for banking institutions. Corresponding with the four BSC perspectives (finance, customer, internal business process, and learning and growth), the most important evaluation indicators of banking performance are synthesized from the relevant literature and screened by a committee of experts. The Decision Making Trial and Evaluation Laboratory (DEMATEL) method, a multiple criteria analysis tool, is then employed to determine the causal relationships between the KPIs, to identify the critical central and influential factors, and to establish a visualized strategy map with logical links to improve banking performance. An empirical application is provided as an example. According to the expert evaluations, the three most essential KPIs for banking performance are customer satisfaction, sales performance, and customer retention rate. The DEMATEL results demonstrate a clear road map to assist management in prioritizing the performance indicators and in focusing attention on the strategy-related activities of the crucial indicators. According to the constructed strategy map, management could better invest limited resources in the areas that need improvement most. Although these strategy maps of the BSC are not universal, the research results show that the presented approach is an objective and feasible way to construct strategy maps more justifiably. The proposed framework can be applicable to institutions in other industries as well.

  17. Understanding Individual Problem-Solving Style: A Key to Learning and Applying Creative Problem Solving

    Science.gov (United States)

    Treffinger, Donald J.; Selby, Edwin C.; Isaksen, Scott G.

    2008-01-01

    More than five decades of research and development have focused on making the Creative Problem Solving process and tools accessible across a wide range of ages and contexts. Recent evidence indicates that when individuals, in both school and corporate settings, understand their own style of problem solving, they are able to learn and apply process…

  18. Aligning Key Success Factors to ERP Implementation Strategy: Learning from a Case Study

    OpenAIRE

    Zouaghi, I.; Laghouag, Abderrazak

    2012-01-01

    CAHIER DE RECHERCHE n°2012-08 E5 These last years, we can observe that most of companies implemented an ERP system but many of them fail. Much of research that has been conducted in this field, focus on KSFs. We have noticed that confronting those KSFs to ERP implementation strategies seems quiet fecund. So provide in this article a brief overview of the literature dealing with key success factors related to an ERP implementation project to better cope with the field, then come out with a ...

  19. Research on Key Techniques for Video Surveillance System Applied to Shipping Channel Management

    Institute of Scientific and Technical Information of China (English)

    WANG Lin; ZHUANG Yan-bin; ZHENG Cheng-zeng

    2007-01-01

    A video patrol and inspection system is an important part of the government's shipping channel information management. This system is mainly applied to video information gathering and processing as a patrol is carried out. The system described in this paper can preview, edit, and add essential explanation messages to the collected video data. It then transfers these data and messages to a video server for the leaders and engineering and technical personnel to retrieve, play, chart, download or print. Each department of the government will use the system's functions according to that department's mission. The system can provide an effective means for managing the shipping enterprise. It also provides a valuable reference for the modernizing of waterborne shipping.

  20. Research on key techniques of virtual reality applied in mining industry

    Institute of Scientific and Technical Information of China (English)

    LIAO Jun; LU Guo-bin

    2009-01-01

    Based on the applications of virtual reality technology in many fields, introduced the virtual reality technical basic concept, structure type, related technique development, etc., tallied up applications of virtual reality technique in the present mining industry, inquired into core techniques related software and hardware, especially the optimization in the setup of various 3D models technique, and carried out a virtual scene to travel extensively in real-time by stereoscopic manifestation technique and so on. Then it brought forward the solution of virtual reality technique with software and hardware to the mining industry that can satisfy the demand of different aspects and levers. Finally, it show a fine prospect of virtual reality technique applied in the mining industry.

  1. Task shifting: A key strategy in the multipronged approach to reduce maternal mortality in India.

    Science.gov (United States)

    Bhushan, Himanshu; Bhardwaj, Ajey

    2015-10-01

    Task shifting from specialist to nonspecialist doctors (NSDs) is an important strategy that has been implemented in India to overcome the critical shortage of healthcare workers by using the human resources available to serve the vast population, particularly in rural areas. A competency-based training program in comprehensive emergency obstetric care was implemented to train and certify NSDs. Trained NSDs were able to provide key services in maternal health, which contribute toward reductions in maternal morbidity and mortality. The present article provides an overview of the maternal health challenges, shares important steps in program implementation, and shows how challenges can be overcome. The lessons learned from this experience contribute to understanding how task shifting can be used to address large-scale public health issues in low-resource countries and in particular solutions to address maternal health issues.

  2. Task shifting: A key strategy in the multipronged approach to reduce maternal mortality in India.

    Science.gov (United States)

    Bhushan, Himanshu; Bhardwaj, Ajey

    2015-10-01

    Task shifting from specialist to nonspecialist doctors (NSDs) is an important strategy that has been implemented in India to overcome the critical shortage of healthcare workers by using the human resources available to serve the vast population, particularly in rural areas. A competency-based training program in comprehensive emergency obstetric care was implemented to train and certify NSDs. Trained NSDs were able to provide key services in maternal health, which contribute toward reductions in maternal morbidity and mortality. The present article provides an overview of the maternal health challenges, shares important steps in program implementation, and shows how challenges can be overcome. The lessons learned from this experience contribute to understanding how task shifting can be used to address large-scale public health issues in low-resource countries and in particular solutions to address maternal health issues. PMID:26433512

  3. Strategies and techniques of communication and public relations applied to non-profit sector

    Directory of Open Access Journals (Sweden)

    Ioana – Julieta Josan

    2010-05-01

    Full Text Available The aim of this paper is to summarize the strategies and techniques of communication and public relations applied to non-profit sector.The approach of the paper is to identify the most appropriate strategies and techniques that non-profit sector can use to accomplish its objectives, to highlight specific differences between the strategies and techniques of the profit and non-profit sectors and to identify potential communication and public relations actions in order to increase visibility among target audience, create brand awareness and to change into positive brand sentiment the target perception about the non-profit sector.

  4. Simultaneous effect of RCM key indicators, related to equipment lifecycle for maintenance strategies (in production systems

    Directory of Open Access Journals (Sweden)

    Mohammad Zadhoosh

    2015-07-01

    Full Text Available In the modern industrial world, effective role of maintenance activities in the survival of organizations and enhancing their productivity is undeniable. Variety of equipments in the industrial organizations and their exclusivities in terms of longevity and failures modes, clear the importance of choosing a strategy for the maintenance of any equipment. Thus, knowing the type of the failure is so important for maintenance manager and engineers. Important introduced indicators in this domain such as indicator of reliability, MTBF and MTTR can be used to predicting and detecting approximate failure time and analyzing life cycle status. On the other hand, due to fluctuating time of system availability because of work continuity and loss of a performance indicator, by combining RCM indicators and Overall Equipment Effectiveness (OEE indicator the most compatible strategy could be chosen. The aim of this article which differs from other studies in this field is to apply a composed indicator, including different parameters of RCM, which is obtained based on the equipment life status.

  5. Future scientific drilling in the Arctic Ocean: Key objectives, areas, and strategies

    Science.gov (United States)

    Stein, R.; Coakley, B.; Mikkelsen, N.; O'Regan, M.; Ruppel, C.

    2012-04-01

    Past, Present and Future Changes in Arctic Terrestrial and Marine Systems" (Kananaskis, Alberta/Canada, February 2012). During these workshops, key areas and key scientific themes as well as drilling and site-survey strategies were discussed. Major scientific themes for future Arctic drilling will include: - The Arctic Ocean during the transition from greenhouse to icehouse conditions and millennial scale climate changes; - Physical and chemical changes of the evolving Polar Ocean and Arctic gateways; - Impact of Pleistocene/Holocene warming and sea-level rise on upper continental slope and shelf gas hydrates and on shelf permafrost; - Land-ocean interactions; - Tectonic evolution and birth of the Arctic Ocean basin: Arctic ridges, sea floor spreading and global lithosphere processes. When thinking about future Arctic drilling, it should be clearly emphasized that for the precise planning of future Arctic Ocean drilling campaigns, including site selection, evaluation of proposed drill sites for safety and environmental protection, etc., comprehensive site survey data are needed first. This means that the development of a detailed site survey strategy is a major challenge for the coming years. Here, an overview of perspectives and plans for future Arctic Ocean drilling will be presented.

  6. Assessment of Instructional and Administrative Strategies Applied by Principals to Improve Academic Performance

    Science.gov (United States)

    Akiri, Agharuwhe A.

    2014-01-01

    The study is based on the assessment of instructional and administrative strategies applied by principals to improve academic performance of students in schools. This simply means that the individual talents of everyone in school needs to be maximized for the effective benefit of the school, students, parents, and the society at large. It is…

  7. Enhancing Social Presence in Online Learning: Mediation Strategies Applied to Social Networking Tools

    Science.gov (United States)

    Joyce, Kristopher M.; Brown, Abbie

    2009-01-01

    An exploration of the mediation strategies applied to social networking tools for purposes of enhancing social presence for students participating in online course work. The article includes a review of the literature, specific examples from the authors' professional practice and recommendations for creating a positive social experience for online…

  8. Modeling boolean decision rules applied to multiple-observer decision strategies.

    Science.gov (United States)

    Maguire, W

    1996-01-01

    A model that derives multiple-observer decision strategy ROC curves for boolean decision rules applied to binary decisions of two or three observers is presented. It is assumed that covert decision variables consistent with ROC models of observer performance underlie decisions and that readers' decision criteria are in a fixed relationship. The specific parameters of individual ROC curves and the correlational structure that describes interobserver agreement have dramatic effects upon the relative benefits to be derived from different boolean strategies. A common strategy employed in clinical practice, in which the overall decision is positive if any observer makes a positive decision, is most effective when the readers are of similar ability, when they adopt similar decision criteria, when interreader agreement is greater for negative than for positive cases, and when the individual ROC slope is observer decision strategies can be evaluated using the model equations. A bootstrap method for testing model-associated hypotheses is described. PMID:8717599

  9. How Do Deaf Children with and without Cochlear Implants Manage to Read Sentences: The Key Word Strategy

    Science.gov (United States)

    Domínguez, Ana-Belén; Carrillo, María-Soledad; González, Virginia; Alegria, Jesús

    2016-01-01

    The aim of this study is to examine the mechanisms used by deaf children with and without cochlear implants (CIs) to read sentences and the linguistic bases (vocabulary and syntax) underlying those reading mechanisms. Previous studies have shown that deaf persons read sentences using the key word strategy (KWS), which consists of identifying some…

  10. Key Strategies Used by Title I Elementary School Principals to Increase Student Achievement in Six San Bernardino County Schools

    Science.gov (United States)

    Brown, Marcie

    2011-01-01

    Purpose: The purpose of this case study was to determine key strategies in the areas of instructional leadership, communication, and empowerment used by the principals of selected high-poverty elementary schools in two high-poverty San Bernardino County school districts that exceeded their Academic Performance Index growth target score by forty or…

  11. IMPROVING STUDENTS’ SKIMMING AND SCANNING IN READING SKILL BY APPLYING METACOGNITIVE STRATEGY

    Directory of Open Access Journals (Sweden)

    Siti Mariam

    2016-07-01

    Full Text Available Reading is one of the main four language skills that a learner needs to master in order to ensure success in learning English. To facilitate students in comprehending a text, the effective strategies should be used. One of the strategies is Meta-cognitive strategies. The objectives of the research are to identify students’ responses during learned process by using Meta-cognitive strategies and to investigate how high students’ improvement of skimming and scanning reading skill after learned by using Meta-cognitive strategies in recount text. Meta-cognitive strategies improve students to reflect on thought processes and to plan, monitor, and evaluate aspects of their learning. The participants were third semester of English department students of Islamic Education and Teacher Training Faculty of Walisongo State Islamic University.The reserch design was Classroom Action Research with 1 preliminary cycle and 2 cycles. This research was conducted from March, 2th 2015 until March, 21th 2015. Data collection technique was tests. Observations were done in each cycle. Tests form was given the students, they should answer 20 questions of multiple choice test. Then, the data were analyzed using mean (descriptive statistics to find out the improvements. Meta-cognitive strategies were applied in the teaching learning process by giving plan (giving task for students, monitoring, evaluating, and problem solving to the students. After collecting the data, the result showed the improvements of the students. Students’ average score in pre cycle test was 60. In the first cycle, the average score increased became 70. This score hadn’t met the minimum standard score yet 75. Therefore, second cycle was conducted. Students’ average score increased became 82.16. Students’ engagements also increased since the first cycle. Consequently, the objectives were reached. Based on the result, it could be concluded that Meta-cognitive strategy can improve the

  12. Songbirds and humans apply different strategies in a sound sequence discrimination task

    Directory of Open Access Journals (Sweden)

    Yoshimasa eSeki

    2013-07-01

    Full Text Available The abilities of animals and humans to extract rules from sound sequences have previously been compared using observation of spontaneous responses and conditioning techniques. However, the results were inconsistently interpreted across studies possibly due to methodological and/or species differences. Therefore, we examined the strategies for discrimination of sound sequences in Bengalese finches and humans using the same protocol. Birds were trained on a GO/NOGO task to discriminate between two categories of sound stimulus generated based on an AAB or ABB rule. The sound elements used were taken from a variety of male (M and female (F calls, such that the sequences could be represented as MMF and MFF. In test sessions, FFM and FMM sequences, which were never presented in the training sessions but conformed to the rule, were presented as probe stimuli. The results suggested two discriminative strategies were being applied: 1 memorizing sound patterns of either GO or NOGO stimuli and generating the appropriate responses for only those sounds; and 2 using the repeated element as a cue. There was no evidence that the birds successfully extracted the abstract rule (i.e. AAB and ABB; MMF-GO subjects did not produce a GO response for FFM and vice versa. Next we examined whether those strategies were also applicable for human participants on the same task. The results and questionnaires revealed that participants extracted the abstract rule, and most of them employed it to discriminate the sequences. This strategy was never observed in bird subjects, although some participants used strategies similar to the birds when responding to the probe stimuli. Our results showed that the human participants applied the abstract rule in the task even without instruction but Bengalese finches did not, thereby reconfirming that humans have to extract abstract rules from sound sequences that is distinct from non-human animals.

  13. Shikimic acid production in Escherichia coli: From classical metabolic engineering strategies to omics applied to improve its production

    Directory of Open Access Journals (Sweden)

    Juan Andrés Martínez

    2015-09-01

    Full Text Available Shikimic acid (SA is an intermediate of the SA pathway that is present in bacteria and plants. SA has gained great interest because it is a precursor in the synthesis of the drug oseltamivir phosphate (OSF, an efficient inhibitor of the neuraminidase enzyme of diverse seasonal influenza viruses, the avian influenza virus H5N1, and the human influenza virus H1N1. For the purposes of OSF production, SA is extracted from the pods of Chinese star anise plants (Illicium spp., yielding up to 17% of SA (dry basis content. The high demand for OSF necessary to manage a major influenza outbreak is not adequately met by industrial production using SA from plants sources. As the SA pathway is present in the model bacteria Escherichia coli, several intuitive metabolically engineered strains have been applied for its successful overproduction by biotechnological processes, resulting in strains producing up to 71 g/L of SA, with high conversion yields of up to 0.42 (mol SA/mol Glc, in both batch and fed-batch cultures using complex fermentation broths, including glucose as a carbon source and yeast extract. Global transcriptomic analyses have been performed in SA producing strains, resulting in the identification of possible key target genes for the design of a rational strain improvement strategy. Because possible target genes are involved in the transport, catabolism and interconversion of different carbon sources and metabolic intermediates outside the central carbon metabolism and SA pathways, as genes involved in diverse cellular stress responses, the development of rational cellular strain improvement strategies based on omics data constitutes a challenging task to improve SA production in currently overproducing engineered strains. In this review, we discuss the main metabolic engineering strategies that have been applied for the development of efficient SA producing strains, as the perspective of omics analysis has focused on further strain improvement

  14. Restoration of natural capital: a key strategy on the path to sustainability

    NARCIS (Netherlands)

    Blignaut, J.N.; Aronson, J.; Groot, de R.S.

    2014-01-01

    Three intertwining braids or strategies to enable transition towards sustainability can be identified, namely: (i) appropriate sustainable technologies, (ii) revising behaviour including reproduction and consumption patterns, and (iii) investment in the restoration of natural capital (RNC). Less exp

  15. Manufacturing Strategy & Operations: Reflections on Key Current Issues: Challenges and Associated Human Resource Implications

    OpenAIRE

    McGrath, Lorraine

    2013-01-01

    This chapter evaluates the current issues and challenges in defining a company’s manufacturing strategy and its production operations in consideration of the contemporary shift to low cost manufacturing locations. Competitive priorities of cost, quality, delivery and flexibility are reviewed. The structural and infrastructure elements of a manufacturing strategy are outlined. Mitigating risks in a global arena are reviewed. Collaborative efforts, including the cultural and personality issues ...

  16. Implementing Key Strategies for Successful Network Integration in the Quebec Substance-Use Disorders Programme

    Directory of Open Access Journals (Sweden)

    Marie-Josée Fleury

    2016-04-01

    Full Text Available Background: Fragmentation and lack of coordination often occur among organisations offering treatment for individuals with substance-use disorders. Better integration from a system perspective within a network of organisations offering substance-use disorder services can be developed using various integration strategies at the administrative and clinical levels. This study aims to identify integration strategies implemented in Quebec substance-use disorder networks and to assess their strengths and limitations. Methods: A total of 105 stakeholders representing two regions and four local substance-use disorder networks participated in focus groups or individual interviews. Thematic qualitative and descriptive quantitative analyses were conducted. Results: Six types of service integration strategies have been implemented to varying degrees in substance-use disorder networks. They are: 1 coordination activities-governance, 2 primary-care consolidation models, 3 information and monitoring management tools, 4 service coordination strategies, 5 clinical evaluation tools and 6 training activities. Conclusion: Important investments have been made in Quebec for the training and assessment of individuals with substance-use disorders, particularly in terms of support for emergency room liaison teams and the introduction of standardised clinical evaluation tools. However, the development of integration strategies was insufficient to ensure the implementation of successful networks. Planning, consolidation of primary care for substance-use disorders and systematic implementation of various clinical and administrative integration strategies are needed in order to ensure a better continuum of care for individuals with substance-use disorders.

  17. Microorganisms in heavy metal bioremediation: strategies for applying microbial-community engineering to remediate soils

    Directory of Open Access Journals (Sweden)

    Jennifer L. Wood

    2016-06-01

    Full Text Available The remediation of heavy-metal-contaminated soils is essential as heavy metals persist and do not degrade in the environment. Remediating heavy-metal-contaminated soils requires metals to be mobilized for extraction whilst, at the same time, employing strategies to avoid mobilized metals leaching into ground-water or aquatic systems. Phytoextraction is a bioremediation strategy that extracts heavy metals from soils by sequestration in plant tissues and is currently the predominant bioremediation strategy investigated for remediating heavy-metal-contaminated soils. Although the efficiency of phytoextraction remains a limiting feature of the technology, there are numerous reports that soil microorganisms can improve rates of heavy metal extraction.This review highlights the unique challenges faced when remediating heavy-metal-contaminated soils as compared to static aquatic systems and suggests new strategies for using microorganisms to improve phytoextraction. We compare how microorganisms are used in soil bioremediation (i.e. phytoextraction and water bioremediation processes, discussing how the engineering of microbial communities, used in water remediation, could be applied to phytoextraction. We briefly outline possible approaches for the engineering of soil communities to improve phytoextraction either by mobilizing metals in the rhizosphere of the plant or by promoting plant growth to increase the root-surface area available for uptake of heavy metals. We highlight the technological advances that make this research direction possible and how these technologies could be employed in future research.

  18. [Social marketing: applying commercial strategies to the prevention of nosocomial infections].

    Science.gov (United States)

    Sax, Hugo; Longtin, Yves; Alvarez-Ceyssat, Raymonde; Bonfillon, Chantal; Cavallero, Sabrina; Dayer, Pierre; Ginet, Claude; Herrault, Pascale

    2009-04-01

    Although a large proportion of healthcare-associated infections are avoidable, healthcare workers do not always practice evidence-based preventive strategies. Marketing technologies might help to improve patient safety. This article presents the basic principles of marketing and its potential use to promote good infection control practices. The marketing mix (Product, Price, Place, and Promotion) should be taken into account to induce behaviour change. By placing the emphasis on the perceived "profits" for healthcare workers the approach might lose its moral aspect and gain in effectiveness. VigiGerme, a non-commercial registered trademark, applies social marketing techniques to infection control and prevention. PMID:19492518

  19. [Social marketing: applying commercial strategies to the prevention of nosocomial infections].

    Science.gov (United States)

    Sax, Hugo; Longtin, Yves; Alvarez-Ceyssat, Raymonde; Bonfillon, Chantal; Cavallero, Sabrina; Dayer, Pierre; Ginet, Claude; Herrault, Pascale

    2009-04-01

    Although a large proportion of healthcare-associated infections are avoidable, healthcare workers do not always practice evidence-based preventive strategies. Marketing technologies might help to improve patient safety. This article presents the basic principles of marketing and its potential use to promote good infection control practices. The marketing mix (Product, Price, Place, and Promotion) should be taken into account to induce behaviour change. By placing the emphasis on the perceived "profits" for healthcare workers the approach might lose its moral aspect and gain in effectiveness. VigiGerme, a non-commercial registered trademark, applies social marketing techniques to infection control and prevention.

  20. Achieving synergy between strategy and innovation: The key to value creation

    Directory of Open Access Journals (Sweden)

    Dobni, C.B.

    2010-01-01

    Full Text Available An innovation perspective provides an unencumbered clean sheet view of the future, as it is only concerned with what opportunities lie ahead. It prompts the organization to consider the question of 'what future state do we want to achieve?' as opposed to the orchestrated approaches of strategic planning that promotes incrementalism. The perspective chosen will often determine whether an organization is a competitive innovator and competitive imitator. In today's economic environment, organizations are required to create differentiable value. To do so requires a certain synergy between strategy and innovation. This article outlines the importance of innovation, but more importantly discusses the relationship between strategy and innovation. It argues that strategic innovation is logical, yet strategy and innovation are quite different, both in terms of definition and function. These differences are identified, and approaches to achieving synergy are outlined.

  1. Development ofin-situproduct removal strategies in biocatalysis applying scaled-down unit operations

    DEFF Research Database (Denmark)

    Heintz, Søren; Börner, Tim; Ringborg, Rolf Hoffmeyer;

    2016-01-01

    An experimental platform based on scaled-down unit operations combined in a plug-and-play manner enables easy and highly flexible testing of advanced biocatalytic process options such as in-situ product removal (ISPR) process strategies. In such a platform it is possible to compartmentalize...... different process steps while operating it as a combined system, giving the possibility to test and characterize the performance of novel process concepts and biocatalysts with minimal influence of inhibitory products. Here the capabilities of performing process development by applying scaled-down unit...... operations are highlighted through a case study investigating the asymmetric synthesis of 1-methyl-3-phenylpropylamine (MPPA) using ω-transaminase, an enzyme in the sub-family of amino transferases (ATAs). An on-line HPLC system was applied to avoid manual sample handling and to semi...

  2. How Key Account Management and Competitive Intelligence can Contribute to the Development of Corporate Strategy

    OpenAIRE

    Dean, Crispin

    2013-01-01

    One of the proxies for the success of a corporate strategy is firm performance. This is because “performance is a surrogate for the alignment between an organization’s internal processes (strategy, structure, etc) and the external environment.”1 Business excellence therefore hangs together with the attainment of such an alignment. It is two of the processes that support such an alignment between customer and supplier that are the subject of this paper. The processes in question are so called ...

  3. On the Data Mining Technology Applied to Active Marketing Model of International Luxury Marketing Strategy in China— An Empirical Analysis

    Directory of Open Access Journals (Sweden)

    Qishen Zhou

    2013-09-01

    Full Text Available  This paper emphasizes the importance of active marketing in the customer relationship management. Especially, the data mining technology is applied to establish an active marketing model to empirically analyze the condition of the AH Jewelry Company. Michael Porter's Five Forces Model is employed to assess and calculate the similarity in the active marketing model. Then, the questionnaire analysis on the customer relationship management model is carried out to explain the target market and target customer groups of AH Jewelry Company. The cluster analysis and principal component analysis (PCA are applied as data mining tool to investigate factors and problems that influence marketing effect of the AH Jewelry Company. The analysis results show that it becomes a key problem to enhance the customer loyalty and retain the customers under the changeable consumption environment. Data mining technology can help to analyze the historical data to produce the clients set which is most closed to the customer behaviors, and regards the most interesting information as the recommendation to the customers. Hence, marketing optimization strategy could be proposed as reference to manage the luxury marketing.

  4. Evaluating nest supplementation as a recovery strategy for the endangered rodents of the Florida Keys

    Science.gov (United States)

    Cove, Michael V.; Simons, Theodore R.; Gardner, Beth; Maurer, Andrew S.; O'Connell, Allan F.

    2016-01-01

    The Key Largo woodrat (Neotoma floridana smalli) and Key Largo cotton mouse (Peromyscus gossypinus allapaticola) are federally endangered subspecies endemic to the tropical hardwood hammocks of Key Largo, Florida. Woodrats are considered generalists in habitat and diet, yet a steady decline in natural stick nests and capture rates over the past several decades suggests that they are limited by the availability of nesting habitat due to habitat loss and fragmentation. The more specialized Key Largo cotton mouse appears to rely on old growth hammock, a habitat type that is rare following past land clearing. In 2004, the U.S. Fish and Wildlife Service started building supplemental nest structures to restore habitat quality and connectivity for these endangered rodents, but nest use requires evaluation. We used camera traps and occupancy models to evaluate the factors influencing woodrat and cotton mouse use of the supplemental nests. We detected woodrats at 65 and cotton mice at 175 of 284 sampled nest structures, with co-occurrence at 38 nests. Woodrat nest use followed a gradient from low nest use in the north to high nest use in the south, which might relate to the proximity of free-ranging domestic cat (Felis catus) colonies in residential developments. Cotton mouse nest use, however, was related positively to mature hammock and related negatively to disturbed areas (e.g. scarified lands). The two species occurred independently of each other. Stick-stacking behavior was observed at supplemental nests and, although it was correlated with detection of woodrats, it was not a strong predictor of their occurrence. We suggest that nest supplementation can be an important tool for species recovery as habitat quality continues to improve with succession.

  5. RENEWABLE ENERGY, A KEY TO INTEGRATING COMPETITIVE POLICIES WITH ADVANCED ENVIRONMENT PROTECTION STRATEGIES

    OpenAIRE

    Cinade Lucian Ovidiu

    2011-01-01

    Development of competitive policies and improvement of environment protection strategies are two basic trends of the development of the European Unique Market. Energy, also known as "industry bread", is basic product and strategic resource, where energy industry plays an obvious role in the economic and social development of any community. Traditional energy production is marred by three major drawbacks: it generates negative externalities by polluting; it is totally in the hands of the produ...

  6. Contextualising change through a common strategy: Lecturers' perceptions and key role in supporting academic reform

    Science.gov (United States)

    Kindelan, Paz; Martin, Ana

    2014-05-01

    European universities are currently going through a process of change in order to meet the common goals set for higher education by the European Commission. They are revising their educational models to adjust them to the guidelines of the "Bologna Process" and are devising an institutional strategy for its implementation. In practical terms, this means aligning former national degrees and diplomas to standard European Bachelor and Masters degrees and PhD doctorates, by creating acknowledged professional qualification benchmarks that also include adjusted course lengths and contents. This process, in the end, mostly affects academic staff members who have a fundamental role to play in carrying out the pedagogical reforms on the teaching front. Besides presenting a commentary on the institutional approach of one particular technical university in Spain, the purpose of this paper is to propose, from the authors' point of view as lecturers, a strategy which has the potential to create a favourable atmosphere for carrying out such a reform. The article's main objective is to highlight a series of action points which may serve to reinforce and advance the main institutional strategy by relying on the powerful influence of its academic staff members.

  7. A model ternary heparin conjugate by direct covalent bond strategy applied to drug delivery system.

    Science.gov (United States)

    Wang, Ying; Xin, Dingcheng; Hu, Jiawen; Liu, Kaijian; Pan, Jiangao; Xiang, Jiannan

    2009-01-01

    A model ternary heparin conjugate by direct covalent bond strategy has been developed, in which modified heparin using active mix anhydride as intermediate conjugates with model drug molecule and model specific ligand, respectively. Designed ester bonds between model drug and heparin facilitate hydrolysis kinetics research. The strategy can be extended to design and synthesize a targeted drug delivery system. The key point is to use mixed anhydride groups as activating intermediates to mediate the synthesis of the ternary heparin conjugate. Formation of mixed anhydride is detected by the conductimetry experiment. The ternary heparin conjugate is characterized by (13)C NMR, FT-IR and GPC, respectively. The decreased trend on degree of substitution (DS) is consistent with that of introduced anticancer drug and specific ligand in drug delivery system. Moreover, their anticoagulant activity is evaluated by measuring activated partial thromboplastin time (APTT) and anti-factor Xa activity. The results show that model ternary heparin conjugate with reduced anticoagulant activity may avoid the risk of severe hemorrhagic complication during the administration and is potential to develop a safe and effective drug delivery system on anticancer research.

  8. DSC: software tool for simulation-based design of control strategies applied to wastewater treatment plants.

    Science.gov (United States)

    Ruano, M V; Ribes, J; Seco, A; Ferrer, J

    2011-01-01

    This paper presents a computer tool called DSC (Simulation based Controllers Design) that enables an easy design of control systems and strategies applied to wastewater treatment plants. Although the control systems are developed and evaluated by simulation, this tool aims to facilitate the direct implementation of the designed control system to the PC of the full-scale WWTP (wastewater treatment plants). The designed control system can be programmed in a dedicated control application and can be connected to either the simulation software or the SCADA of the plant. To this end, the developed DSC incorporates an OPC server (OLE for process control) which facilitates an open-standard communication protocol for different industrial process applications. The potential capabilities of the DSC tool are illustrated through the example of a full-scale application. An aeration control system applied to a nutrient removing WWTP was designed, tuned and evaluated with the DSC tool before its implementation in the full scale plant. The control parameters obtained by simulation were suitable for the full scale plant with only few modifications to improve the control performance. With the DSC tool, the control systems performance can be easily evaluated by simulation. Once developed and tuned by simulation, the control systems can be directly applied to the full-scale WWTP.

  9. Prediction of key genes in ovarian cancer treated with decitabine based on network strategy.

    Science.gov (United States)

    Wang, Yu-Zhen; Qiu, Sheng-Chun

    2016-06-01

    The objective of the present study was to predict key genes in ovarian cancer before and after treatment with decitabine utilizing a network approach and to reveal the molecular mechanism. Pathogenic networks of ovarian cancer before and after treatment were identified based on known pathogenic genes (seed genes) and differentially expressed genes (DEGs) detected by Significance Analysis of Microarrays (SAM) method. A weight was assigned to each gene in the pathogenic network and then candidate genes were evaluated. Topological properties (degree, betweenness, closeness and stress) of candidate genes were analyzed to investigate more confident pathogenic genes. Pathway enrichment analysis for candidate and seed genes were conducted. Validation of candidate gene expression in ovarian cancer was performed by reverse transcriptase-polymerase chain reaction (RT-PCR) assays. There were 73 nodes and 147 interactions in the pathogenic network before treatment, while 47 nodes and 66 interactions after treatment. A total of 32 candidate genes were identified in the before treatment group of ovarian cancer, of which 16 were rightly candidate genes after treatment and the others were silenced. We obtained 5 key genes (PIK3R2, CCNB1, IL2, IL1B and CDC6) for decitabine treatment that were validated by RT-PCR. In conclusion, we successfully identified 5 key genes (PIK3R2, CCNB1, IL2, IL1B and CDC6) and validated them, which provides insight into the molecular mechanisms of decitabine treatment and may be potential pathogenic biomarkers for the therapy of ovarian cancer.

  10. Post-translational modifications are key players of the Legionella pneumophila infection strategy

    Science.gov (United States)

    Michard, Céline; Doublet, Patricia

    2015-01-01

    Post-translational modifications (PTMs) are widely used by eukaryotes to control the enzymatic activity, localization or stability of their proteins. Traditionally, it was believed that the broad biochemical diversity of the PTMs is restricted to eukaryotic cells, which exploit it in extensive networks to fine-tune various and complex cellular functions. During the last decade, the advanced detection methods of PTMs and functional studies of the host–pathogen relationships highlight that bacteria have also developed a large arsenal of PTMs, particularly to subvert host cell pathways to their benefit. Legionella pneumophila, the etiological agent of the severe pneumonia legionellosis, is the paradigm of highly adapted intravacuolar pathogens that have set up sophisticated biochemical strategies. Among them, L. pneumophila has evolved eukaryotic-like and rare/novel PTMs to hijack host cell processes. Here, we review recent progress about the diversity of PTMs catalyzed by Legionella: ubiquitination, prenylation, phosphorylation, glycosylation, methylation, AMPylation, and de-AMPylation, phosphocholination, and de-phosphocholination. We focus on the host cell pathways targeted by the bacteria catalyzed PTMs and we stress the importance of the PTMs in the Legionella infection strategy. Finally, we highlight that the discovery of these PTMs undoubtedly made significant breakthroughs on the molecular basis of Legionella pathogenesis but also lead the way in improving our knowledge of the eukaryotic PTMs and complex cellular processes that are associated to. PMID:25713573

  11. High protein flexibility and reduced hydration water dynamics are key pressure adaptive strategies in prokaryotes.

    Science.gov (United States)

    Martinez, N; Michoud, G; Cario, A; Ollivier, J; Franzetti, B; Jebbar, M; Oger, P; Peters, J

    2016-01-01

    Water and protein dynamics on a nanometer scale were measured by quasi-elastic neutron scattering in the piezophile archaeon Thermococcus barophilus and the closely related pressure-sensitive Thermococcus kodakarensis, at 0.1 and 40 MPa. We show that cells of the pressure sensitive organism exhibit higher intrinsic stability. Both the hydration water dynamics and the fast protein and lipid dynamics are reduced under pressure. In contrast, the proteome of T. barophilus is more pressure sensitive than that of T. kodakarensis. The diffusion coefficient of hydration water is reduced, while the fast protein and lipid dynamics are slightly enhanced with increasing pressure. These findings show that the coupling between hydration water and cellular constituents might not be simply a master-slave relationship. We propose that the high flexibility of the T. barophilus proteome associated with reduced hydration water may be the keys to the molecular adaptation of the cells to high hydrostatic pressure. PMID:27595789

  12. CO2 recycling: a key strategy to introduce green energy in the chemical production chain.

    Science.gov (United States)

    Perathoner, Siglinda; Centi, Gabriele

    2014-05-01

    The introduction of renewable energy in the chemical production chain is a key strategic factor both to realize a sustainable, resource-efficient, low-carbon economy and society and to drive innovation and competiveness in the chemical production. This Concept discusses this concept in terms of motivations, perspectives, and impact as well as technical barriers to achieve this goal. It is shown how an important element to realize this scenario is to foster the paths converting carbon dioxide (CO2) into feedstock for the chemical/process industry, which is one of the most efficient methods to rapidly introduce renewable energy into the chemical production chain. Some of the possible options to proceed in this direction are discussed, with focus on the technical barriers and enabling factors such as catalysis. The tight interconnection between CO2 management and the use of renewable energy is evidenced. PMID:24599714

  13. Consumer-perceived value: the key to a successful business strategy in the healthcare marketplace.

    Science.gov (United States)

    Ettinger, W H

    1998-01-01

    The Medicare market is becoming increasingly competitive and uncertain. To compete successfully for a share of the Medicare market, providers must: Have a cogent strategy that defines their customers and the value proposition for those customers Design their services to maximize the benefits of outcomes and service process that are important to consumers Determine the needed structure and infrastructure to put those services in place Marketing research is critical in this regard, as is effectiveness tracking. This approach is different from that usually taken by healthcare providers in the marketplace. It means being strategic rather than tactical and proactive rather than reactive. Most importantly, providers must shift their focus externally to the consumer's needs rather than their own. Finally, this approach requires working together in an integrated organization with common goals. PMID:9434675

  14. RENEWABLE ENERGY, A KEY TO INTEGRATING COMPETITIVE POLICIES WITH ADVANCED ENVIRONMENT PROTECTION STRATEGIES

    Directory of Open Access Journals (Sweden)

    Cinade Lucian Ovidiu

    2011-12-01

    Full Text Available Development of competitive policies and improvement of environment protection strategies are two basic trends of the development of the European Unique Market. Energy, also known as 'industry bread', is basic product and strategic resource, where energy industry plays an obvious role in the economic and social development of any community. Traditional energy production is marred by three major drawbacks: it generates negative externalities by polluting; it is totally in the hands of the producers; hence, prices rise at their will, of fossil fuels such as oil and gas. Present study focuses on electric energy industry, yet bearing over the whole length of the chain producer-to-end-consumer, thus revealed as particularly complex. The question is do alternative energy sources meet the prerequisite of market being competitive meanwhile environment protection being highly observed. We identify limits in point, of the energy market; effects of market liberalization; entry barriers; interchangeability level of energy sources; active forces on the energy market. Competitive rivalry has been expressed as per market micro-economic analysis, based on Michael Porter's 5-forces model. It will thus be noticed that, morphologically, competition evolution depends firstly on the market type. For the time being, the consumer on the energy market stays captive, for various reasons such as: legislation; limits of energy transfer infrastructure; scarcity of resources; resources availability imbalance; no integrative strategy available, of renewable energy resources usage. Energy availability is vital for human society to function. Comparative advantages of renewable energy resources are twofold, as manifested: in terms of economics, i.e. improving competition by substitute products entered at the same time as new producers enter market; and in terms of ecology, by reducing CO2 emissions. As to energy production technology and transfer, the complementary nature will

  15. The Impact of Employing Brainstorming Strategy on Improving Writing Performance of English Major Students at Balqa Applied University in Jordan

    Science.gov (United States)

    Amoush, Kholoud Hussein

    2015-01-01

    The study aimed at identifying the impact of employing brainstorming strategy on improving writing performance of English Major Students at Balqa Applied University in Jordan. The sample of the study which consisted of 80 male and female university students was distributed into two groups; experimental (taught by brainstorming strategy) and…

  16. Key Factors for the Linkage Strategy between R and D and Commercialization for Gen-ΙV

    International Nuclear Information System (INIS)

    The Fukushima nuclear disaster has leaded to enhance the safety and the cost-effectiveness of technology for the future so that advanced countries such as United Sates and France have concerned about a next generation nuclear power plant, Gen-IV(Generation-IV Reactor). Considering various characteristics of nuclear R and D, it is necessary to have more elaborated strategies for the effective development of the next generation of nuclear technology. In this study, we suggest 5 key factors for the successful commercialization of Gen-IV by analyzing the distinct characteristics of nuclear R and D with Gen-IV and CSF(Critical Success Factor)s of several cases in these field and conducting the FGI(Focus Group Interview). Considering these results, we could find and suggest some important points for further strategy for Gen-IV. That is, following five key factors for the linkage improvement between R and D and commercialization of Gen-IV should be considered: the participation of nuclear power plant operators from the beginning, the establishment of consistent and comprehensive plan/roadmap/detailed strategy, the technology development based on global energy issues and international cooperation, the stable and clear funding plans for long-term projects, the cooperation of relative ministries. Gen-IV system is getting a positive response in that it accompanies long-term R and D plans in Korea. We think that the standard of Gen-IV would lead the next generation of nuclear industry if the proper strategy for the cooperation between the private sector and the regulation from the beginning. Moreover, we expect that this study will facilitate its development process from R and D to commercialization

  17. Multiple imputations applied to the DREAM3 phosphoproteomics challenge: a winning strategy.

    Directory of Open Access Journals (Sweden)

    Nicolas Guex

    Full Text Available DREAM is an initiative that allows researchers to assess how well their methods or approaches can describe and predict networks of interacting molecules [1]. Each year, recently acquired datasets are released to predictors ahead of publication. Researchers typically have about three months to predict the masked data or network of interactions, using any predictive method. Predictions are assessed prior to an annual conference where the best predictions are unveiled and discussed. Here we present the strategy we used to make a winning prediction for the DREAM3 phosphoproteomics challenge. We used Amelia II, a multiple imputation software method developed by Gary King, James Honaker and Matthew Blackwell[2] in the context of social sciences to predict the 476 out of 4624 measurements that had been masked for the challenge. To chose the best possible multiple imputation parameters to apply for the challenge, we evaluated how transforming the data and varying the imputation parameters affected the ability to predict additionally masked data. We discuss the accuracy of our findings and show that multiple imputations applied to this dataset is a powerful method to accurately estimate the missing data. We postulate that multiple imputations methods might become an integral part of experimental design as a mean to achieve cost savings in experimental design or to increase the quantity of samples that could be handled for a given cost.

  18. Applying strategies from libertarian paternalism to decision making for prostate specific antigen (PSA screening

    Directory of Open Access Journals (Sweden)

    Black Amanda

    2011-04-01

    Full Text Available Abstract Background Despite the recent publication of results from two randomized clinical trials, prostate specific antigen (PSA screening for prostate cancer remains a controversial issue. There is lack of agreement across studies that PSA screening significantly reduces prostate cancer mortality. In spite of these facts, the widespread use of PSA testing in the United States leads to overdetection and overtreatment of clinically indolent prostate cancer, and its associated harms of incontinence and impotence. Discussion Given the inconclusive results from clinical trials and incongruent PSA screening guidelines, the decision to screen for prostate cancer with PSA testing is an uncertain one for patients and health care providers. Screening guidelines from some health organizations recommend an informed decision making (IDM or shared decision making (SDM approach for deciding on PSA screening. These approaches aim to empower patients to choose among the available options by making them active participants in the decision making process. By increasing involvement of patients in the clinical decision-making process, IDM/SDM places more of the responsibility for a complex decision on the patient. Research suggests, however, that patients are not well-informed of the harms and benefits associated with prostate cancer screening and are also subject to an assortment of biases, emotion, fears, and irrational thought that interferes with making an informed decision. In response, the IDM/SDM approaches can be augmented with strategies from the philosophy of libertarian paternalism (LP to improve decision making. LP uses the insights of behavioural economics to help people better make better choices. Some of the main strategies of LP applicable to PSA decision making are a default decision rule, framing of decision aids, and timing of the decision. In this paper, we propose that applying strategies from libertarian paternalism can help with PSA

  19. The strategy of the key players in the African oil sector (the Gulf of Guinea)?

    International Nuclear Information System (INIS)

    The African oil industry, (particularly in the deep water offshore fields of the Gulf of Guinea), is symbolic of the new balance of power taking shape in the oil industry between the international companies and the host state on the one hand, and between the petrol companies themselves on the other. In an area rich in potential and which has become highly competitive, the traditional players in the region's oil development sector (Shell, Chevron and TotalFinaElf) which have for so long been sheltered from genuine competition in their respective areas of activity, must now face up to the renewed ambitions of new 'Super Majors' (in particular ExxonMobil), not to mention those of many independent companies seeking to internationalize their business. Several reasons explain this change. Firstly, the main developments are now taking place offshore with deep water drilling, and financial solidity and technological competence have replaced the closeness of political links as key factors of success. In these conditions, the risk of long term marginalization for the medium-sized companies is considerable. Secondly, the need to achieve profitability stressed by the major petrol groups is opening the door to the independents who are operating a niche policy (based on marginal or mature fields which no longer interest the majors). This type of competition tends to promote activity and to open up new countries to exploration and production (in particular Equatorial Guinea). (author)

  20. HIV elite controllers as a key to novel strategies in treatment of HIV infection

    Directory of Open Access Journals (Sweden)

    A Pronin

    2012-11-01

    measurements. These represent 11.32% (95% CI: 5.17%; 17.47% from EC and 0.45% (95% CI: 0.19%; 0.71% from population with A1 (asymptomatic HIV-disease. Conclusions: Among EC patients with “minimal change disease” were identified. They may represent: (i primarily persistent HIV infection (with reduced productive cycle, (ii low dose (localized HIV-infection, (iii rare successful immune-mediated elimination of HIV that could be the model for novel elimination strategies.

  1. Optimization strategies in the modelling of SG-SMB applied to separation of phenylalanine and tryptophan

    Science.gov (United States)

    Diógenes Tavares Câmara, Leôncio

    2014-03-01

    The solvent-gradient simulated moving bed process (SG-SMB) is the new tendency in the performance improvement if compared to the traditional isocratic solvent conditions. In such SG-SMB process the modulation of the solvent strength leads to significant increase in the purities and productivity followed by reduction in the solvent consumption. A stepwise modelling approach was utilized in the representation of the interconnected chromatographic columns of the system combined with a lumped mass transfer model between the solid and liquid phase. The influence of the solvent modifier was considered applying the Abel model which takes into account the effect of modifier volume fraction over the partition coefficient. Correlation models of the mass transfer parameters were obtained through the retention times of the solutes according to the volume fraction of modifier. The modelling and simulations were carried out and compared to the experimental SG-SMB separation unit of the amino acids Phenylalanine and Tryptophan. The simulation results showed the great potential of the proposed modelling approach in the representation of such complex systems. The simulations showed great agreement fitting the experimental data of the amino acids concentrations both at the extract as well as at the raffinate. A new optimization strategy was proposed in the determination of the best operating conditions which uses the phi-plot concept.

  2. Improving Students' Science Text Comprehension through Metacognitive Self-Regulation When Applying Learning Strategies

    Science.gov (United States)

    Leopold, Claudia; Leutner, Detlev

    2015-01-01

    In three experiments, students were trained to use strategies for learning from scientific texts: text highlighting (Experiment 1), knowledge mapping (Experiment 2), and visualizing (Experiment 3). Each experiment compared a control condition, cognitive strategy training, and a combined cognitive strategy plus metacognitive self-regulation…

  3. Interpersonal Influence Strategies Applied to Sexual Decision-Making of Adolescents.

    Science.gov (United States)

    Falbo, Toni; Eisen, Marvin

    Little is known about the power strategies adolescents view as effective in influencing an intimate partner to have or avoid having sexual intercourse. These strategies were examined in a pretest survey of 203 adolescents who reported their agreement or disagreement with strategies used to have protected sex or to avoid having sex with a…

  4. Anaerobic degradation of homocyclic aromatic compounds via arylcarboxyl-coenzyme A esters: organisms, strategies and key enzymes.

    Science.gov (United States)

    Boll, Matthias; Löffler, Claudia; Morris, Brandon E L; Kung, Johannes W

    2014-03-01

    Next to carbohydrates, aromatic compounds are the second most abundant class of natural organic molecules in living organic matter but also make up a significant proportion of fossil carbon sources. Only microorganisms are capable of fully mineralizing aromatic compounds. While aerobic microbes use well-studied oxygenases for the activation and cleavage of aromatic rings, anaerobic bacteria follow completely different strategies to initiate catabolism. The key enzymes related to aromatic compound degradation in anaerobic bacteria are comprised of metal- and/or flavin-containing cofactors, of which many use unprecedented radical mechanisms for C-H bond cleavage or dearomatization. Over the past decade, the increasing number of completed genomes has helped to reveal a large variety of anaerobic degradation pathways in Proteobacteria, Gram-positive microbes and in one archaeon. This review aims to update our understanding of the occurrence of aromatic degradation capabilities in anaerobic microorganisms and serves to highlight characteristic enzymatic reactions involved in (i) the anoxic oxidation of alkyl side chains attached to aromatic rings, (ii) the carboxylation of aromatic rings and (iii) the reductive dearomatization of central arylcarboxyl-coenzyme A intermediates. Depending on the redox potential of the electron acceptors used and the metabolic efficiency of the cell, different strategies may be employed for identical overall reactions.

  5. 汽车遥控钥匙按键策略%The Strategy of Remote Keyless Key

    Institute of Scientific and Technical Information of China (English)

    周靖

    2012-01-01

    汽车遥控门禁系统(RKE-remote keyless entry system)是一种应用于车辆的防盗技术.它可以用来远程遥控车门的上锁和解锁请求.该系统通过钥匙端发送一串特殊编码的数据,汽车防盗系统在接收到该数据后,进行解码运算来判断该数据的有效性,之后执行上锁或解锁的请求.由于无线干扰问题的存在,当钥匙和汽车间的通讯时间越长,受干扰的几率就越大.为了避免经常出错,对整个发送方式做一改进,以尽量减少受干扰的情况发生.%A Remote Keyless Entry System is an anti-theft technology for vehicles. It can be used to remote control door lock and unlock requests. The system sends a stream through a specially coded data, the receiver in car gets the data and decodes with encrypt algorithm. After decrypting the key information, the vehicle performs lock or unlock request. As wireless interference problems, the longer the communication spends between the key and the vehicle, the greater the chance of interference. In order to avoid these mistakes, this paper tries to improve the method for key fob's button strategy.

  6. Applying Foreign Entry Market Strategies to UK Higher Education Transnational Education Models

    Science.gov (United States)

    Lindsay, Victoria; Antoniou, Christos

    2016-01-01

    We take a multidisciplinary approach mapping the models used by UK higher education (HE) institutions against established international business foreign market entry strategies. We review the conditions in host markets that facilitate market entry and consider how these will determine foreign market entry strategy. We specifically consider four…

  7. Effects of Applied Land Use Strategies on Farmland Soils in the Southwestern Siberian Kulunda-Steppe

    Science.gov (United States)

    Grunwald, Lars-Christian; Illiger, Patrick; Stephan, Eckart; Frühauf, Manfred

    2014-05-01

    The Kulunda steppe in southwestern Siberia is one of the most intensely used agricultural regions in the world. The study area of the KULUNDA project is the Kulunda steppe, which is a part of the conversion region created during the so called "virgin land campaign" in the soviet era. Nowadays it is characterized by widespread soil degradation. Despite the fact that agriculture is the basis of existence, land use practice is maladjusted to the local conditions. The widespread soil degradation and accordingly the decreased soil humus content have negative effects on crop yields in this region. With respect to climate change, the current study analyses the cause effect relationship between land use practice and soil properties. In particular, different methods of soil cultivation will be tested and for each of the cases the soil humus content, soil water, soil solute balance will be measured and compared. In addition, the possibilities of soil carbon sequestration capacity will be analyzed. Furthermore, the study aims to achieve properly adapted sustainable cropping systems to stabilize the yields and to increase the productivity of plant production per spatial unit in this high vulnerable dry farming region. In 2012 the long term field trials started at three test farms in different steppe biomes, containing different soil types from chernozems to kastanozems. Each of them is characterized by a negative water balance. Successfully running cropping models, such as crop rotation, tilling intensity, plant protection and nutrition strategies from south Canadian steppe regions were adapted to regional agronomic needs. The traditional Russian cultivation system will be compared with two modern systems, including no-tillage methods on specially randomized test plots. Additionally, these plots are equipped with soil moisture monitoring systems to analyze the soil water content in different depths under the different cropping methods. The expected results will not only deepen

  8. Applied Strategies for Improving Patient Safety: A Comprehensive Process To Improve Care in Rural and Frontier Communities

    Science.gov (United States)

    Westfall, John M.; Fernald, Douglas H.; Staton, Elizabeth W.; VanVorst, Rebecca; West, David; Pace, Wilson D.

    2004-01-01

    Medical errors and patient safety have gained increasing attention throughout all areas of medical care. Understanding patient safety in rural settings is crucial for improving care in rural communities. To describe a system to decrease medical errors and improve care in rural and frontier primary care offices. Applied Strategies for Improving…

  9. Psychosocial problems in pre-school children : Recognition and strategy applied by doctors and nurses in child health care objective.

    NARCIS (Netherlands)

    Reijneveld, SA; Brugman, E; Verhulst, FC; Verloove-Vanhorick, SP

    2005-01-01

    Psychosocial problems in pre-school children: recognition and strategy applied by doctors and nurses in child health care Objective. To assess the degree to which preventive child health professionals (CHPs) identify and manage psychosocial problems among pre-school children in the general populatio

  10. Psychosocial problems in pre-school children: Recognition and strategy applied by doctors and nurses in child health care objective

    NARCIS (Netherlands)

    Reijneveld, S.A.; Brugman, E.; Verhulst, F.C.; Verloove-Vanhorick, S.P.

    2005-01-01

    Psychosocial problems in pre-school children: recognition and strategy applied by doctors and nurses in child health care Objective. To assess the degree to which preventive child health professionals (CHPs) identify and manage psychosocial problems among pre-school children in the general populatio

  11. Uncertainty contributions due to different measurement strategies applied to optomechanical hole plate

    DEFF Research Database (Denmark)

    Morace, Renate Erica; Hansen, Hans Nørgaard; De Chiffre, Leonardo

    2003-01-01

    The work described in this paper deals with influence parameters in optical measurements, with particular respect to the choice of measurement strategy, which strongly affects the results of measurement. In this investigation, an optomechanical hole plate developed by DTU was measured...... with an optical CMM equipped with a CCD camera. Deviations up to 4 µm were observed for centre coordinates obtained using different measurement strategies. These deviations only came from optical influences since no movements of the CMM axes were introduced....

  12. Diversity-Oriented Synthetic Strategies Applied to Cancer Chemical Biology and Drug Discovery

    OpenAIRE

    Ian Collins; Jones, Alan M.

    2014-01-01

    How can diversity-oriented strategies for chemical synthesis provide chemical tools to help shape our understanding of complex cancer pathways and progress anti-cancer drug discovery efforts? This review (surveying the literature from 2003 to the present) considers the applications of diversity-oriented synthesis (DOS), biology-oriented synthesis (BIOS) and associated strategies to cancer biology and drug discovery, summarising the syntheses of novel and often highly complex scaffolds from p...

  13. Benefits and opportunities for applying Integrated Management Systems (IMS) strategies in the nuclear industry

    International Nuclear Information System (INIS)

    Full text: The safe, reliable, and cost-effective operation of Nuclear Power Facilities require a vast accumulation of information - volumes of scientific research, engineering analysis, operational data, regulatory reviews and many other types of technical information - combined with a complex assortment of people with the requisite educational background, expertise and acquired insight to apply that body of knowledge safely and effectively. This paper is intended to address the changing strategies and deployment techniques of IMS by identifying and examining initiatives that have been instigated in other regulated (and non-regulated industries), analyzing the opportunities, challenges and success criteria. 'Virtually everything in business today is an undifferentiated commodity except how a company manages its information. How you manage information determines whether you win or lose.' - Bill Gates, Microsoft A number of independent studies have drawn similar conclusions as to the benefits of managing plant information: The National Institute of Standards and Technology (NIST) estimates that $15.8 billion in profits is lost in U.S. capital facilities every year. Most of these losses ($9.1 billion or 2.8% of total installed cost), are realized in the operations and maintenance phase of the asset life cycle, while $2.7 billion and $4.1 billion are realized in engineering, procurement, and construction (EPC) phases respectively. It is clear from the report that again the O/Os bear the brunt of the costs ($10.6 billion or 3.3% total installed cost) associated with poor information management (in this case interoperability) due to supply chain dynamics and duration, and that with proper incentives for their information supply chains, O/Os have the most to gain. - 45% of costs are associated with operations and maintenance information verification; - 15% of costs are associated with unnecessary operations and maintenance idle employee time; - 40%, the balance, is an

  14. The cubature smooth variable structure filter estimation strategy applied to a quadrotor controller

    Science.gov (United States)

    Al-Shabi, M.; Gadsden, S. A.; Wilkerson, S. A.

    2015-05-01

    Unmanned aerial systems (UAS) are becoming increasingly popular in industry, military, and social environments. An UAS that provides good operating performance and robustness to disturbances is often quite expensive and prohibitive to the general public. To improve UAS performance without affecting the overall cost, an estimation strategy can be implemented on the internal controller. The use of an estimation strategy or filter reduces the number of required sensors and power requirement, and improves the controller performance. UAS devices are highly nonlinear, and implementation of filters can be quite challenging. This paper presents the implementation of the relatively new cubature smooth variable structure filter (CSVSF) on a quadrotor controller. The results are compared with other state and parameter estimation strategies.

  15. Using a problem-solving strategy to train students to apply general principles and to improve students' epistemology

    Science.gov (United States)

    McCoy, B.

    2011-12-01

    General studies science classes at many universities, such as physical science, Earth science, or astronomy, stress memorization and repetition of concepts. This approach leaves students with little appreciation for how science is used to explain phenomena from general principles. We present a novel instructional technique for an Earth science class in which the students are instructed in the use of a general problem solving strategy, adapted from a quantitative problem solving strategy developed by physics education research, in order to train the students in how to apply general principles. Using the Epistemological Beliefs Assessment for Physical Science, we have found that explicit training in problem solving significantly improves students' epistemology.

  16. Connectivity strategies for higher-order neural networks applied to pattern recognition

    Science.gov (United States)

    Spirkovska, Lilly; Reid, Max B.

    1990-01-01

    Different strategies for non-fully connected HONNs (higher-order neural networks) are discussed, showing that by using such strategies an input field of 128 x 128 pixels can be attained while still achieving in-plane rotation and translation-invariant recognition. These techniques allow HONNs to be used with the larger input scenes required for practical pattern-recognition applications. The number of interconnections that must be stored has been reduced by a factor of approximately 200,000 in a T/C case and about 2000 in a Space Shuttle/F-18 case by using regional connectivity. Third-order networks have been simulated using several connection strategies. The method found to work best is regional connectivity. The main advantages of this strategy are the following: (1) it considers features of various scales within the image and thus gets a better sample of what the image looks like; (2) it is invariant to shape-preserving geometric transformations, such as translation and rotation; (3) the connections are predetermined so that no extra computations are necessary during run time; and (4) it does not require any extra storage for recording which connections were formed.

  17. Applying an Experiential Learning Model to the Teaching of Gateway Strategy Board Games

    Science.gov (United States)

    Sato, Aiko; de Haan, Jonathan

    2016-01-01

    The board game hobby has rapidly grown and evolved in recent years, but most of the non-digital games lack tips and tutorials and remain difficult to learn and teach effectively. In this project, we integrated a popular hobbyist approach to teaching modern strategy games with classical experiential learning elements (i.e., demonstration,…

  18. The Effects of Applying Authentic Learning Strategies to Develop Computational Thinking Skills in Computer Literacy Students

    Science.gov (United States)

    Mingo, Wendye Dianne

    2013-01-01

    This study attempts to determine if authentic learning strategies can be used to acquire knowledge of and increase motivation for computational thinking. Over 600 students enrolled in a computer literacy course participated in this study which involved completing a pretest, posttest and motivation survey. The students were divided into an…

  19. Finding uncontested markets for European Fruit and Vegetables through applying the Blue Ocean Strategy

    NARCIS (Netherlands)

    Wubben, E.F.M.; Düsseldorf, S.; Batterink, M.H.

    2012-01-01

    Purpose – The purpose of this paper is to discover an uncontested market space in the European fruit and vegetables industry (EFVI), and thereby assess the ex-ante applicability of the Blue Ocean Strategy of Kim and Mauborgne. Design/methodology/approach – The search for an untapped market space mad

  20. Applying open innovation in business strategies : Evidence from Finnish software firms

    NARCIS (Netherlands)

    Harison, Elad; Koski, Heli

    2010-01-01

    Our study aims at shedding light on the innovative business strategies in the software sector and understanding better the economics that underlies the supply of Open Source Software (OSS). We use survey data collected from 170 Finnish software companies to investigate how different properties of so

  1. Comparison of Current Control Strategies Applied to a Boost-Rectifier Connected to a Direct Drive Wave Energy Converter

    OpenAIRE

    Rocha Mendonca, Hugo; Martínez González, Sergio; Ramírez Prieto, Dionisio

    2015-01-01

    Direct drive wave energy converters are characterized by a direct conversion of the wave energy into electricity with no intermediate mechanical conversion system. For this reason, optimization methods for maximizing the absorbed power have to be designed for acting on the electrical generator. Besides, this type of system requires power electronics to be connected to the grid. This paper evaluates three different current control strategies applied to a boost-rectifier in the ac-dc stage as p...

  2. Applying an Experiential Learning Model to the Teaching of Gateway Strategy Board Games

    Directory of Open Access Journals (Sweden)

    Aiko Sato

    2016-01-01

    Full Text Available The board game hobby has rapidly grown and evolved in recent years, but most of the non-digital games lack tips and tutorials and remain difficult to learn and teach effectively. In this project, we integrated a popular hobbyist approach to teaching modern strategy games with classical experiential learning elements (i.e., demonstration, observation, reflection, discussion and repeated experiences. We tested our model by teaching two modern board games to Japanese high school and university students. Questionnaires, gameplay data, self-ratings and discussions showed improved understanding and enjoyment, more strategic play and more interest in modern board games over the course of the instructional sequence. The model's repetition (the participants played each game three times was rated the most useful in terms of learning the games. Overall, the integrated model was largely successful in teaching strategy board games to new players, and we offer several recommendations for teachers, designers and researchers of board games.

  3. A price-responsive dispatching strategy for Vehicle-to-Grid: An economic evaluation applied to the case of Singapore

    Science.gov (United States)

    Pelzer, Dominik; Ciechanowicz, David; Aydt, Heiko; Knoll, Alois

    2014-06-01

    Employing electric vehicles as short-term energy storage could improve power system stability and at the same time create a new income source for vehicle owners. In this paper, the economic viability of this concept referred to as Vehicle-to-Grid is investigated. For this purpose, a price-responsive charging and dispatching strategy built upon temporally resolved electricity market data is presented. This concept allows vehicle owners to maximize returns by restricting market participation to profitable time periods. As a case study, this strategy is then applied using the example of Singapore. It is shown that an annual loss of S 1000 resulting from a non-price-responsive strategy as employed in previous works can be turned into a S 130 profit by applying the price-responsive approach. In addition to this scenario, realistic mobility patterns which restrict the temporal availability of vehicles are considered. In this case, profits in the range of S 21-S 121 are achievable. Returns in this order of magnitude are not expected to make Vehicle-to-Grid a viable business case, sensitivity analyses, however, show that improved technical parameters could increase profitability. It is further assumed that employing the price-responsive strategy to other national markets may yield significantly greater returns.

  4. A research about thr sources of professional stress of accountancy and applied individual strategies

    OpenAIRE

    DEMİR, Mehmet; ANASIZ, İsmail

    2008-01-01

    The technological developments bring various problems while facilitating human life. Stress can easily be seen in today's life however the spiritual dimension of the phenomenon has been neglected. In our age stress is one of the most important troubles that might come into sight in every profession. Moreover it causes to many serious illness. As many professions, accounThe aim of the study is to find out the sources of stress in accountancy and the individual strategies of the accountants to ...

  5. Teaching Strategies to Apply in the Use of Technological Tools in Technical Education

    OpenAIRE

    Olga Arranz García; Vidal Alonso Secades

    2014-01-01

    The emergence of new technologies in education area is changing the way of organizing the educational processes. Teachers are not unrelated to these changes and must employ new strategies to adapt their teaching methods to the new circumstances. One of these adaptations is framed in the virtual learning, where the learning management systems have been revealed as a very effective means within the learning process. In this paper we try to provide teachers in engineering schools how to use in a...

  6. Applying Construal Level Theory to Communication Strategies for Participatory Sustainable Development

    OpenAIRE

    Strongheart, D.H.; Obison, Florence; Bordoni, Fabio

    2010-01-01

    To the vast majority of people, the terms “sustainability” and “sustainable development” are unfamiliar, and, when they are recognized, there is still a great deal of interpretability as to their significance. Since no consensus exists regarding these terms, communication efforts to promote action and awareness among citizens must invariably “frame” the issue of sustainable development in one way or another. By and large, most communication strategies promote small private-sphere actions rele...

  7. PCARRD's strategies for technology transfer: The agriculture and resources regional technology information system and the regional applied communication program

    International Nuclear Information System (INIS)

    This paper describes the Agriculture and Resources Regional Technology Information System (ARRTIS) and the Regional Applied Communication Outreach Program (RAC) of PCARRD. The ARRTIS and the RACO are the strategies in communicating scientific and technology-based information. The ARRTIS is an information system that provides an information base on the status of technologies at various levels of maturity (generation, adaptation, verification, piloting, dissemination and utilization) and offers technology alternatives based on environmental requirements, costs and returns analysis or feasibility of the technologies. This information base provides the repository of technology information from which the Applied Communication Program draws its information for packaging into various formats, using various strategies/media to cater to various users in the regions most especially the farmers. Meanwhile, as PCARRD executes its mission of developing the national research system, it incorporates a development support communication program through the RACO. The RACO is essentially a working component of a regional research center/consortium in each region coordinated by the Applied Communication Division of PCARRD. It aims at reaching farmers and their families, extensionists, administrators, policy makers and entrepreneurs with research information and technology which use a variety of appropriate communication channels, modern communication technology and strategies so that they may actively participate in research diffusion and utilization. (author). 7 refs

  8. A long-term evaluation of applied nucleation as a strategy to facilitate forest restoration.

    Science.gov (United States)

    Corbin, Jeffrey D; Robinson, George R; Hafkemeyer, Lauren M; Handel, Steven N

    2016-01-01

    Applied nucleation is a restoration technique that seeks to facilitate woody-plant establishment by attracting birds or other animals that may introduce seeds of dispersal-limited species. In 1991, an experimental test of applied nucleation was initiated in an abandoned landfill in New Jersey, USA. Trees and shrubs were planted into 16 10 x 10 m plots, covering land-use changes in the region. Despite the relatively low species richness of the community, this experiment demonstrated that reforestation of even severely degraded habitat can be achieved with minimal management after site preparation and cluster plantings.

  9. A long-term evaluation of applied nucleation as a strategy to facilitate forest restoration.

    Science.gov (United States)

    Corbin, Jeffrey D; Robinson, George R; Hafkemeyer, Lauren M; Handel, Steven N

    2016-01-01

    Applied nucleation is a restoration technique that seeks to facilitate woody-plant establishment by attracting birds or other animals that may introduce seeds of dispersal-limited species. In 1991, an experimental test of applied nucleation was initiated in an abandoned landfill in New Jersey, USA. Trees and shrubs were planted into 16 10 x 10 m plots, covering reforestation following disturbances or land-use changes in the region. Despite the relatively low species richness of the community, this experiment demonstrated that reforestation of even severely degraded habitat can be achieved with minimal management after site preparation and cluster plantings. PMID:27039513

  10. Revisiting Monitoring and Evaluation Strategies for Applied Drama and Theatre Practice in African Contexts

    Science.gov (United States)

    Chinyowa, Kennedy C.

    2011-01-01

    Most of the applied drama and theatre projects being carried out in African contexts tend to be one-off events with limited follow-up in terms of building the capacity of target communities and organising them for action. Besides bringing people together for workshops, performances and post-performance discussions, such projects simply pass by…

  11. Applying Coaching Strategies to Support Youth- and Family-Focused Extension Programming

    Science.gov (United States)

    Olson, Jonathan R.; Hawkey, Kyle R.; Smith, Burgess; Perkins, Daniel F.; Borden, Lynne M.

    2016-01-01

    In this article, we describe how a peer-coaching model has been applied to support community-based Extension programming through the Children, Youth, and Families at Risk (CYFAR) initiative. We describe the general approaches to coaching that have been used to help with CYFAR program implementation, evaluation, and sustainability efforts; we…

  12. Business-oriented modeling and Simulation: Dynamic Scorecard method Applied the Formularization of Strategies

    Directory of Open Access Journals (Sweden)

    Josué Vitor

    2007-12-01

    Full Text Available The main goal of this research was to application the “Scorecard Dinâmico” method onstrategic formulation process in a small business. This method incorporate qualitative andsimulation tools from System Dynamics in the strategic map provided by Balanced Scorecardmaking the strategic management flexible in accordance with the organizational realitycomplexity. The research method adopted was the “research-action” and it was possible,with participating observation, the construction of strategic models on interaction with thecompany directors. During this process, it could be assessed organizing points thatinterfering in formulation of strategy of a small business during the research. Through thisprocess, company members mental models were explained in strategic map and qualitativemodels resulting on a simulation tool for control the results and alternative prospection offuture strategies and a higher level of learning organizational. As a result, it could be pointedthe method difficult implantation in virtue of the absence quantitative data and a higherunderstanding by the research participants of the problem resulting from the systemicstructural behavior in the small business.

  13. Green design "bioinspired disassembly-reassembly strategy" applied for improved tumor-targeted anticancer drug delivery.

    Science.gov (United States)

    Wang, Ruoning; Gu, Xiaochen; Zhou, Jianping; Shen, Lingjia; Yin, Lifang; Hua, Peiying; Ding, Yang

    2016-08-10

    In this study, a simple and green approach 'bioinspired disassembly-reassembly strategy' was employed to reconstitute lipoprotein nanoparticles (RLNs) using whole-components of endogenous ones (contained dehydrated human lipids and native apolipoproteins). These RLNs were engineered to mimic the configuration and properties of natural lipoproteins for efficient drug delivery. In testing therapeutic targeting to microtubules, paclitaxel (PTX) was reassembled into RLNs to achieve improved targeted anti-carcinoma treatment and minimize adverse effects, demonstrating ultimately more applicable than HDL-like particles which are based on exogenous lipid sources. We have characterized that apolipoprotein-decoration of PTX-loaded RLNs (RLNs-PTX) led to favoring uniformly dispersed distribution, increasing PTX-encapsulation with a sustained-release pattern, while enhancing biostability during blood circulation. The innate biological RLNs induced efficient intracellular trafficking of cargos in situ via multi-targeting mechanisms, including scavenger receptor class B type I (SR-BI)-mediated direct transmembrane delivery, as well as other lipoprotein-receptors associated endocytic pathways. The resulting anticancer treatment from RLNs-PTX was demonstrated a half-maximal inhibitory concentration of 0.20μg/mL, cell apoptosis of 18.04% 24h post-incubation mainly arresting G2/M cell cycle in vitro, and tumor weight inhibition of 70.51% in vivo. Collectively, green-step assembly-based RLNs provided an efficient strategy for mediating tumor-targeted accumulation of PTX and enhanced anticancer efficacy. PMID:27238442

  14. An Implementation Mechanisms of SVM Control Strategies Applied to Five Levels Cascaded Multi-Level Inverters

    Directory of Open Access Journals (Sweden)

    Mohammed Yaichi

    2014-03-01

    Full Text Available In the area of the energy control with high voltage and power, the multilevel inverters constitute a relatively recent research orientation. The current applications of this technology are in the domains of the high voltage (over hundred kV, variable speed drives, transport and distribution of a good quality of electrical energy (HVDC, FACTS system, ..... To improve the output voltage for such inverters, many different modulation strategies have been developed. Among these strategies, the SVM (Space Vector Modulation. The technique provide the nearest switching vectors sequence to the reference vector without involving trigonometric functions and provide the additional advantages of superior harmonic quality. In this paper, we analyze different mechanisms of the output voltage synthesis and the problem of even order harmonic production. With the proposed a new trajectory SVM, which can eliminate all the even order harmonics for five levels inverter. Show clearly how to deduce the trajectories from the sequences allowing to have better performances among several possible trajectories. It is dedicated to the application of two particular trajectories.

  15. SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD

    OpenAIRE

    Jaya Srivastaval; Twinkle Dwivedi

    2015-01-01

    Software testing is an important activity of the software development process. Software testing is most efforts consuming phase in software development. One would like to minimize the effort and maximize the number of faults detected and automated test case generation contributes to reduce cost and time effort.Hence test case generation may be treated as an optimization problem In this paper we have used genetic algorithm to optimize the test case that are generated applying conditional cover...

  16. Teaching Strategies to Apply in the Use of Technological Tools in Technical Education

    Directory of Open Access Journals (Sweden)

    Olga Arranz García

    2014-09-01

    Full Text Available The emergence of new technologies in education area is changing the way of organizing the educational processes. Teachers are not unrelated to these changes and must employ new strategies to adapt their teaching methods to the new circumstances. One of these adaptations is framed in the virtual learning, where the learning management systems have been revealed as a very effective means within the learning process. In this paper we try to provide teachers in engineering schools how to use in an appropriate way the different technological tools that are present in a virtual platform. Thus, in the experimental framework we show the results outcomes in the analysis of two data samples obtained before and after the implementation of the European Higher Education Area, that would be extrapolated for its innovative application to the learning techniques.

  17. Optimality, Rational Expectations and Time Inconsistency Applied to Inflation Targeting Strategy

    Directory of Open Access Journals (Sweden)

    Marius-Corneliu Marinas

    2008-10-01

    Full Text Available The purpose of this paper is to analyse the characteristics of an inflation targeting strategy, using the Barro-Gordon model specific tools. This paper uses the initial Barro-Gordon concepts of inflationary social costs and benefits, adding a new dimension generated by the cost of output deviating from the potential level. The main contribution of this paper is the exhaustive study of the time inconsistency problem generated by the very existence of a policymaker-established inflation rate. The mathematic simulation of a model allowed a complete analysis of several parameters’ influence (parameters such as the optimal rate of inflation, the discount rate, the importance structure of inflationary social cost on the applicable range of the target inflation rate, range that guarantees that the policymakers have no incentive to break their own rules, or at least this incentive is somewhat inferior to the future cost of doing so.

  18. SDRE control strategy applied to a nonlinear robotic including drive motor

    Science.gov (United States)

    de Lima, Jeferson J.; Tusset, Angelo M.; Janzen, Frederic C.; Piccirillo, Vinicius; Nascimento, Claudinor B.; Balthazar, José M.; Brasil, Reyolando M. L. R. da Fonseca

    2014-12-01

    A robotic control design considering all the inherent nonlinearities of the robot-engine configuration is developed. The interactions between the robot and joint motor drive mechanism are considered. The proposed control combines two strategies, one feedforward control in order to maintain the system in the desired coordinate, and feedback control system to take the system into a desired coordinate. The feedback control is obtained using State-Dependent Riccati Equation (SDRE). For link positioning two cases are considered. Case I: For control positioning, it is only used motor voltage; Case II: For control positioning, it is used both motor voltage and torque between the links. Simulation results, including parametric uncertainties in control shows the feasibility of the proposed control for the considered system.

  19. SDRE control strategy applied to a nonlinear robotic including drive motor

    Energy Technology Data Exchange (ETDEWEB)

    Lima, Jeferson J. de, E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Tusset, Angelo M., E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Janzen, Frederic C., E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Piccirillo, Vinicius, E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Nascimento, Claudinor B., E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br [UTFPR-PONTA GROSSA, PR (Brazil); Balthazar, José M., E-mail: jmbaltha@rc.unesp.br [UNESP-BAURU, SP (Brazil); Brasil, Reyolando M. L. R. da Fonseca, E-mail: reyolando.brasil@ufabc.edu.br [UFABC-SANTO ANDRE, SP (Brazil)

    2014-12-10

    A robotic control design considering all the inherent nonlinearities of the robot-engine configuration is developed. The interactions between the robot and joint motor drive mechanism are considered. The proposed control combines two strategies, one feedforward control in order to maintain the system in the desired coordinate, and feedback control system to take the system into a desired coordinate. The feedback control is obtained using State-Dependent Riccati Equation (SDRE). For link positioning two cases are considered. Case I: For control positioning, it is only used motor voltage; Case II: For control positioning, it is used both motor voltage and torque between the links. Simulation results, including parametric uncertainties in control shows the feasibility of the proposed control for the considered system.

  20. Multicomponent venom of the spider Cupiennius salei: a bioanalytical investigation applying different strategies.

    Science.gov (United States)

    Trachsel, Christian; Siegemund, Doreen; Kämpfer, Urs; Kopp, Lukas S; Bühr, Claudia; Grossmann, Jonas; Lüthi, Christoph; Cunningham, Monica; Nentwig, Wolfgang; Kuhn-Nentwig, Lucia; Schürch, Stefan; Schaller, Johann

    2012-08-01

    The multicomponent venom of the spider Cupiennius salei was separated by three different chromatographic strategies to facilitate subsequent analysis of peptidic venom components by tandem mass spectrometry (MALDI-TOF-MS and ESI-MS), Edman degradation and amino acid analysis: (a) desalting of the crude venom by RP-HPLC only, (b) chromatographic separation of the crude venom into 42 fractions by RP-HPLC, and (c) multidimensional purification of the crude venom by size exclusion and cation exchange chromatography and RP-HPLC. A total of 286 components were identified in the venom of C. salei by mass spectrometry and the sequence of 49 new peptides was determined de novo by Edman degradation and tandem mass spectrometry; 30 were C-terminally amidated. The novel peptides were assigned to two main groups: (a) short cationic peptides and (b) Cys-containing peptides with the inhibitor cystine knot motif. Bioinformatics revealed a limited number of substantial similarities, namely with the peptides CpTx1 from the spider Cheiracantium punctorium and U3-ctenitoxin-Asp1a from the South American fishing spider (Ancylometes sp.) and with sequences from a Lycosa singoriensis venom gland transcriptome analysis. The results clearly indicate that the quality of the data is strongly dependent on the chosen separation strategy. The combination of orthogonal analytical methods efficiently excludes alkali ion and matrix adducts, provides indispensable information for an unambiguous identification of isomasses, and results in the most comprehensive repertoire of peptides identified in the venom of C. salei so far.

  1. SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD

    Directory of Open Access Journals (Sweden)

    Jaya Srivastaval

    2015-06-01

    Full Text Available Software testing is an important activity of the software development process. Software testing is most efforts consuming phase in software development. One would like to minimize the effort and maximize the number of faults detected and automated test case generation contributes to reduce cost and time effort.Hence test case generation may be treated as an optimization problem In this paper we have used genetic algorithm to optimize the test case that are generated applying conditional coverage on source code. Test case data is generated automatically using genetic algorithm are optimized and outperforms the test cases generated by random testing.

  2. Proceedings of PEIA Forum 2007 : adapting and applying California's greenhouse gas strategies in Canada

    International Nuclear Information System (INIS)

    The key challenge in addressing climate change lies in identifying and implementing cost-effective measures to reduce greenhouse gas (GHG) emissions. The purpose of this forum was to stimulate action for reducing GHGs in British Columbia, the western provinces and Canada. The successes realized in California which are adaptable in BC and Canada were highlighted. In September 2006, California demonstrated leadership in taking determined action on climate change, with its signing of the California Global Warming Solutions Act. This landmark legislation calls for GHG reductions to 1990 levels by 2020, and 80 per cent below 1990 levels by 2050. The BC Energy plan calls for an aggressive target to reduce GHG emissions to 33 per cent below current levels by 2020, which will place emissions 10 per cent below 1990 levels; net zero GHG emissions from all electric power plants by 2016; acquiring 50 per cent of BC Hydro's new resource needs through conservation by 2020; ensuring electricity self-sufficiency by 2016; and, establishing a standing offer for clean electricity projects up to 10 megawatts. In May 2007, the province of British Columbia demonstrated a commitment to follow California's lead in GHG control, and to collaborate on projects such as the Hydrogen Highway. The actions are intended to make a significant contribution to the control of energy and greenhouse gas emissions in British Columbia and Canada. The conference featured 6 presentations, of which 2 have been catalogued separately for inclusion in this database. tabs., figs

  3. Implementation Strategies for a Universal Acquisition and Tracking Channel Applied to Real GNSS Signals.

    Science.gov (United States)

    Fortin, Marc-Antoine; Landry, René

    2016-01-01

    This paper presents a universal GNSS receiver channel capable of tracking any civil GNSS signal. This fundamentally differs from dedicated channels, each customized for a given signal. A mobile device could integrate fewer universal channels to harvest all available signals. This would allow securing signal availability, while minimizing power consumption and chip size, thus maximizing battery lifetime. In fact, the universal channel allows sequential acquisition and tracking of any chipping rate, carrier frequency, FDMA channel, modulation, or constellation, and is totally configurable (any integration time, any discriminator, etc.). It can switch from one signal to another in 1.07 ms, making it possible for the receiver to rapidly adapt to its sensed environment. All this would consume 3.5 mW/channel in an ASIC implementation, i.e., with a slight overhead compared to the original GPS L1 C/A dedicated channel from which it was derived. After extensive surveys on GNSS signals and tracking channels, this paper details the implementation strategies that led to the proposed universal channel architecture. Validation is achieved using GNSS signals issued from different constellations, frequency bands, modulations and spreading code schemes. A discussion on acquisition approaches and conclusive remarks follow, which open up a new signal selection challenge, rather than satellite selection. PMID:27144569

  4. Applying the Taguchi Method to River Water Pollution Remediation Strategy Optimization

    Directory of Open Access Journals (Sweden)

    Tsung-Ming Yang

    2014-04-01

    Full Text Available Optimization methods usually obtain the travel direction of the solution by substituting the solutions into the objective function. However, if the solution space is too large, this search method may be time consuming. In order to address this problem, this study incorporated the Taguchi method into the solution space search process of the optimization method, and used the characteristics of the Taguchi method to sequence the effects of the variation of decision variables on the system. Based on the level of effect, this study determined the impact factor of decision variables and the optimal solution for the model. The integration of the Taguchi method and the solution optimization method successfully obtained the optimal solution of the optimization problem, while significantly reducing the solution computing time and enhancing the river water quality. The results suggested that the basin with the greatest water quality improvement effectiveness is the Dahan River. Under the optimal strategy of this study, the severe pollution length was reduced from 18 km to 5 km.

  5. Applying the Taguchi method to river water pollution remediation strategy optimization.

    Science.gov (United States)

    Yang, Tsung-Ming; Hsu, Nien-Sheng; Chiu, Chih-Chiang; Wang, Hsin-Ju

    2014-04-01

    Optimization methods usually obtain the travel direction of the solution by substituting the solutions into the objective function. However, if the solution space is too large, this search method may be time consuming. In order to address this problem, this study incorporated the Taguchi method into the solution space search process of the optimization method, and used the characteristics of the Taguchi method to sequence the effects of the variation of decision variables on the system. Based on the level of effect, this study determined the impact factor of decision variables and the optimal solution for the model. The integration of the Taguchi method and the solution optimization method successfully obtained the optimal solution of the optimization problem, while significantly reducing the solution computing time and enhancing the river water quality. The results suggested that the basin with the greatest water quality improvement effectiveness is the Dahan River. Under the optimal strategy of this study, the severe pollution length was reduced from 18 km to 5 km. PMID:24739765

  6. Implementation Strategies for a Universal Acquisition and Tracking Channel Applied to Real GNSS Signals.

    Science.gov (United States)

    Fortin, Marc-Antoine; Landry, René

    2016-05-02

    This paper presents a universal GNSS receiver channel capable of tracking any civil GNSS signal. This fundamentally differs from dedicated channels, each customized for a given signal. A mobile device could integrate fewer universal channels to harvest all available signals. This would allow securing signal availability, while minimizing power consumption and chip size, thus maximizing battery lifetime. In fact, the universal channel allows sequential acquisition and tracking of any chipping rate, carrier frequency, FDMA channel, modulation, or constellation, and is totally configurable (any integration time, any discriminator, etc.). It can switch from one signal to another in 1.07 ms, making it possible for the receiver to rapidly adapt to its sensed environment. All this would consume 3.5 mW/channel in an ASIC implementation, i.e., with a slight overhead compared to the original GPS L1 C/A dedicated channel from which it was derived. After extensive surveys on GNSS signals and tracking channels, this paper details the implementation strategies that led to the proposed universal channel architecture. Validation is achieved using GNSS signals issued from different constellations, frequency bands, modulations and spreading code schemes. A discussion on acquisition approaches and conclusive remarks follow, which open up a new signal selection challenge, rather than satellite selection.

  7. Terrorist profiling as a Counterinsurgency Strategy: Applying the Concept to Law Enforcement

    Directory of Open Access Journals (Sweden)

    Farhan Hyder Sahito

    2013-10-01

    Full Text Available The nature of terrorism is fundamentally psychological. Similarly, psychological profiling is widely accepted in detecting crimes in both law enforcement operations and the study of criminology. However, there is a need to transfer its appearance from old traditional criminal environment to the context of counterterrorism. This research argues that most prevalent method of interrogating suspects to achieve distinction between guilty and innocent is to establish a set of psychological attributes and factors. This paper proposes that terrorist's profiling is value-added intelligence that may add a new dimension in counterterrorism to identify the individual behind a terrorist act. It is important to constructs a terrorist profile before designing a paradigm that should determine the probability of terroristic trends within the individual as well as certain perceptible qualities with which an observed suspect can be likened to. This article proposes a personality-guided model of interrogation with different categories to steer clear of oversimplified thinking about individual terrorist or groups. The objective is to adapt the style and content of questioning to obtain a clear overall picture of the suspect's knowledge with appropriate interviewing and interrogation methods. This profiling will provide thorough understanding of the ideology that drives terrorism and more awareness of the likely means and likely targets used by terrorists. This paper is a shift in direction – focusing rather on the development of evidence-based methods that could lead to an effective counterinsurgency strategy and the extraction of innocent's involvement in the terrorism.

  8. Carbohydrate metabolism teaching strategy for the Pharmacy course, applying active teaching methodology

    Directory of Open Access Journals (Sweden)

    Uderlei Donizete Silveira Covizzi

    2012-12-01

    Full Text Available The traditional teaching method has been widely questioned on the development of skills and abilities in training healthcare professionals. In the traditional methodology the main transmitter of knowledge is the teacher while students assume passive spectator role. Some Brazilian institutions broke with this model, structuring the curriculum to student-centered learning. Some medical schools have adopted the Problem Based Learning (PBL, a methodology that presents problem questions, to be encountered by future physicians, for resolution in small tutorial groups. Our work proposes to apply an active teaching-learning methodology addressing carbohydrate metabolism during the discipline of biochemistry for under graduation students from pharmacy course. Thus, the academic content was presented through brief and objective talks. Later, learners were split into tutorial groups for the resolution of issues in context. During the activities, the teacher drove the discussion to the issues elucidation. At the end of the module learners evaluated the teaching methodology by means of an applied questionnaire and the developed content was evaluated by an usual individual test. The questionnaire analysis indicates that students believe they have actively participated in the teaching-learning process, being encouraged to discuss and understand the theme. The answers highlight closer ties between students and tutor. According to the professor, there is a greater student engagement with learning. It is concluded that an innovative methodology, where the primary responsibility for learning is centered in the student himself, besides to increase the interest in learning, facilitates learning by cases discussion in groups. The issues contextualization establishes a narrowing between theory and practice.

  9. Applying Business Process Re-Engineering to Public Sector as A New Public Management Strategy

    Directory of Open Access Journals (Sweden)

    Ropinder Oberoi

    2013-08-01

    Full Text Available The introduction of Business Process Reengineering (BPR to the public sector follows the much broader trend of New Public Management. BPR in the public sector mostly means amalgamation of business processes, computerization of various activities and removal of some unnecessary ones. BPR assimilates a radical premeditated scheme of business pro-cess reengineering and an additional progressive technique of uninterrupted process improvement with adequate information technology (IT and e-business infrastructure strategies. Public organizations have specific and exclusive features that differentiae-ate them from private sector organizations. Based on the literature review and examining of study find-ings, it is argued that a public sector organization can employ BPR to get better its process and overall organizational performance, if it (1 has accrues a collection of BPR-relevant resources and capabilities; (2 has embarked on BPR with adequate depth and breadth; (3 is developing a post-BPR complementary set of skills, systems and technologies, which are essential to further develop the organizational impact of the BPR; and (4 has successfully mitigated the effects of BPR implementation problems. In addition to its effect on administration and ser-vice delivery processes through reduction of the processing time, work steps and cost of government processes, BPR also contributes to enhancing citizen/customer and employee satisfaction, increasing organizational transparency and responsiveness which have also become an essential objective of New Public Management. Therefore, public sector BPR is emerging as an indispensable to performance of organizations in the developing economy. The essential questions addressed in this paper are: What are the scenario and impending problems of reengineering applications in the public sector? Can it be functional for the public sector in attending to frequent problems blockading bureaucracies of developed and

  10. Management Strategy Evaluation Applied to Coral Reef Ecosystems in Support of Ecosystem-Based Management.

    Science.gov (United States)

    Weijerman, Mariska; Fulton, Elizabeth A; Brainard, Russell E

    2016-01-01

    Ecosystem modelling is increasingly used to explore ecosystem-level effects of changing environmental conditions and management actions. For coral reefs there has been increasing interest in recent decades in the use of ecosystem models for evaluating the effects of fishing and the efficacy of marine protected areas. However, ecosystem models that integrate physical forcings, biogeochemical and ecological dynamics, and human induced perturbations are still underdeveloped. We applied an ecosystem model (Atlantis) to the coral reef ecosystem of Guam using a suite of management scenarios prioritized in consultation with local resource managers to review the effects of each scenario on performance measures related to the ecosystem, the reef-fish fishery (e.g., fish landings) and coral habitat. Comparing tradeoffs across the selected scenarios showed that each scenario performed best for at least one of the selected performance indicators. The integrated 'full regulation' scenario outperformed other scenarios with four out of the six performance metrics at the cost of reef-fish landings. This model application quantifies the socio-ecological costs and benefits of alternative management scenarios. When the effects of climate change were taken into account, several scenarios performed equally well, but none prevented a collapse in coral biomass over the next few decades assuming a business-as-usual greenhouse gas emissions scenario.

  11. Management Strategy Evaluation Applied to Coral Reef Ecosystems in Support of Ecosystem-Based Management.

    Directory of Open Access Journals (Sweden)

    Mariska Weijerman

    Full Text Available Ecosystem modelling is increasingly used to explore ecosystem-level effects of changing environmental conditions and management actions. For coral reefs there has been increasing interest in recent decades in the use of ecosystem models for evaluating the effects of fishing and the efficacy of marine protected areas. However, ecosystem models that integrate physical forcings, biogeochemical and ecological dynamics, and human induced perturbations are still underdeveloped. We applied an ecosystem model (Atlantis to the coral reef ecosystem of Guam using a suite of management scenarios prioritized in consultation with local resource managers to review the effects of each scenario on performance measures related to the ecosystem, the reef-fish fishery (e.g., fish landings and coral habitat. Comparing tradeoffs across the selected scenarios showed that each scenario performed best for at least one of the selected performance indicators. The integrated 'full regulation' scenario outperformed other scenarios with four out of the six performance metrics at the cost of reef-fish landings. This model application quantifies the socio-ecological costs and benefits of alternative management scenarios. When the effects of climate change were taken into account, several scenarios performed equally well, but none prevented a collapse in coral biomass over the next few decades assuming a business-as-usual greenhouse gas emissions scenario.

  12. Management Strategy Evaluation Applied to Coral Reef Ecosystems in Support of Ecosystem-Based Management.

    Science.gov (United States)

    Weijerman, Mariska; Fulton, Elizabeth A; Brainard, Russell E

    2016-01-01

    Ecosystem modelling is increasingly used to explore ecosystem-level effects of changing environmental conditions and management actions. For coral reefs there has been increasing interest in recent decades in the use of ecosystem models for evaluating the effects of fishing and the efficacy of marine protected areas. However, ecosystem models that integrate physical forcings, biogeochemical and ecological dynamics, and human induced perturbations are still underdeveloped. We applied an ecosystem model (Atlantis) to the coral reef ecosystem of Guam using a suite of management scenarios prioritized in consultation with local resource managers to review the effects of each scenario on performance measures related to the ecosystem, the reef-fish fishery (e.g., fish landings) and coral habitat. Comparing tradeoffs across the selected scenarios showed that each scenario performed best for at least one of the selected performance indicators. The integrated 'full regulation' scenario outperformed other scenarios with four out of the six performance metrics at the cost of reef-fish landings. This model application quantifies the socio-ecological costs and benefits of alternative management scenarios. When the effects of climate change were taken into account, several scenarios performed equally well, but none prevented a collapse in coral biomass over the next few decades assuming a business-as-usual greenhouse gas emissions scenario. PMID:27023183

  13. Expectations as a key to understanding actor strategies in the field of fuel cell and hydrogen vehicles.

    Science.gov (United States)

    Budde, Björn; Alkemade, Floortje; Weber, K Matthias

    2012-07-01

    Due to its environmental impact, the mobility system is increasingly under pressure. The challenges to cope with climate change, air quality, depleting fossil resources imply the need for a transition of the current mobility system towards a more sustainable one. Expectations and visions have been identified as crucial in the guidance of such transitions, and more specifically of actor strategies. Still, it remained unclear why the actors involved in transition activities appear to change their strategies frequently and suddenly. The empirical analysis of the expectations and strategies of three actors in the field of hydrogen and fuel cell technology indicates that changing actor strategies can be explained by rather volatile expectations related to different levels. Our case studies of the strategies of two large car manufacturers and the German government demonstrate that the car manufacturers refer strongly to expectations about the future regime, while expectations related to the socio-technical landscape level appear to be crucial for the strategy of the German government. PMID:24850974

  14. General Strategy for the Design of DNA Coding Sequences Applied to Nanoparticle Assembly.

    Science.gov (United States)

    Calais, Théo; Baijot, Vincent; Djafari Rouhani, Mehdi; Gauchard, David; Chabal, Yves J; Rossi, Carole; Estève, Alain

    2016-09-20

    The DNA-directed assembly of nano-objects has been the subject of many recent studies as a means to construct advanced nanomaterial architectures. Although much experimental in silico work has been presented and discussed, there has been no in-depth consideration of the proper design of single-strand sticky termination of DNA sequences, noted as ssST, which is important in avoiding self-folding within one DNA strand, unwanted strand-to-strand interaction, and mismatching. In this work, a new comprehensive and computationally efficient optimization algorithm is presented for the construction of all possible DNA sequences that specifically prevents these issues. This optimization procedure is also effective when a spacer section is used, typically repeated sequences of thymine or adenine placed between the ssST and the nano-object, to address the most conventional experimental protocols. We systematically discuss the fundamental statistics of DNA sequences considering complementarities limited to two (or three) adjacent pairs to avoid self-folding and hybridization of identical strands due to unwanted complements and mismatching. The optimized DNA sequences can reach maximum lengths of 9 to 34 bases depending on the level of applied constraints. The thermodynamic properties of the allowed sequences are used to develop a ranking for each design. For instance, we show that the maximum melting temperature saturates with 14 bases under typical solvation and concentration conditions. Thus, DNA ssST with optimized sequences are developed for segments ranging from 4 to 40 bases, providing a very useful guide for all technological protocols. An experimental test is presented and discussed using the aggregation of Al and CuO nanoparticles and is shown to validate and illustrate the importance of the proposed DNA coding sequence optimization. PMID:27578445

  15. Four Perspectives of Sustainability Applied to the Local Food Strategy of Ghent (Belgium: Need for a Cycle of Democratic Participation?

    Directory of Open Access Journals (Sweden)

    Maarten Crivits

    2016-01-01

    Full Text Available As part of cities’ increasing commitment to sustainable development, local food systems are becoming a policy priority. In this article we focus on the case of a local food system in Ghent, Belgium. We adopt the notion of Hajer et al. (2015 that top-down steering of environmental issues (so-called “cockpit-ism” is insufficient, incomplete and in need of revision. Using their four perspectives on sustainable development (Hajer et al., 2015, we explore, analyze and valorize the potential of the actors, motives and logics for change within the agriculture and food system in the Ghent region. Applying these four perspectives, we have mapped the current positive developments as well as identified the weaknesses, pitfalls and opportunities of a local food strategy. The discussion section contains two important strategies for good governance of sustainable urban development: first, a governance approach to stimulate participation and representation in a complex, unequal and rapidly changing context; and second, a reflection on how local food strategies can drive global sustainability. In conclusion, we argue for the integration of a global sustainability approach within sustainable urban development.

  16. Applying the Creativity in Oder to Generate Innovation Projects: the Practical Case Study of a Didactic Strategy

    Directory of Open Access Journals (Sweden)

    Eliana Maria dos Santos Pereira Alves

    2015-08-01

    Full Text Available A current challenge in teaching practice is to transform classrooms into laboratories to exchange experiences in courses whose goal is to enhance the professional skills in a practical and meaningful way. The search for improvement demonstrates that, increasingly, professionals become aware that organizations coexist in highly competitive environments, seeking to conquer more markets based on sustainable competitive advantages demanding fast responses of its employees. Considering that the process of creativity can be stimulated through the establishment of a suitable environment, this study aims to discuss the application of a didactic strategy developed for this purpose. Using the single case study methodology, it was used the technique of unstructured observation (informal or single to carry out the collection and the recording of events that occurred during the strategy application. It discusses elements such as identifying opportunities, creativity, innovation and entrepreneurship, seeking their relationships to understand how it is possible to motivate the generation of proposals for innovative projects in educational environments. As a result, it is presented the perceptions of teachers on the didactic strategy applied, emphasizing that a suitable environment for the development of ideas encourages the student to propose solutions for the improbabilities, creating innovative alternatives to the identified needs.

  17. An empirical study on key factors for purchasing strategy on project based organizations: A case study of gas field development projects

    Directory of Open Access Journals (Sweden)

    Aboulfazl Kazazi

    2012-08-01

    Full Text Available One of the primary concerns in development of oil and gas resources is to find the critical success factors associated with different important projects. Purchasing and procurement plays a key role in these projects. There is no doubt that in history of similar studies, there are not much studies to determine key factors. The proposed study of this paper presents an empirical study to find these factors in one of the most important gas filed in Iran is now South Pars Gas Field. The study distributes a questionnaire consists of various questions associated with purchasing activities. We investigate the feedbacks gathered from decision makers using factor analysis. The results of our survey reveal that there are three categories of organizational strategy, the relative importance of strategy and risk according to factor analysis. Each factor consists of many other factors and the relative importance of all factors are investigated.

  18. Impact of metal ions in porphyrin-based applied materials for visible-light photocatalysis: Key information from ultrafast electronic spectroscopy

    KAUST Repository

    Kar, Prasenjit

    2014-07-10

    ProtoporphyrinIX-zinc oxide (PP-ZnO) nanohybrids have been synthesized for applications in photocatalytic devices. High-resolution transmission electron microscopy (HRTEM), X-ray diffraction (XRD), and steady-state infrared, absorption, and emission spectroscopies have been used to analyze the structural details and optical properties of these nanohybrids. Time-resolved fluorescence and transient absorption techniques have been applied to study the ultrafast dynamic events that are key to photocatalytic activities. The photocatalytic efficiency under visible-light irradiation in the presence of naturally abundant iron(III) and copper(II) ions has been found to be significantly retarded in the former case, but enhanced in the latter case. More importantly, femtosecond (fs) transient absorption data have clearly demonstrated that the residence of photoexcited electrons from the sensitizer PP in the centrally located iron moiety hinders ground-state bleach recovery of the sensitizer, affecting the overall photocatalytic rate of the nanohybrid. The presence of copper(II) ions, on the other hand, offers additional stability against photobleaching and eventually enhances the efficiency of photocatalysis. In addition, we have also explored the role of UV light in the efficiency of photocatalysis and have rationalized our observations from femtosecond- to picosecond-resolved studies. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. The implementation of the import substitution strategy as the key to the development of export potential of industrial enterprises

    Directory of Open Access Journals (Sweden)

    T.V. Vashchenko

    2015-09-01

    Full Text Available The aim of the article. The article examines the preconditions and prospects of import substitution implementation by native producers of machine-building industry. It is based on the analysis of the different countries experiences in import substitution implementation for their economic growth and renovation. The rational explanation of the import substitution strategy formation and implementation at the management level of enterprise development is given. It allows to form more clearly the mission and objectives of enterprise’s effective management in an unstable external environment. The results of the analysis. The definition of the concept «industrial enterprise import substitution strategy» was formulated. The scientific and methodical aspects to the definition of the perspective directions for the import substitution strategy were developed. It allows to choose the best solution while considering the set of criteria. The matrix «the group's share in the product portfolio of an enterprise – the priority directions of the import substitution strategy realization» was developed using the method of hierarchies analysis. It helps to choose direction of the import substitution strategy implementation. According to the matrix it is possible to distinguish five zones in which it is ossible to choose the direction of the import substitution strategy implementation at industrial enterprises. Conclusions and directions of further researches. It is proved that for the purpose of determining of strategically effective directions of industrial enterprise development it is advisable to use principle of «sales funnel» phased selection of promising groups of product portfolio according to the criteria «degree of market risk and the additional ratio of return per unit of risk investment». The analysis of these indicators provides an opportunity to identify risk of attractive investment project and growth of the commodity portfolio groups

  20. Dyna-H: a heuristic planning reinforcement learning algorithm applied to role-playing-game strategy decision systems

    CERN Document Server

    Santos, Matilde; Lopez, Victoria

    2011-01-01

    In a Role-Playing Game, finding optimal trajectories is one of the most important tasks. In fact, the strategy decision system becomes a key component of a game engine. Determining the way in which decisions are taken (e.g. online, batch or simulated) and the consumed resources in decision making (e.g. execution time, memory) will influence, in mayor degree, the game performance. When classical search algorithms such as A* can be used, they are the very first option. Nevertheless, such methods rely on precise and complete models of the search space, and so there are many interesting scenarios where its application is not possible, hence model free methods for sequential decision making under uncertainty are the best choice. In this paper, we propose a heuristic planning strategy to incorporate, into a Dyna agent, the ability of heuristic-search in path-finding. The proposed Dyna-H algorithm, as A* does, selects branches more likely to produce outcomes than other branches. However, it has the advantages, A* ha...

  1. Formative Assessment for College Readiness: Measuring Skill and Growth in Five Key Cognitive Strategies Associated with Postsecondary Success

    Science.gov (United States)

    Conley, David; Lombardi, Allison; Seburn, Mary; McGaughy, Charis

    2009-01-01

    This study reports the preliminary results from a field test of the College-readiness Performance Assessment System (C-PAS), a large-scale, 6th-12th grade criterion-referenced assessment system that utilizes classroom-embedded performance tasks to measure student progress toward the development of key cognitive skills associated with success in…

  2. Analysis of market & business strategies of key players in UK professional services sector For Tata Consultancy Services MBA 2012

    OpenAIRE

    Pinto, Ajay Don; Sridhar, Geetha

    2012-01-01

    This project is part of the Nottingham University Business School Management Project and TCS’s Global Internship Program which provides an opportunity to work on challenging projects on information technology. The key areas include: improving operational efficiency and productivity; promoting business agility; simplification and transformation; managing enterprise risk and compliance; and enabling the understanding of markets and customers. The project from Tata Consultancy Services (TCS)...

  3. Managing the duality of IHRM: unravelling the strategy and perceptions of key actors in South Korean MNCs

    OpenAIRE

    Chung, C.; Bozkurt, O.; Sparrow, P R

    2012-01-01

    This research aims to extend our understanding of the duality between global integration and local responsiveness in multinational corporations (MNCs) by exploring the perceptions of corporate HR actors regarding the intra-organisational factors that alter the balance between these pressures. It examines the perceptions and actions of key actors in the context of two Korean MNCs. The study shows the importance attributed to a range of socio-procedural factors by corporate actors and which, th...

  4. The implementation of the import substitution strategy as the key to the development of export potential of industrial enterprises

    OpenAIRE

    T.V. Vashchenko

    2015-01-01

    The aim of the article. The article examines the preconditions and prospects of import substitution implementation by native producers of machine-building industry. It is based on the analysis of the different countries experiences in import substitution implementation for their economic growth and renovation. The rational explanation of the import substitution strategy formation and implementation at the management level of enterprise development is given. It allows to form more clearly the ...

  5. Service-Learning Might be the Key: Learning From the Challenges and Implementation Strategies in EFL Teacher Education in Oman

    Directory of Open Access Journals (Sweden)

    Thuwayba Al Barwani

    2013-07-01

    Full Text Available Service-learning, a major reform in higher education, is considered essential for developing citizenship for the 21st century. This paper reports a study aimed at investigating the problems and challenges faced when implementing service-learning in pre-service education of teachers of English as a Foreign Language (EFL and carried out in the Sultanate of Oman. The study also investigated the strategies that could possibly be used to overcome the challenges. A two-part questionnaire was designed and administered to a sample of 65 respondents comprising EFL instructors, pre-service student-teachers, administrators and administrative support staff. The first part of the questionnaire included 26 items covering 5 dimensions of challenges and the second consisted of 14 dimensions that covered a total of 77 strategies for overcoming the challenges identified. In general, the challenges were perceived to present serious problems in implementing service-learning; there were no significant differences between respondent groups on account of gender. The study also found that the strategies suggested were perceived to be very helpful in overcoming the challenges with no significant differences between faculty and administrators.

  6. Multi-Objective Thermo-Economic Optimization Strategy for ORCs Applied to Subcritical and Transcritical Cycles for Waste Heat Recovery

    Directory of Open Access Journals (Sweden)

    Steven Lecompte

    2015-04-01

    Full Text Available Organic Rankine cycles (ORCs are an established technology to convert waste heat to electricity. Although several commercial implementations exist, there is still considerable potential for thermo-economic optimization. As such, a novel framework for designing optimized ORC systems is proposed based on a multi-objective optimization scheme in combination with financial appraisal in a post-processing step. The suggested methodology provides the flexibility to quickly assess several economic scenarios and this without the need of knowing the complex design procedure. This novel way of optimizing and interpreting results is applied to a waste heat recovery case. Both the transcritical ORC and subcritical ORC are investigated and compared using the suggested optimization strategy.

  7. Comparative Analysis of Interval, Skipped, and Key-vertebral Pedicle Screw Strategies for Correction in Patients With Lenke Type 1 Adolescent Idiopathic Scoliosis

    Science.gov (United States)

    Wang, Fei; Xu, Xi-Ming; Lu, Yanghu; Wei, Xian-Zhao; Zhu, Xiao-Dong; Li, Ming

    2016-01-01

    Abstract Pedicle screw constructs have become the mainstay for surgical correction in patients with spinal deformities. To reduce or avoid the risk of pedicle screw-based complications and to decrease the costs associated with pedicle screw instrumentation, some authors have introduced interval, skipped, and key-vertebral pedicle screw strategies for correction. However, there have been no comparisons of outcomes among these 3 pedicle screw-placement strategies. The aim of this study was to compare the correlative clinical outcomes of posterior correction and fusion with pedicle screw fixation using these 3 surgical strategies. Fifty-six consecutive patients with Lenke type 1 adolescent idiopathic scoliosis were included in this study. Twenty patients were treated with the interval pedicle screw strategy (IPSS), 20 with the skipped pedicle screw strategy (SPSS), and 16 with the key-vertebral pedicle screw strategy (KVPSS). Coronal and sagittal radiographs were analyzed before surgery, at 1 week after surgery, and at the last follow-up after surgery. There were no significant differences among the 3 groups regarding preoperative radiographic parameters. No significant difference was found between the IPSS and SPSS groups in correction of the main thoracic curve (70.8% vs 70.0%; P = 0.524). However, there were statistically significant differences between the IPSS and KVPSS groups (70.8% vs 64.9%) and between the SPSS and KVPSS groups (70.0% vs 64.9%) in correction of the main thoracic curve (P < 0.001 for both). Additionally, there were no significant differences among the 3 strategies for sagittal parameters at the immediate postoperative and last postoperative follow-up periods, though there were significant differences in the Cobb angle between the preoperative and immediate postoperative periods among the 3 groups, but not between the immediate postoperative and last follow-up periods. The amount of hospital charges in the SPSS group was significantly

  8. Marketing 'less harmful, low-tar' cigarettes is a key strategy of the industry to counter tobacco control in China.

    Science.gov (United States)

    Yang, Gonghuan

    2014-03-01

    While the 'low-tar' scheme has been widely recognised as a misleading tactic used by the tobacco industry to deceive the public about the true risks of cigarette smoking, a similar campaign using the slogan of 'less harmful, low tar' was launched by the Chinese tobacco industry, that is, State Tobacco Monopoly Administration/China National Tobacco Corporation and began to gain traction during the last decade. Despite the fact that no sufficient research evidence supports the claims made by the industry that these cigarettes are safer, the Chinese tobacco industry has continued to promote them using various health claims. As a result, the production and sales of 'less harmful, low-tar' cigarettes have increased dramatically since 2000. Recently, a tobacco industry senior researcher, whose main research area is 'less harmful, low-tar' cigarettes, was elected as an Academician to the prestigious Chinese Academy of Engineering for his contribution to developing 'less harmful, low-tar' cigarettes. The tobacco researcher's election caused an outcry from the tobacco control community and the general public in China. This paper discusses the Chinese tobacco industry's 'less harmful, low-tar' initiatives and calls for the Chinese government to stop the execution of this deceptive strategy for tobacco marketing.

  9. Marketing 'less harmful, low-tar' cigarettes is a key strategy of the industry to counter tobacco control in China.

    Science.gov (United States)

    Yang, Gonghuan

    2014-03-01

    While the 'low-tar' scheme has been widely recognised as a misleading tactic used by the tobacco industry to deceive the public about the true risks of cigarette smoking, a similar campaign using the slogan of 'less harmful, low tar' was launched by the Chinese tobacco industry, that is, State Tobacco Monopoly Administration/China National Tobacco Corporation and began to gain traction during the last decade. Despite the fact that no sufficient research evidence supports the claims made by the industry that these cigarettes are safer, the Chinese tobacco industry has continued to promote them using various health claims. As a result, the production and sales of 'less harmful, low-tar' cigarettes have increased dramatically since 2000. Recently, a tobacco industry senior researcher, whose main research area is 'less harmful, low-tar' cigarettes, was elected as an Academician to the prestigious Chinese Academy of Engineering for his contribution to developing 'less harmful, low-tar' cigarettes. The tobacco researcher's election caused an outcry from the tobacco control community and the general public in China. This paper discusses the Chinese tobacco industry's 'less harmful, low-tar' initiatives and calls for the Chinese government to stop the execution of this deceptive strategy for tobacco marketing. PMID:23349230

  10. Design key points of shield tunnel applied in the water intake & drain project of power plants%电厂取排水工程采用盾构法隧道的设计要点

    Institute of Scientific and Technical Information of China (English)

    庄敏

    2014-01-01

    In this paper, the design key points of shield tunnel applied in the water intake&drain project of power plants are summarized according to the design code.These design key points will be references for engineers.%根据规范的要求,整理出盾构法隧道应用于电厂取排水工程的设计要点,供同仁设计参考。

  11. Protein homeostasis disorders of key enzymes of amino acids metabolism: mutation-induced protein kinetic destabilization and new therapeutic strategies.

    Science.gov (United States)

    Pey, Angel L

    2013-12-01

    Many inborn errors of amino acids metabolism are caused by single point mutations affecting the ability of proteins to fold properly (i.e., protein homeostasis), thus leading to enzyme loss-of-function. Mutations may affect protein homeostasis by altering intrinsic physical properties of the polypeptide (folding thermodynamics, and rates of folding/unfolding/misfolding) as well as the interaction of partially folded states with elements of the protein homeostasis network (such as molecular chaperones and proteolytic machineries). Understanding these mutational effects on protein homeostasis is required to develop new therapeutic strategies aimed to target specific features of the mutant polypeptide. Here, I review recent work in three different diseases of protein homeostasis associated to inborn errors of amino acids metabolism: phenylketonuria, inherited homocystinuria and primary hyperoxaluria type I. These three different genetic disorders involve proteins operating in different cell organelles and displaying different structural complexities. Mutations often decrease protein kinetic stability of the native state (i.e., its half-life for irreversible denaturation), which can be studied using simple kinetic models amenable to biophysical and biochemical characterization. Natural ligands and pharmacological chaperones are shown to stabilize mutant enzymes, thus supporting their therapeutic application to overcome protein kinetic destabilization. The role of molecular chaperones in protein folding and misfolding is also discussed as well as their potential pharmacological modulation as promising new therapeutic approaches. Since current available treatments for these diseases are either burdening or only successful in a fraction of patients, alternative treatments must be considered covering studies from protein structure and biophysics to studies in animal models and patients.

  12. Applying maintenance strategies from the space and satellite sector to the upstream oil and gas industry: A research agenda

    International Nuclear Information System (INIS)

    Practitioners from both the upstream oil and gas industry and the space and satellite sector have repeatedly noted several striking similarities between the two industries over the years, which have in turn resulted in many direct comparisons in the media and industry press. The two sectors have previously worked together and shared ideas in ways that have yielded some important breakthroughs, but relatively little sharing or cross-pollination has occurred in the area of asset maintenance. This is somewhat surprising in light of the fact that here, too, the sectors have much in common. This paper accordingly puts forward the viewpoint that the upstream oil and gas industry could potentially make significant improvements in asset maintenance—specifically, with regard to offshore platforms and remote pipelines—by selectively applying some aspects of the maintenance strategies and philosophies that have been learned in the space and satellite sector. The paper then offers a research agenda toward accelerating the rate of learning and sharing between the two industries in this domain, and concludes with policy recommendations that could facilitate this kind of cross-industry learning. - Highlights: • Oil and gas industry and space and satellite sector are very similar in several important ways. • Paper suggests that oil and gas industry should adopt best maintenance practices from satellite sector. • Research agenda outlined to accelerate the rate of learning and sharing between the two industries

  13. N'Dow sees water as key to a sustainable peace. Outlines a new strategy for the new century.

    Science.gov (United States)

    Singh, V

    1996-06-01

    Water availability has emerged as the most important element of peace, so it is central to the UN's peacekeeping mandate as it moves into the next century, Wally N'Dow said Wednesday. Addressing a panel on the growing water needs of cities, N'Dow, the Secretary General of Habitat II, said lack of water is one of the 'most critical factors' that cause conflict. N'Dow urged city officials, nongovernmental organizations and other Habitat players to act on the recommendations of the panel, which he labeled "the single most important dialogue at this conference." N'Dow stressed cost effectiveness, better technology, and new management systems as the three most important elements of a new strategy. More than 1 billion people worldwide--mostly in poor countries--do not have access to safe drinking water. Also, most of the world's largest cities, including some in rich countries, do not treat their waste water adequately. The challenge for growing cities, UN officials say, is not just to provide safe water but also to ensure the poor can afford it. "Habitat is a wake-up call, as 40% of city residents do not have water," said Beatrice Labonne, director of the UN's Division for Environment Management and Social Development. Currently, subsidies skew water prices overwhelmingly in favor of the rich. In Jakarta, Indonesia, piped water accounts for only 14% of the total water supply, according to the World Bank. Many poor residents shut out of the system have to pay more than 20 times the price paid by the rich. Water pricing has long been a hot political issue, which is partly why the World Bank and the UN have called for privatization of the water sector. But, they say, governments must regulate the firms to guarantee safe water and fair pricing. Privatization is seen as a solution to manipulation of government utilities by vested interests. For example, governments often grant huge concessions to industry as a means of helping the latter create more jobs. Last March, Habitat

  14. A novel fermentation strategy for removing the key inhibitor acetic acid and efficiently utilizing the mixed sugars from lignocellulosic hydrolysates

    Energy Technology Data Exchange (ETDEWEB)

    Mark A. Eiteman PHD; Elliot Altman Phd

    2009-02-11

    As part of preliminary research efforts, we have completed several experiments which demonstrate 'proof of concept.' These experiments addressed the following three questions: (1) Can a synthetic mixed sugar solution of glucose and xylose be efficiently consumed using the multi-organism approach? (2) Can this approach be used to accumulate a model product? (3) Can this approach be applied to the removal of an inhibitor, acetate, selectively from mixtures of xylose and glucose? To answer the question of whether this multi-organism approach can effectively consume synthetic mixed sugar solutions, we first tested substrate-selective uptake using two strains, one unable to consume glucose and one unable to consume xylose. The xylose-selective strain ALS998 has mutations in the three genes involved in glucose uptake, rendering it unable to consume glucose: ptsG codes for the Enzyme IICB{sup Glc} of the phosphotransferase system (PTS) for carbohydrate transport (Postma et al., 1993), manZ codes for the IID{sup Man} domain of the mannose PTS permease (Huber, 1996), glk codes for glucokinase (Curtis and Epstein 1975) We also constructed strain ALS1008 which has a knockout in the xylA gene encoding for xylose isomerase, rendering ALS1008 unable to consume xylose. Two batch experiments and one continuous bioprocess were completed. In the first experiment, each strain was grown separately in a defined medium of 8 g/L xylose and 15 g/L glucose which represented xylose and glucose concentrations that can be generated by actual biomass. In the second experiment, the two strains were grown together in batch in the same defined, mixed-sugar medium. In a third experiment, we grew the strains continuously in a 'chemostat', except that we shifted the concentrations of glucose and xylose periodically to observe how the system would respond. (For example, we shifted the glucose concentration suddenly from 15 g/L to 30 g/L in the feed).

  15. Key Problems and Strategy Research of Medical Health Big Data%医疗健康大数据关键问题及对策研究

    Institute of Scientific and Technical Information of China (English)

    黄晓琴

    2016-01-01

    医疗健康大数据分析能发挥区域卫生信息平台上汇聚采集的数据价值。针对目前医疗健康大数据分析存在的一些关键问题,结合在上海市卫计委医疗健康大数据分析的项目案例,探讨了医疗健康大数据关键问题的对策。研究成果表明解决医疗健康大数据关键问题非常重要,包括确定医疗健康大数据业务主题、医疗健康大数据技术架构、医疗健康数据的数据分类、医疗健康数据标准制定策略、医疗健康数据治理策略和医疗健康大数据分析关键技术。案例研究表明,解决医疗健康大数据的关键问题对已有医疗健康数据做科研分析、临床指导、医学经济研究等具有重要意义。%In view of the present medical health the key problems of big data analysis, combined the case of medical health big data analysis of Shanghai regional health projects, put forward the countermeasures to solve the key problems of medical health big data. Research shows that solving the medical health big data problems is very important. Including expounds the medical health big data application research status quo and necessity, discusses the medical health big data analysis key problems, medical health big data analysis strategy are given, including determine the medical health big data business subject, determine medical health big data technical architecture, medical health data classification, medical health data standards formulate strategy, medical health data governance policies, medical health big data analysis key technology. Case study shows that, solve the critical issue of medical health big data analysis has the vital significance, to existing medical health data to do scientific research, clinical guidance, and medical economic research.

  16. OSGi Key Technology and the Applying Research%O SG i关键技术及其应用研究

    Institute of Scientific and Technical Information of China (English)

    胡佳慧; 吴思竹; 方安

    2015-01-01

    The paper summarizes and shares the current key technology of OSGi including the hierarchical model, the extended func-tion, the realization framework and the technical features.It illustrates OSGi's special advantages in service-oriented development of the modern information application system by giving examples and combining the three typical application fields, namely medical and health service, scientific research platform construction and remote information processing.%总结和分析目前OSGi关键技术,包括分层模型、扩展功能、实现框架和技术特点,结合医疗卫生服务、科研平台建设和远程信息处理3个典型应用领域,举例说明OSGi在以服务为导向的现代信息应用系统开发中的独特优势。

  17. Applying Future Studies Methods to Understanding the Impact of University Information and Communication Technology Strategies on Learning

    Science.gov (United States)

    Aczel, J. C.; Hardy, P.

    2007-01-01

    This article aims to explore the potential of certain future studies techniques to provide insight into the question of the impact of higher education information and communication technology (ICT) strategies on student learning. The approach is to consider three case studies of new universities in different countries, and to identify the main…

  18. A spatial model with pulsed releases to compare strategies for the sterile insect technique applied to the mosquito Aedes aegypti

    OpenAIRE

    Evans, T. P. O.; Bishop, S.R.

    2014-01-01

    We present a simple mathematical model to replicate the key features of the sterile insect technique (SIT) for controlling pest species, with particular reference to the mosquito Aedes aegypti, the main vector of dengue fever. The model differs from the majority of those studied previously in that it is simultaneously spatially explicit and involves pulsed, rather than continuous, sterile insect releases. The spatially uniform equilibria of the model are identified and analysed. Simulations a...

  19. A narrative review of psychological and educational strategies applied to young children's eating behaviours aimed at reducing obesity risk

    OpenAIRE

    Gibson, E. Leigh; Wildgruber, Andreas; Kreichauf, Susanne; Vögele, Claus; Nixon, Catherine A.; Douthwaite, Wayne; Moore, Helen J; Manios, Yannis; Summerbell, Carolyn D; on behalf of the Toybox-study group

    2012-01-01

    Strategies to reduce risk of obesity by influencing preschool children’s eating behaviour are reviewed. The studies are placed in the context of relevant psychological processes, including inherited and acquired preferences, and behavioural traits, such as food neophobia, ‘enjoyment of food’ and ‘satiety responsiveness’. These are important influences on how children respond to feeding practices, as well as predictors of obesity risk. Nevertheless, in young children, food environment and expe...

  20. Understanding NTNU's students' and employees' recycling behaviour based on intervention strategies by applying a comprehensive psychological model

    OpenAIRE

    Tobolova, Monika

    2015-01-01

    One of the solutions for the environmental problem of waste is proper waste separation by individuals. This Master’s Thesis discusses the psychological variables of individuals’ waste separation behaviour. Building on the Theory of Planned Behaviour, Norm-activation Model, Habits and the Comprehensive Action Determination Model, a questionnaire was created paying close attention to the intervention strategies implemented by the project group ‘Klimafot Avfall’ at The Norwegian University of Sc...

  1. Applying peripheral auditory model to improve CIS strategy for cochlear implant%采用听觉外周模型改进电子耳蜗CIS方案

    Institute of Scientific and Technical Information of China (English)

    孙文业; 陶智; 孙宝印; 倪赛华; 王振明; 顾济华

    2014-01-01

    提出了一种改进的CIS电子耳蜗的脉冲刺激方案。利用听觉外周模型产生一种符合听神经发放机制的刺激脉冲序列来刺激电极,代替传统的均匀交替刺激方案,不仅可以通过包络而且可以通过脉冲间隔来传递语音信息,确保了语音的空间编码和时间编码。听觉仿真实验表明,相对于其他两种方案,方案可以有效地传递更多更丰富的语音信息,在汉语声调识别实验中至少提高19.2%识别率,在可懂度的对比实验中具有最高可懂度。%A stimulation strategy for cochlear implant is proposed. The proposed strategy applies the stochastic firing characteristic of peripheral auditory nerve to generate the impulse train stimulating the corresponding electrode, instead of traditional uniform alternating stimulating strategy. Therefore, speech information can be conveyed not only by the envelope but also impulse intervals by the proposed strategy, which ensure both the space principle and time principle. Auditory simulation experiments show that the proposed strategy can efficiently convey more speech information when comparing with the other strategies. The proposed strategy improves the recognition rate at least 19.2% at the Chinese tone recogni-tion experiment, and has the highest intelligibility at the intelligibility contrast experiment.

  2. LCA of local strategies for energy recovery from waste in England, applied to a large municipal flow

    International Nuclear Information System (INIS)

    An intense waste management (WM) planning activity is currently undergoing in England to build the infrastructure necessary to treat residual wastes, increase recycling levels and the recovery of energy from waste. From the analyses of local WM strategic and planning documents we have identified the emerging of three different energy recovery strategies: established combustion of residual waste; pre-treatment of residual waste and energy recovery from Solid Recovered Fuel in a dedicated plant, usually assumed to be a gasifier; pre-treatment of residual waste and reliance on the market to accept the 'fuel from waste' so produced. Each energy recovery strategy will result in a different solution in terms of the technology selected; moreover, on the basis of the favoured solution, the total number, scale and location of thermal treatment plants built in England will dramatically change. To support the evaluation and comparison of these three WM strategy in terms of global environmental impacts, energy recovery possibilities and performance with respect to changing 'fuel from waste' market conditions, the LCA comparison of eight alternative WM scenarios for a real case study dealing with a large flow of municipal wastes was performed with the modelling tool WRATE. The large flow of waste modelled allowed to formulate and assess realistic alternative WM scenarios and to design infrastructural systems which are likely to correspond to those submitted for approval to the local authorities. The results show that all alternative scenarios contribute to saving abiotic resources and reducing global warming potential. Particularly relevant to the current English debate, the performance of a scenario was shown to depend not from the thermal treatment technology but from a combination of parameters, among which most relevant are the efficiency of energy recovery processes (both electricity and heat) and the calorific value of residual waste and pre-treated material. The

  3. LCA of local strategies for energy recovery from waste in England, applied to a large municipal flow.

    Science.gov (United States)

    Tunesi, Simonetta

    2011-03-01

    An intense waste management (WM) planning activity is currently undergoing in England to build the infrastructure necessary to treat residual wastes, increase recycling levels and the recovery of energy from waste. From the analyses of local WM strategic and planning documents we have identified the emerging of three different energy recovery strategies: established combustion of residual waste; pre-treatment of residual waste and energy recovery from Solid Recovered Fuel in a dedicated plant, usually assumed to be a gasifier; pre-treatment of residual waste and reliance on the market to accept the 'fuel from waste' so produced. Each energy recovery strategy will result in a different solution in terms of the technology selected; moreover, on the basis of the favoured solution, the total number, scale and location of thermal treatment plants built in England will dramatically change. To support the evaluation and comparison of these three WM strategy in terms of global environmental impacts, energy recovery possibilities and performance with respect to changing 'fuel from waste' market conditions, the LCA comparison of eight alternative WM scenarios for a real case study dealing with a large flow of municipal wastes was performed with the modelling tool WRATE. The large flow of waste modelled allowed to formulate and assess realistic alternative WM scenarios and to design infrastructural systems which are likely to correspond to those submitted for approval to the local authorities. The results show that all alternative scenarios contribute to saving abiotic resources and reducing global warming potential. Particularly relevant to the current English debate, the performance of a scenario was shown to depend not from the thermal treatment technology but from a combination of parameters, among which most relevant are the efficiency of energy recovery processes (both electricity and heat) and the calorific value of residual waste and pre-treated material. The

  4. New cleaning strategies based on carbon nanomaterials applied to the deteriorated marble surfaces: A comparative study with enzyme based treatments

    Energy Technology Data Exchange (ETDEWEB)

    Valentini, Federica, E-mail: federica.valentini@uniroma2.it [Dipartimento di Scienze e Tecnologie Chimiche, Universita degli Studi di Roma Tor Vergata, Via della Ricerca Scientifica 1, 00133 Rome (Italy); Diamanti, Alessia; Carbone, M. [Dipartimento di Scienze e Tecnologie Chimiche, Universita degli Studi di Roma Tor Vergata, Via della Ricerca Scientifica 1, 00133 Rome (Italy); Bauer, E.M. [Istituto di Struttura della Materia del Consiglio Nazionale delle Ricerche (ISM-CNR), RM 1, Via Salaria km 29.3, 00015 Monterotondo (Italy); Palleschi, Giuseppe [Dipartimento di Scienze e Tecnologie Chimiche, Universita degli Studi di Roma Tor Vergata, Via della Ricerca Scientifica 1, 00133 Rome (Italy)

    2012-06-01

    Pentelic marbles from Basilica Neptuni in Rome-Italy (27-25 B.C.) show the signs of deterioration phenomena, which can be identified as black crust as well as black and grey patina. The present study has the twofold objective of assessing the entity of the deterioration and proposing new cleaning strategies based on nanotechnologies. The former is achieved by performing optical microscopy, differential interference contrast (DIC), stereomicroscopy, scanning electron microscopy/energy dispersive X-ray analysis (SEM/EDX) and infrared Fourier transform spectroscopy (FT-IR) analysis. The second objective of this study, involves different treatments based on a new cleaning strategy with carbon nanomaterials and bio-cleaning (used here for comparison) performed with enzymes, as glucose oxidase (GOD) and lipase. Nanomicelles assembled with functionalised carbon nano-fibres (CNF-COOH) and dispersed in Tween 20 medium show the highest cleaning performances in terms of removal of the black crust, compared with the pristine single-wall carbon nanotubes (SWCNTs) and the enzyme-based cleaning treatments. In particular, in these last two cases, the GOD-based biocleaning is efficient in removing the grey and dark patina, but works slow on the black crust. Finally, the lipase based cleaning approach is efficient in the black patina removal, though at the working temperature of 38 Degree-Sign C.

  5. Joint enhancement strategy applied in ECL biosensor based on closed bipolar electrodes for the detection of PSA.

    Science.gov (United States)

    Shi, Hai-Wei; Zhao, Wei; Liu, Zhen; Liu, Xi-Cheng; Wu, Mei-Sheng; Xu, Jing-Juan; Chen, Hong-Yuan

    2016-07-01

    A highly sensitive electrogenerated chemiluminescence (ECL) biosensor was developed on the basis of a closed bipolar electrode (BPE) apparatus for the analysis of prostate specific antigen (PSA). Bipolar modifications bring up two different stages of enhancement on the same electrode. Anodic enhancement was conducted by modifying gold nanoparticles (Au NPs) to catalyze the anodic ECL reaction between luminol and hydrogen peroxide. Cathodic introduction of thionine tagged PSA antibody led to a further pertinently enhancement synchronized with the PSA amount variation, because the existence of thionine greatly increased the rate of electron gains on cathode, leading to the corresponding acceleration of anodic ECL reaction. The more thionine modified target molecules were introduced, the faster luminol was oxidized, the higher faraday current approached, and sensitive quantification was realized in correlation with the responsive ECL intensity differences. The quantification resulted in a good determination range between 0.1pg/mL and 0.1µg/mL. This strategy mainly took advantage of the special structure of closed BPE to realize a simultaneous amplification on both ends of BPE. Moreover, the platform had a potential of providing a multi-functional strategy for the realization of other bio-detections by simply substituting the PSA sandwich structure with other bio-structures. PMID:27154662

  6. A narrative review of psychological and educational strategies applied to young children's eating behaviours aimed at reducing obesity risk.

    Science.gov (United States)

    Gibson, E L; Kreichauf, S; Wildgruber, A; Vögele, C; Summerbell, C D; Nixon, C; Moore, H; Douthwaite, W; Manios, Y

    2012-03-01

    Strategies to reduce risk of obesity by influencing preschool children's eating behaviour are reviewed. The studies are placed in the context of relevant psychological processes, including inherited and acquired preferences, and behavioural traits, such as food neophobia, 'enjoyment of food' and 'satiety responsiveness'. These are important influences on how children respond to feeding practices, as well as predictors of obesity risk. Nevertheless, in young children, food environment and experience are especially important for establishing eating habits and food preferences. Providing information to parents, or to children, on healthy feeding is insufficient. Acceptance of healthy foods can be encouraged by five to ten repeated tastes. Recent evidence suggests rewarding healthy eating can be successful, even for verbal praise alone, but that palatable foods should not be used as rewards for eating. Intake of healthier foods can be promoted by increasing portion size, especially in the beginning of the meal. Parental strategies of pressuring to eat and restriction do not appear to be causally linked to obesity, but are instead primarily responses to children's eating tendencies and weight. Moderate rather than frequent restriction may improve healthy eating in children. Actively positive social modelling by adults and peers can be effective in encouraging healthier eating. PMID:22309067

  7. On the Data Mining Technology Applied to Active Marketing Model of International Luxury Marketing Strategy in China— An Empirical Analysis

    OpenAIRE

    Qishen Zhou; Shanhui Wang; Zuowei Yin

    2013-01-01

     This paper emphasizes the importance of active marketing in the customer relationship management. Especially, the data mining technology is applied to establish an active marketing model to empirically analyze the condition of the AH Jewelry Company. Michael Porter's Five Forces Model is employed to assess and calculate the similarity in the active marketing model. Then, the questionnaire analysis on the customer relationship management model is carried out to explain the target market and t...

  8. Active Vibration Isolation Control: Comparison of Feedback and Feedforward Control Strategies Applied to Coriolis Mass-Flow Meters (I)

    OpenAIRE

    Ridder, de, J.; Hakvoort, W.B.J.; van Dijk

    2015-01-01

    In this paper we describe the design, implementation and results of multi degree of freedom (DOF) active vibration control for a Coriolis mass-flow meter (CMFM). Without vibration control, environmental vibrational disturbances results in nanometre movement of the fluid-conveying tube which causes erroneous mass-flow measurements. In order to reduce the transmissibility from external vibrations to the internal tube displacement active vibration control is applied. A comparison of a feedback c...

  9. AN ANALYSIS OF STUDENTS’ SKILL IN APPLYING THE PROBLEM SOLVING STRATEGY TO THE PHYSICS PROBLEM SETTLEMENT IN FACING AEC AS GLOBAL COMPETITION

    Directory of Open Access Journals (Sweden)

    A Halim

    2016-04-01

    Full Text Available The results of previous studies show that students of Physics Education (S1 and S2, FKIP Syiah Kuala University more than 50% do not understand the programs and roadmap of Pilar ASEAN Socio-Cultural Community as a part of the ASEAN Economic Community (AEC. The inference of those results to the implementation of learning physics and science education system needs to be implemented through a link and match learning model that can improve the ability to think critically and creatively, and students need to be trained to be problem solvers, not the problem makers.Based on these problems, through this research has been applied physics learning by using Problem Solving strategies on 25 students of Master of Physical Education and Science. At the end of the implementation study measured the ability of students to apply problem-solving strategies in accordance with Answer Sections of Problem Solving adopted from previous research. The results showed that the majority of students (78% are able to implement the stage I (Focus on Problem with a complete, almost all respondents (91% was only able to implement the stage II (Describe the Physics of about 40%, almost all respondents (91% can apply for the stage III (Plan The Solution approximately 80% of all respondents have been able to implement the stage IV (Excute the Plan perfectly, and all respondents have been able to apply the stage V (Evaluate the Answer completely. It is expected that all staff of teaching Science materials (Physics, they are recommended strongly to implement Problem Solving as an alternative strategy for preparing students to face global competition in the ASEAN Economic Community (AEC.

  10. Proton-detected scalar coupling based assignment strategies in MAS solid-state NMR spectroscopy applied to perdeuterated proteins

    Science.gov (United States)

    Linser, Rasmus; Fink, Uwe; Reif, Bernd

    2008-07-01

    Assignment of proteins in MAS (magic angle spinning) solid-state NMR relies so far on correlations among heteronuclei. This strategy is based on well dispersed resonances in the 15N dimension. In many complex cases like membrane proteins or amyloid fibrils, an additional frequency dimension is desirable in order to spread the amide resonances. We show here that proton detected HNCO, HNCA, and HNCACB type experiments can successfully be implemented in the solid-state. Coherences are sufficiently long lived to allow pulse schemes of a duration greater than 70 ms before incrementation of the first indirect dimension. The achieved resolution is comparable to the resolution obtained in solution-state NMR experiments. We demonstrate the experiments using a triply labeled sample of the SH3 domain of chicken α-spectrin, which was re-crystallized in H 2O/D 2O using a ratio of 1/9. We employ paramagnetic relaxation enhancement (PRE) using EDTA chelated Cu II to enable rapid data acquisition.

  11. Sustained reduction of the dengue vector population resulting from an integrated control strategy applied in two Brazilian cities.

    Directory of Open Access Journals (Sweden)

    Lêda N Regis

    Full Text Available Aedes aegypti has developed evolution-driven adaptations for surviving in the domestic human habitat. Several trap models have been designed considering these strategies and tested for monitoring this efficient vector of Dengue. Here, we report a real-scale evaluation of a system for monitoring and controlling mosquito populations based on egg sampling coupled with geographic information systems technology. The SMCP-Aedes, a system based on open technology and open data standards, was set up from March/2008 to October/2011 as a pilot trial in two sites of Pernambuco -Brazil: Ipojuca (10,000 residents and Santa Cruz (83,000, in a joint effort of health authorities and staff, and a network of scientists providing scientific support. A widespread infestation by Aedes was found in both sites in 2008-2009, with 96.8%-100% trap positivity. Egg densities were markedly higher in SCC than in Ipojuca. A 90% decrease in egg density was recorded in SCC after two years of sustained control pressure imposed by suppression of >7,500,000 eggs and >3,200 adults, plus larval control by adding fishes to cisterns. In Ipojuca, 1.1 million mosquito eggs were suppressed and a 77% reduction in egg density was achieved. This study aimed at assessing the applicability of a system using GIS and spatial statistic analysis tools for quantitative assessment of mosquito populations. It also provided useful information on the requirements for reducing well-established mosquito populations. Results from two cities led us to conclude that the success in markedly reducing an Aedes population required the appropriate choice of control measures for sustained mass elimination guided by a user-friendly mosquito surveillance system. The system was able to support interventional decisions and to assess the program's success. Additionally, it created a stimulating environment for health staff and residents, which had a positive impact on their commitment to the dengue control program.

  12. Crossover versus Mutation: A Comparative Analysis of the Evolutionary Strategy of Genetic Algorithms Applied to Combinatorial Optimization Problems

    Science.gov (United States)

    Osaba, E.; Carballedo, R.; Diaz, F.; Onieva, E.; de la Iglesia, I.; Perallos, A.

    2014-01-01

    Since their first formulation, genetic algorithms (GAs) have been one of the most widely used techniques to solve combinatorial optimization problems. The basic structure of the GAs is known by the scientific community, and thanks to their easy application and good performance, GAs are the focus of a lot of research works annually. Although throughout history there have been many studies analyzing various concepts of GAs, in the literature there are few studies that analyze objectively the influence of using blind crossover operators for combinatorial optimization problems. For this reason, in this paper a deep study on the influence of using them is conducted. The study is based on a comparison of nine techniques applied to four well-known combinatorial optimization problems. Six of the techniques are GAs with different configurations, and the remaining three are evolutionary algorithms that focus exclusively on the mutation process. Finally, to perform a reliable comparison of these results, a statistical study of them is made, performing the normal distribution z-test. PMID:25165731

  13. Crossover versus Mutation: A Comparative Analysis of the Evolutionary Strategy of Genetic Algorithms Applied to Combinatorial Optimization Problems

    Directory of Open Access Journals (Sweden)

    E. Osaba

    2014-01-01

    Full Text Available Since their first formulation, genetic algorithms (GAs have been one of the most widely used techniques to solve combinatorial optimization problems. The basic structure of the GAs is known by the scientific community, and thanks to their easy application and good performance, GAs are the focus of a lot of research works annually. Although throughout history there have been many studies analyzing various concepts of GAs, in the literature there are few studies that analyze objectively the influence of using blind crossover operators for combinatorial optimization problems. For this reason, in this paper a deep study on the influence of using them is conducted. The study is based on a comparison of nine techniques applied to four well-known combinatorial optimization problems. Six of the techniques are GAs with different configurations, and the remaining three are evolutionary algorithms that focus exclusively on the mutation process. Finally, to perform a reliable comparison of these results, a statistical study of them is made, performing the normal distribution z-test.

  14. Multiple Δt strategy for particle image velocimetry (PIV) error correction, applied to a hot propulsive jet

    International Nuclear Information System (INIS)

    PIV (particle image velocimetry) is a measurement technique with growing application to the study of complex flows with relevance to industry. This work is focused on the assessment of some significant PIV measurement errors. In particular, procedures are proposed for estimating, and sometimes correcting, errors coming from the sensor geometry and performance, namely peak-locking and contemporary CCD camera read-out errors. Although the procedures are of general application to PIV, they are applied to a particular real case, giving an example of the methodology steps and the improvement in results that can be obtained. This real case corresponds to an ensemble of hot high-speed coaxial jets, representative of the civil transport aircraft propulsion system using turbofan engines. Errors of ∼0.1 pixels displacements have been assessed. This means 10% of the measured magnitude at many points. These results allow the uncertainty interval associated with the measurement to be provided and, under some circumstances, the correction of some of the bias components of the errors. The detection of conditions where the peak-locking error has a period of 2 pixels instead of the classical 1 pixel has been made possible using these procedures. In addition to the increased worth of the measurement, the uncertainty assessment is of interest for the validation of CFD codes

  15. Applied mathematics

    CERN Document Server

    Logan, J David

    2013-01-01

    Praise for the Third Edition"Future mathematicians, scientists, and engineers should find the book to be an excellent introductory text for coursework or self-study as well as worth its shelf space for reference." -MAA Reviews Applied Mathematics, Fourth Edition is a thoroughly updated and revised edition on the applications of modeling and analyzing natural, social, and technological processes. The book covers a wide range of key topics in mathematical methods and modeling and highlights the connections between mathematics and the applied and nat

  16. Enterprise IT governance key decision-making based on strategy alignment and analytic hierarchy process%基于战略匹配和层次分析的企业IT治理关键问题决策

    Institute of Scientific and Technical Information of China (English)

    计春阳; 唐志豪

    2012-01-01

    The alignment between business strategy and IT strategy is the bases for good IT governance performance. And enterprises have to do five key decisions for their IT governance. To convert the alignment ideal into quantitative model so as to support enterprise IT governance decision, the Analytic Network Process (ANP) algorithm was introduced , and collaboration between business and IT strategy was simulated. Business strategy management of Porter, and strategy alignment management of Henderson were borrowed to represent business strategy and IT strategy. An IT governance key decision-making model based on the quantitative results of strategic alignment was put forward and validated through computation and analysis of real cases.%企业战略与IT战略之间的匹配是确保IT治理取得良好绩效的重要前提.企业的IT治理必须完成五个关键问题的决策.为有效地将战略对应的思想转化为量化模型,支持企业决策,本文引入网络层次分析法模拟企业战略与IT战略之间的匹配关系,分别借用Porter的战略管理理论和Henderson的战略匹配模型代表企业战略和IT战略,提出了基于战略匹配的企业IT治理五个关键问题决策模型,并通过实例分析与运算验证了该模型的有效性.

  17. Example of exercise programs in Portugal applied for different kinds of populations and their benefits. How to develop a study to characterize the population, and possible implications for policy strategies

    OpenAIRE

    Raimundo, Armando

    2011-01-01

    Example of exercise programs in Portugal applied for different kinds of populations and their benefits. How to develop a study to characterize the population, and possible implications for policy strategies.

  18. Starting Right: Using "Biophilia," Organism Cards, & Key Themes in Biology to Introduce Student-Centered Active-Learning Strategies at the Beginning of a Course

    Science.gov (United States)

    Metzger, Kelsey

    2013-01-01

    To create rich learning experiences, it is important to engage students from the very beginning of a course and lay the foundation for constructing a community of active learners. The activities described here using "organism cards" connect students' previous knowledge to course goals and address key themes in biology while initiating…

  19. STUDY REGARDING THE IMPORTANCE OF APPLYING THE DIDACTIC STRATEGIES IN LEARNING AND PERFECTING PROCESS OF WOMEN VAULT YURCHENKO - ROUND OFF FLIC FLAC 1 ½ SALTO BACKWARD STRETCHED OFF

    Directory of Open Access Journals (Sweden)

    Gina Gogean

    2009-03-01

    Full Text Available The artistic gymnastic registers significant process at the international level, the contest exigency for the jump test rising to a very high achievement level so as it needs a special training methodology. I broach this study from the point of view of the importance of instructional strategies applied in the learning and perfecting process of the jump through Yurchenko, this providing the quality of the instruction process and the competitive behavior.The instructional strategies aim at solving the operational objectives through a coherent methodological system, well defined, by using efficiently the best combination of the 3M ( methods, materials, means , chosen and adapted to the learning and perfecting process of jumps through Yurchenko, after choosing and obeyingcertain rules, principles and organization methods in order to provide a high level of quality and efficiency in whatconcerns the training process for achieving the proposed objectives and which to allow the junior gymnasts, at thesenior level, the approaching of certain jumps of a higher difficulty.

  20. ID-based Key-insulated Authenticated Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yuan; CHENG Xiao-ming; CHAI Zhen-chuan

    2007-01-01

    The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information. Comparing with the traditional certificate-based cryptography, identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate. However, exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost. In this paper, an ID-based authenticated key agreement protocol was presented. For solving the problem of key exposure of the basic scheme, the technique of key insulation was applied and a key insulated version is developed.

  1. Applying process mapping and analysis as a quality improvement strategy to increase the adoption of fruit, vegetable, and water breaks in Australian primary schools.

    Science.gov (United States)

    Biggs, Janice S; Farrell, Louise; Lawrence, Glenda; Johnson, Julie K

    2014-03-01

    Over the past decade, public health policy in Australia has prioritized the prevention and control of obesity and invested in programs that promote healthy eating-related behaviors, which includes increasing fruit and vegetable consumption in children. This article reports on a study that used process mapping and analysis as a quality improvement strategy to improve the delivery of a nutrition primary prevention program delivered in primary schools in New South Wales, Australia. Crunch&Sip® has been delivered since 2008. To date, adoption is low with only 25% of schools implementing the program. We investigated the cause of low adoption and propose actions to increase school participation. We conducted semistructured interviews with key stakeholders and analyzed the process of delivering Crunch&Sip to schools. Interviews and process mapping and analysis identified a number of barriers to schools adopting the program. The analyses identified the need to simplify and streamline the process of delivering the program to schools and introduce monitoring and feedback loops to track ongoing participation. The combination of stakeholder interviews and process mapping and analysis provided important practical solutions to improving program delivery and also contributed to building an understanding of factors that help and hinder program adoption. The insight provided by this analysis helped identify usable routine measures of adoption, which were an improvement over those used in the existing program plan. This study contributed toward improving the quality and efficiency of delivering a health promoting program to work toward achieving healthy eating behaviors in children.

  2. Leadership the Key Ingredient: an Overview of an Exploration Study of the Issues Surrounding Implementation of Culinary Tourism Strategy on the Dingle Peninsula

    OpenAIRE

    Murphy, Mark

    2012-01-01

    This paper presents an overview of the author’s research thesis which was part of a M.Sc. in Culinary Innovation and New Food Product Development in D.I.T. The research paper explored the issues surrounding implementing a culinary tourism strategy on the Dingle Peninsula in County Kerry. The Dingle Peninsula has been selected by Ireland’s national tourism development agency (Fáilte Ireland) as a region with potential to become a leading food destination. The research methods consisted of a wi...

  3. Global Strategy

    DEFF Research Database (Denmark)

    Li, Peter Ping

    2013-01-01

    Global strategy differs from domestic strategy in terms of content and process as well as context and structure. The content of global strategy can contain five key elements, while the process of global strategy can have six major stages. These are expounded below. Global strategy is influenced...... by rich and complementary local contexts with diverse resource pools and game rules at the national level to form a broad ecosystem at the global level. Further, global strategy dictates the interaction or balance between different entry strategies at the levels of internal and external networks....

  4. Relationship Between Competitive Strategies and the Success Perception of Polish Born Globals

    Directory of Open Access Journals (Sweden)

    Baranowska-Prokop Ewa

    2014-09-01

    Full Text Available The key objective of this paper is to describe and evaluate the competitive strategies applied by Polish born global enterprises. To reveal these strategies, two competitive models developed by M.E. Porter are applied to an original data set obtained from 256 small and medium Polish enterprises through a survey employing the CATI technique. The outcomes of these strategies, as perceived by the companies applying them, are also evaluated against two hypotheses. We conclude that Polish firms apply both basic strategies of competition, i.e. cost leadership strategies and differentiation strategies and that a substantial majority of companies perceive themselves to have succeeded on the market.

  5. 试论地理核心素养的内涵、特征及其培养策略%Analysis on the Connotation and Characteristics of Geographic Key Competences,and Its Development Strategy

    Institute of Scientific and Technical Information of China (English)

    牛超; 刘玉振

    2015-01-01

    Geographic key competences are that students learn by geography course, and form initial geograph-ic competences, then on this basis, combine the common key competences in basic education curriculum, extract essential character and key ability of being more concerned about personal lifelong development and social develop-ment from geography.Geographic key competences have the characteristics of being comprehensive, developmen-tal, and lifelong .The effective training strategies of geographic key competences are:deepening the research of ge-ographical key competences, helping teachers establish the core concept of key competences, focus on the combi-nation of geographic logic and key competences, leading students' thinking by inquiry-based teaching, transla-ting the key competences into observable explicit performance to evaluate, and creating the geography teaching sit-uation which is close to real-life.%地理核心素养是指学生通过地理课程的学习,初步形成地理学科的素养,并在此基础上有机结合基础教育课程的共同核心素养,提炼出地理学科中那些更为关注个人终身发展和社会发展的必备品格和关键能力. 地理核心素养具有综合性、发展性、终身性的特点,深化对地理核心素养内容的研究、树立教师核心素养教育理念、注重学科逻辑和核心素养培养的融合、运用探究式教学引领学生思维、将核心素养转化为可观察的外显表现进行评价、创设贴近真实生活的地理教学情境是地理核心素养培养的有效策略.

  6. Applying algebraic specification and data mutation strategy to test class%应用代数规约和数据变异策略测试类

    Institute of Scientific and Technical Information of China (English)

    余波; 王昆

    2011-01-01

    The method for testing class based on algebraic specification can overcome the difficulties for generating test cases and evaluating test outputs automatically.There is a defect for this method that it would obtain different effects for detecting faults for the same class under testing as the test data are usually generated randomly. This approach is proposed that the new test cases are added by applying data mutation strategy to the original test cases generated from algebraic specification to solve it.The experiments show that this method is feasible for improving the test effects of algebraic testing method.%在应用基于代数规约测试类时,虽然可以有效解决测试数据生成和测试结果判断这两个测试难题,但是,因为该方法常常随机生成测试数据,会导致对于同一待测试类两次测试会得到不同的测试效果.为克服这个缺陷,提出应用数据变异方法,对已生成的测试用例进行变异.变异测试实验表明:该方法能够有效地改善代数测试方法的测试效果.

  7. Real Time Strategy Language

    OpenAIRE

    Hayes, Roy; Beling, Peter; Scherer, William

    2014-01-01

    Real Time Strategy (RTS) games provide complex domain to test the latest artificial intelligence (AI) research. In much of the literature, AI systems have been limited to playing one game. Although, this specialization has resulted in stronger AI gaming systems it does not address the key concerns of AI researcher. AI researchers seek the development of AI agents that can autonomously interpret learn, and apply new knowledge. To achieve human level performance, current AI systems rely on game...

  8. Study on concept, architecture and key technology of IoT applied in medical industry%面向医疗行业物联网:概念、架构及关键技术研究

    Institute of Scientific and Technical Information of China (English)

    邢丹; 姚俊明

    2014-01-01

    从物联网在医疗行业中的应用现状着手,分析了现有的面向医疗行业物联网的概念,并从狭义和广义角度对其进行剖析。借鉴物联网的现有体系架构,针对面向医疗行业物联网的特点,分析了医疗物联网体系架构设计时应考虑的领域业务范畴和体系架构模型标准,并对面向医疗行业物联网的关键技术进行归纳,分析其在医疗领域应用的场合,最后指出未来智慧医疗的发展方向。%The concept of IoT applied to medical industry is analyzed proceeding from its application status and is dissected in both broad sense and narrow sense. Using the existing architecture of IoT, it is pointed out that the business scope and standard architecture model should be considered in design of the medical IoT architecture according to its characteristics. The key technologies of IoT in medical industry are summarized and its application in the medical ifeld is analyzed. Its development direction of smart medical treatment is pointed out.

  9. Early Entry for Youth into the Ocean Science Pipeline Through Ocean Science School Camp and Summer Camp Programs: A Key Strategy for Enhancing Diversity in the Ocean Sciences

    Science.gov (United States)

    Crane, N. L.; Wasser, A.; Weiss, T.; Sullivan, M.; Jones, A.

    2004-12-01

    Educators, policymakers, employers and other stakeholders in ocean and other geo-science fields face the continuing challenge of a lack of diversity in these fields. A particular challenge for educators and geo-science professionals promoting ocean sciences is to create programs that have broad access, including access for underrepresented youth. Experiential learning in environments such as intensive multi-day science and summer camps can be a critical captivator and motivator for young people. Our data suggest that youth, especially underrepresented youth, may benefit from exposure to the oceans and ocean science through intensive, sustained (eg more than just an afternoon), hands-on, science-based experiences. Data from the more than 570 youth who have participated in Camp SEA Lab's academically based experiential ocean science camp and summer programs provide compelling evidence for the importance of such programs in motivating young people. We have paid special attention to factors that might play a role in recruiting and retaining these young people in ocean science fields. Over 50% of program attendees were underrepresented youth and on scholarship, which gives us a closer look at the impact of such programs on youth who would otherwise not have the opportunity to participate. Both cognitive (knowledge) and affective (personal growth and motivation) indicators were assessed through surveys and questionnaires. Major themes drawn from the data for knowledge growth and personal growth in Camp SEA Lab youth attendees will be presented. These will be placed into the larger context of critical factors that enhance recruitment and retention in the geo-science pipeline. Successful strategies and challenges for involving families and broadening access to specialized programs such as Camp SEA Lab will also be discussed.

  10. On the Strategies for Chinese Ceramic Industrial Heritage to Apply for World Heritage%论中国陶瓷业遗产的申遗策略

    Institute of Scientific and Technical Information of China (English)

    戴湘毅; 刘伟国; 徐敏

    2012-01-01

    Chinese ceramic is one of the important symbols of Chinese culture and its related industrial heritage is also the most typical heritage in China. It is of great urgency for Chinese ceramic to apply for World Heritage, in terms of the importance of Chinese ceramic culture, the trend of World Heritage and cultural sovereignty. This paper extracts 789 heritage properties related with Chinese ceramic from officially protected sites/entities. Then it analyzes the characteristics and values of Chinese ceramic industrial heritages. At last, three strategies have been put forward for Chinese ceramic industrial heritage to apply for world heritage, such as the selection of heritage items should focus on the production stage of porcelain; the universal outstanding value of the property should be based on the overall value of Chinese ceramic culture; the property of Chinese ceramic industrial heritage should be composed of multiple sites according to their features and value.%中国陶瓷是中国文化的重要象征,与其相关的产业遗产也是中国最为典型的遗产类型之一.无论从陶瓷文化的重要性和世界遗产的发展趋势,还是从文化主权出发,中国陶瓷业遗产申报世界遗产已刻不容缓.以文物保护单位制度为数据来源,确定了789项陶瓷业遗产,并以此分析了这些项目的基本特征和价值.在此基础上,提出中国陶瓷业遗产应该以瓷器生产的历史阶段为重点,以陶瓷文化的整体价值为依托,采取多项联合捆绑申报的方法申报世界遗产.

  11. 基于大客户营销的工业品营销策略研究%A Study on Industrial Product Marketing Strategies Targeting on Key Accounts

    Institute of Scientific and Technical Information of China (English)

    穆小红

    2012-01-01

    Managing key accounts means managing a company's future. In industrial product industry, key account management greatly influences the market position and future of an industrial product business. By means of marketing strategies, to set up good coordination with key accounts demands marketing ideas focusing on the key accounts and targeted marketing activities, which could help an enterprise obtain the maximum value from the whole value chain and sustained and steady development in a market of fierce competition. The mar- keting strategies may go through four stages: to position, defend, attack and find. In detail, we need to draw a PDAF circle diagram based on a thorough analysis on the key account marketing process to lead a company into a virtuous cycle, so as to promote the core competitive- ness and the market occupation rate.%管理大客户就是管理企业的未来。工业品行业中大客户管理工作的好坏将严重制约着工业品企业的市场地位和未来发展。工业品营销中通过大客户营销战略的实施,与大客户形成良好的协作关系,必须树立以大客户为中心的营销理念,有针对性地开展系列营销活动,从整个价值链条上获取最大价值,从而使企业在竞争激烈的市场环境中获得持续稳定的发展。对大客户的营销策略,可以通过四个阶段来实现,即通过详细划分定位、防守、进攻和寻找阶段,对大客户营销过程展开深入细致的分析,并在此基础上构建PDAF循环图,引导企业进入一个良性循环轨道,提升企业核心竞争力,从而实现较高的市场占有空间。

  12. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Establishment of a Method for Content Determination of Polysaccharide in Membranous milkveteh root Applied in Fisheries Yu Xiao-qing et al. (1) Abstract Some chemical component in the traditional Chinese medicine Membranous milkvetch root can improve the ability of disease-prevention of animal and it can be applied in fisheries. In the paper, the method about content determination of polysaccharide in the root was established based on orthogonal experimental design Key words medicine; polysaccharide in Membranous milkvetch root; method of determination

  13. Relationship Between Competitive Strategies and the Success Perception of Polish Born Globals

    OpenAIRE

    Baranowska-Prokop Ewa; Sikora Tomasz

    2014-01-01

    The key objective of this paper is to describe and evaluate the competitive strategies applied by Polish born global enterprises. To reveal these strategies, two competitive models developed by M.E. Porter are applied to an original data set obtained from 256 small and medium Polish enterprises through a survey employing the CATI technique. The outcomes of these strategies, as perceived by the companies applying them, are also evaluated against two hypotheses. We conclude that Polish firms ap...

  14. NSTL全国服务体系监测平台的构建策略和关键技术*%The Construction Strategy and Key Technologies of NSTL Monitoring Platform

    Institute of Scientific and Technical Information of China (English)

    王莉; 郝春云; 刘玉海

    2013-01-01

    This paper proposes the strategy of NSLT Monitoring Platform, including monitoring indicators, three-level framework, and the core business logic of data col ection, tracking, alarm and storage, and describes key technologies such as Shel programming, JMX framework, data storage and alarm mechanisms.%  文章提出NSTL全国服务体系监测平台的构建策略,包括监测指标、三级监测体系,以及从数据收集、跟踪、告警到存储的核心业务逻辑分析,对Shell编程、JMX框架、数据存储和报警机制等关键技术进行了描述。

  15. CAR:应用型办学环境下大学生学习动力提升的关键--基于期望理论的视角%A Key to Learning Motivation Boost of College Students under the Applied Education Environment:Based on the Perspective of Expectancy Theory

    Institute of Scientific and Technical Information of China (English)

    尚从永; 张伟

    2015-01-01

    文章以期望理论为基础,从期望值、工具值和目标价值三种影响大学生行为的促动因素出发,分别从个人努力寅学业成绩、学业成绩寅组织奖励及组织奖励寅个人满意三个环节分析了应用型办学环境下大学生学习动力不足的原因。接着,根据20/80法则,抓住解决大学生学习动力不足的关键要素,进而提出了由课程激励、学业评价激励和组织奖励激励所构成的CAR激励策略。%The paper is to begin with three kinds of actuation factors influencing college student's behavior which are Expectancy, Instrumentality and Valence based on the expectancy theory. It analyzes the causes of deficiency of college students' learning motivation from three links which are respectively from personal efforts to academic performance,from academic performance to organization reward and from organization reward to Personal satisfaction under the applied education environment. And then, it grasps the key factors to solve the deficiency of college students' learning motivation according to the 20/80 rule. After that, The"CAR"motivation strategies are put forward, which consist of Course Motivation, Academy Appraisal Motivation and Reward Motivation of Organization.

  16. 运用创新教学策略 培养创新学习品质——建设高效课堂的一点体会%Applying Innovative Teaching Strategies and Cultivating Innovative Learning Quality

    Institute of Scientific and Technical Information of China (English)

    王一平

    2011-01-01

    New curriculum reform needs teachers possessing innovative teaching strategies and new trend needs students of innovative quality. Therefore, "innovation" is very important in modem teaching, and teachers should apply new teaching strategies to cultivate%新课改需要有创新教学策略的教师,新形势需要有创新品质的学生。所以,“创新”在现代教学中非常重要,教师要运用新的教学策略,培养学生的创新学习品质。

  17. The fate of fresh and stored 15N-labelled sheep urine and urea applied to a sandy and a sandy loam soil using different application strategies

    DEFF Research Database (Denmark)

    Sørensen, P.; Jensen, E.S.

    1996-01-01

    The fate of nitrogen from N-15-labelled sheep urine and urea applied to two soils was studied under field conditions. Labelled and stored urine equivalent to 204 kg N ha(-1) was either incorporated in soil or applied to the soil surface prior to sowing of Italian ryegrass (Lolium multiflorum L.),...... mineralized in the sandy loam soil, when urine was applied prior to sowing. Thus, the fertilizer effect of urine N may be significantly lower than that of urea N on fine-textured soils, even when gaseous losses of urine N are negligible....

  18. Security of quantum key distribution using two-mode squeezed states against optimal beam splitter attack

    Institute of Scientific and Technical Information of China (English)

    He Guang-Qiang; Zhu Si-Wei; Guo Hong-Bin; Zeng Gui-Hua

    2008-01-01

    For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack.

  19. Multidimensional Strategy for Sensitive Phosphoproteomics Incorporating Protein Prefractionation Combined with SIMAC, HILIC, and TiO(2) Chromatography Applied to Proximal EGF Signaling

    DEFF Research Database (Denmark)

    Engholm-Keller, Kasper; Hansen, Thomas Aarup; Palmisano, Giuseppe;

    2011-01-01

    Comprehensive enrichment and fractionation is essential to obtain a broad coverage of the phosphoproteome. This inevitably leads to sample loss and thus phosphoproteomics studies are usually only performed on highly abundant samples. Here, we present a comprehensive phosphoproteomics strategy...... IMAC (SIMAC) followed by hydrophilic interaction liquid chromatography of the mono- and non-phosphorylated peptides and subsequent titanium dioxide chromatography of the HILIC fractions. This strategy facilitated the identification of >4,700 unique phosphopeptides, while 636 phosphosites were changing....... Manually validating a subset of low-scoring peptides exclusively identified using the MaxQuant software revealed a large percentage of false positive identifications. This indicates that despite having highly accurate precursor mass determination, peptides with low fragment ion scores should...

  20. A critical assessment of hidden markov model sub-optimal sampling strategies applied to the generation of peptide 3D models.

    Science.gov (United States)

    Lamiable, A; Thevenet, P; Tufféry, P

    2016-08-01

    Hidden Markov Model derived structural alphabets are a probabilistic framework in which the complete conformational space of a peptidic chain is described in terms of probability distributions that can be sampled to identify conformations of largest probabilities. Here, we assess how three strategies to sample sub-optimal conformations-Viterbi k-best, forward backtrack and a taboo sampling approach-can lead to the efficient generation of peptide conformations. We show that the diversity of sampling is essential to compensate biases introduced in the estimates of the probabilities, and we find that only the forward backtrack and a taboo sampling strategies can efficiently generate native or near-native models. Finally, we also find such approaches are as efficient as former protocols, while being one order of magnitude faster, opening the door to the large scale de novo modeling of peptides and mini-proteins. © 2016 Wiley Periodicals, Inc. PMID:27317417

  1. Comparative Analysis of Strategies Applied in Persian and English Translations of Quranic-Arabic Culture Bound Term “Jilbab” (33:59

    Directory of Open Access Journals (Sweden)

    Fatemeh Zahra Nazari Robati

    2016-03-01

    Full Text Available Today TS focus has altered from linguistics to cultural studies. Culture is the way of life; as such every text is culture-bound and includes items that are culture-specific. Translating these cultural-specific items (henceforth CSI has made translation a complicated task. Hijab, one of the controversial issues of the present day of Islam in the world is defined in one way through presenting terms for women clothing such as “Jilbab” in Quran. Using Davies' (2003 strategies of translating CSIs, as the theoretical framework, taking the Quranic-Arabic culture bound term “Jilbab” (33:59 as the object of the study, this corpus-based comparative descriptive research was an attempt to compare totally 64 Persian and English (54 in Persian and 12 in English translations of this term with two concerns regarding the adopted translation strategies: a linguistic (Persian and English concern, and b translators' gender concern (male and female. The analysis of data showed that the most adopted strategy in both Persian and English corpus was localization (in Persian 35.71%, and in English 46.66%. Male translators in Persian had more tendency to use localization (36.53% and female translators to addition and globalization (each 50%. Male translators in English were more inclined to localization (45.83%, and the female have used preservation, addition, globalization and localization with the same frequency (25%. Totally male translators were inclined to localization (39.47%, while the female to globalization and addition (33.33%.Keywords: CSI, Translation strategies, Comparative analysis, Quran, “Jilbab”

  2. 调适性销售战略的影响因素及其成功关键%INFLUENCING FACTORS AND KEYS TO SUCCESS FOR THE ADAPTIVE MARKETING STRATEGY

    Institute of Scientific and Technical Information of China (English)

    郭国庆; 李屹松; 汪晓凡

    2009-01-01

    As an innovation of marketing strategy, adaptive selling plays a significant role in improving enterprise performance. The motivation and ability of sales personnel as well as constrains in the environment are the key factors for successful implementation of adaptive selling. Therefore, from a strategic perspective, it is necessary for enterprises to foster information utilization ability of sales personnel and train them to improve their marketing knowledge.%调适性销售作为创新的营销战略,对提升企业绩效意义重大.销售人员的动机、能力和环境制约对调适性销售战略的成功实施具有明显的影响.从战略高度看待调适性销售,着力提高销售人员的信息利用能力,强化销售人员的知识技能培训,是成功调适性销售战略的

  3. A non-target chemometric strategy applied to UPLC-MS sphingolipid analysis of a cell line exposed to chlorpyrifos pesticide: a feasibility study

    OpenAIRE

    Kássio M. G. Lima; Bedia, Carmen; Tauler, Romá

    2014-01-01

    A non-target chemometrics study based on the application of Multivariate Curve Resolution Alternating Least Squares (MCR-ALS) method to a data set obtained by ultra-performance liquid chromatographic coupled to mass spectrometry (UPLC-MS) has been applied to the study of human prostate cancer (DU145) cell line samples treated with the organophosphate pesticide chlorpyrifos (CPF). Full scan UPLC-MS data sets were segmented in 17 different chromatographic windows and submitted to a non-target d...

  4. [An experience applying the teaching strategies of cooperative learning and creative thinking in a mental-health nursing practicum for undergraduates at a technical college].

    Science.gov (United States)

    Huang, Yu-Hsien; Lin, Mei-Feng; Ho, Hsueh-Jen; Chang, Lu-Na; Chen, Shiue

    2015-04-01

    Lack of knowledge and experience is prevalent in undergraduate students who are taking their clinical practicum for mental-health nursing. This issue negatively affects the learning process. This article shares an experience of implementing a practicum-teaching program. This program was developed by the authors to facilitate the cooperative learning and clinical care competence of students. A series of multidimensional teaching activities was designed by integrating the strategies of peer cooperation and creative thinking to promote group and individual learning. Results indicate that the program successfully encouraged the students to participate more actively in the learning process. Additionally, the students demonstrated increased competence in empathetic caring toward patients, stronger friendship relationships with peers, and improved self-growth. The authors hope this teaching program provides a framework to increase the benefits for students of participating in clinical practicums and provides a teaching reference for clinical instructors.

  5. [An experience applying the teaching strategies of cooperative learning and creative thinking in a mental-health nursing practicum for undergraduates at a technical college].

    Science.gov (United States)

    Huang, Yu-Hsien; Lin, Mei-Feng; Ho, Hsueh-Jen; Chang, Lu-Na; Chen, Shiue

    2015-04-01

    Lack of knowledge and experience is prevalent in undergraduate students who are taking their clinical practicum for mental-health nursing. This issue negatively affects the learning process. This article shares an experience of implementing a practicum-teaching program. This program was developed by the authors to facilitate the cooperative learning and clinical care competence of students. A series of multidimensional teaching activities was designed by integrating the strategies of peer cooperation and creative thinking to promote group and individual learning. Results indicate that the program successfully encouraged the students to participate more actively in the learning process. Additionally, the students demonstrated increased competence in empathetic caring toward patients, stronger friendship relationships with peers, and improved self-growth. The authors hope this teaching program provides a framework to increase the benefits for students of participating in clinical practicums and provides a teaching reference for clinical instructors. PMID:25854950

  6. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  7. 论应用写作教学设计理念的实施策略%Implementation Strategy of Teaching Design of Applied Writing

    Institute of Scientific and Technical Information of China (English)

    袁丽

    2012-01-01

    应用文写作作为高校普遍开设的一门专业必修课和素质技能课,对于其教学理论与实践的研究层出不穷,尤其致力于其教学方法上的研究和探讨颇多,而教师采用何种教学方法,又受制于对该门课程前期设计理念的构想和实施,本文拟从应用写作课程理念入手,以期抛砖引玉,共同探讨该课教学艺术。%Applied Writing is a professional course and quality class. There are researches about its teaching theory and teaching practice, especially on its teaching methods. However, the teaching method is decided by the teaching philosophy. This thesis researches on the art of Applied Writing teaching from investigating the teaching philosophy.

  8. Applying Memory Strategy to Improve Junior High School Students' English Vocabulary Learning Ability%运用记忆策略提高初中生英语词汇学习能力

    Institute of Scientific and Technical Information of China (English)

    顾吟声

    2012-01-01

    英语词汇学习策略,尤其是记忆策略越来越受到重视,这从一个侧面反映了目前学生英语词汇学习的现状。本文运用实例着重论述了记忆英语词汇过程中如何实际运用记忆策略来提高记忆效果,探讨了学生记忆策略水平提高的具体方法和手段。%English vocabulary learning strategy, especially me~mory strategy is paid more and more attention, it effects the status quo of students Enghsh vocabulary learning from a side. This paper mainly expounds how to apply memory strategy to improve memory effect in the processof memorizing English vocabulary and discusses the specific methods and instruments of improving students' memory strategy competence.

  9. Target spectrum matrix definition for multiple-input- multiple-output control strategies applied on direct-field- acoustic-excitation tests

    Science.gov (United States)

    Alvarez Blanco, M.; Janssens, K.; Bianciardi, F.

    2016-09-01

    During the last two decades there have been several improvements on environmental acoustic qualification testing for launch and space vehicles. Direct field excitation (DFAX) tests using Multiple-Input-Multiple-Output (MIMO) control strategies seems to become the most cost-efficient way for component and subsystem acoustic testing. However there are still some concerns about the uniformity and diffusivity of the acoustic field produced by direct field testing. Lately, much of the documented progresses aimed to solve the non-uniformity of the field by altering the sound pressure level requirement, limiting responses and adding or modifying control microphones positions. However, the first two solutions imply modifying the qualification criteria, which could lead to under-testing, potentially risking the mission. Furthermore, adding or moving control microphones prematurely changes the system configuration, even if it is an optimal geometric layout in terms of wave interference patterns control. This research investigates the target definition as an initial condition for the acoustic MIMO control. Through experiments it is shown that for a given system configuration the performance of a DFAX test strongly depends on the target definition procedure. As output of this research a set of descriptors are presented describing a phenomenon defined as “Energy- sink”.

  10. Multi-matrix, dual polarity, tandem mass spectrometry imaging strategy applied to a germinated maize seed: toward mass spectrometry imaging of an untargeted metabolome.

    Science.gov (United States)

    Feenstra, Adam D; Hansen, Rebecca L; Lee, Young Jin

    2015-11-01

    Mass spectrometry imaging (MSI) provides high spatial resolution information that is unprecedented in traditional metabolomics analyses; however, the molecular coverage is often limited to a handful of compounds and is insufficient to understand overall metabolomic changes of a biological system. Here, we propose an MSI methodology to increase the diversity of chemical compounds that can be imaged and identified, in order to eventually perform untargeted metabolomic analysis using MSI. In this approach, we use the desorption/ionization bias of various matrixes for different metabolite classes along with dual polarities and a tandem MSI strategy. The use of multiple matrixes and dual polarities allows us to visualize various classes of compounds, while data-dependent MS/MS spectra acquired in the same MSI scans allow us to identify the compounds directly on the tissue. In a proof of concept application to a germinated corn seed, a total of 166 unique ions were determined to have high-quality MS/MS spectra, without counting structural isomers, of which 52 were identified as unique compounds. According to an estimation based on precursor MSI datasets, we expect over five hundred metabolites could be potentially identified and visualized once all experimental conditions are optimized and an MS/MS library is available. Lastly, metabolites involved in the glycolysis pathway and tricarboxylic acid cycle were imaged to demonstrate the potential of this technology to better understand metabolic biology. PMID:26339687

  11. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  12. What Is Green Growth Strategy for Government Link Company?

    Science.gov (United States)

    Jamilah Asha'ari, Maryam; Daud, Salina; Hassan, Hasmaizan

    2016-03-01

    Disasters around the world are very extreme because of the global warming and climate change. Malaysia firms have to play their role in handling the challenging of environmental problems in order to sustain. The feature of the new strategy which is green growth strategy has been identified. The study focuses on the features of the green growth strategy which discuss on the keys to sustaining the strategy, marketing emphasis, production emphasis, product line, basis of competitive advantage and strategic target. Business had contributed to the industrialisation era positively or negatively and therefore there is a must for business people to use the best strategy in reducing the environmental risks. By 2020, Malaysia will achieve the target in becoming an advanced economy by applying the right strategy. The objective of this paper is to propose a feature for new strategy known as green growth strategy. Future study is to propose to conduct an empirical analysis to confirm the green growth strategy features.

  13. 大学英语四级短文听力的信息解码策略%The Decoding Information Strategy Applied in Passage Listening of CET-4

    Institute of Scientific and Technical Information of China (English)

    陈文雅

    2012-01-01

    文章通过对信息解码的理论和实践研究分析,深刻探讨解码策略,帮助解决学生在短文听力过程中存在的难以突破的障碍,从而提高学生英语听力理解能力的技巧。%The paper profoundly discusses the decoding information strategy applied in passage listening by both theories and practical analysis. It helps the students find out solutions to their listening problems so as to improve the comprehensive listening skills.

  14. LC-MS/MS screening strategy for unknown adducts to N-terminal valine in hemoglobin applied to smokers and nonsmokers.

    Science.gov (United States)

    Carlsson, Henrik; von Stedingk, Hans; Nilsson, Ulrika; Törnqvist, Margareta

    2014-12-15

    Electrophilically reactive compounds have the ability to form adducts with nucleophilic sites in DNA and proteins, constituting a risk for toxic effects. Mass spectrometric detection of adducts to N-terminal valine in hemoglobin (Hb) after detachment by modified Edman degradation procedures is one approach for in vivo monitoring of exposure to electrophilic compounds/metabolites. So far, applications have been limited to one or a few selected reactive species, such as acrylamide and its metabolite glycidamide. This article presents a novel screening strategy for unknown Hb adducts to be used as a basis for an adductomic approach. The method is based on a modified Edman procedure, FIRE, specifically developed for LC-MS/MS analysis of N-terminal valine adducts in Hb detached as fluorescein thiohydantoin (FTH) derivatives. The aim is to detect and identify a priori unknown Hb adducts in human blood samples. Screening of valine adducts was performed by stepwise scanning of precursor ions in small mass increments, monitoring four fragments common for the FTH derivative of valine with different N-substitutions in the multiple-reaction mode, covering a mass range of 135 Da (m/z 503-638). Samples from six smokers and six nonsmokers were analyzed. Control experiments were performed to compare these results with known adducts and to check for artifactual formation of adducts. In all samples of smokers and nonsmokers, seven adducts were identified, of which six have previously been studied. Nineteen unknown adducts were observed, and 14 of those exhibited fragmentation patterns similar to earlier studied FTH derivatives of adducts to valine. Identification of the unknown adducts will be the focus of future work. The presented methodology is a promising screening tool using Hb adducts to indicate exposure to potentially toxic electrophilic compounds and metabolites.

  15. Precision agriculture for sugarcane management: a strategy applied for brazilian conditions doi: 10.4025/actasciagron.v36i1.17664

    Directory of Open Access Journals (Sweden)

    José Alexandre Melo Demattê

    2014-01-01

    Full Text Available The region of Areiópolis in São Paulo State is one of the major sugarcane producers in the world, and chemical management is the basis of the system making its production viable. Thus, the proposed methods for precision agriculture can be evaluated as an alternative for environment protection and can aid the search for greater productivity at the same time. The main objective of the present work was to compare the precision agriculture (PA and traditional agriculture (TA management systems and to highlight their distinctions, such as differences in grid sampling, production variation, plant failure and costs. Two experiments were set up, and the soil fertilizers were applied by corrective application methods to 16-ha lots using the average general fertility rate (GFR. The PA method had the highest productivity volume for conversion of green matter to sugar in the 4.0-ha plots. As the size of the PA plots decreased, the costs of soil analyses increased with potassium and lime analyses being the most expensive. The PA plots had more suitable grid sampling in terms of productivity, and the cost/benefit ratio was 4.0-ha. In general, the final cost was higher in the PA system compared to the TA system. The present results provide information to help select the better system between these techniques to manage tropical soils.

  16. Key Issues in Business English Curriculum Design

    Institute of Scientific and Technical Information of China (English)

    计越波

    2009-01-01

    This article aims to explore the key factors involved in business English curriculum design and the ways of analyzing the needs of teachers and students,course design as well as the teaching strategies.

  17. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  18. Applied Electromagnetics

    International Nuclear Information System (INIS)

    These proceedings contain papers relating to the 3rd Japanese-Bulgarian-Macedonian Joint Seminar on Applied Electromagnetics. Included are the following groups: Numerical Methods I; Electrical and Mechanical System Analysis and Simulations; Inverse Problems and Optimizations; Software Methodology; Numerical Methods II; Applied Electromagnetics

  19. The keys to successful diversification: lessons from leading hospital systems.

    Science.gov (United States)

    Shortell, S M; Morrison, E; Hughes, S

    1989-01-01

    Hospitals have engaged in a variety of diversification activities over the past five years--many of which have not met expectations. Based on a nationwide study of 570 hospitals belonging to eight leading hospital systems (both investor-owned and not-for-profit), four key factors are identified that differentiate the winners from the losers. These include strategies for working effectively with physicians; learning to combine centralized and decentralized strategic planning approaches; understanding partially related diversification; and effectively applying the experience curve. Putting these lessons to work will increase the probability of a more effectively diversified health care system in the future.

  20. Applied superconductivity

    CERN Document Server

    Newhouse, Vernon L

    1975-01-01

    Applied Superconductivity, Volume II, is part of a two-volume series on applied superconductivity. The first volume dealt with electronic applications and radiation detection, and contains a chapter on liquid helium refrigeration. The present volume discusses magnets, electromechanical applications, accelerators, and microwave and rf devices. The book opens with a chapter on high-field superconducting magnets, covering applications and magnet design. Subsequent chapters discuss superconductive machinery such as superconductive bearings and motors; rf superconducting devices; and future prospec

  1. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  2. Mixed Strategy May Outperform Pure Strategy: An Initial Study

    OpenAIRE

    He, Jun; Hou, Wei; Dong, Hongbin; He, Feidun

    2013-01-01

    In pure strategy meta-heuristics, only one search strategy is applied for all time. In mixed strategy meta-heuristics, each time one search strategy is chosen from a strategy pool with a probability and then is applied. An example is classical genetic algorithms, where either a mutation or crossover operator is chosen with a probability each time. The aim of this paper is to compare the performance between mixed strategy and pure strategy meta-heuristic algorithms. First an experimental study...

  3. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  4. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  5. PEM public key certificate cache server

    Science.gov (United States)

    Cheung, T.

    1993-12-01

    Privacy Enhanced Mail (PEM) provides privacy enhancement services to users of Internet electronic mail. Confidentiality, authentication, message integrity, and non-repudiation of origin are provided by applying cryptographic measures to messages transferred between end systems by the Message Transfer System. PEM supports both symmetric and asymmetric key distribution. However, the prevalent implementation uses a public key certificate-based strategy, modeled after the X.509 directory authentication framework. This scheme provides an infrastructure compatible with X.509. According to RFC 1422, public key certificates can be stored in directory servers, transmitted via non-secure message exchanges, or distributed via other means. Directory services provide a specialized distributed database for OSI applications. The directory contains information about objects and then provides structured mechanisms for accessing that information. Since directory services are not widely available now, a good approach is to manage certificates in a centralized certificate server. This document describes the detailed design of a centralized certificate cache serve. This server manages a cache of certificates and a cache of Certificate Revocation Lists (CRL's) for PEM applications. PEMapplications contact the server to obtain/store certificates and CRL's. The server software is programmed in C and ELROS. To use this server, ISODE has to be configured and installed properly. The ISODE library 'libisode.a' has to be linked together with this library because ELROS uses the transport layer functions provided by 'libisode.a.' The X.500 DAP library that is included with the ELROS distribution has to be linked in also, since the server uses the DAP library functions to communicate with directory servers.

  6. An Investigation Into College English Vocabulary Learning Strategies

    Institute of Scientific and Technical Information of China (English)

    马慧

    2008-01-01

    This article focuses on the investigation into college English vocabulary learning strategies.The non-English major students should be instructed and encouraged by the teachers to apply various kinds of VLS that can facilitate their learning achievement because the versatile strategy use is not only a way to meet the increasing demand for vocabulary learning,but also a key to success in the learning of the English language.

  7. The NIHR collaboration for leadership in applied health research and care (CLAHRC for greater manchester: combining empirical, theoretical and experiential evidence to design and evaluate a large-scale implementation strategy

    Directory of Open Access Journals (Sweden)

    Bamford David

    2011-08-01

    Full Text Available Abstract Background In response to policy recommendations, nine National Institute for Health Research (NIHR Collaborations for Leadership in Applied Health Research and Care (CLAHRCs were established in England in 2008, aiming to create closer working between the health service and higher education and narrow the gap between research and its implementation in practice. The Greater Manchester (GM CLAHRC is a partnership between the University of Manchester and twenty National Health Service (NHS trusts, with a five-year mission to improve healthcare and reduce health inequalities for people with cardiovascular conditions. This paper outlines the GM CLAHRC approach to designing and evaluating a large-scale, evidence- and theory-informed, context-sensitive implementation programme. Discussion The paper makes a case for embedding evaluation within the design of the implementation strategy. Empirical, theoretical, and experiential evidence relating to implementation science and methods has been synthesised to formulate eight core principles of the GM CLAHRC implementation strategy, recognising the multi-faceted nature of evidence, the complexity of the implementation process, and the corresponding need to apply approaches that are situationally relevant, responsive, flexible, and collaborative. In turn, these core principles inform the selection of four interrelated building blocks upon which the GM CLAHRC approach to implementation is founded. These determine the organizational processes, structures, and roles utilised by specific GM CLAHRC implementation projects, as well as the approach to researching implementation, and comprise: the Promoting Action on Research Implementation in Health Services (PARIHS framework; a modified version of the Model for Improvement; multiprofessional teams with designated roles to lead, facilitate, and support the implementation process; and embedded evaluation and learning. Summary Designing and evaluating a large

  8. 企业识别系统在科技期刊发展中的作用与应用策略分析%Contribution and applied strategies of corporate identity system in development of sci-tech journals

    Institute of Scientific and Technical Information of China (English)

    周志新

    2011-01-01

    With the continuous intensive competition of journal publishing market and gradual deepening of publication reform, introducing and applying the corporate identity system ( CIS ) has become the inexorable tendency in the administration and development of modern sci-tech journals. This paper briefly discusses the contribution of CIS in the development of modern sci- tech journals, such as improving the competitive strength and corporate image, increasing the cohesiveness. At the same time, the applied strategies of CIS are also analyzed through the mind identity, behavior identity and visual identity.%简要论述企业识别系统(CIS)在科技期刊发展中的作用,如有利于提升竞争力和形象、增强凝聚力等,同时从理念识别、行为识别和视觉识别3个方面分析CIS在科技期刊中的应用策略。

  9. Applied dynamics

    CERN Document Server

    Schiehlen, Werner

    2014-01-01

    Applied Dynamics is an important branch of engineering mechanics widely applied to mechanical and automotive engineering, aerospace and biomechanics as well as control engineering and mechatronics. The computational methods presented are based on common fundamentals. For this purpose analytical mechanics turns out to be very useful where D’Alembert’s principle in the Lagrangian formulation proves to be most efficient. The method of multibody systems, finite element systems and continuous systems are treated consistently. Thus, students get a much better understanding of dynamical phenomena, and engineers in design and development departments using computer codes may check the results more easily by choosing models of different complexity for vibration and stress analysis.

  10. Applied optics

    International Nuclear Information System (INIS)

    The 1988 progress report, of the Applied Optics laboratory, of the (Polytechnic School, France), is presented. The optical fiber activities are focused on the development of an optical gyrometer, containing a resonance cavity. The following domains are included, in the research program: the infrared laser physics, the laser sources, the semiconductor physics, the multiple-photon ionization and the nonlinear optics. Investigations on the biomedical, the biological and biophysical domains are carried out. The published papers and the congress communications are listed

  11. Intelligent card access keys

    International Nuclear Information System (INIS)

    A newly developed access control technology allows information about users to be stored on key-like EEPROM devices. The keys store encrypted information about the user and his or her authorized access activity. Specially developed key readers scan, decrypt, and process the key data, and make the decision whether entry should be granted or denied. The key readers can function as complete, stand-alone facility management systems, incorporating access control, security monitoring, and remote control. In this configuration, the key readers provide anti-passback protection and other special features without requiring any data lines between readers. The key readers also feature sophisticated algorithmic processing for performing complex operations such as two-man control or cross zoned security annunciation. Key readers can also be interconnected with an MCM-1000 Multiples Monitoring System to form a distributed processing local area network. In such a configuration, changes in key reader status can be uploaded to the MCM-1000, and programming changes and operator commands can be downloaded to the key readers

  12. Essays on Applied Microeconomics

    OpenAIRE

    Lee, Hoan Soo

    2013-01-01

    Empirical and theoretical topics in applied microeconomics are discussed in this dissertation. The first essay identifies and measures managerial advantages from access to high-quality deals in venture capital investments. The underlying social network of Harvard Business School MBA venture capitalists and entrepreneurs is used to proxy availability of deal access. Random section assignment of HBS MBA graduates provides a key exogenous variation for identification. Being socially connected to...

  13. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  14. The Homomorphic Key Agreement

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a process of computing a shared secret contributed by two or more entities such that no single node can predetermine the resulting value. An authenticated key agreement is attained by combining the key agreement protocol with digital signatures. After a brief introduction to existing key agreement in group communication, Making use of the additive-multiplicative homomorphism in the integer ring defined by Sander and Tschudin: A new protocols, called the homomorphism key agreement, was designed, which can be self-contributory, robust, scalable and applicable in group communication.

  15. Talent Management: Working lines and key processes

    Directory of Open Access Journals (Sweden)

    Alvaro Alonso

    2014-12-01

    Full Text Available Purpose: Talent management represents today a challenge for companies, since the contribution of value comes increasingly from the area of intangible capital. The current paradigm of expanding technology and competitive dynamics, makes talent management that companies realize a critical success factor in today's markets. However, there is no generally accepted theoretical framework and empirical studies sufficient to demonstrate the role of talent management in creating competitive advantage. Therefore, the first objective of this paper is to analyze the evolution of talent management, to understand more deeply their fundamental dimensions: people and key positions in the organization. From these dimensions, as a second objective of the research is proposed to classify and characterize the literature about four alternative ways of study, according to the treatment they receive such dimensions and thus improve understanding of the role of talent management in business strategyDesign/methodology: To develop this paper we have selected the major contributions to the field of talent management, with particular emphasis on certain meta-analysis very quoted by the scientific community (Lewis and Heckman, 2006; Mellahi and Collings, 2009; Tarique and Schuler, 2010. In addition we have select additional papers published in high impact journals seen in ABI/Inform, Science Direct, SCOPUS, and EBSCO (Business Source Complete, through the keywords "Gestion del talento", "Plan de Gestion del Talento" and "Modelo de Gestion de Talento" and its English equivalent "Talent Management ", "Talent Management Plans/Systems" and "Talent Management Framework/Model ".Findings: From this review, we extracted the existence of different ways of understanding and talent management apply in organizations and even different understandings of what is talent itself. For this, we describe the basic dimensions of talent management (people and key positions and four alternative

  16. Key point selection and clustering of swimmer coordination through Sparse Fisher-EM

    CERN Document Server

    Komar, John; Seifert, Ludovic

    2014-01-01

    To answer the existence of optimal swimmer learning/teaching strategies, this work introduces a two-level clustering in order to analyze temporal dynamics of motor learning in breaststroke swimming. Each level have been performed through Sparse Fisher-EM, a unsupervised framework which can be applied efficiently on large and correlated datasets. The induced sparsity selects key points of the coordination phase without any prior knowledge.

  17. Empirical Studies on Legitimation Strategies: A Case for International Business Research Extension

    DEFF Research Database (Denmark)

    Turcan, Romeo V.; Marinova, Svetla Trifonova; Rana, Mohammad Bakhtiar

    2012-01-01

    The paper focuses on legitimation and legitimation strategies applied by companies. Following the process of systematic review, we analyze empirical studies exploring legitimation and legitimation strategies from different theoretical perspectives. Using the key findings by reconnoitering and com...... and comparing the theoretical background, approaches, methodologies, and findings of these empirical studies, we outline potential directions for research in the legitimation strategies of firms engaged in international business operations....

  18. Cluster Policies in Energy Efficiency Management in Regional Innovative Strategy of Sustainable Development

    OpenAIRE

    Volkov, Alexander N.

    2012-01-01

    The article introduces modern approaches to catalyze energy efficiency efforts in Russia and Krasnodar region in particular – clean energy cluster concept and low-emission and climate-resilient development strategies (green LECRDS). The potential of Krasnodar region for developing clean energy and low-carbon sustainable development strategies were analyzed briefly. The key role of academic and research facilities in developing and applying of such innovative strategies was highlighted. Basic ...

  19. Mega Key Authentication Mechanism

    OpenAIRE

    Kloss, Guy

    2016-01-01

    For secure communication it is not just sufficient to use strong cryptography with good and strong keys, but to actually have the assurance, that the keys in use for it are authentic and from the contact one is expecting to communicate with. Without that, it is possible to be subject to impersonation or man-in-the-middle (MitM) attacks. Mega meets this problem by providing a hierarchical authentication mechanism for contacts and their keys. To avoid any hassle when using multiple types of key...

  20. Financial Key Ratios

    Directory of Open Access Journals (Sweden)

    Tănase Alin-Eliodor

    2014-08-01

    Full Text Available This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  1. Applied mathematics

    International Nuclear Information System (INIS)

    The 1988 progress report of the Applied Mathematics center (Polytechnic School, France), is presented. The research fields of the Center are the scientific calculus, the probabilities and statistics and the video image synthesis. The research topics developed are: the analysis of numerical methods, the mathematical analysis of the physics and mechanics fundamental models, the numerical solution of complex models related to the industrial problems, the stochastic calculus and the brownian movement, the stochastic partial differential equations, the identification of the adaptive filtering parameters, the discrete element systems, statistics, the stochastic control and the development, the image synthesis techniques for education and research programs. The published papers, the congress communications and the thesis are listed

  2. Applied geodesy

    International Nuclear Information System (INIS)

    This volume is based on the proceedings of the CERN Accelerator School's course on Applied Geodesy for Particle Accelerators held in April 1986. The purpose was to record and disseminate the knowledge gained in recent years on the geodesy of accelerators and other large systems. The latest methods for positioning equipment to sub-millimetric accuracy in deep underground tunnels several tens of kilometers long are described, as well as such sophisticated techniques as the Navstar Global Positioning System and the Terrameter. Automation of better known instruments such as the gyroscope and Distinvar is also treated along with the highly evolved treatment of components in a modern accelerator. Use of the methods described can be of great benefit in many areas of research and industrial geodesy such as surveying, nautical and aeronautical engineering, astronomical radio-interferometry, metrology of large components, deformation studies, etc

  3. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  4. 浅析保障性住房绿色运营管理策略%Analysis on the Strategy of Green Operation and Management Applied to Affordable Housing

    Institute of Scientific and Technical Information of China (English)

    徐立

    2016-01-01

    在保障性住房中推行绿色建筑,不仅可以有效降低建筑资源能源消耗,提高保障性住房的质量和舒适度,同时也是推动绿色建筑发展的良好契机。针对保障性住房绿色建筑运营管理的现状与问题,从绿色建筑技术管理、绿色建筑运营管理方式、绿色建筑物业管理服务3个层面提出了保障性住房绿色建筑运营管理策略,旨在为弥补绿色建筑推进中的“短板”,实现绿色运营管理提供思路。%The implementation of green buildings to affordable housing can not only effectively reduce the energy consumption of building resources so as to improve the quality and comfort of affordable housing, but it also is a good opportunity to promote the development of green buildings. Regarding the current operation and management status and problems of green buildings applied to the affordable housing, the paper puts forward the strategy of green building operation and management applied to affordable housing from three levels which are the technological management of green buildings, the operation and management of green buildings and the property management service of green buildings. It aims to make up for the performing disadvantage of green building and to provide ideas for the achievement of green operation and management.

  5. Key success factors of tourist market segmentation. / Elmarie Slabbert

    OpenAIRE

    Slabbert, Elmarie

    2002-01-01

    Descriptors: Marketing; market; market segmentation; tourist; tourism; promotion; promotional strategy; communication mix; promotional mix; destination marketing; competitiveness; competitive strategy; key success factors. The primary goal of this study was to determine the key success factors of tourist market segmentation, especially for South Africa as a tourism destination. Four objectives were derived from the primary research goal. The first objective was to analyse...

  6. Perceptions of food risk management among key stakeholders

    DEFF Research Database (Denmark)

    van Kleef, Ellen; Frewer, Lynn J.; Chryssochoidis, George M.;

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management.......In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management....

  7. 护理员规范化管理中多元化策略的实践效果%Impact of the diverse strategy applying on the nursing assistant standardized management

    Institute of Scientific and Technical Information of China (English)

    袁赛霞; 史定妹

    2013-01-01

      目的:探讨护理员规范化管理多元化策略的实践效果,为规范护理员的管理提供依据。方法:将2011年新聘、在编护理员设为对照组,采用传统培训、管理模式;将2012年新聘、在编护理员设为观察组,采用多元化策略规范管理,包括完善岗前培训、持续改进在职培训;多方携手共管提升陪护质量;调动护理员工作积极性,提升职业自豪感;以及推行人性化管理举措,稳定队伍等方法。结果:两组比较:患者与家属满意度由84.73%上升到97.08%,医护人员满意度由79.63%上升到96.30%,人员流失率由52%下降到28.99%,差异有统计学意义(P<0.05)。结论:采用多元化策略对护理员进行规范化培训、管理,有助于提高护理员整体素质及服务能力,满足了患者的需求,提升医院服务品质。%  Objectives:To measure the impact of the diverse strategy applying on the nursing assistant standardized management, and to give evidence fir standardizing nursing assistant management. Methods:New and in-service nursing assistant in 2011 as the control group to accept traditional management and training mode. New and in-service nursing assistant in 2012 as the treatment group who are given diverse strategy standardized management which includes complete pre-service training, continuous improvement of in-service training, enhancing caring quality cooperatively, motivating nursing assistant's enthusiasm, promoting professional pride and implementing humanism management. Results:Compared with the control group, the treatment group could raise the satisfaction of patients and their families. The satisfaction rate of patient increased from 84.73%to 97.08%, and the satisfaction rate of medical staff increased from 79.63%to 96.30%, staff turnover rate decreased from 52%to 28.99%, which has significant difference (p<0.05). Conclusions:Diverse strategy applying on nursing assistant

  8. Issues in Learner Strategy

    Institute of Scientific and Technical Information of China (English)

    刘剑英

    2004-01-01

    There is an urgent need in China that learning strategy and strategy training be given the attenion and status that it deserves.Strategy training can help students make effcetive use of multiple strategies.Studying good language learners has proved a useful way of investigating how strategies affect language learning.The first approach to strategy training suggested by Cohen is targets isolated strategies by including explicit modeling and explanation of the benefits of applying a specific strategy,extensive functional practice with the strategy.The second approach outlined by Oxford is to raise students' awareness as to the purpose and rationale of strategy use.The third approach by Cohen is to help students to complete language learning tasks through planning,monitoring,problem solving and evaluation.Teachers play an important part in strategy training.

  9. Putting leadership back into strategy.

    Science.gov (United States)

    Montgomery, Cynthia A

    2008-01-01

    In recent decades an infusion of economics has lent the study of strategy much needed theory and empirical evidence. Strategy consultants, armed with frameworks and techniques, have stepped forward to help managers analyze their industries and position their companies for strategic advantage. Strategy has come to be seen as an analytical problem to be solved. But, says Montgomery, the Timken Professor of Business Administration at Harvard Business School, the benefits of this rigorous approach have attendant costs: Strategy has become a competitive game plan, separate from the company's larger sense of purpose. The CEO's unique role as arbiter and steward of strategy has been eclipsed. And an overemphasis on sustainable competitive advantage has obscured the importance of making strategy a dynamic tool for guiding the company's development over time. For any company, intelligent guidance requires a clear sense of purpose, of what makes the organization truly distinctive. Purpose, Montgomery says, serves as both a constraint on activity and a guide to behavior. Creativity and insight are key to forging a compelling organizational purpose; analysis alone will never suffice. As the CEO--properly a company's chief strategist--translates purpose into practice, he or she must remain open to the possibility that the purpose itself may need to change. Lou Gerstner did this in the 1990s, when he decided that IBM would evolve to focus on applying technology rather than on inventing it. So did Steve Jobs, when he rescued Apple from a poorly performing strategy and expanded the company into attractive new businesses. Watching over strategy day in and day out is the CEO's greatest opportunity to shape the firm as well as outwit the competition. PMID:18271318

  10. Putting leadership back into strategy.

    Science.gov (United States)

    Montgomery, Cynthia A

    2008-01-01

    In recent decades an infusion of economics has lent the study of strategy much needed theory and empirical evidence. Strategy consultants, armed with frameworks and techniques, have stepped forward to help managers analyze their industries and position their companies for strategic advantage. Strategy has come to be seen as an analytical problem to be solved. But, says Montgomery, the Timken Professor of Business Administration at Harvard Business School, the benefits of this rigorous approach have attendant costs: Strategy has become a competitive game plan, separate from the company's larger sense of purpose. The CEO's unique role as arbiter and steward of strategy has been eclipsed. And an overemphasis on sustainable competitive advantage has obscured the importance of making strategy a dynamic tool for guiding the company's development over time. For any company, intelligent guidance requires a clear sense of purpose, of what makes the organization truly distinctive. Purpose, Montgomery says, serves as both a constraint on activity and a guide to behavior. Creativity and insight are key to forging a compelling organizational purpose; analysis alone will never suffice. As the CEO--properly a company's chief strategist--translates purpose into practice, he or she must remain open to the possibility that the purpose itself may need to change. Lou Gerstner did this in the 1990s, when he decided that IBM would evolve to focus on applying technology rather than on inventing it. So did Steve Jobs, when he rescued Apple from a poorly performing strategy and expanded the company into attractive new businesses. Watching over strategy day in and day out is the CEO's greatest opportunity to shape the firm as well as outwit the competition.

  11. Key concepts in energy

    CERN Document Server

    Madureira, Nuno Luis

    2014-01-01

    Highlights how key energy concepts surfaced, tracing their evolution throughout history to encompasses four economic concepts and four technological-engineering concepts developed through their history to conclude with current economic and environmental sciences Considers the process of energy-substitutions through complementary usages, hybridization and technological mixes Combines a conceptual approach with key theoretical concepts from engineering, geological and economic sciences providing cross disciplinary overview of energy fundamentals in a short and focused reading

  12. Strategie podniku

    OpenAIRE

    Hes, Ondřej

    2014-01-01

    The goal of this paper is to establish a suitable strategy for Centropen company. The master's thesis is divided into theoretical and practical part. The theoretical part deals with analyses of the internal and external environment, which is based on literature. The practical part then applies the said analyses to the company. The internal analysis is carried out based on source and financial analysis. The external environment is studied through the PEST analysis and the Porter's Five Forces ...

  13. Introduction: Experimental Green Strategies

    DEFF Research Database (Denmark)

    Peters, Terri

    2011-01-01

    Defining new ways in which archietcts are responding to the challenge of creating sustainable architecture , Experimental Green Strategies present a state of the art in applied ecological architectural research.......Defining new ways in which archietcts are responding to the challenge of creating sustainable architecture , Experimental Green Strategies present a state of the art in applied ecological architectural research....

  14. E-commerce strategy

    CERN Document Server

    Qin, Zheng; Li, Shundong; Li, Fengxiang

    2014-01-01

    This book helps deepen understanding of key e-commerce strategies. It brings together theoretical perspectives based on academic research, integrated use of technologies and a large amount of cases, especially those of China.

  15. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria;

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  16. Lock and key colloids.

    Science.gov (United States)

    Sacanna, S; Irvine, W T M; Chaikin, P M; Pine, D J

    2010-03-25

    New functional materials can in principle be created using colloids that self-assemble into a desired structure by means of a programmable recognition and binding scheme. This idea has been explored by attaching 'programmed' DNA strands to nanometre- and micrometre- sized particles and then using DNA hybridization to direct the placement of the particles in the final assembly. Here we demonstrate an alternative recognition mechanism for directing the assembly of composite structures, based on particles with complementary shapes. Our system, which uses Fischer's lock-and-key principle, employs colloidal spheres as keys and monodisperse colloidal particles with a spherical cavity as locks that bind spontaneously and reversibly via the depletion interaction. The lock-and-key binding is specific because it is controlled by how closely the size of a spherical colloidal key particle matches the radius of the spherical cavity of the lock particle. The strength of the binding can be further tuned by adjusting the solution composition or temperature. The composite assemblies have the unique feature of having flexible bonds, allowing us to produce flexible dimeric, trimeric and tetrameric colloidal molecules as well as more complex colloidal polymers. We expect that this lock-and-key recognition mechanism will find wider use as a means of programming and directing colloidal self-assembly. PMID:20336142

  17. 75 FR 1803 - Lower Florida Keys Refuges, Monroe County, FL

    Science.gov (United States)

    2010-01-13

    ... designed to maintain and restore native communities. Active management strategies will be applied... an adaptive management approach to develop site-specific burn prescriptions and to determine whether... to strategic landscape conservation, providing flexibility in management strategies in order...

  18. Research into the construction and management strategies for teaching staff of universities of applied sciences%应用型本科高校师资队伍组构与管理策略研究

    Institute of Scientific and Technical Information of China (English)

    李丽娜

    2015-01-01

    The knowledge and quality requirements of teaching staff employed in universities of ap-plied sciences is different from those research universities,the composition and management of which needs to be different from that of the research universities.No mature /relevant experiences can be drawn owing to the differences in discipline power among applied universities.Issues con-cerning the school positioning,teaching staff-influencing disciplines planning,team composition, disciplines power and evaluation /assessment,qualities/specialties and evaluation /assessment and employment in the construction and management of the teaching staff are discussed.Based on the principle that the strategies should be in line with the actualities,proposals are proposed.The pro-posals include rationally arranging the disciplines and recruiting the associated teaching staff in a de-signed manner,evaluating academic platforms in a objective way to properly adjust the asessment of the staff’s performances,monitoring dynamically the tendency of the staff’s capabilities/competence and setting competence-based staff position requirements.%应用型本科高校师资的知识结构和能力特质要求有别于研究型本科高校,队伍组构与管理策略应适于需要自成体系,然而由于各校学科实力差距过大,致使迄今尚无成型借鉴经验。针对师资队伍组构与管理过程中直接影响办学定位实现和教师队伍沉淀的学科规划与队伍组构、学科实力与业绩考核、专长特质与岗位聘任等关键问题,遵照策略对策与客观实际对等适用的原则,提出应用型本科高校应理智决断学科布局并按需量化组构师资队伍、客观评价学术平台支撑能力并以此调整教师业绩考核力度、动态监控各学科师资队伍能力结构发展趋势、岗位聘任考察项目中应包括专长特质因素等对策建议。

  19. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  20. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  1. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  2. Turn key contracts

    International Nuclear Information System (INIS)

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW)

  3. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without infor

  4. The empirical determination of key skills from an economic perspective

    OpenAIRE

    Loo, J.B. van; Toolsema, B.

    2004-01-01

    Notwithstanding an impressive research tradition on key skills, no clear statistical criterion exists that is suitable to determine which skills may be considered key skills. This contribution proposes one possible methodology that can be used to identify key skills. Proposing an economic definition of the key skill concept and by disentangling the direct and indirect effects of skills on productivity, we develop an empirical criterion for the identification of key skills. We apply this metho...

  5. Key strategies for enhancing the cycling stability and rate capacity of LiNi0.5Mn1.5O4 as high-voltage cathode materials for high power lithium-ion batteries

    Science.gov (United States)

    Yi, Ting-Feng; Mei, Jie; Zhu, Yan-Rong

    2016-06-01

    Spinel LiNi0.5Mn1.5O4 (LNMO) is one of the most promising high voltage cathode materials for future application due to its advantages of large reversible capacity, high thermal stability, low cost, environmental friendliness, and high energy density. LNMO can provide 20% and 30% higher energy density than traditional cathode materials LiCoO2 and LiFePO4, respectively. Unfortunately, LNMO-based batteries with LiPF6-based carbonate electrolytes always suffer from severe capacity deterioration and poor thermostability because of the oxidization of organic carbonate solvents and decomposition of LiPF6, especially at elevated temperatures and water-containing environment. Hence, it is necessary to systematically and comprehensively summarize the progress in understanding and modifying LNMO cathode from various aspects. In this review, the structure, transport properties and different reported possible fading mechanisms of LNMO cathode are first discussed detailedly. And then, the major goal of this review is to highlight new progress in using proposed strategies to improve the cycling stability and rate capacity of LNMO-based batteries, including synthesis, control of special morphologies, element doping and surface coating etc., especially at elevated temperatures. Finally, an insight into the future research and further development of LNMO cathode is discussed.

  6. Vulnerabilities in Quantum Key Distribution Protocols

    OpenAIRE

    Kuhn, D. Richard

    2003-01-01

    Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather, they suggest th...

  7. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Influence of Fermented Product from Beneficial Microorganism on the Cultivation of Larvae Apostichopus japonicus Li Shuang et al(1) Abstract The fermented product from beneficial microorganism was applied in the seed rearing of sea cucumber.The result

  8. Analysis and discussion of key technical strategies for measles prevention and control%现阶段消除麻疹关键防控技术策略分析与探讨

    Institute of Scientific and Technical Information of China (English)

    刘爱国; 杨会利

    2011-01-01

    Based on data on measles surveillance in the Taian area from the past 12 years, this study analyzed the major characteristics of measles outbreaks and incidence, including the month or date that the initial case of measles appeared each year, dips in seasonal incidence, nosocomial infection, and the high proportion of patients with measles among infants <8 months of age and adults. Such characteristics are crucial to predicting measles incidence and measles control efforts. Key technical measures are discussed and the importance of standardized emergency responses and administrative intervention in the event of a measles outbreak are emphasized.%基于对泰安市1999~2010年麻疹监测与防控工作,分析了当前麻疹发生与流行的主要特征,提出了麻疹首例病例、疫情季节性流行低谷、医院感染、小于8月龄及成人病例为主的两极年龄分布等特征对于疫情预测与防控工作的重要意义,重点探讨消除麻疹关键防控技术措施,强调规范疫情应急处置及强化行政干预的重要性,并力求纠正当前消除麻疹工作中存在的一些问题.

  9. The Key and Long-term Strategy of De-leveraging to Local Government Debt%地方政府债务:去杠杆的关键与长期方略

    Institute of Scientific and Technical Information of China (English)

    陆铭

    2016-01-01

    In today’s China, local government financial vehicles are deeply involved in the financial system. They borrow a lot in commercial banking, and also finance in the shadow banking paying high interest, while the private sector has great difficulty in financing. The high debt-GDP ratio reflects poor efficiency in public investment, which is more inefficient in lagged regions. To solve these problems, the key is to separate public finance and private banking. In the long run, to reduce the debt burden in lagged regions, cross-region labor mobility should be encouraged.%在当前中国,地方政府融资平台深度介入金融体系,既在商业银行体系中大量借贷,同时,也在影子银行中以高利率融资,而大量民营企业却出现融资难的问题。地方政府债务与GDP之比高企,反映的是相应投资的投入-产出效率差的现状,而这一问题又在欠发达地区更为严重。针对上述问题,去杠杆的关键是财政和金融分家。在长期,对于欠发达地区,降债务的关键是促进劳动力跨地区流动。

  10. THE MANAGEMENT OF KNOWLEDGE WORKERS – KEY FACTOR OF SUCCES

    Directory of Open Access Journals (Sweden)

    Claudia-Elena ŢUCLEA

    2007-01-01

    Full Text Available The traditional companies are built on familiar bedrock of buildings, plants, and inventories. Competitive advantage is viewed in terms of scale and volume stemming from high-capacity use of machine-based factories. Such an approach fails to recognize how the leverage of knowledge is becoming a key to long-term success. Nowadays, organizations must recognize that power resides in the minds of their best people, who are diffused throughout the business and the organizations are becoming more dependent on people than ever before. The recruitment and the employment of knowledge workers are becoming very important issues from Romanian managers. The competitiveness is the only chance to deal with a very challenging market, especially after European integration. In this paper we present the results of a survey of the opinions of Romanian managers about the most effective strategies for recruitment, motivation and retention the knowledge workers. The study investigated two groups of managers: the first group included the managers who never were involved in activities related to human resources, and the second, the managers who have been involved. The managers from the first group chose theoretical the strategies they considered most effective; the managers for the second group indicated the strategies they applied.

  11. An Efficient Key Agreement Framework to MANET

    Institute of Scientific and Technical Information of China (English)

    WANG Shun-man; TAO Ran; WANG Yue

    2006-01-01

    Protocols for key management are compared and evaluated from the point of view on mobile ad hoc networks (MANET). The issues of fault-tolerance and efficiency of key distribution protocols for group communications in MANET are addressed. Most key distribution protocols existing today are primarily designed for wire-line networks. These protocols either fail to work as intended or cannot work at all when they are applied to the demanding environment of MANET. Parameters and performance of different protocols are analyzed, and then a flat is given out, on which new protocols or existing ones are designed and modified, so that they can be robust, scalable and efficient in MANET.

  12. Key Distribution based on Three Player Quantum Games

    CERN Document Server

    Toyota, Norihito

    2010-01-01

    We study a new QKD that is different from the scheme proposed by \\cite{Ramz2}, though it essentially takes our ground on three-player quantum games and Greenberg-Horne-Zeilinger triplet entangled state (GHZ state) \\cite{Gree} is used. In our scheme proposed in this article, Bob and Charlie (and Alice also) that they are players in a game get some common key or information (applied strategies and their payoffs in the game) by knowing some results of the measurement made by Alice. There is not any arbiter in our scheme, since existence of an arbiter increase the risk of wiretapping. For it is difficult to detect wiretapping, when an arbiter repeatedly sends classical information. Lastly we discuss robustness for eavesdrop. We show that though maximally entangled case and non-entangled case provided essentially equivalent way in QKD, the latter is not available in the case there are some eavesdroppers.

  13. Key Changes [Book Review

    OpenAIRE

    Kousser, J. Morgan

    1981-01-01

    The notion that electoral history may be divided into long periods of stability broken periodically by major shocks has been the central organizing motif of American political history for a generation. Drawing on the simple empirical observation that the balance of electoral support for the major American political parties across geographic units remained roughly the same for a sequence of contests, and then shifted rather suddenly into a new and lasting pattern, V. 0. Key, Jr., Lee Benson, W...

  14. Public-Key Cryptography

    OpenAIRE

    Lint, van, JH

    2003-01-01

    Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For most security properties, it is computational security that has to be considered: an attack scenario describes how adversaries interact with the cryptosystem, trying to attack it; the system can be called secure if adversaries with reasonably bounded computational means have negligible prospects of success. The lack of computational problems that are guaranteed to be hard in an appropriate sen...

  15. A Key to the Art of Letters

    DEFF Research Database (Denmark)

    Jensen-Rix, Robert William

    2008-01-01

    The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English gr...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science......The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...

  16. Creativity Management Key Elements

    OpenAIRE

    Fuchs Ángeles, Rosa María; Franceso Tonetti, Federico Carlo

    2015-01-01

    Organizations are constantly looking towards innovation. In order to reach it they must foment creativity. This paper analyzes a series of elements considered in the organizational creativity management and proposes a model with the indispensable factors that organizations should consider to reach it. These elements are: culture and organizational environment, strategy, structure, communication, relation with customers, human resources (recruiting, training, job design, compensation, promotio...

  17. From shared care to disease management: key-influencing factors

    Directory of Open Access Journals (Sweden)

    Irmgard M.J.G. Eijkelberg

    2001-03-01

    Full Text Available Background: In order to improve the quality of care of chronically ill patients the traditional boundaries between primary and secondary care are questioned. To demolish these boundaries so-called ‘shared care’ projects have been initiated in which different ways of substitution of care are applied. When these projects end, disease management may offer a solution to expand the achieved co-operation between primary and secondary care. Objective: Answering the question: What key factors influence the development and implementation of shared care projects from a management perspective and how are they linked? Theory: The theoretical framework is based on the concept of the learning organisation. Design: Reference point is a multiple case study that finally becomes a single case study. Data are collected by means of triangulation. The studied cases concern two interrelated Dutch shared care projects for type 2 diabetic patients, that in the end proceed as one disease management project. Results: In these cases the predominant key-influencing factors appear to be the project management, commitment and local context, respectively. The factor project management directly links the latter two, albeit managing both appear prerequisites to its success. In practice this implies managing the factors' interdependency by the application of change strategies and tactics in a committed and skilful way. Conclusion: Project management, as the most important and active key factor, is advised to cope with the interrelationships of the influencing factors in a gradually more fundamental way by using strategies and tactics that enable learning processes. Then small-scale shared care projects may change into a disease management network at a large scale, which may yield the future blueprint to proceed.

  18. Radial oil injection applied to main engine bearings: evaluation of injection control rules

    DEFF Research Database (Denmark)

    Estupiñan, EA; Santos, Ilmar

    2012-01-01

    The performance of main bearings in a combustion engine affects key functions such as durability, noise and vibration. Thus, with the aim of reducing friction losses and vibrations between the crankshaft and the bearings, the work reported here evaluates different strategies for applying controll......The performance of main bearings in a combustion engine affects key functions such as durability, noise and vibration. Thus, with the aim of reducing friction losses and vibrations between the crankshaft and the bearings, the work reported here evaluates different strategies for applying...... controllable radial oil injection to main crankshaft journal bearings. In an actively lubricated bearing, conventional hydrodynamic lubrication is combined with controllable hydrostatic lubrication, where the oil injection pressures can be modified depending on the operational conditions. In this study...... of the actively lubricated bearing is compared with the performance of the conventional lubricated bearing, giving some insights into the minimum fluid film thickness, maximum fluid film pressure, friction losses and maximum vibration levels....

  19. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  20. k-Connectivity of Random Key Graphs

    CERN Document Server

    Zhao, Jun; Gligor, Virgil

    2015-01-01

    Random key graphs represent topologies of secure wireless sensor networks that apply the seminal Eschenauer-Gligor random key predistribution scheme to secure communication between sensors. These graphs have received much attention and also been used in diverse application areas beyond secure sensor networks; e.g., cryptanalysis, social networks, and recommender systems. Formally, a random key graph with $n$ nodes is constructed by assigning each node $X_n$ keys selected uniformly at random from a pool of $Y_n$ keys and then putting an undirected edge between any two nodes sharing at least one key. Considerable progress has been made in the literature to analyze connectivity and $k$-connectivity of random key graphs, where $k$-connectivity of a graph ensures connectivity even after the removal of $k$ nodes or $k$ edges. Yet, it still remains an open question for $k$-connectivity in random key graphs under $X_n \\geq 2$ and $X_n = o(\\sqrt{\\ln n})$ (the case of $X_n=1$ is trivial). In this paper, we answer the a...

  1. Identification key to Quivira milkweeds

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document is a key to milkweed identification at Quivira National Wildlife Refuge. It contains a dichotomous key as well as a picture key. Milkweeds found on...

  2. Study on the Strategies of Developing the Key Ability of Higher Vocational Accounting Majors Based on Market Demand%基于市场需求导向的高职会计学生关键能力培养策略

    Institute of Scientific and Technical Information of China (English)

    宋建军

    2014-01-01

    会计是与社会经济发展密不可分的职业,如何提供适应社会经济发展需求的会计人才是会计教育面临的重要课题。高职会计教育为社会培养大量专业知识扎实,操作能力强的会计人员,但面对不断变化的环境和要求,其关键能力欠缺,职业生涯发展受到较大制约。高职会计教育必须寻求基于市场需求的学生关键能力培养策略,采取“整体策略”、“渗透策略”和“体验策略”,在教学与非教学活动中通过“多维度、立体化”的途径培养学生关键能力。%Accounting is a profession closely connected with social and economic development. It is an important task for accounting education how to provide accounting talents to meet the demands of social and economic development. Higher vocational accounting education cultivates a large number of accounting personnel with solid professional knowledge and strong practical operative abilities for the society. However, in the face of changing conditions and requirements, they lack key abilities and the career development is thus severely constrained. Higher vocational accounting education need explore the strategies of developing students' critical abilities based on market demand. The"overall strategy","penetrating strategy"and"experience strategy"should be adopted to train students' critical abilities through multidimensional and three-dimen-sional ways in the teaching and non-teaching activities.

  3. Synthesis of the key intermediate of ramelteon

    Institute of Scientific and Technical Information of China (English)

    Shan Bao Yu; Hao Min Liu; Yu Luo; Wei Lu

    2011-01-01

    Asymmetric conjugated addition of allylcopper reagents derived from an allyl Grignard reagent and CuBr·Me2S to chiral α,β-unsaturated N-acyl oxazolidinones has been achieved. The synthetic procedure was applied to the preparation of the key intermediate of the novel nonbenzodiazepine hypnotic drug, ramelteon.

  4. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Determination of the Estrogen Alkylphenols and Bisphenol A in Marine Sediments by Gas Chromatography-Mass Spectrometry Deng Xu-xiu et al. (1) Abstract Octylphenol, nonylphenol and bisphenol A are recognized environmental endocrine disruptors. A quantitative method was established for the simultaneous determination of octylphenol, nonylphenol and bisphenol A in marine sediments by gas chromatography-mass spectrometry. The test sample was extracted by methanol with ultrasonic technique, purified with copper powder and carbon solid phase extraction column, and derived with heptafluorobutyric anhydride. Then the analytes were separated on HP-5ms column and determined by gas chromatography-mass. The recovery of the method was between 84.3% and 94.5%, and the LOQ of 4-N- octylphenol, nonylphenol and bisphenol A was 0.25 g/kg, 0.15 g/kg and 0.15 g/kg. Key words octylphenol; nonylphenol; bisphenol A; gas chromatography-mass spectrometry

  5. Paediatric pharmacokinetics: key considerations

    Science.gov (United States)

    Batchelor, Hannah Katharine; Marriott, John Francis

    2015-01-01

    A number of anatomical and physiological factors determine the pharmacokinetic profile of a drug. Differences in physiology in paediatric populations compared with adults can influence the concentration of drug within the plasma or tissue. Healthcare professionals need to be aware of anatomical and physiological changes that affect pharmacokinetic profiles of drugs to understand consequences of dose adjustments in infants and children. Pharmacokinetic clinical trials in children are complicated owing to the limitations on blood sample volumes and perception of pain in children resulting from blood sampling. There are alternative sampling techniques that can minimize the invasive nature of such trials. Population based models can also limit the sampling required from each individual by increasing the overall sample size to generate robust pharmacokinetic data. This review details key considerations in the design and development of paediatric pharmacokinetic clinical trials. PMID:25855821

  6. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Comparative Study on Adhesion Effect Among Different Materials of Sepia esculenta Wang Xue-mei et al. (1) Abstract PE Harness, mesh, sea cucumber seedling box attached, sorghum bar, tamarix (fresh, and old), artemisia annua (fresh, and old) and artificial egg-based subsidiary were used as spawning substrates of Sepia esculenta for comparative study on adhesion effect during artificial breeding. The results showed that the best was artificial egg-based subsidiary produced by the process of invention in this study. The second was old artemisia annua and tamarix. PE Harness, mesh, sea cucumber seedling box attached, sorghum bar were unsatisfactory for using as spawning substrates of Sepia esculenta. Key words Sepia esculenta; adhesion effect; different materials

  7. Interactive simulations for quantum key distribution

    CERN Document Server

    Kohnle, Antje

    2016-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualization Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different quantum key distribution protocols. The simulations use either...

  8. Identification of Key Barriers in Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  9. Key variables of organisation design in servitization

    OpenAIRE

    Kreye, Melanie; Jensen, Per Langaa

    2014-01-01

    Manufacturing companies offering additional service with their products need to change their organisation design to accommodate for the service business. Using the star model, this paper investigates organisation design in terms of strategy, structure, processes, rewards and people as a response to external environment to ensure performance. We present a case in the European renewable energy sector. The findings show three key variables: (i) processes need to enable information flow between b...

  10. Chaos control applied to heart rhythm dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Borem Ferreira, Bianca, E-mail: biaborem@gmail.com [Universidade Federal do Rio de Janeiro, COPPE, Department of Mechanical Engineering, P.O. Box 68.503, 21.941.972 Rio de Janeiro, RJ (Brazil); Souza de Paula, Aline, E-mail: alinedepaula@unb.br [Universidade de Brasi' lia, Department of Mechanical Engineering, 70.910.900 Brasilia, DF (Brazil); Amorim Savi, Marcelo, E-mail: savi@mecanica.ufrj.br [Universidade Federal do Rio de Janeiro, COPPE, Department of Mechanical Engineering, P.O. Box 68.503, 21.941.972 Rio de Janeiro, RJ (Brazil)

    2011-08-15

    Highlights: > A natural cardiac pacemaker is modeled by a modified Van der Pol oscillator. > Responses related to normal and chaotic, pathological functioning of the heart are investigated. > Chaos control methods are applied to avoid pathological behaviors of heart dynamics. > Different approaches are treated: stabilization of unstable periodic orbits and chaos suppression. - Abstract: The dynamics of cardiovascular rhythms have been widely studied due to the key aspects of the heart in the physiology of living beings. Cardiac rhythms can be either periodic or chaotic, being respectively related to normal and pathological physiological functioning. In this regard, chaos control methods may be useful to promote the stabilization of unstable periodic orbits using small perturbations. In this article, the extended time-delayed feedback control method is applied to a natural cardiac pacemaker described by a mathematical model. The model consists of a modified Van der Pol equation that reproduces the behavior of this pacemaker. Results show the ability of the chaos control strategy to control the system response performing either the stabilization of unstable periodic orbits or the suppression of chaotic response, avoiding behaviors associated with critical cardiac pathologies.

  11. WEALTH MANAGEMENT STRATEGIES IN THE ERA OF E-COMMERCE

    OpenAIRE

    Mohammed Shahedul QUADER; Mohammad SHAMSUDDOHA; Jahan, Akhter; Alexandru NEDELEA

    2011-01-01

    This paper looks at the key strategies being applied by wealth management and their competitive position. Each approach has merits, although the multi-channel ‘single brand’ approach seems to be gathering momentum. E-commerce facilitates differentiation and requires focus, whilst making cost leadership more difficult Choices between being a traditional or extended wealth manager, or simply a wealth product provider, are increasingly being made. Moreover need for strategic choice in the wealth...

  12. 75 FR 39656 - Availability of Seats for the Florida Keys National Marine Sanctuary Advisory Council

    Science.gov (United States)

    2010-07-12

    ... (member), Research and Monitoring (alternate), South Florida Ecosystem Restoration (member), Tourism--Lower Keys (member), Tourism Lower Keys (alternate), and Tourism Upper Keys (member). Applicants are... applying; community and professional affiliations; philosophy regarding the protection and management...

  13. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Directory of Open Access Journals (Sweden)

    Ting Zhang

    Full Text Available This paper aims to identify the key fields and their key technical points of oncology by patent analysis.Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC and the International Patent Classification (IPC, respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012 and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year and the standardized values of patent applications in seven years (2006-2012 was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones.The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and

  14. Stakeholder engagement: a key component of integrating genomic information into electronic health records.

    Science.gov (United States)

    Hartzler, Andrea; McCarty, Catherine A; Rasmussen, Luke V; Williams, Marc S; Brilliant, Murray; Bowton, Erica A; Clayton, Ellen Wright; Faucett, William A; Ferryman, Kadija; Field, Julie R; Fullerton, Stephanie M; Horowitz, Carol R; Koenig, Barbara A; McCormick, Jennifer B; Ralston, James D; Sanderson, Saskia C; Smith, Maureen E; Trinidad, Susan Brown

    2013-10-01

    Integrating genomic information into clinical care and the electronic health record can facilitate personalized medicine through genetically guided clinical decision support. Stakeholder involvement is critical to the success of these implementation efforts. Prior work on implementation of clinical information systems provides broad guidance to inform effective engagement strategies. We add to this evidence-based recommendations that are specific to issues at the intersection of genomics and the electronic health record. We describe stakeholder engagement strategies employed by the Electronic Medical Records and Genomics Network, a national consortium of US research institutions funded by the National Human Genome Research Institute to develop, disseminate, and apply approaches that combine genomic and electronic health record data. Through select examples drawn from sites of the Electronic Medical Records and Genomics Network, we illustrate a continuum of engagement strategies to inform genomic integration into commercial and homegrown electronic health records across a range of health-care settings. We frame engagement as activities to consult, involve, and partner with key stakeholder groups throughout specific phases of health information technology implementation. Our aim is to provide insights into engagement strategies to guide genomic integration based on our unique network experiences and lessons learned within the broader context of implementation research in biomedical informatics. On the basis of our collective experience, we describe key stakeholder practices, challenges, and considerations for successful genomic integration to support personalized medicine.

  15. Decentralization and Faculty Ownership: Keys to a Successful Assessment Strategy.

    Science.gov (United States)

    Foley, Terrence; And Others

    In an effort to prepare for a North Central Association accreditation visit, Henry Ford Community College (HFCC), in Michigan, developed and implemented a decentralized and faculty-driven assessment plan. First, a faculty member was assigned to begin the groundwork for the assessment plan and an Instructional Assessment Committee was formed to…

  16. Internal Employability as a Strategy for Key Employee Retention

    Directory of Open Access Journals (Sweden)

    Ángela Sánchez-Manjavacas

    2014-05-01

    Full Text Available Economies the world over and particularly those in southern Europe, are suffering the crippling effects of the extremely complex economic and financial crisis. This study looks at the impact of certain human resource policies geared towards increasing internal employability as a means of retaining valued employees and promoting job flexibility within the firm, as well as increasing positive attitudes towards organizational citizenship. Satisfaction and commitment are proposed as intermediating variables of the relationship between perceived internal employability and ITQ/OCB. The proposed research model is contrasted using structural equation modeling (LISREL. The results obtained from the empirical study indicate that employability should be considered an essential factor in achieving the desired commitment, loyalty, adaptability and productivity from employees by strengthening the psychological contract between firm and worker through professional recognition.

  17. Synenco Energy's Northern Lights Project : update and key strategies

    International Nuclear Information System (INIS)

    This presentation described the Northern Lights Project and addressed the unique characteristics of oil sands which have led to innovative mine and extraction techniques. A table indicating the mining projects in development was presented with reference to recoverable bitumen and ore grade. The marketing aspects of synthetic crude that influence the choice of bitumen upgrader design and economics were discussed. It was noted that new pipeline developments should open up new market opportunities. The expected market for Synenco crude is the northern portion of the United States Midwest. There may also be a possibility to sell the product as diluent because Synenco crude has a lower vacuum gas oil (VGO) content and more naphtha than other synthetic crude. The properties of Synenco crude components were listed with reference to gravity, density, sulfur content, cetane number, smoke point, and feed quality. The trade-off between capital costs, operating cost and risk mitigation was also examined. tabs., figs

  18. ACHIEVING VALUE FROM ICT IN SMES: KEY MANAGEMENT STRATEGIES

    OpenAIRE

    Johnston, K; Parker, S; K.D. Tu; F. Mosoval

    2009-01-01

    ICT covers a broad range of fields in business and therefore makes ICT value difficult to simply define. The main factors that influence the use of ICT are therefore important to look at, as they give a good understanding of the how much influence the organisation has, on achieving value in its given context. The transformational model of ICT use was analysed to establish how SMEs in South Africa achieve business value from ICT and what management practices are most effective. Implications of...

  19. Key Strategies for Safety-of-Life Receiver Development

    OpenAIRE

    Cuntz, Manuel; Buchner, Georg; Denks, Holmer; Greda, Lukasz; Heckler, Marcos; Hornbostel, Achim; Konovaltsev, Andriy; Dreher, Achim; Meurer, Michael

    2009-01-01

    It is well known from the open literature that interference is a serious threat for the new Galileo services especially in the E5 and E6 bands. In particular for the Safety-of–Life (SoL) applications like aviation high power pulsed radars and DMEs are a major concern. To cope with such interference it is essential for the development of a SoL receiver to consider the impact of interference on each part of the receiving chain. For this reason a new project was launch...

  20. Intercultural Communication: A Key Element in Global Strategies.

    Science.gov (United States)

    Spinks, Nelda; Wells, Barron

    1997-01-01

    Cultural factors in global communication include differences in customs, space, dress, religion, class, work ethic, privacy, and other areas. Language differences in oral, written, and nonverbal communication as well as semantics also complicate intercultural communication. (SK)

  1. Internal employability as a strategy for key employee retention

    OpenAIRE

    Ángela Sánchez-Manjavacas; M. Carmen Saorín-Iborra; Michael Willoughby

    2014-01-01

    Las economías alrededor del mundo, en especial en países delsur de Europa, están sufriendo los paralizantes efectos de la extremadamentecompleja crisis económica y financiera. Este estudio examina el impactode ciertas políticas de recursos humanos enfocadas a incrementarla empleabilidad interna como un medio para retener a los empleados valiososy para promover la flexibilidad laboral dentro de la empresa, asícomo para incrementar las actitudes positivas hacia la ciudadanía organizacional.Se p...

  2. ACHIEVING VALUE FROM ICT IN SMES: KEY MANAGEMENT STRATEGIES

    Directory of Open Access Journals (Sweden)

    K. Johnston

    2009-01-01

    Full Text Available ICT covers a broad range of fields in business and therefore makes ICT value difficult to simply define. The main factors that influence the use of ICT are therefore important to look at, as they give a good understanding of the how much influence the organisation has, on achieving value in its given context. The transformational model of ICT use was analysed to establish how SMEs in South Africa achieve business value from ICT and what management practices are most effective. Implications of the research are that management practices are an important factor that influences the value from ICT, and that the more management practices organisations implement, the greater the business value from ICT. Further findings of this study deduced that organisations that are more ICT aware, gain greater business value from ICT, with value achievement from ICT largely within the organisation’s control. This paper concludes with recommendations for future research.

  3. Change Management Competence - Key Contributor to Project Success : Case: Nokia Solutions Networks / key project managers

    OpenAIRE

    Pokela, Anu

    2013-01-01

    ABSTRACT Oulu university of applied sciences Master degree in entrepreneurship and business competence Author: Anu Pokela Title of thesis: Change management competence – key contributor to project success Supervisor: Tiina Gallén Term and year when the thesis was submitted: Autumn 2013 Number of pages: 63 Nowadays majority of the work in telecommunications industry is done in projects, work has become projectified. Project managers are the key contributors to making...

  4. 应用于Bottom-up蛋白质鉴定的质谱数据采集策略研究进展%Data Acquisition Strategy for Mass Spectrometers Applied to Bottom-up-based Protein Identification

    Institute of Scientific and Technical Information of China (English)

    徐长明; 张纪阳; 张伟; 谢红卫

    2013-01-01

    The high complexity of the proteome has brought great challenges to mass spectrometry-based protein identification.The technical requirements continuously forward the development of mass spectrometry.The advances in hardware and software of instrument platform provide more choices and supports for protein identification.However,it is necessary to design high-quality data acquisition strategy,which is heavyly dependent on the specific biological problem and the sample,to make the best use of the performance of the instrument.Here,the data acquisition strategy that has been developed for mass spectrometers in high throughput protein identification was reviewed.The simple repetitions,ion exclusion,ion inclusion,online intelligent data acquisition and segmented scanning technology for Bottom-up strategy were highlighted,and the impact of these strategies on the protein identification was concerned.Finally,the advantages and disadvantages of various strategies were summarized,and the future directions of developing the data acquisition strategy for mass spectrometers were discussed.%蛋白质组的高度复杂性给基于质谱的蛋白质鉴定提出了很大的挑战.技术需求促进质谱技术不断向前发展.仪器平台在软硬件方面的进步,为高通量蛋白质鉴定提供了更多选择和支撑.但是,仪器性能的充分发挥,还需要根据生物学问题的需求和分析样本的特性,设计高质量的数据采集策略.本文对目前高通量蛋白质鉴定中已开发的质谱数据采集策略进行了综述,重点介绍了Bottom-up策略中使用的简单重复、离子排除和监测、在线智能化扫描和分段扫描等技术,并关注了这些策略对高通量蛋白质鉴定的影响,总结了各种策略的优缺点并展望了其未来发展方向.

  5. Vulnerabilities in Quantum Key Distribution Protocols

    CERN Document Server

    Kuhn, D R

    2003-01-01

    Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather, they suggest that quantum cryptographic protocols, like conventional protocols, may be vulnerable to methods of attack that were not envisaged by their designers.

  6. ICT for AQA applied as single award

    CERN Document Server

    Wilson, Barbara

    2007-01-01

    This book has been written specifically for teachers and students following AQA's Applied AS ICT specification and covers the key elements of the units of the course, including the coursework requirements.

  7. 桥头堡建设背景下的云南公安出入境管理争取国家政策支持的思考%Thinking On Applying for National Policy Support of Exit and Entry Administration of Yunnan Public Security on the Background of Bridgehead Strategy

    Institute of Scientific and Technical Information of China (English)

    肖震宇

    2012-01-01

    "两强一堡"战略是统领云南社会经济发展的主体,云南公安出入境管理工作积极争取国家政策支持,为"桥头堡"建设提供良好环境。本文试从上述观点出发,结合实际工作,提出对策建议和政策支持。%The Strategy of Building Province of Green Economy and Ethnic Culture Strength and the Bridgehead Strategy are principles of social and economic development of Yunnan province. The exit and entry administration of Yunnan public security shall apply for national policy support actively, providing a favorable environment for implementing the Bridgehead strategy. This essay, based on the mentioned standpoint, combi- ning practice of this field, proposes measures, ,suggestion, and supporting policy.

  8. A threshold key escrow scheme based on public key cryptosystem

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.

  9. Advanced Algorithms for Local Routing Strategy on Complex Networks

    Science.gov (United States)

    Lin, Benchuan; Chen, Bokui; Gao, Yachun; Tse, Chi K.; Dong, Chuanfei; Miao, Lixin; Wang, Binghong

    2016-01-01

    Despite the significant improvement on network performance provided by global routing strategies, their applications are still limited to small-scale networks, due to the need for acquiring global information of the network which grows and changes rapidly with time. Local routing strategies, however, need much less local information, though their transmission efficiency and network capacity are much lower than that of global routing strategies. In view of this, three algorithms are proposed and a thorough investigation is conducted in this paper. These algorithms include a node duplication avoidance algorithm, a next-nearest-neighbor algorithm and a restrictive queue length algorithm. After applying them to typical local routing strategies, the critical generation rate of information packets Rc increases by over ten-fold and the average transmission time 〈T〉 decreases by 70–90 percent, both of which are key physical quantities to assess the efficiency of routing strategies on complex networks. More importantly, in comparison with global routing strategies, the improved local routing strategies can yield better network performance under certain circumstances. This is a revolutionary leap for communication networks, because local routing strategy enjoys great superiority over global routing strategy not only in terms of the reduction of computational expense, but also in terms of the flexibility of implementation, especially for large-scale networks. PMID:27434502

  10. 写作策略知识在小学语文教学中应用状况的分析%Analysis of the Situation of Writing Strategies Applied Knowledge in Language Teaching in Primary Schools

    Institute of Scientific and Technical Information of China (English)

    王秋萍

    2014-01-01

    In primary school language teaching, writing is an important part. The level of writing and language learning level have a direct link, through writing, students are observed the overall quality of the language.Therefore, this paper describes the importance of writing strategies, and explore writing strategies knowledge application status of language teaching in primary schools, for reference.%在小学语文教学中,写作是重要组成部分。写作水平的高低与语文学习水平有直接的联系,通过写作,可以观察学生的整体语文素质。因此,主要探究写作策略知识的重要性及在小学语文教学中的应用状况,以供参考。

  11. Conversation Analysis in Applied Linguistics

    DEFF Research Database (Denmark)

    Kasper, Gabriele; Wagner, Johannes

    2014-01-01

    For the last decade, conversation analysis (CA) has increasingly contributed to several established fields in applied linguistics. In this article, we will discuss its methodological contributions. The article distinguishes between basic and applied CA. Basic CA is a sociological endeavor concerned...... been driven by applied work. After laying out CA's standard practices of data treatment and analysis, this article takes up the role of comparison as a fundamental analytical strategy and reviews recent developments into cross-linguistic and cross-cultural directions. The remaining article focuses...... on learning and development. In conclusion, we address some emerging themes in the relationship of CA and applied linguistics, including the role of multilingualism, standard social science methods as research objects, CA's potential for direct social intervention, and increasing efforts to complement CA...

  12. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  13. Improving quality of care in substance abuse treatment using five key process improvement principles.

    Science.gov (United States)

    Hoffman, Kim A; Green, Carla A; Ford, James H; Wisdom, Jennifer P; Gustafson, David H; McCarty, Dennis

    2012-07-01

    Process and quality improvement techniques have been successfully applied in health care arenas, but efforts to institute these strategies in alcohol and drug treatment are underdeveloped. The Network for the Improvement of Addiction Treatment (NIATx) teaches participating substance abuse treatment agencies to use process improvement strategies to increase client access to, and retention in, treatment. NIATx recommends five principles to promote organizational change: (1) understand and involve the customer, (2) fix key problems, (3) pick a powerful change leader, (4) get ideas from outside the organization, and (5) use rapid cycle testing. Using case studies, supplemented with cross-agency analyses of interview data, this paper profiles participating NIATx treatment agencies that illustrate successful applications of each principle. Results suggest that organizations can successfully integrate and apply the five principles as they develop and test change strategies, improving access and retention in treatment, and agencies' financial status. Upcoming changes requiring increased provision of behavioral health care will result in greater demand for services. Treatment organizations, already struggling to meet demand and client needs, will need strategies that improve the quality of care they provide without significantly increasing costs. The five NIATx principles have potential for helping agencies achieve these goals.

  14. Reading comprehension metacognitive strategies as a means for controlling behavior

    Directory of Open Access Journals (Sweden)

    Dinorah Aladina Caballero López

    2014-07-01

    Full Text Available Textual comprehension implies the use of various metacognitive strategies by the students when they have to face a text to be competent readers. That is why the objective of this article is to illustrate the application of metacognitive strategies in order to achieve an efficient textual comprehension, taking into account the self – regulation the student exerts over his own learning process. It is applied as the main method historical-logical studies based on a professional-researching systematic practice; at the same time observation is largely used. The main result is the introduction of metacognitive strategies in reading comprehension, which subsequently favor the self-control of personal behavior. The article is the result of a research project sponsored by the department of Special Education. Key words: reading comprehension, metacognitive strategies, behavior self-control.

  15. ENHANCEMENTS STRATEGY OF CLOUD STORAGE ACCESS CONTROL APPLIED TO POWER GRID ENTERPRISE%应用于电网企业的云存储访问控制增强策略

    Institute of Scientific and Technical Information of China (English)

    张鸿辉; 刘伟; 李永强

    2014-01-01

    针对电力信息云存储管理应用的安全需求,以降低传统访问控制方案在访问规则上的系统开销为目标,提出一种基于实体属性和安全标记相结合的云存储访问控制增强策略。采用面向实体属性管理权限方法优化访问控制,降低权限管理开销,避免访问权限与用户、存储进程、平台客体间的直接联系;通过多级安全标记,进行权限分配、确保策略在实施后维护上的灵活性。并以某电网企业的电力信息云存储管理系统为例,详细阐述该策略的具体配置过程。经过性能分析表明,所设计访问控制策略在可维护性、存储开销、安全性能等方面表现良好,具有应用可行性。%For the security need of cloud storage applications in power information management,we propose an enhancement strategy of cloud storage access control,which is based on the combination of entity attributes and security tag,and is targeted at reducing the system overhead of conventional access control schemes in regard to access rules. The strategy utilises entity attributes-oriented privileges management method to optimise the access control,reduces privileges management overhead,and prevents the direct contacts between the access privileges and the user,storage process and platform object.Moreover,it also uses multi-level security tag to carry out privileges allocation and to ensure the flexibility of the strategy in maintenance when implemented.A power information cloud storage management system at a certain power grid enterprises is taken for example to elaborate the specific configuration process of the strategy.It is illustrated by the performance analysis that the access control strategy designed in the paper has good performance in maintainability,storage overhead, security and other aspects,and has application feasibility.

  16. The advertising strategies

    Institute of Scientific and Technical Information of China (English)

    YAKOUBI Mohamed Lamine

    2013-01-01

    We will try to demonstrate, through the display of the various advertising creation strategies and their evolution, how the advertising communication passed from of a vision or a strategy focused on the product, to a vision focused on the brand. The first advertising strategy that was applied by advertising agencies is the"Unique Selling Proposition";it focused only on the product advantages and its philosophy dominated the advertising world, throughout its various evolutions, till the nineties but this is without counting the introduction of the new advertising strategies that brought a more brand oriented philosophy to the ground.

  17. Key Concepts in Informatics: Algorithm

    Science.gov (United States)

    Szlávi, Péter; Zsakó, László

    2014-01-01

    "The system of key concepts contains the most important key concepts related to the development tasks of knowledge areas and their vertical hierarchy as well as the links of basic key concepts of different knowledge areas." (Vass 2011) One of the most important of these concepts is the algorithm. In everyday life, when learning or…

  18. MOBILE PAYMENTMETHODBASED ON PUBLIC-KEY CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Adnan A. Hnaif

    2015-03-01

    Full Text Available Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash, cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is summarized in three processes: firstly, the authentication process, which involves the authentication phases for the applied customers. Secondly, the member recognition process which tests and ensures the customer membership by the market server. Finally, payment processwhich will be done by ciphering the customer information using public-key encryption cryptosystem (RSA, to be submitted over an insecure network to the market server. Actually, this mobile payment methodis more efficient than otherpayment methods since the customer can pay from his/her own mobilephone without any extra cost and effort. The RSA public-key encryption system ensures the security of the proposed method. However, to prevent a brute force attack, the choice of the key size becomes crucial.

  19. Compositional Advantage and Strategy

    DEFF Research Database (Denmark)

    Li, Xin

    advantage is redefined as the attractiveness of the composition of the producer’s offering in terms of scope and perceived value/price ratio. I identify five ways or basic compositional strategies to improve the value/price ratio. A firm may have an overall compositional strategy that is composed of some...... or all of the five basic compositional strategies. I argue there are three indispensable key success factors for a composition-based competition, i.e., aspiration (ambition-position asymmetry), attitude (being ALERT), and action (turning asymmetry into advantage). I also discuss the particular relevance...

  20. A belief-based evolutionarily stable strategy

    OpenAIRE

    Deng, Xinyang; Wang, Zhen; Liu, Qi; Deng, Yong; Mahadevan, Sankaran

    2014-01-01

    As an equilibrium refinement of the Nash equilibrium, evolutionarily stable strategy (ESS) is a key concept in evolutionary game theory and has attracted growing interest. An ESS can be either a pure strategy or a mixed strategy. Even though the randomness is allowed in mixed strategy, the selection probability of pure strategy in a mixed strategy may fluctuate due to the impact of many factors. The fluctuation can lead to more uncertainty. In this paper, such uncertainty involved in mixed st...

  1. Some Key Principles for Developing Grammar Skills

    Institute of Scientific and Technical Information of China (English)

    张威

    2008-01-01

    Grammar is sometimes defined aft"the way words are put together to make correct sentences"(Ur,2004,P.75).The aim of teaching grammar is to raise the rates of the correctness of language use and help the students transfer the isolated language points to apply language.In this essay,the author introduces two kinds of Conlnlon methods in English grammar class. And there are some key principles in grammar teaching.

  2. Applying evolutionary anthropology.

    Science.gov (United States)

    Gibson, Mhairi A; Lawson, David W

    2015-01-01

    Evolutionary anthropology provides a powerful theoretical framework for understanding how both current environments and legacies of past selection shape human behavioral diversity. This integrative and pluralistic field, combining ethnographic, demographic, and sociological methods, has provided new insights into the ultimate forces and proximate pathways that guide human adaptation and variation. Here, we present the argument that evolutionary anthropological studies of human behavior also hold great, largely untapped, potential to guide the design, implementation, and evaluation of social and public health policy. Focusing on the key anthropological themes of reproduction, production, and distribution we highlight classic and recent research demonstrating the value of an evolutionary perspective to improving human well-being. The challenge now comes in transforming relevance into action and, for that, evolutionary behavioral anthropologists will need to forge deeper connections with other applied social scientists and policy-makers. We are hopeful that these developments are underway and that, with the current tide of enthusiasm for evidence-based approaches to policy, evolutionary anthropology is well positioned to make a strong contribution.

  3. Fuzzy MADM Approach for Identification of Key Sectors of Tajikistan Economy

    Institute of Scientific and Technical Information of China (English)

    ASADULLO Abdulhamidov; TANG Bing-yong; LI Dan

    2006-01-01

    The development strategy, focused on the promotion of the efficient and prospective production sectors required for effectively solving social, economic and other problems becomes very important in resource allocation decision making process of developing countries. The structural hierarchy, comprising social, economic, technological and environmental aspects, which is involved in the selection of sectors constructed according to the hierarchical system of objectives. The Fuzzy Multi-attribute Decision Making method is used to rank the sectors by indicating the degree to which an alternative satisfies the global objectives of criteria obtained by aggregation operations in fuzzy environment. By applying the developed approach to defming and identifying the key sectors of an economy, we can rank the aggregated 17 sectors of the Tajikistan economy according to their degree of achievement in satisfying key criteria.

  4. Multiple hashes of single key with passcode for multiple accounts

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However, human memorability constrains the number of keys. Single sign-on server, key hashing, key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name, but numeric 4-digit passcode, key hashing, key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts.

  5. Limitations on quantum key repeaters.

    Science.gov (United States)

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  6. Secure key storage and distribution

    Science.gov (United States)

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  7. Key Update Assistant for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Key update is a challenging task in resource-constrained networks where limitations in terms of computation, memory, and energy restrict the proper use of security mechanisms. We present an automated tool that computes the optimal key update strategy for any given resource-constrained network. We...... developed a push-button solution - powered by stochastic model checking - that network designers can easily benefit from, and it paves the way for consumers to set up key update related security parameters. Key Update Assistant, as we named it, runs necessary model checking operations and determines...

  8. Capacity estimation and preliminary strategy for reducing the release of dioxins in China

    Institute of Scientific and Technical Information of China (English)

    YU Gang; ZHANG Qing; HUANG Jun; CAI Zhenxiao; SUI Qian

    2007-01-01

    As a party of the Stockholm Convention on Persistent Organic Pollutants,China must submit its national implementation plan(NIP)for this convention.The strategy and action plan for reducing the release of dioxins in China are the most important components of the NIP.Three problems are key points for developing such strategy and action plan-what are the key sources for applying the best available technology/best environmental practice(BAT/BEP)to reduce the release of dioxins?How about the capacity for reducing the dioxins release from the key sources?Where are the areas of priority for applying BAT/BEP?This paper shows the efforts towards the solution of these problems.The list of key sources covering about half of the total dioxins release was determined considering four criteria.The capacity of key sources were estimated based on the difference between the emission factor corresponding to the actual situation in 2004 and that corresponding to the scenario that all key sources have been applied BAT/BEP to reduce the dioxins release.The priority analysis using the geographical information system(GIS)tool has revealed that eastern provinces should be of high priority in the future reduction activities of dioxins release in China.

  9. Quantum Key Distribution Using Decoy State Protocol

    Directory of Open Access Journals (Sweden)

    Sellami Ali

    2009-01-01

    Full Text Available Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible for sophisticated eavesdroppers to launch various subtle eavesdropping attacks including the Photon Number Splitting (PNS attack. The decoy state protocols recently proposed to beat PNS attack and to improve dramatically distance and secure key generation rate of Quantum Key Distribution (QKD. Approach: Objective of this study was experimental implementation of weak decoy + vacuum states QKD for increasing the performance of QKD system. To show conceptually how simple it was to apply the weak decoy + vacuum state idea to a commercial QKD system, we chosen ID-3000 commercial quantum key distribution system manufactured by id quantique. To implement the weak decoy + vacuum state protocol, we had to add some new optical and electronics components to id quantique and to attenuate each signal to the intensity of either signal state or weak decoy or vacuum state randomly. Results: In our implementation, the attenuation will be done by placing a VOA (variable optical attenuator in Alice’s side. Specifically, our QKD system required the polarizations of 2 pulses from the same signal to be orthogonal. Therefore the VOA must be polarization independent so as to attenuate the two pulses equally. The VOA utilized in experiment to attenuate signals dynamically was Intensity Modulator (IM. We had implemented weak + vacuum protocol on a modified commercial QKD system over a 25 km of telecom fibers with an unconditionally secure key rate of 6.2931x10-4 per pulse. Conclusion: By making simple modifications to a commercial quantum key distribution system, we could achieve much better performance with substantially higher key generation rate and longer distance than

  10. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  11. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  12. Applying Strategies of Cooperative Learning Model to Hotel English Teaching in Higher Vocational Colleges%合作学习在高职酒店英语教学中的应用策略

    Institute of Scientific and Technical Information of China (English)

    周东妮; 陈遇春

    2016-01-01

    Cooperative Learning is regarded as one of the most effective and practical teaching model in 21st century ,which aims to improve the scores of the comprehensive group members .The paper begins with a brief study on Cooperative Learning teach‐ing model ,followed by analysis on English teaching status in higher vocational colleges and hotel staff's English abilities required in hotels .In the paper ,the author analyzes the suitability of applying Cooperative Learning teaching model in hotel English teaching ,and puts forward proposals of applying rules and steps of Cooperative Learning model in Hotel English teaching .%合作学习被认为是21世纪最有效、最实用的教学模式之一。在促进学习小组内个人学习的前提下,合作学习力求达到学习小组整体成绩的提高。文章对合作学习教学模式进行了描述性研究,并结合当前高职英语教与学的现状以及酒店对该行业从业人员英语能力要求等方面的探讨,对合作学习教学模式应用到实际英语教学活动中的可行性进行了分析,提出了合作学习在酒店英语课堂上实施的具体原则和步骤。

  13. Cloud computing strategies

    CERN Document Server

    Chorafas, Dimitris N

    2011-01-01

    A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy. Based on extensive research, it examines the opportunities and challenges that loom in the cloud. It explains exactly what cloud computing is, what it has to offer, and calls attention to the important issues management needs to consider before passing the point of no return regarding financial commitments.

  14. Applied large eddy simulation.

    Science.gov (United States)

    Tucker, Paul G; Lardeau, Sylvain

    2009-07-28

    Large eddy simulation (LES) is now seen more and more as a viable alternative to current industrial practice, usually based on problem-specific Reynolds-averaged Navier-Stokes (RANS) methods. Access to detailed flow physics is attractive to industry, especially in an environment in which computer modelling is bound to play an ever increasing role. However, the improvement in accuracy and flow detail has substantial cost. This has so far prevented wider industrial use of LES. The purpose of the applied LES discussion meeting was to address questions regarding what is achievable and what is not, given the current technology and knowledge, for an industrial practitioner who is interested in using LES. The use of LES was explored in an application-centred context between diverse fields. The general flow-governing equation form was explored along with various LES models. The errors occurring in LES were analysed. Also, the hybridization of RANS and LES was considered. The importance of modelling relative to boundary conditions, problem definition and other more mundane aspects were examined. It was to an extent concluded that for LES to make most rapid industrial impact, pragmatic hybrid use of LES, implicit LES and RANS elements will probably be needed. Added to this further, highly industrial sector model parametrizations will be required with clear thought on the key target design parameter(s). The combination of good numerical modelling expertise, a sound understanding of turbulence, along with artistry, pragmatism and the use of recent developments in computer science should dramatically add impetus to the industrial uptake of LES. In the light of the numerous technical challenges that remain it appears that for some time to come LES will have echoes of the high levels of technical knowledge required for safe use of RANS but with much greater fidelity. PMID:19531503

  15. Essays in applied microeconomics

    Science.gov (United States)

    Wang, Xiaoting

    In this dissertation I use Microeconomic theory to study firms' behavior. Chapter One introduces the motivations and main findings of this dissertation. Chapter Two studies the issue of information provision through advertisement when markets are segmented and consumers' price information is incomplete. Firms compete in prices and advertising strategies for consumers with transportation costs. High advertising costs contribute to market segmentation. Low advertising costs promote price competition among firms and improves consumer welfare. Chapter Three also investigates market power as a result of consumers' switching costs. A potential entrant can offer a new product bundled with an existing product to compensate consumers for their switching cost. If the primary market is competitive, bundling simply plays the role of price discrimination, and it does not dominate unbundled sales in the process of entry. If the entrant has market power in the primary market, then bundling also plays the role of leveraging market power and it dominates unbundled sales. The market for electric power generation has been opened to competition in recent years. Chapter Four looks at issues involved in the deregulated electricity market. By comparing the performance of the competitive market with the social optimum, we identify the conditions under which market equilibrium generates socially efficient levels of electric power. Chapter Two to Four investigate the strategic behavior among firms. Chapter Five studies the interaction between firms and unemployed workers in a frictional labor market. We set up an asymmetric job auction model, where two types of workers apply for two types of job openings by bidding in auctions and firms hire the applicant offering them the most profits. The job auction model internalizes the determination of the share of surplus from a match, therefore endogenously generates incentives for an efficient division of the matching surplus. Microeconomic

  16. 少儿志愿者激励策略初探--基于应用行为分析之强化原理%Probe into the Motivation Strategy for Children ’s Volunteers---Based on the Reinforcement Principal of Applied Behavior Analysis

    Institute of Scientific and Technical Information of China (English)

    袁嘉芮

    2015-01-01

    阐述了少儿志愿者活动中存在的问题,基于应用行为分析之强化原理,探讨了针对少儿心理行为特点建立激励策略的措施。%ABSTRACT:This paper expounds some problems existing in children’s volunteer activities, and based on the reinforcement principal of applied behavior analysis, probes into the measures for establishing the motivation strategies in the light of children’s psychological behavior characteristics.

  17. Breaking chaotic shift key communication via adaptive key identification

    Institute of Scientific and Technical Information of China (English)

    Ren Hai-Peng; Han Chong-Zhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter(key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise.

  18. Compositional Advantage and Strategy

    DEFF Research Database (Denmark)

    Li, Xin

    or all of the five basic compositional strategies. I argue there are three indispensable key success factors for a composition-based competition, i.e., aspiration (ambition-position asymmetry), attitude (being ALERT), and action (turning asymmetry into advantage). I also discuss the particular relevance......In this paper, I first critique the composition-based view of Yadong Luo and John Child for understanding how resource-poor firms survive and thrive. To remedy the deficiencies in their perspective, I then propose a dynamic theory of compositional advantage and strategy. Here, the compositional...... advantage is redefined as the attractiveness of the composition of the producer’s offering in terms of scope and perceived value/price ratio. I identify five ways or basic compositional strategies to improve the value/price ratio. A firm may have an overall compositional strategy that is composed of some...

  19. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Harinarayan Tiwari; Nayan Sharma

    2015-10-01

    This paper presents fundamental outcomes from an experimental study on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). Hydrodynamic performance was tested in a circulated open channel that comprised of PKW and sand bed (d50 = 0.25 mm). Instantaneous velocities were measured at 20 cross sections using Laser Doppler Velocimeter (LDV) with constant discharge and depth. Average velocity and turbulence intensities in both directions were investigated. Average longitudinal velocities are found very much consistent at every point and maximum around the midway of inlet key. In transverse direction, flow is bifurcating in two directions which are also confirmed by average transverse velocity estimation. Variation of turbulence intensity presents average 10 times higher transverse turbulence than longitudinal turbulence near inlet key of PKW.

  20. Impact of Future Trends on Marketing Strategy

    OpenAIRE

    Dr R. K. Srivastava; S.T. Sakunke

    2011-01-01

    This paper describes how impact of product range, price level, product positioning and technological change can help in formulating optimal business strategy for automotive manufacturers. A key aspect of identifying future trend of market is the key gradient to formulate proper marketing strategy - Mr. Andrew Young (2008).

  1. Cell-Based Strategies for Meniscus Tissue Engineering

    Science.gov (United States)

    Niu, Wei; Guo, Weimin; Han, Shufeng; Zhu, Yun; Liu, Shuyun; Guo, Quanyi

    2016-01-01

    Meniscus injuries remain a significant challenge due to the poor healing potential of the inner avascular zone. Following a series of studies and clinical trials, tissue engineering is considered a promising prospect for meniscus repair and regeneration. As one of the key factors in tissue engineering, cells are believed to be highly beneficial in generating bionic meniscus structures to replace injured ones in patients. Therefore, cell-based strategies for meniscus tissue engineering play a fundamental role in meniscal regeneration. According to current studies, the main cell-based strategies for meniscus tissue engineering are single cell type strategies; cell coculture strategies also were applied to meniscus tissue engineering. Likewise, on the one side, the zonal recapitulation strategies based on mimicking meniscal differing cells and internal architectures have received wide attentions. On the other side, cell self-assembling strategies without any scaffolds may be a better way to build a bionic meniscus. In this review, we primarily discuss cell seeds for meniscus tissue engineering and their application strategies. We also discuss recent advances and achievements in meniscus repair experiments that further improve our understanding of meniscus tissue engineering. PMID:27274735

  2. Cell-Based Strategies for Meniscus Tissue Engineering

    Directory of Open Access Journals (Sweden)

    Wei Niu

    2016-01-01

    Full Text Available Meniscus injuries remain a significant challenge due to the poor healing potential of the inner avascular zone. Following a series of studies and clinical trials, tissue engineering is considered a promising prospect for meniscus repair and regeneration. As one of the key factors in tissue engineering, cells are believed to be highly beneficial in generating bionic meniscus structures to replace injured ones in patients. Therefore, cell-based strategies for meniscus tissue engineering play a fundamental role in meniscal regeneration. According to current studies, the main cell-based strategies for meniscus tissue engineering are single cell type strategies; cell coculture strategies also were applied to meniscus tissue engineering. Likewise, on the one side, the zonal recapitulation strategies based on mimicking meniscal differing cells and internal architectures have received wide attentions. On the other side, cell self-assembling strategies without any scaffolds may be a better way to build a bionic meniscus. In this review, we primarily discuss cell seeds for meniscus tissue engineering and their application strategies. We also discuss recent advances and achievements in meniscus repair experiments that further improve our understanding of meniscus tissue engineering.

  3. Quality-aware scheduling for key-value data stores

    CERN Document Server

    Xu, Chen

    2015-01-01

    This book comprehensively illustrates quality-ware scheduling in key-value stores. In addition, it provides scheduling strategies and a prototype framework of quality-aware scheduler as well as a demonstration of online applications. The book offers a rich blend of theory and practice which is suitable for students, researchers and practitioners interested in distributed systems, NoSQL key-value stores and scheduling.

  4. Suggestions for Customer Strategy Updates : Finnish Customs

    OpenAIRE

    Kaisto, Raisa

    2014-01-01

    The case organization Finnish Customs wanted to be provided with new suggestions for their customer strategy updates. The first objective of this study was to study how the needs of the partnership and key customers are met in the customer strategy and provide suggestions for improvements. Another objective was to research the legislation influencing the customer strategy development. The customer strategy was created in 2004 and it was combined with other strategies in 2013. The customer...

  5. The Effective Key Length of Watermarking Schemes

    CERN Document Server

    Bas, Patrick

    2012-01-01

    Whereas the embedding distortion, the payload and the robustness of digital watermarking schemes are well understood, the notion of security is still not completely well defined. The approach proposed in the last five years is too theoretical and solely considers the embedding process, which is half of the watermarking scheme. This paper proposes a new measurement of watermarking security, called the effective key length, which captures the difficulty for the adversary to get access to the watermarking channel. This new methodology is applied to additive spread spectrum schemes where theoretical and practical computations of the effective key length are proposed. It shows that these schemes are not secure as soon as the adversary gets observations in the Known Message Attack context.

  6. Estrategias de Enseñanza a Distancia sobre Control No-Lineal Aplicada al Péndulo Invertido Strategies for Distance Learning Courses on Nonlinear Control Applied to the Inverted Pendulum

    Directory of Open Access Journals (Sweden)

    Sergio García-Nieto

    2007-01-01

    Full Text Available Este artículo describe el desarrollo de una herramienta software/hardware destinada al estudio, en el ámbito de la enseñanza universitaria, de sistemas de control distribuidos en tiempo real. El sistema se empleará en el control de procesos no lineales. Esta herramienta presenta tres partes claramente diferenciadas, las cuales pueden ser analizadas y modificadas por los estudiantes: i se introduce el modelo físico del péndulo invertido; ii el controlador es implementado en un sistema distribuido de tiempo real; y iii todo el sistema es manejado mediante una aplicación desarrollada en JAVA. Por lo tanto, los estudiantes tienen todos los elementos necesarios para trabajar con sistemas complejos no lineales, como el problema del péndulo invertido que se discute en este trabajo. Las pruebas realizadas muestran que la plataforma proporciona un método rápido y seguro de experimentación para los estudiantes.This paper presents a software/hardware tool to study, at university level, distributed control systems in real time. This platform is applied to control nonlinear processes. The system has three different parts which students can evaluate and modify; i a virtual model represents the physic model of the inverted pendulum; the controller is implemented by a real time distributed control system; and iii the whole system is managed with a JAVA application. Therefore, students have all the necessary elements to practice with complex nonlinear systems, such as the inverted pendulum discussed in this work. The tests done show that the plattform represents a fast and reliable method for experimentation by the students.

  7. Smartphones Could Make Keys Obsolete

    Institute of Scientific and Technical Information of China (English)

    Matt Richtel

    2011-01-01

    @@ Front pockets and purses are slowly being emptied of one of civilization's most basic and enduring tools: the key.It's being swallowed by the cellphone.New technology lets smartphones unlock hotel, office and house doors and open garages and even car doors. It's a not-too-distant cousin of the technology that allows key fobs to remotely unlock automobiles or key cards to be waved beside electronic pads at office entrances.What's new is that it is on the device more people are using as the Swiss Army knife of electronics, in equal parts phone, memo pad, stereo, map, GPS unit, and camera and game machine.

  8. Classroom Questioning Strategies

    Institute of Scientific and Technical Information of China (English)

    陈小林

    2013-01-01

      Interaction has been playing a more and more important role in language research since the early 1970s,when the communicative teaching method was widely applied in language teaching. Questioning is the most common classroom interaction. This thesis analyzed the influence on students' immediate oral production by applying different teacher questioning strategies including teacher's question types,teacher question modification and teacher feedback.

  9. 3 keys to defeating unconscious bias watch, think, act

    CERN Document Server

    Thiederman, Sondra

    2015-01-01

    Have you ever had a biased thought? If the answer is “yes,” join the club. Everybody has biases and, although that doesn’t make us bad people, it does mean we compromise our ability to get along with people who are different from us. The good news is, there’s a lot we can do to defeat bias. Calling on Dr. Sondra Thiederman’s twenty-five years of experience in the diversity/inclusion field, the book lays out an innovative WATCH, THINK, ACT strategy that each of us can immediately apply to the task. Easy-to-read and filled with anecdotes and activities, 3 Keys shows the reader: • How to WATCH their thoughts, experiences, and actions to identify unconscious biases and target them for extinction. • How to THINK in such a way as to weaken and control our biases. • How to ACT to defeat our biases and cultivate the kind of common ground that we know to be inhospitable to the survival of bias. Designed to motivate real change, the answer to defeating our biases is in these pages. The rest is up to you...

  10. Modern applied U-statistics

    CERN Document Server

    Kowalski, Jeanne

    2008-01-01

    A timely and applied approach to the newly discovered methods and applications of U-statisticsBuilt on years of collaborative research and academic experience, Modern Applied U-Statistics successfully presents a thorough introduction to the theory of U-statistics using in-depth examples and applications that address contemporary areas of study including biomedical and psychosocial research. Utilizing a "learn by example" approach, this book provides an accessible, yet in-depth, treatment of U-statistics, as well as addresses key concepts in asymptotic theory by integrating translational and cross-disciplinary research.The authors begin with an introduction of the essential and theoretical foundations of U-statistics such as the notion of convergence in probability and distribution, basic convergence results, stochastic Os, inference theory, generalized estimating equations, as well as the definition and asymptotic properties of U-statistics. With an emphasis on nonparametric applications when and where applic...

  11. Secret Key Generation From Mobility

    CERN Document Server

    Gungor, Onur; Koksal, C Emre

    2011-01-01

    We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.

  12. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  13. Key Statistics for Thyroid Cancer

    Science.gov (United States)

    ... cancer? Next Topic Thyroid cancer risk factors Key statistics for thyroid cancer How common is thyroid cancer? ... remains very low compared with most other cancers. Statistics on survival rates for thyroid cancer are discussed ...

  14. Strategy as simple rules.

    Science.gov (United States)

    Eisenhardt, K M; Sull, D N

    2001-01-01

    The success of Yahoo!, eBay, Enron, and other companies that have become adept at morphing to meet the demands of changing markets can't be explained using traditional thinking about competitive strategy. These companies have succeeded by pursuing constantly evolving strategies in market spaces that were considered unattractive according to traditional measures. In this article--the third in an HBR series by Kathleen Eisenhardt and Donald Sull on strategy in the new economy--the authors ask, what are the sources of competitive advantage in high-velocity markets? The secret, they say, is strategy as simple rules. The companies know that the greatest opportunities for competitive advantage lie in market confusion, but they recognize the need for a few crucial strategic processes and a few simple rules. In traditional strategy, advantage comes from exploiting resources or stable market positions. In strategy as simple rules, advantage comes from successfully seizing fleeting opportunities. Key strategic processes, such as product innovation, partnering, or spinout creation, place the company where the flow of opportunities is greatest. Simple rules then provide the guidelines within which managers can pursue such opportunities. Simple rules, which grow out of experience, fall into five broad categories: how- to rules, boundary conditions, priority rules, timing rules, and exit rules. Companies with simple-rules strategies must follow the rules religiously and avoid the temptation to change them too frequently. A consistent strategy helps managers sort through opportunities and gain short-term advantage by exploiting the attractive ones. In stable markets, managers rely on complicated strategies built on detailed predictions of the future. But when business is complicated, strategy should be simple. PMID:11189455

  15. Wiki keys on mobile devices

    OpenAIRE

    Weber, Gisela; Hagedorn, Gregor

    2010-01-01

    The development of increasingly powerful mobile devices like PDAs (Personal Digital Assistants) and Smartphones, with larger displays and greater resolution makes them increasingly suitable for identification tools available directly “in the field”. One of several approaches towards this aim in the KeyToNature project is based on wiki-stored documents. Important features of wiki-based keys, such as hidden text and media information as well as links to glossary entries are su...

  16. Finite-key security analysis for multilevel quantum key distribution

    Science.gov (United States)

    Brádler, Kamil; Mirhosseini, Mohammad; Fickler, Robert; Broadbent, Anne; Boyd, Robert

    2016-07-01

    We present a detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite-key-length scenario. The finite secret key rates (in bits per detected photon) are calculated as a function of the length of the sifted key by (i) generalizing the uncertainly relation-based insight from BB84 to any d-level 2-MUB QKD protocol and (ii) by adopting recent advances in the second-order asymptotics for finite block length quantum coding (for both d-level 2- and 3-MUB QKD protocols). Since the finite and asymptotic secret key rates increase with d and the number of MUBs (together with the tolerable threshold) such QKD schemes could in principle offer an important advantage over BB84. We discuss the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons.

  17. Introducing an Evidential Reasoning Approach for Selecting Knowledge Management Strategies

    Directory of Open Access Journals (Sweden)

    Mohammad Shariatmadari

    2013-04-01

    Full Text Available In a knowledge economy, a key source of sustainable competitive advantage relies on the way to create, share, and utilize knowledge. In order to react to an increasingly competitive business environment, many companies emphasize the importance of Knowledge Management (KM, and base their KM strategy on their unique resources and capabilities. Although numerous works discuss the issues of how to perform a KM strategy and implement it successfully, few have provided methods that can systematically evaluate and model the KM strategy involving several complex factors. In this paper, the evidential reasoning (ER approach is applied as a method for KM strategy selection. The process of building a multiple criteria decision model of a hierarchical structure is presented, in which both quantitative and qualitative information is represented in a unified manner. The KM strategy selection is then fully investigated using the ER approach in a real case study in Academic Center for Education, Culture and Research (ACECR. Both the advantages of applying this model in practice and the analysis process itself are discussed.

  18. Essays in Applied Microeconomics

    Science.gov (United States)

    Ge, Qi

    This dissertation consists of three self-contained applied microeconomics essays on topics related to behavioral economics and industrial organization. Chapter 1 studies how sentiment as a result of sports event outcomes affects consumers' tipping behavior in the presence of social norms. I formulate a model of tipping behavior that captures consumer sentiment following a reference-dependent preference framework and empirically test its relevance using the game outcomes of the NBA and the trip and tipping data on New York City taxicabs. While I find that consumers' tipping behavior responds to unexpected wins and losses of their home team, particularly in close game outcomes, I do not find evidence for loss aversion. Coupled with the findings on default tipping, my empirical results on the asymmetric tipping responses suggest that while social norms may dominate loss aversion, affect and surprises can result in freedom on the upside of tipping. Chapter 2 utilizes a novel data source of airline entry and exit announcements and examines how the incumbent airlines adjust quality provisions as a response to their competitors' announcements and the role of timing in such responses. I find no evidence that the incumbents engage in preemptive actions when facing probable entry and exit threats as signaled by the competitors' announcements in either short term or long term. There is, however, evidence supporting their responses to the competitors' realized entry or exit. My empirical findings underscore the role of timing in determining preemptive actions and suggest that previous studies may have overestimated how the incumbent airlines respond to entry threats. Chapter 3, which is collaborated with Benjamin Ho, investigates the habit formation of consumers' thermostat setting behavior, an often implicitly made decision and yet a key determinant of home energy consumption and expenditures. We utilize a high frequency dataset on household thermostat usage and find that

  19. Block Based Symmetry Key Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Satyendra Nath Mandal

    2012-08-01

    Full Text Available Visual cryptography is a method for protecting image-based secrets that has a computation-free decoding process. In this technique, numbers of shares have been generated from one image. The shares are sent through any channel to the receiver and the receiver can again produce original image by stacking all the shares in proper order. But, this method wastes a lot of bandwidth of the network. The techniques of generating shares have been used in several existing methods which are not unique. The different methods have been used in different types of images like binary, gray and color images. In this paper, a block based symmetry key visual cryptography algorithm has been proposed to convert image in encrypted form and decrypt the encrypted image into original form. The symmetric key has been generated from a real number. The encryption and decryption algorithm have been designed based on symmetry key. The algorithm with key has been used to encrypt image into single share and decrypt the single share into original image. The real number has been used to form the key may be predefined or may be sent by secure channel to the receiver. The proposed algorithm can be applied to any type images i.e. binary, gray scale and color images. A comparison has been made of the proposed algorithm with different existing algorithms like Ceaser cipher, transpose of matrix, bit comp, and transposition cipher based on the performance. The pixels distributed in original and share images have also been tested. Finally, it has shown that breaking of security level of proposed algorithm i.e. to guess the real number is huge time consuming.

  20. Marketingová strategie u vybraného produktu na příkladu společnosti DuPont

    OpenAIRE

    Wojnar, Michal

    2009-01-01

    The bachelor thesis "Marketing Strategy of a Chosen Product on The Example of DuPont" is aimed at analyzing the marketing strategy and marketing mix of the Elvaloy material which is used in paving segment. The main applied methodology is called situation analysis through which the author compares individual key markets, reviews internal and external conditions of the company and studies the competition. The main objective of the thesis is also to present diminishing differences between indust...

  1. Applying Pesticides Safely

    OpenAIRE

    Latimer, Joyce G.

    2009-01-01

    Proper use of pesticides is essential for your safety and for that of the environment. Pesticides must be used correctly to be effective. This publication reviews the key factors in the proper use of pesticides.

  2. China's New Energy Strategy

    Institute of Scientific and Technical Information of China (English)

    Cui Shuhong

    2004-01-01

    @@ At one of the routine meetings recently held by the State Council, the Chinese Government discussed and approved in principle the draft "Platform of Energy Development Plan (2004-2020)". This platform document is regarded as important to China's energy industrial development,according to the industrial insiders. In an interview with news media, Director of Energy Research Institute of State Development and Reform Commission Zhou Dadi specified eight key points of the new energy strategy.

  3. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  4. Where is the engineering I applied for?

    DEFF Research Database (Denmark)

    Holmegaard, Henriette Tolstrup; Madsen, Lene Møller; Ulriksen, Lars

    2016-01-01

    explores how this encounter provides a platform for students to become integrated during first year. We find that students' expectations are poorly met by their first-year study programme. In their attempt to bridge the gap between their expectations and their experiences, the students apply three...... strategies: some endure the gap, some constantly try out different study strategies and some compromised their expectations and identities to become more aligned with the study programme. The findings show that even when students successfully manage to bridge the gap, their strategy may turn out to be...

  5. 变频控制溶解氧和低温下SBR工艺实时控制策略的实现及中试%The Achievement of Real-time Control Strategy in Pilot-scale SBR Process at the Conditions of Low Temperature and Fixed Dissolved Oxygen by Applying Frequency Conversion Technology

    Institute of Scientific and Technical Information of China (English)

    顾升波; 王淑莹; 李夕耀; 杨庆; 李凌支; 杨培; 李论

    2011-01-01

    针对现今序批式活性污泥法(SBR)污水处理厂大多采用灵活性差的定时控制策略的现状,建立实时控制策略强化SBR工艺的性能,提高低温条件下的系统稳定性.采用体积为8.8 m3的中试SBR应用定时控制策略长期处理生活污水,采用变频技术控制SBR曝气阶段ρDO保持恒定,同时在低温条件下考察硝化终点时频率,曝气时间与温度之间的经验关系式,最后建立低温条件下的实时控制策略,并将其应用到中试SBR中.结果表明,实时控制策略在SBR系统中得到成功应用,且在低温条件(11~18 ℃)下稳定运行100 d,出水ρCOD低于50kg/m3,出水ρTN低于5 g/m3,出水COD和TN平均去除率分别达到80%和95%以上,出水水质达到一级A排放标准.%In order to solve the problem of poor flexibility of fixed time control strategy applying in most sequencing batch reactor (SBR) wastewater treatment plants nowadays, this research tries to enhance the performance of SBR process with a newly built real-time control strategy and to improve the stability of SBR system at low temperature. A 8.8 m3 pilot-scale SBR is operated for treating domestic wastewater with fixed-time control strategy. At the same time, frequency conversion technology is applied to control PDO of aeration period during the study. This study investigates the empirical expressions of frequency (f), aeration time (t) and temperature(θ) at the endpoint of nitrification under low temperature, and establishes a real-time control strategy and applies it into pilot-scale SBR. Results show that real time control strategy for low temperature is successfully applied in pilot-scale SBR, and was operated more than 100 days under low temperature condition ( 11 ~ 18 ℃ ) , and the effluent PCOD is lower than 50 × 10-3 kg/m3 ,the effluent PTN is lower than 5 × 10-3 kg/m3, the average effluent COD and TN removal efficiency maintains 80% , 95% respectively. The quality of effluent achieves

  6. A New Distribution Strategy : The Omnichannel Strategy

    Directory of Open Access Journals (Sweden)

    Mihaela Gabriela Belu

    2014-06-01

    Full Text Available In an increasingly globalized world, dependent on information technology, distribution companies are searching for new marketing models meant to enrich the consumer’s experience. Therefore, the evolution of new technologies, the changes in the consumer’s behaviour are the main factors that determine changes in the business model in the distribution field. The following article presents different forms of distribution, focusing on the omnichannel strategy. In the last part of the paper, the authors analyse the Romanian retail market, namely, the evolution of the market, its key competitors and the new distribution models adopted by retaileres in our country.

  7. Comment on "Quantum key distribution without alternative measurements"

    CERN Document Server

    Zhang Yu Shun; Guo Guang Can; Zhang, Yong-Sheng; Li, Chuan-Feng; Guo, Guang-Can

    2001-01-01

    In a recent paper [A. Cabello, Phys. Rev. A 61, 052312 (2000)], a quantum key distribution protocol based on entanglement swapping was proposed. However, in this comment, it is shown that this protocol is insecure if Eve use a special strategy to attack.

  8. Fatores críticos para o sucesso no desempenho de novos produtos: um estudo aplicado ao setor moveleiro da Serra Gaúcha Key factors for success in the new product development: an applied study in the furniture industry of Serra Gaúcha

    Directory of Open Access Journals (Sweden)

    Deonir De Toni

    2011-01-01

    Full Text Available Uma melhor performance de um novo produto no mercado pode ser alcançada pela adoção de um conjunto de estratégia e ações que sirvam de suporte para a gestão de novos projetos. A questão central deste estudo é: por que alguns novos produtos são bem-sucedidos enquanto muitos outros fracassam? A partir disso, o estudo teve por objetivo testar um modelo visando dar respostas a esta questão de pesquisa. Para tanto, foi implementada uma pesquisa do tipo survey em empresas do setor moveleiro da Serra Gaúcha utilizando um instrumento de pesquisa que integra fatores mercadológicos, organizacionais, operacionais e o desempenho do processo de desenvolvimento de novos produtos (PDNP. Com isso, foi possível fazer um comparativo entre esta pesquisa e dois estudos anteriores realizados com o mesmo enfoque (BOEHE; MILAN; DE TONI, 2009; DE TONI; BOEHE, 2006. Os resultados são semelhantes e contribuem com a literatura existente, pois têm a preocupação de integrar essas três dimensões, analisando como elas estão relacionadas e qual o seu impacto no PDNP. Com a finalidade de testar as hipóteses do modelo proposto, foram utilizados três modelos de regressão múltipla hierárquica. Os resultados sugerem que, para a amostra analisada, a estratégia de inovação e a reação dos concorrentes são os dois fatores que mais impactam no desempenho do PDNP. Dessa forma, observou-se que o desempenho no PDNP não depende apenas de uma única dimensão ou fator. Mais do que isso, os resultados da regressão múltipla indicam que a combinação entre as três dimensões, organizacional, mercadológica e operacional, explica de maneira mais significativa o desempenho do PDNP.A better performance of a product in the market may be achieved by adopting a new set of strategies and actions that support the management of new products. The central issue of this study is: why do some products succeed while others fail? Starting from this point, this study aims

  9. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin;

    2016-01-01

    We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression......, for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  10. Symmetric-key cryptosystem with DNA technology

    Institute of Scientific and Technical Information of China (English)

    LU MingXin; LAI XueJia; XIAO GuoZhen; QIN Lei

    2007-01-01

    DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred to as DNA symmetric-key cryptosystem (DNASC). In DNASC,both encryption and decryption keys are formed by DNA probes, while its ciphertext is embedded in a specially designed DNA chip (microarray). The security of this system is mainly rooted in difficult biology processes and problems, rather than conventional computing technology, thus it is unaffected by changes from the attack of the coming quantum computer. The encryption process is a fabrication of a specially designed DNA chip and the decryption process is the DNA hybridization.In DNASC, billions of DNA probes are hybridized and identified at the same time,thus the decryption process is conducted in a massive, parallel way. The great potential in vast parallelism computation and the extraordinary information density of DNA are displayed in DNASC to some degree.

  11. Supporting culturally and linguistically diverse students during clinical placement: strategies from both sides of the table

    OpenAIRE

    O’Reilly, Sharleen L.; Milner, Julia

    2015-01-01

    Background Increasing proportions of Culturally and Linguistically Diverse (CALD) students within health professional courses at universities creates challenges in delivering inclusive training and education. Clinical placements are a core component of most health care degrees as they allow for applied learning opportunities. A research gap has been identified in regard to understanding challenges and strategies for CALD students in health professional placements. Methods A key stakeholder ap...

  12. Evaluation Strategy

    DEFF Research Database (Denmark)

    Coto Chotto, Mayela; Wentzer, Helle; Dirckinck-Holmfeld, Lone

    2009-01-01

    The paper presents an evaluation strategy based on deliberate ideals and principles of dialogue design. The evaluation strategy is based on experiential phenomenology taking the point of departure for design and evaluation processes in the experienced practitioners themselves. The article presents...... the evaluation strategy and methodology of a research project Making Online Path to Enter new Markets, MOPEM. It is an EU-research project with partners from different Educational Institutions of Technology and Business in five European Countries....

  13. Environmental strategy

    DEFF Research Database (Denmark)

    Zabkar, Vesna; Cater, Tomaz; Bajde, Domen;

    2013-01-01

    Environmental issues and the inclusion of environmental strategies in strategic thinking is an interesting subject of investigation. In general, managerial practices organized along ecologically sound principles contribute to a more environmentally sustainable global economy. From the managerial...... perspective, appropriate environmental strategies in compliance with environmental requirements aim at building competitive advantages through sustainable development. There is no universal “green” strategy that would be appropriate for each company, regardless of its market requirements and competitive...

  14. Marketing Strategy

    OpenAIRE

    Pokorná, Martina

    2012-01-01

    This diploma thesis deals with issues of marketing strategy of a company in chosen retail business. Its main aim is to suggest new advertising strategy of a company for the purpose of increasing awareness customers and marketability of products. On the grounds of consultations with the management of the company, analysis of current marketing strategy and results of market research I have fulfiled this task. In the theoretical part of this diploma thesis I deal with introduction to strat...

  15. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars;

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif......This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so...

  16. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  17. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  18. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  19. Key Revocation System for DNSSEC

    Directory of Open Access Journals (Sweden)

    Gilles Guette

    2008-06-01

    Full Text Available The Doma in Name System (DNS is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions (DNSSEC has been designed to protect the DNS protocol using public key cryptography and digital signatures. In this paper, we show how DNSSEC can be attacked using compromised keys and the consequences of such attacks. Then, we propose a new revocation scheme for DNSSEC based on two new resource records. There is currently no revocation system defined in the DNSSEC standard.

  20. Advances in Applied Mechanics

    OpenAIRE

    2014-01-01

    Advances in Applied Mechanics draws together recent significant advances in various topics in applied mechanics. Published since 1948, Advances in Applied Mechanics aims to provide authoritative review articles on topics in the mechanical sciences, primarily of interest to scientists and engineers working in the various branches of mechanics, but also of interest to the many who use the results of investigations in mechanics in various application areas, such as aerospace, chemical, civil, en...

  1. Perspectives on Applied Ethics

    OpenAIRE

    2007-01-01

    Applied ethics is a growing, interdisciplinary field dealing with ethical problems in different areas of society. It includes for instance social and political ethics, computer ethics, medical ethics, bioethics, envi-ronmental ethics, business ethics, and it also relates to different forms of professional ethics. From the perspective of ethics, applied ethics is a specialisation in one area of ethics. From the perspective of social practice applying eth-ics is to focus on ethical aspects and ...

  2. Applied Neuroscience Laboratory Complex

    Data.gov (United States)

    Federal Laboratory Consortium — Located at WPAFB, Ohio, the Applied Neuroscience lab researches and develops technologies to optimize Airmen individual and team performance across all AF domains....

  3. Quantum key distribution with untrusted detectors

    Science.gov (United States)

    González, P.; Rebón, L.; Ferreira da Silva, T.; Figueroa, M.; Saavedra, C.; Curty, M.; Lima, G.; Xavier, G. B.; Nogueira, W. A. T.

    2015-08-01

    Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solution that might exceed the performance and practicality of the previous two in circumventing detector side-channel attacks, which arguably is the most hazardous part of QKD implementations. Our proposal has, however, one main requirement: the legitimate users of the system need to ensure that their labs do not leak any unwanted information to the outside. The security in the low-loss regime is guaranteed, while in the high-loss regime we already prove its robustness against some eavesdropping strategies.

  4. Key Value Considerations for Consultant Pharmacists.

    Science.gov (United States)

    Meyer, Lee; Perry, Ronald G; Rhodus, Susan M; Stearns, Wendy

    2016-07-01

    Managing the efficiency and costs of residents' drug regimens outside the acute-care hospital and through transitions of care requires a toolbox filled with cost-control tools and careful collaboration among the pharmacy provider(s), facility staff, and the consultant/senior care pharmacist. This article will provide the reader with key long-term care business strategies that affect the profitability of the pharmacy provider in various care settings while, at the same time, ensuring optimal therapy for residents as they transition across levels of care. Readers can take away ideas on how to access critical information, what they can do with this information, and how they can improve the overall care process. Four experts in various aspects of pharmacy management share their insights on pharmacy practice issues including formulary management, performance metrics, short-cycle dispensing challenges/solutions, cost-control measures, facility surveys, billing practices, medication reconciliation, prospective medication reviews, and transitions of care. PMID:27412312

  5. DOE groundwater protection strategy

    International Nuclear Information System (INIS)

    EH is developing a DOE-wide Groundwater Quality Protection Strategy to express DOE's commitment to the protection of groundwater quality at or near its facilities. This strategy responds to a September 1986 recommendation of the General Accounting Office. It builds on EPA's August 1984 Ground-Water Protection Strategy, which establishes a classification system designed to protect groundwater according to its value and vulnerability. The purposes of DOE's strategy are to highlight groundwater protection as part of current DOE programs and future Departmental planning, to guide DOE managers in developing site-specific groundwater protection practices where DOE has discretion, and to guide DOE's approach to negotiations with EPA/states where regulatory processes apply to groundwater protection at Departmental facilities. The strategy calls for the prevention of groundwater contamination and the cleanup of groundwater commensurate with its usefulness. It would require long-term groundwater protection with reliance on physical rather than institutional control methods. The strategy provides guidance on providing long-term protection of groundwater resources; standards for new remedial actions;guidance on establishing points of compliance; requirements for establishing classification review area; and general guidance on obtaining variances, where applicable, from regulatory requirements. It also outlines management tools to implement this strategy

  6. Predicting Strategy and Listening Comprehension

    OpenAIRE

    Yongmei Jiang

    2009-01-01

    The author found certain potential obstacles that students encounter in their listening class, which she believes should be removed by a good class teaching method. However, traditional listening class fails. She goes on to explore integrating strategies into listening class, among the many strategies she choose the prediction strategy and describes it in three stages: Pre-listening, while-listening, and post-listening. Then a real model of applying prediction in listening class is given, who...

  7. Significant demand and key problems of membrane science and technology applying to pharmaceutical industry of Chinese materia medica%中药制药工业对膜科学技术的重大需求与关键问题

    Institute of Scientific and Technical Information of China (English)

    郭立玮

    2009-01-01

    To discuss the significant application for the membrane science and technology in the development of pharmaceutical industry of Chinese materia medica(CMM)in such aspects as obtaination of integrated effctive substances,transformation of traditional technology,reduction of power consumption,product safety,sewage treatment,and technological innovation.To analyze the major restrictions on the industrialization of CMM'S membrane science and propose the corresponding measures.Currently,the development of macromolecule science and technology and the implementation of environmental-friendly strategy have advanced the technology of membrane to a new stage and thus offer the insurance to the integration of extraction,separation,concentration,and purification in traditional pharmaceutical production of CMM.Meanwhile,the technolgy of membrane separation has been widely used in the separation,concentration,and purification of macromolecule,which bears similar characteristics with traditional CMM.It is also a proof that the technology of membrane will improve the efficency of traditional CMM production when it is used in the pharmaceutical industry of CMM.%论述了中药制药工业在获取中药整体药效物质、改造传统工艺、降低能耗、保障产品安全、污水处理、技术创新等方面对膜科学技术的重大需求.分析了制约中药膜分离技术产业化进程的关键问题,并提出相应对策.当前高分子科学和分析技术的进展以及环境友好战略的实施使膜技术步入了快速发展的新阶段,从而为中药生产的提取、分离、浓缩、纯化一体化工程技术的解决提供了保证.同时膜分离技术在与中药体系特性接近的生物大分子的分离、浓缩和纯化上所得到的广泛应用,也从一个侧面说明膜技术如果用于中药生产,应当同样会获得较高的效益.

  8. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  9. Overview, conclusions, and key recommendations

    NARCIS (Netherlands)

    R. Loeber; D.P. Farrington; J.C. Howell; M. Hoeve

    2012-01-01

    Section I of this chapter summarizes the most important points of Chapters 2 to 5 and relevant portions of Chapter 10 (which concerns European issues) by addressing key findings that are relevant for juveniles’ transition of offending from adolescence (up to age 18) into adulthood. Section I focuses

  10. Ten Keys to the Portal

    Science.gov (United States)

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  11. Key Skills Influencing Student Achievement

    Science.gov (United States)

    Balch, Tonya; Gruenert, Steve

    2009-01-01

    A predictive, non-experimental, cross-sectional design (Johnson, 2001) was used to conduct a study to determine if elementary administrators' key counseling skills and select demographics predicted state-level student performance indicators in their respective schools. A secondary purpose of this study was to develop a valid and reliable on-line…

  12. Ant Colony Optimization for Inferring Key Gene Interactions

    OpenAIRE

    Raza, Khalid; Kohli, Mahish

    2014-01-01

    Inferring gene interaction network from gene expression data is an important task in systems biology research. The gene interaction network, especially key interactions, plays an important role in identifying biomarkers for disease that further helps in drug design. Ant colony optimization is an optimization algorithm based on natural evolution and has been used in many optimization problems. In this paper, we applied ant colony optimization algorithm for inferring the key gene interactions f...

  13. Psycholinguistics in Applied Linguistics: Trends and Perspectives.

    Science.gov (United States)

    de Bot, Kees

    2000-01-01

    Discusses the relationship between the terms psycholinguistics and applied linguistics, and in the process explores key issues in multilingual processing, such as the structure of the bilingual lexicon, language choice in production and perception, and the language mode. (Author/VWL)

  14. Interdisciplinary Instructional Reading Strategies: An Applied Application for Business Education

    Science.gov (United States)

    Polkinghorne, Frederick W.; Bland, Zinna L.

    2011-01-01

    The contemporary workforce requires technical and reading skills (Shanahan & Shanahan, 2008; The Conference Board, Corporate Voices for Working Families, Partnership for 21st Century Skills, Society of Human Resource Management, 2006). Technical skills allow workers to perform specific workforce tasks, while reading skills are generally needed by…

  15. Effectiveness of Compensatory Strategies applied to Cognitive impairment in Schizophrenia

    DEFF Research Database (Denmark)

    Hansen, Jens Peter; Østergaard, Birte; Nordentoft, Merete;

    Background Bewteen 75% and 85% of patients with schizophrenia have cognitive impairments. The impairments have a negative influence on the patient's ability to maintain work, maintain contact with friends, independent living and living in a social relationship. Compared to treatment as usual......, have investigated the effect of CAT in younger patients with schizophrenia     Purpose The purpose of this study is to evaluate the effect of CAT in comparison with treatment as usual, focusing on social functions, symptoms, relapse, re-hospitalisation, and quality of life in younger outpatients...

  16. Effectiveness of Compensatory Strategies applied to Cognitive impairment in Schizophrenia

    DEFF Research Database (Denmark)

    Hansen, Jens Peter; Østergaard, Birte; Nordentoft, Merete;

      Background Between 75% and 85% of patients with schizophrenia have cognitive impairments. The impairments have a negative influence on the patient's ability to maintain work, maintain contact with friends, independent living and living in a social relationship. Compared to treatment as usual......, have investigated the effect of CAT in younger patients with schizophrenia   Purpose The purpose of this study is to evaluate the effect of CAT in comparison with treatment as usual, focusing on social functions, symptoms, relapse, re-hospitalisation, and quality of life in younger outpatients...

  17. Applying medicinal chemistry strategies to understand odorant discrimination

    OpenAIRE

    Poivet, Erwan; Peterlin, Zita; Tahirova, Narmin; Xu, Lu; Altomare, Clara; Paria, Anne; Zou, Dong-Jing; Firestein, Stuart

    2016-01-01

    Associating an odorant's chemical structure with its percept is a long-standing challenge. One hindrance may come from the adoption of the organic chemistry scheme of molecular description and classification. Chemists classify molecules according to characteristics that are useful in synthesis or isolation, but which may be of little importance to a biological sensory system. Accordingly, we look to medicinal chemistry, which emphasizes biological function over chemical form, in an attempt to...

  18. Strategies and methodologies for applied marine radioactivity studies

    International Nuclear Information System (INIS)

    The main objective of this document is to provide basic training in the theoretical background and practical applications of the methodologies for the measurement, monitoring and assessment of radioactivity in marine environment. This manual is a compilation of lectures and notes that have been presented at previous training courses. The document contains 16 individual papers, each of them was indexed separately

  19. The Risk Management Strategy of Applying Cloud Computing

    Directory of Open Access Journals (Sweden)

    Tien-Chun Chen

    2012-09-01

    Full Text Available It is inevitable that Cloud Computing will trigger off some loss exposures. Unfortunately, not much of scientific and objective researches had been focused on the identification and evaluation of loss exposures stemming from applications of Cloud Computing. In order to fill this research gap, this study attempts to identify and analyze loss exposures of Cloud Computing by scientific and objective methods which provide the necessary information to administrators in support of decisions of risk management. In conclusion, this study has identified “Social Engineering”, “Cross-Cloud Compatibility” and “Mistakes are made by employees intentionally or accidentally” are high priority risks to be treated. The findings also revealed that people who work in the field of information or Cloud Computing are somehow ignorant of where the risks in Cloud Computing lie due to its novelty and complication.

  20. Image remapping strategies applied as protheses for the visually impaired

    Science.gov (United States)

    Johnson, Curtis D.

    1993-01-01

    Maculopathy and retinitis pigmentosa (rp) are two vision defects which render the afflicted person with impaired ability to read and recognize visual patterns. For some time there has been interest and work on the use of image remapping techniques to provide a visual aid for individuals with these impairments. The basic concept is to remap an image according to some mathematical transformation such that the image is warped around a maculopathic defect (scotoma) or within the rp foveal region of retinal sensitivity. NASA/JSC has been pursuing this research using angle invariant transformations with testing of the resulting remapping using subjects and facilities of the University of Houston, College of Optometry. Testing is facilitated by use of a hardware device, the Programmable Remapper, to provide the remapping of video images. This report presents the results of studies of alternative remapping transformations with the objective of improving subject reading rates and pattern recognition. In particular a form of conformal transformation was developed which provides for a smooth warping of an image around a scotoma. In such a case it is shown that distortion of characters and lines of characters is minimized which should lead to enhanced character recognition. In addition studies were made of alternative transformations which, although not conformal, provide for similar low character distortion remapping. A second, non-conformal transformation was studied for remapping of images to aid rp impairments. In this case a transformation was investigated which allows remapping of a vision field into a circular area representing the foveal retina region. The size and spatial representation of the image are selectable. It is shown that parametric adjustments allow for a wide variation of how a visual field is presented to the sensitive retina. This study also presents some preliminary considerations of how a prosthetic device could be implemented in a practical sense, vis-a-vis, size, weight and portability.

  1. Weighted gene coexpression network analysis strategies applied to mouse weight

    OpenAIRE

    Fuller, Tova F; Ghazalpour, Anatole; Aten, Jason E.; Drake, Thomas A; Lusis, Aldons J.; Horvath, Steve

    2007-01-01

    Systems-oriented genetic approaches that incorporate gene expression and genotype data are valuable in the quest for genetic regulatory loci underlying complex traits. Gene coexpression network analysis lends itself to identification of entire groups of differentially regulated genes—a highly relevant endeavor in finding the underpinnings of complex traits that are, by definition, polygenic in nature. Here we describe one such approach based on liver gene expression and genotype data from an ...

  2. COMMAND AND CONTROL STRATEGIES APPLIED TO HIGHPOWER STEAM GENERATORS

    OpenAIRE

    DUINEA. A.M.; MIRCEA P.M.

    2015-01-01

    The paper presents the analysis of the actual operation scheme existing for steam generator drum. Following the trend valid for forced circulation steam generator, it is proposed to replace the classical adjustment loops with new regulation scheme highlighting its advantages in steam generation operation.

  3. COMMAND AND CONTROL STRATEGIES APPLIED TO HIGHPOWER STEAM GENERATORS

    Directory of Open Access Journals (Sweden)

    DUINEA. A.M.

    2015-06-01

    Full Text Available The paper presents the analysis of the actual operation scheme existing for steam generator drum. Following the trend valid for forced circulation steam generator, it is proposed to replace the classical adjustment loops with new regulation scheme highlighting its advantages in steam generation operation.

  4. What are applied ethics?

    Science.gov (United States)

    Allhoff, Fritz

    2011-03-01

    This paper explores the relationships that various applied ethics bear to each other, both in particular disciplines and more generally. The introductory section lays out the challenge of coming up with such an account and, drawing a parallel with the philosophy of science, offers that applied ethics may either be unified or disunified. The second section develops one simple account through which applied ethics are unified, vis-à-vis ethical theory. However, this is not taken to be a satisfying answer, for reasons explained. In the third section, specific applied ethics are explored: biomedical ethics; business ethics; environmental ethics; and neuroethics. These are chosen not to be comprehensive, but rather for their traditions or other illustrative purposes. The final section draws together the results of the preceding analysis and defends a disunity conception of applied ethics.

  5. Coordinated Control Strategies of VSC-HVDC-Based Wind Power Systems for Low Voltage Ride Through

    OpenAIRE

    Xinyin Zhang; Zaijun Wu; Minqiang Hu; Xianyun Li; Ganyun Lv

    2015-01-01

    The Voltage Source Converter-HVDC (VSC-HVDC) system applied to wind power generation can solve large scale wind farm grid-connection and long distance transmission problems. However, the low voltage ride through (LVRT) of the VSC-HVDC connected wind farm is a key technology issue that must be solved, and it is currently lacking an economic and effective solution. In this paper, a LVRT coordinated control strategy is proposed for the VSC-HVDC-based wind power system. In this strategy, the oper...

  6. Determination of key enzymes for threonine synthesis through in vitro metabolic pathway analysis

    OpenAIRE

    Zhang, Yanfei; Meng, Qinglong; Ma, Hongwu; Liu, Yongfei; Cao, Guoqiang; Zhang, Xiaoran; Zheng, Ping; Sun, Jibin; Zhang, Dawei; Jiang, Wenxia; Ma, Yanhe

    2015-01-01

    Background The overexpression of key enzymes in a metabolic pathway is a frequently used genetic engineering strategy for strain improvement. Metabolic control analysis has been proposed to quantitatively determine key enzymes. However, the lack of quality data often makes it difficult to correctly identify key enzymes through control analysis. Here, we proposed a method combining in vitro metabolic pathway analysis and proteomics measurement to find the key enzymes in threonine synthesis pat...

  7. A dyadic trust perspective of key account relationship development in the UK mortgage industry

    OpenAIRE

    Murray, Sharon Lee

    2007-01-01

    The main purpose of this study is to examine how a dyadic trust perspective can support effective development of key account relationships. The need for Key Account Management in the UK Mortgage Industry is investigated, factors for effective key account relationship management are identified and a trust/Mortgage Lender and Intermediary perspective of Key Account relationship effectiveness is analysed. The results of this study have been achieved through a mixed methods research strategy and ...

  8. Group secret key generation in wireless networks:algorithms and rate optimization

    OpenAIRE

    Xu, Peng; Cumanan, Kanapathippillai; Ding, Zhiguo; Dai, Xuchu

    2016-01-01

    This paper investigates group secret key generation problems for different types of wireless networks, by exploiting physical layer characteristics of wireless channels. A new group key generation strategy with low complexity is proposed, which combines the well-established point-to-point pairwise key generation technique, the multisegment scheme, and the one-time pad. In particular, this group key generation process is studied for three types of communication networks: 1) the three-node netw...

  9. MARKETING STRATEGIES BASED ON THE BUYING PROCESS

    OpenAIRE

    LIVIU NEAMŢU; ADINA CLAUDIA NEAMŢU

    2016-01-01

    In marketing, due to dynamic, rapid and permanent changes known on the market, we will talk more about politics than about strategy, the time horizon covered is much lower than that contained in a classic strategy, with a risk that elements and criteria to which we refer are no longer current. Sales growth strategies are, in fact, combination strategies and consist in the company applying, in its different units, different strategies, according to the requirement of appropriate st...

  10. The Key Drivers behind Novo Nordisk’s Growth in the Diabetes Market in China

    Directory of Open Access Journals (Sweden)

    Hind Louiza CHITOUR

    2013-12-01

    Full Text Available To enter the Chinese Pharmaceutical market, “Big Pharma” has adopted different strategies to tackle the challenges specific to the country in terms of size, demographics, specific sales channels and logistics adjustments. While the majority of Global Pharmaceutical players have opted for an aggressive M&A approach to penetrate the Chinese market and gain local insight; the Danish Novo Nordisk has instead chosen a strategy focusing on innovation and developing its R&D structure to capitalize on the local talent pool. To illustrate Novo Nordisk’s growth strategy in the Mainland, we analyzed its competitiveness in the diabetes market by demonstrating the key drivers behind this success. We applied a various set of tools for this research: Novo Nordisk, Dong Bao Pharmaceutical executives’ interviews and personal observations accounting for the primary data, we also reviewed secondary data to perform a PEST analysis in addition to Porter’s competitive advantage model in order to extract the reasons behind Novo Nordisk’s marching success in the Mainland.

  11. Identification Schemes from Key Encapsulation Mechanisms

    Science.gov (United States)

    Anada, Hiroaki; Arita, Seiko

    We propose a generic conversion from a key encapsulation mechanism (KEM) to an identification (ID) scheme. The conversion derives the security for ID schemes against concurrent man-in-the-middle (cMiM) attacks from the security for KEMs against adaptive chosen ciphertext attacks on one-wayness (one-way-CCA2). Then, regarding the derivation as a design principle of ID schemes, we develop a series of concrete one-way-CCA2 secure KEMs. We start with El Gamal KEM and prove it secure against non-adaptive chosen ciphertext attacks on one-wayness (one-way-CCA1) in the standard model. Then, we apply a tag framework with the algebraic trick of Boneh and Boyen to make it one-way-CCA2 secure based on the Gap-CDH assumption. Next, we apply the CHK transformation or a target collision resistant hash function to exit the tag framework. And finally, as it is better to rely on the CDH assumption rather than the Gap-CDH assumption, we apply the Twin DH technique of Cash, Kiltz and Shoup. The application is not “black box” and we do it by making the Twin DH technique compatible with the algebraic trick. The ID schemes obtained from our KEMs show the highest performance in both computational amount and message length compared with previously known ID schemes secure against concurrent man-in-the-middle attacks.

  12. Information Systems Management: an Australian view of the key issues

    OpenAIRE

    Graham Pervan

    1994-01-01

    Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The re...

  13. Typhoid fever vaccination strategies.

    Science.gov (United States)

    Date, Kashmira A; Bentsi-Enchill, Adwoa; Marks, Florian; Fox, Kimberley

    2015-06-19

    Typhoid vaccination is an important component of typhoid fever prevention and control, and is recommended for public health programmatic use in both endemic and outbreak settings. We reviewed experiences with various vaccination strategies using the currently available typhoid vaccines (injectable Vi polysaccharide vaccine [ViPS], oral Ty21a vaccine, and injectable typhoid conjugate vaccine [TCV]). We assessed the rationale, acceptability, effectiveness, impact and implementation lessons of these strategies to inform effective typhoid vaccination strategies for the future. Vaccination strategies were categorized by vaccine disease control strategy (preemptive use for endemic disease or to prevent an outbreak, and reactive use for outbreak control) and vaccine delivery strategy (community-based routine, community-based campaign and school-based). Almost all public health typhoid vaccination programs used ViPS vaccine and have been in countries of Asia, with one example in the Pacific and one experience using the Ty21a vaccine in South America. All vaccination strategies were found to be acceptable, feasible and effective in the settings evaluated; evidence of impact, where available, was strongest in endemic settings and in the short- to medium-term. Vaccination was cost-effective in high-incidence but not low-incidence settings. Experience in disaster and outbreak settings remains limited. TCVs have recently become available and none are WHO-prequalified yet; no program experience with TCVs was found in published literature. Despite the demonstrated success of several typhoid vaccination strategies, typhoid vaccines remain underused. Implementation lessons should be applied to design optimal vaccination strategies using TCVs which have several anticipated advantages, such as potential for use in infant immunization programs and longer duration of protection, over the ViPS and Ty21a vaccines for typhoid prevention and control.

  14. ANALYSIS OF PETROBRAS? CORPORATE STRATEGY

    OpenAIRE

    Devine, Jeff

    2009-01-01

    This document presents an analysis of Petrobras? corporate strategy to enhance the firm?s competitiveness in the industry. The document provides an industry analysis that identifies the company?s current position and a strategic alternative that will improve the company?s performance. The industy analysis determines the structure of the industry and the competitive forces identify the key success factors. The key success factors pinpoint the opportunities and threats to form the strategic alt...

  15. Formulation of price strategies in the software sector: outsourcing of development and maintenance software product case

    Directory of Open Access Journals (Sweden)

    Antonio Cezar Bornia

    2008-07-01

    Full Text Available The main goal of this article is to discuss the formulation of price strategies in the software sector. In the intention of reaching the proposed goal, strategies models of prices are introduced along with the procedure to the formulation of price strategies, composed by five stages: external and internal analyses, consolidation, positioning, price strategy formalization and market attendance. As for the methodology, the study is classified as qualitative, exploratory, descriptive, documental, of field and case study, according to the approach of Vergara (1998. In the case study, the model to the formulation of price strategies is applied in a company’s software sector, being analyzed the outsourcing of development and maintenance software product. As main contributions, it is highlighted the price procedure application that emphasizes strategic price logic and prices strategies formulations, with base in the analysis of five main factors: quality, comparison with the competition, company life cycle, product life cycle and characteristics of the segment-objective. Based on the analyzed factors, a possible strategy to be adopted considering the characteristics of the product and the company is the price strategy and superior value. Key-words: Pricing Strategies. Price Formulation. Software Enterprises.

  16. Key drivers of airline loyalty

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  17. Analysis of Muji's Business Strategy

    Institute of Scientific and Technical Information of China (English)

    范晶

    2011-01-01

    This article is a report of analysis of Muji's business strategy.First,the vision and mission are introduced.Second,the current strategy is identified.Then the industry analysis,industry driving forces,key success factors,value chain analysis,competitive advantage,competitive power of the competitive advantage were analyzed.At last,on the basis of the former analysis the SWOT analysis was worked out.

  18. Niger; Poverty Reduction Strategy Paper

    OpenAIRE

    International Monetary Fund

    2013-01-01

    The Government of the Republic of Niger has implemented the Poverty Reduction Strategy (PRS), which describes the country's macroeconomic, structural, and social policies in support of growth and poverty reduction. This strategy is based on the conviction that poverty can be reduced through strong and sustained economic growth that creates wealth and jobs. The study is the outcome of a concerted analysis. The first part outlines the diagnosis and key factors of poverty and the second part pre...

  19. OCDMA Network and Key Technology

    Institute of Scientific and Technical Information of China (English)

    Li Yuquan; Pu Tao; Xu Ming; Yang Shuwen

    2003-01-01

    OCDMA's network application on LAN, metro-ring and backbone networks are discussed. Its simple tell-go protocol makes it a powerful competitor with CSMA/CD in optical LANs. Its large soft capacity could erase the wavelength routing algorithm of WDM based metro-ring. And its content susceptibility could be largely used in label switching backbone network. And why should be 2D CODEC as well as interference cancellation is although mentioned as OCDMA key technology.

  20. Key Topics in Sports Medicine

    OpenAIRE

    Amir Ali Narvani; Panagiotis Thomas; Burce Lynn

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  1. Key Questions in Thoracic Surgery

    OpenAIRE

    Subotic, Dragan R.

    2016-01-01

    This 1000-page textbook encompasses much more than the title suggests. In fact, the title “Key questions in thoracic surgery and pulmonology” would be more fitting. The specific format of the book, with precise questions and evidence-based, but equally clear answers covering all relevant fields of pulmonology and thoracic surgery, makes this 40-chapter book a “must read” not only for residents, but also for senior pulmonologists and thoracic surgeons.

  2. Key Lake human resources and northern business initiative

    International Nuclear Information System (INIS)

    The Key Lake Operation is committed to a policy of maximizing Saskatchewan, and particularly northern Saskatchewan, employment and business opportunities. The participation rate of northern people in the Key Lake operation's workforce has risen from 23.8% in 1983, to 42% today. Cameco's objective is to achieve 50% representation of residents of Saskatchewan's north in the Key Lake workforce by 1995. The company also extends this strategic objective to contractors. All contractors are required to maximize employment opportunities for residents of Saskatchewan's north, and report employment levels to the company as a condition of the contract. Today, contractors at the Key Lake site have achieved a northern participation rate of 47%. This paper highlights strategies for increasing northern/aboriginal participation and provides several examples of successes from these initiatives. (author)

  3. KeySpan Energy Canada

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-09-01

    Operating in Alberta, KeySpan is a gas processing company with 14 gas plant facilities and pipelines in the province. Since its employees are sometimes working at remote locations, it has been difficult to use conventional classroom and seminar learning techniques to meet training needs. Cost-effective and innovative learning delivery solutions are now available from sophisticated information and communication technologies such as the Internet. In 1998, the Capability Development System (CDS) was developed by KeySpan as an on-line training system. It comprised a software assessment tool, a number of skills profiles for different occupations, and a curriculum registry providing technical information on the gas processing industry. E-learning initiatives are focused on specific projects or business units in order to better manage the training outcomes. The e-learning experience of KeySpan has resulted in benefits such as: better support to its customers and clients' needs through focused training on company-critical processes, services, products, and functions; more efficient employees; and, employees that feel part of the team.

  4. Safety strategy

    International Nuclear Information System (INIS)

    The basis for safety strategy in nuclear industry and especially nuclear power plants is the prevention of radioactivity release inside or outside of the technical installation. Therefore either technical or administrative measures are combined to a general strategy concept. This introduction will explain in more detail the following topics: - basic principles of safety - lines of assurance (LOA) - defense in depth - deterministic and probabilistic methods. This presentation is seen as an introduction to the more detailed discussion following in this course, nevertheless some selected examples will be used to illustrate the aspects of safety strategy development although they might be repeated later on. (orig.)

  5. Applied statistics: A review

    OpenAIRE

    Cox, D R

    2007-01-01

    The main phases of applied statistical work are discussed in general terms. The account starts with the clarification of objectives and proceeds through study design, measurement and analysis to interpretation. An attempt is made to extract some general notions.

  6. Applied eye tracking research

    NARCIS (Netherlands)

    Jarodzka, Halszka

    2011-01-01

    Jarodzka, H. (2010, 12 November). Applied eye tracking research. Presentation and Labtour for Vereniging Gewone Leden in oprichting (VGL i.o.), Heerlen, The Netherlands: Open University of the Netherlands.

  7. Applied Mathematics Seminar 1982

    International Nuclear Information System (INIS)

    This report contains the abstracts of the lectures delivered at 1982 Applied Mathematics Seminar of the DPD/LCC/CNPq and Colloquy on Applied Mathematics of LCC/CNPq. The Seminar comprised 36 conferences. Among these, 30 were presented by researchers associated to brazilian institutions, 9 of them to the LCC/CNPq, and the other 6 were given by visiting lecturers according to the following distribution: 4 from the USA, 1 from England and 1 from Venezuela. The 1981 Applied Mathematics Seminar was organized by Leon R. Sinay and Nelson do Valle Silva. The Colloquy on Applied Mathematics was held from october 1982 on, being organized by Ricardo S. Kubrusly and Leon R. Sinay. (Author)

  8. Mesothelioma Applied Research Foundation

    Science.gov (United States)

    ... Percentage Donations Tribute Wall Other Giving/Fundraising Opportunities Bitcoin Donation Form FAQs Help us raise awareness and ... Percentage Donations Tribute Wall Other Giving/Fundraising Opportunities Bitcoin Donation Form FAQs © 2013 Mesothelioma Applied Research Foundation, ...

  9. Handbook of Applied Analysis

    CERN Document Server

    Papageorgiou, Nikolaos S

    2009-01-01

    Offers an examination of important theoretical methods and procedures in applied analysis. This book details the important theoretical trends in nonlinear analysis and applications to different fields. It is suitable for those working on nonlinear analysis.

  10. Applying contemporary statistical techniques

    CERN Document Server

    Wilcox, Rand R

    2003-01-01

    Applying Contemporary Statistical Techniques explains why traditional statistical methods are often inadequate or outdated when applied to modern problems. Wilcox demonstrates how new and more powerful techniques address these problems far more effectively, making these modern robust methods understandable, practical, and easily accessible.* Assumes no previous training in statistics * Explains how and why modern statistical methods provide more accurate results than conventional methods* Covers the latest developments on multiple comparisons * Includes recent advanc

  11. Mask strategy at International SEMATECH

    Science.gov (United States)

    Kimmel, Kurt R.

    2002-08-01

    International SEMATECH (ISMT) is a consortium consisting of 13 leading semiconductor manufacturers from around the globe. Its objective is to develop the infrastructure necessary for its member companies to realize the International Technology Roadmap for Semiconductors (ITRS) through efficiencies of shared development resources and knowledge. The largest area of effort is lithography, recognized as a crucial enabler for microelectronics technology progress. Within the Lithography Division, most of the efforts center on mask-related issues. The development strategy at International SEMATCH will be presented and the interlock of lithography projects clarified. Because of the limited size of the mask production equipment market, the business case is weak for aggressive investment commensurate with the pace of the International Technology Roadmap for Semiconductors. With masks becoming the overwhelming component of lithography cost, new ways of reducing or eliminating mask costs are being explored. Will mask technology survive without a strong business case? Will the mask industry limit the growth of the semiconductor industry? Are advanced masks worth their escalating cost? An analysis of mask cost from the perspective of mask value imparted to the user is presented with examples and generic formulas for the reader to apply independently. A key part to the success for both International SEMATECH and the industry globally will be partnerships on both the local level between mask-maker and mask-user, and the macro level where global collaborations will be necessary to resolve technology development cost challenges.

  12. International Marketing Strategies and the relationship with the export performance and export marketing orientation

    Directory of Open Access Journals (Sweden)

    Marlon Dalmoro

    2010-04-01

    Full Text Available This work aims to identify the relationship between marketing strategies of exporting Taquari Valley firms with the export performance and export market orientation. To achieve the goal sought proposed is the development of theoretical benchmark, made up items strategies for international marketing, export performance and export market orientation. In epistemological level was conducted a survey, applying for a questionnaire to a sample of 25 exporting companies that have industrial activities, chosen in a not probabilistic manner. Finally, it was observed that the key decisions on how to act in various markets in terms of strategies for international marketing - satisfaction with the internal market, international consistency, adaptation and localization level of the strategies - have relationship with the export market orientation and the export performance of studied companies.

  13. The social strategy cone: Towards a framework for evaluating social media strategies

    NARCIS (Netherlands)

    Effing, Robin; Spil, Ton A.M.

    2016-01-01

    Social media is growing rapidly. Providing both risks and opportunities for organizations as it does. The social strategy cone is developed for evaluating social media strategies. This framework comprises of seven key elements of social media strategies as based on a systematic literature review and

  14. SIX KEY POINTS FOR ACUPUNCTURE TREATMENT

    Institute of Scientific and Technical Information of China (English)

    付玮

    2004-01-01

    In the present paper, the author puts forward six key points for acupuncture treatment of diseases, namely, ① careful examination, ② definite diagnosis, ③ precise and appropriate identification of syndromes, ④ accurate location of the acupoint, ⑤ flexible application of needling manipulations, and ⑥Deqi". The first three aspects are the foundation, accurate location and flexible needling manipulations are also the prerequisite for effective treatment of diseases. In addition, sound theoretical basic knowledge of both traditional Chinese medicine (TCM) and modern medicine, and flexibly applying suitable needling maneuvers, stimulating quantity and duration of needle retaining in accordance with the concrete state of disease and the patient's conditions are also very important in clinical practice of acupuncture.

  15. Strategie podniku

    OpenAIRE

    BLÁHOVÁ, Iveta

    2008-01-01

    The subject of this bachelor paper was elaboration of a business strategy for selected company. The main purpose was to evaluate the business of the company in order to prepare or change its strategy. Methods used for evalution of the position of the company: financial analysis, analysis of external environment, STEP analysis, SWOT analysis, operating model. All processed information related to periods 2006 and 2007.

  16. Globalization strategy

    OpenAIRE

    SHIMIZU, RYUEI

    1992-01-01

    History of overseas strategies of Japanese firms can be divided into three periods; until 1960's, when import and export were the main focus; from 1970's to the first half of 1980's, when establishing overseas bases was a major interest for clear purposes of reducing labor cost, averting trade conflicts, or securing natural resources; and after 1985, when strategy started to be formulated from more global viewpoint in order to cope with new situation arising from stronger yen and Japan having...

  17. Strategie podniku

    OpenAIRE

    Brabcová, Sanda

    2009-01-01

    The aim of this thesis is to conduct strategic analysis and create a strategy for travel agency Autoturist a.s. Part of the analysis is research on external environment that includes PEST analysis, 4C method and Porter's five forces analysis. Internal environment is explored especilly with financial analysis, analysis of resources and SWOT analysis. Outcome is to propose concrete strategy for selected company.

  18. Geography: Key to World Understanding.

    Science.gov (United States)

    Dando, William A.

    1990-01-01

    Delineates the nature of applied geography, asserting that geography links the natural and social sciences. Underscores geography's role in data analysis and problem solving on a global scale. Traces the discipline's history. Maps geography's status in higher education institutions. Discusses new technologies used by geographers. Summarizes career…

  19. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  20. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory......, is responsible for the report, which is based on literature studies. Post Doc Stefan Krüger Nielsen, Risø National Laboratory, has contributed to parts of the report, including the description of the IEA energyscenarios, the IEA statistics on R&D and the description of the science and technology base of biomass...

  1. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  2. Key Obama officials leave administration

    Science.gov (United States)

    Showstack, Randy

    2013-01-01

    Secretary of the Interior Ken Salazar is one of the latest members of the Obama administration to announce that he is leaving his position near the start of President Obama's second term in office. Salazar, who has served as interior secretary since January 2009, intends to leave the department by the end of March, the department noted on 16 January. Salazar joins a number of other key officials who are planning to leave the administration. They include Environmental Protection Agency administrator Lisa Jackson, National Oceanic and Atmospheric Administration administrator Jane Lubchenco, and U.S. Geological Survey director Marcia McNutt.

  3. The EURATOM Programme - a strategy for the future

    International Nuclear Information System (INIS)

    The EURATOM Framework Programme, implementing R and D actions in the general field of applied nuclear science and technology, is now in its 7th edition. It seeks to maximise Community added value in a key area of research with a long tradition of European excellence. The objectives of the programmes have changed over the years, responding to many trends and developments. In particular, the strategy for the future being laid out now is paving the way for a truly integrative and coordinated programme of R and D in Europe in the areas of nuclear fission and related technologies. The EURATOM programme is instrumental in this drive to establish a widespread and effective European Research Area in this field, and is providing a focal point for many of the initiatives that are currently being witnessed. However, success can only be achieved with the full involvement and support of the key European R and D stakeholder organisations. (author)

  4. Applied chemical engineering thermodynamics

    CERN Document Server

    Tassios, Dimitrios P

    1993-01-01

    Applied Chemical Engineering Thermodynamics provides the undergraduate and graduate student of chemical engineering with the basic knowledge, the methodology and the references he needs to apply it in industrial practice. Thus, in addition to the classical topics of the laws of thermodynamics,pure component and mixture thermodynamic properties as well as phase and chemical equilibria the reader will find: - history of thermodynamics - energy conservation - internmolecular forces and molecular thermodynamics - cubic equations of state - statistical mechanics. A great number of calculated problems with solutions and an appendix with numerous tables of numbers of practical importance are extremely helpful for applied calculations. The computer programs on the included disk help the student to become familiar with the typical methods used in industry for volumetric and vapor-liquid equilibria calculations.

  5. PSYCHOANALYSIS AS APPLIED AESTHETICS.

    Science.gov (United States)

    Richmond, Stephen H

    2016-07-01

    The question of how to place psychoanalysis in relation to science has been debated since the beginning of psychoanalysis and continues to this day. The author argues that psychoanalysis is best viewed as a form of applied art (also termed applied aesthetics) in parallel to medicine as applied science. This postulate draws on a functional definition of modernity as involving the differentiation of the value spheres of science, art, and religion. The validity criteria for each of the value spheres are discussed. Freud is examined, drawing on Habermas, and seen to have erred by claiming that the psychoanalytic method is a form of science. Implications for clinical and metapsychological issues in psychoanalysis are discussed. PMID:27428582

  6. Influence of the Personalization and Codification Strategies on Successful Knowledge Management Case Study: National Iranian Oil Company

    Directory of Open Access Journals (Sweden)

    Roghyeh Nouri

    2013-06-01

    Full Text Available Successful implementation of Knowledge Management (KM involves on identification the most effective associated factors. Hence well-thought-out of organization strategy often is absent in implementing KM. Moreover resource restrictions lead us to prioritize them. Consequently, organizations are looking to prioritize the projects for deploying KM in order to invest on the infrastructural projects based on that. The purpose of this study is on identifying, classifying and ranking the enablers related to four key factors of people, process, leadership and information technology based on two given KM strategies. The quantitative approach was utilized in collecting data through questionnaire. In order to approve and classify the identified enablers in each key factor, a quantitative approach was utilized in collecting data through a few justifiable reliable questionnaires. We designed them using Delphi method and distributed among organization experts. Significant factors extracted from applying an exploratory factor analysis using the SPSS package. In order to prioritize the extracted enabler’s a fuzzy multi-criteria decision making technique is then applied. The results shows that among thirty identified enablers in personalization strategy, twenty seven ones and among the nineteen identified enablers in codification strategy, sixteen of are significant. Accordingly by ranking the factors and enablers in nine management organizations of the National Iranian Oil Company (NIOC, the leadership factor in personalization strategy and also information technology in codification strategy have higher ranks by weighing 0.259 and 0.267respectively.

  7. Key energy technologies for Europe

    International Nuclear Information System (INIS)

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO2 capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  8. Retransmission Steganography Applied

    CERN Document Server

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    This paper presents experimental results of the implementation of network steganography method called RSTEG (Retransmission Steganography). The main idea of RSTEG is to not acknowledge a successfully received packet to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field. RSTEG can be applied to many network protocols that utilize retransmissions. We present experimental results for RSTEG applied to TCP (Transmission Control Protocol) as TCP is the most popular network protocol which ensures reliable data transfer. The main aim of the performed experiments was to estimate RSTEG steganographic bandwidth and detectability by observing its influence on the network retransmission level.

  9. Applied mathematics made simple

    CERN Document Server

    Murphy, Patrick

    1982-01-01

    Applied Mathematics: Made Simple provides an elementary study of the three main branches of classical applied mathematics: statics, hydrostatics, and dynamics. The book begins with discussion of the concepts of mechanics, parallel forces and rigid bodies, kinematics, motion with uniform acceleration in a straight line, and Newton's law of motion. Separate chapters cover vector algebra and coplanar motion, relative motion, projectiles, friction, and rigid bodies in equilibrium under the action of coplanar forces. The final chapters deal with machines and hydrostatics. The standard and conte

  10. Applied statistics with SPSS

    CERN Document Server

    Huizingh, Eelko K R E

    2007-01-01

    Accessibly written and easy to use, Applied Statistics Using SPSS is an all-in-one self-study guide to SPSS and do-it-yourself guide to statistics. Based around the needs of undergraduate students embarking on their own research project, the text's self-help style is designed to boost the skills and confidence of those that will need to use SPSS in the course of doing their research project. The book is pedagogically well developed and contains many screen dumps and exercises, glossary terms and worked examples. Divided into two parts, Applied Statistics Using SPSS covers :

  11. Applied Electromagnetism and Materials

    CERN Document Server

    Moliton, André

    2007-01-01

    Applied Electromagnetism and Materials picks up where the author's Basic Electromagnetism and Materials left off by presenting practical and relevant technological information about electromagnetic material properties and their applications. This book is aimed at senior undergraduate and graduate students as well as researchers in materials science and is the product of many years of teaching basic and applied electromagnetism. Topics range from the spectroscopy and characterization of dielectrics and semiconductors, to non-linear effects and electromagnetic cavities, to ion-beam applications in materials science.

  12. On applying cognitive psychology.

    Science.gov (United States)

    Baddeley, Alan

    2013-11-01

    Recent attempts to assess the practical impact of scientific research prompted my own reflections on over 40 years worth of combining basic and applied cognitive psychology. Examples are drawn principally from the study of memory disorders, but also include applications to the assessment of attention, reading, and intelligence. The most striking conclusion concerns the many years it typically takes to go from an initial study, to the final practical outcome. Although the complexity and sheer timescale involved make external evaluation problematic, the combination of practical satisfaction and theoretical stimulation make the attempt to combine basic and applied research very rewarding.

  13. Introduction to applied thermodynamics

    CERN Document Server

    Helsdon, R M; Walker, G E

    1965-01-01

    Introduction to Applied Thermodynamics is an introductory text on applied thermodynamics and covers topics ranging from energy and temperature to reversibility and entropy, the first and second laws of thermodynamics, and the properties of ideal gases. Standard air cycles and the thermodynamic properties of pure substances are also discussed, together with gas compressors, combustion, and psychrometry. This volume is comprised of 16 chapters and begins with an overview of the concept of energy as well as the macroscopic and molecular approaches to thermodynamics. The following chapters focus o

  14. Teaching International Nursing Students: Challenges and Strategies.

    Science.gov (United States)

    Carty, Rita M.; Hale, Janet F.; Carty, Gina; Williams, Joyce; Rigney, Dawn; Principato, Jerold J.

    1998-01-01

    George Mason University conducted a nursing education program for Saudi students. Cultural differences necessitated creative strategies to accommodate learning. Didactic and clinical methods of knowledge acquisition were used. Communication and flexibility were key elements. (SK)

  15. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  16. 24 CFR 954.103 - Housing strategy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Housing strategy. 954.103 Section... INDIAN HOME PROGRAM Applying for Assistance § 954.103 Housing strategy. Grantees are not required to submit a housing strategy to receive HOME funds. However, the application must demonstrate how...

  17. Motivational Strategies in Medical English Classroom

    Institute of Scientific and Technical Information of China (English)

    TIAN Jun-ying

    2014-01-01

    Objective:To explore strategies to motivate students in the classroom of Medical English. Methods:The motivational strategies applied in medical English classroom including defining course goals early in the semester, appropriate teacher behavior, creating real context and giving helpful and frequent Feedback were recommended. Results & Conclusion: The motivational strategies make a positive impact on students’motivation in medical English classroom.

  18. Zambia : Smallholder Agricultural Commercialization Strategy

    OpenAIRE

    World Bank

    2007-01-01

    This report focuses on the potential and opportunities for smallholder commercialization in Zambia. The paper discusses the framework for Zambia's smallholder commercialization strategy, the current state of smallholder agriculture in Zambia, key issues, support from agribusiness to smallholders, and development of potential and opportunities for smallholder commercialization. The paper co...

  19. Studies on the Synthesis of Morphinan Alkaloid: Preparation of the Key Allylic Silyl Ether Precursor

    Institute of Scientific and Technical Information of China (English)

    Zhen Lei SONG; Yong Qiang TU; Shuan Hu GAO; Yi Jun JIANG; Shu Yu ZHANG

    2005-01-01

    A convergent strategy to the key allylic silyl ether precursor 4 in our synthetic efforts toward morphinan alkaloid is presented. The vital step is the selective 1,2-addition of the organocerium agent of 6 to ketene 5.

  20. Applied Statistics with SPSS

    Science.gov (United States)

    Huizingh, Eelko K. R. E.

    2007-01-01

    Accessibly written and easy to use, "Applied Statistics Using SPSS" is an all-in-one self-study guide to SPSS and do-it-yourself guide to statistics. What is unique about Eelko Huizingh's approach is that this book is based around the needs of undergraduate students embarking on their own research project, and its self-help style is designed to…

  1. Essays on Applied Microeconomics

    Science.gov (United States)

    Mejia Mantilla, Carolina

    2013-01-01

    Each chapter of this dissertation studies a different question within the field of Applied Microeconomics. The first chapter examines the mid- and long-term effects of the 1998 Asian Crisis on the educational attainment of Indonesian children ages 6 to 18, at the time of the crisis. The effects are identified as deviations from a linear trend for…

  2. Assessing control strategies for ground level ozone

    Science.gov (United States)

    Sule, Neelesh Vijay

    2009-12-01

    Developing cost effective control strategies for ozone has been a challenge to air quality modelers. Conventionally, the control strategies are applied across-the board to the region. The main aim of this research was to develop a Decision-Making Framework (DMF) for evaluating and optimizing the selection of ozone control strategies. Conventional across-the-board reductions conduct emission reductions uniformly throughout the region and throughout the day. By contrast, this dissertation studied targeted reductions, in which emission sources of various types are reduced at various times and locations. The proposed DMF comprised of four phases: (1) Initialization, (2) Mining, (3) Metamodeling, and (4) Optimization. This DMF was tested on a DFW 2009 future case episode which was based on a 10-day episode from August 13-22, 1999. 612 emission variables were identified in three source categories viz. point, area (includes non-road) and line (on-road). The emission control regions and time periods along with ozone monitoring regions and time periods were defined. The control strategy emission reductions and costs were also identified in this stage. Initially a Latin hypercube experimental design was setup to organize 30 sets of emission reduction scenarios to be modeled using the photochemical model CAMx. Data mining reduced the number of variables to a maximum of 126. A second Latin hypercube was setup to organize another 30 emission reduction scenarios for the significant variables identified by data mining. Metamodels were developed for ozone from the 60 CAMx runs using linear regression models constructed with the stepwise model selection method. Stepwise regression further reduced the number of variables. The metamodels were implemented in optimization as a surrogate for time-intensive CAMx modeling. Appropriate constraints were calculated for each metamodel to ensure that it satisfied EPA's MAT. The optimization was formulated to find the most cost effective

  3. EVALUATION OF KEY ASPECTS OF PHYTOREMEDIATION APPLIED IN REDUCTION OF POLLUTION IN SOIL AND WATER

    Directory of Open Access Journals (Sweden)

    Glaucia Eliza Gama Vieira

    2011-07-01

    Full Text Available Nowadays, sectors of some areas have been observing with great interest the increasing number of pollutants inthe world. For this reason, the interest for remediation techniques grows, having at this moment a great focus onthe soil. Phytoremediation, that is a technique that uses plants as agents of soil and water decontaminationthrough degradation, volatilization, stimutation, extraction, containment or immobilization of contaminants.. It isan advantageous alternative to the conventional methods of water pumping and treatment and/or physicalremoval of the contaminated soil layer since it allows in situ treatment at feasible costs. Also, after extracting thecontaminant from the soil, the plant stores it for a subsequent treatment, if necessary, or may metabolicallytransform it into products that are less or non-toxic. The article in question consists of a literature review thatcovers the general aspects of phytoremediation, discussing the mechanisms of action, which may reduce theamount of waste and pollutants specific soil and water

  4. Experiments with the hot list strategy

    Energy Technology Data Exchange (ETDEWEB)

    Wos, L.

    1997-10-01

    Experimentation strongly suggests that, for attacking deep questions and hard problems with the assistance of an automated reasoning program, the more effective paradigms rely on the retention of deduced information. A significant obstacle ordinarily presented by such a paradigm is the deduction and retention of one or more needed conclusions whose complexity sharply delays their consideration. To mitigate the severity of the cited obstacle, the author formulates and features in this report the hot list strategy. The hot list strategy asks the researcher to choose, usually from among the input statements, one or more clauses that are conjectured to play a key role for assignment completion. The chosen clauses - conjectured to merit revisiting, again and again - are placed in an input list of clauses, called the hot list. When an automated reasoning program has decided to retain a new conclusion C - before any other clause is chosen to initiate conclusion drawing - the presence of a nonempty hot list (with an appropriate assignment of the input parameter known as heat) causes each inference rule in use to be applied to C together with the appropriate number of members of the hot list. Members of the hot list are used to complete applications of inference rules and not to initiate applications. The use of the hot list strategy thus enables an automated reasoning program to briefly consider a newly retained conclusion whose complexity would otherwise prevent its use for perhaps many CPU-hours. To give evidence of the value of the strategy, the author focuses on four contexts: (1) dramatically reducing the CPU time required to reach a desired goal; (2) finding a proof of a theorem that had previously resisted all but the more inventive automated attempts; (3) discovering a proof that is more elegant than previously known; and (4) answering a question that had steadfastly eluded researchers relying on an automated reasoning program.

  5. Key Issues to Consider in Therapy with Muslim Families.

    Science.gov (United States)

    Weatherhead, Stephen; Daiches, Anna

    2015-12-01

    We present the key issues to consider in therapy with Muslim families. Following a brief introduction, five themes are presented: self, family dynamics, causation, and coping strategies. The section on "self" includes a discussion of three terms which link the four Islamic models of "self" identified through the review. The family dynamics section pays particular attention to interconnectedness, family roles, and gender. Causation is discussed with reference to supernatural and spiritual causes. On the theme of coping strategies, religious responses are discussed as are the roles of religious leaders, and professional mental health services. Clinical implications from the key themes are also discussed in addition to limitations of the published literature in this area. This includes a discussion of the epistemological and paradigmatic issues related to the research. The review concludes by summarising these issues and presenting areas for further research. PMID:25801751

  6. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  7. Astrocytes: Key Regulators of Neuroinflammation.

    Science.gov (United States)

    Colombo, Emanuela; Farina, Cinthia

    2016-09-01

    Astrocytes are crucial regulators of innate and adaptive immune responses in the injured central nervous system. Depending on timing and context, astrocyte activity may exacerbate inflammatory reactions and tissue damage, or promote immunosuppression and tissue repair. Recent literature has unveiled key factors and intracellular signaling pathways that govern astrocyte behavior during neuroinflammation. Here we have re-visited in vivo studies on astrocyte signaling in neuroinflammatory models focusing on evidences obtained from the analysis of transgenic mice where distinct genes involved in ligand binding, transcriptional regulation and cell communication have been manipulated in astrocytes. The integration of in vivo observations with in vitro data clarifies precise signaling steps, highlights the crosstalk among pathways and identifies shared effector mechanisms in neuroinflammation.

  8. Key Aspects of Wave Energy

    DEFF Research Database (Denmark)

    Margheritini, Lucia; Nørgaard, Jørgen Harck

    2012-01-01

    . By collecting the experience from mainly three different wave energy developers, the possible alternative functions (other than energy production) of the devices are describe: Wave Dragon can be effectively used to reduce coastline erosion and/or as mussel farm; the Sea wave Slot cone Generator (SSG) can......Diversification of renewable energy sources is fundamental to ensure sustainability. In this contest, wave energy can provide a substantial contribution as soon as the sector breaks into the market. In order to accelerate shift from a technology to a market focus and reduce technical and non......-technical risks, it is critical to provide comprehensive and reliable information on the technologies without neglecting attractive advantages. It is possible to underline a different key of lecture of wave energy performance by considering efficiency and power production as well as device versatility...

  9. New Weak Keys in RSA

    Institute of Scientific and Technical Information of China (English)

    WANG Baocang; LIU Shuanggen; HU Yupu

    2006-01-01

    The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown that the RSA number n=pq can be easily factored if p and q have the special form of p=as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).

  10. Some keys to reread authority.

    Directory of Open Access Journals (Sweden)

    Edgar Straehle

    2015-12-01

    Full Text Available This article vindicates a rereading of the concept of authority and tries to dissociate this concept from the concept of power in order to undo their identification and thereby the oblivion of the specific nature (or the history of authority. Besides, this rereading must not be confused with an apology of authority but with an exploration about this complicated and ambivalent category. The key point of this distinction lies in that authority, unlike power, depends not on itself but on the other person, the person who acknowledges another one as authority. Therefore, authority can be compatible with freedom and can appear as an exteriority of power, which undermines it or even becomes a counterpower. Hence the logical endeavours of power to monopolize and instrumentalize authority.

  11. A framework for assessing severe accident management strategies

    International Nuclear Information System (INIS)

    Accident management can be defined as the innovative use of existing and or alternative resources, systems and actions to prevent or mitigate a severe accident. Together with risk management (changes in plant operation and/or addition of equipment) and emergency planning (off-site actions), accident management provides an extension of the defense-in-depth safety philosophy for severe accidents. A significant number of probabilistic safety assessments (PSA) have been completed which yield the principal plant vulnerabilities. For each sequence/threat and each combination of strategy there may be several options available to the operator. Each strategy/option involves phenomenological and operational considerations regarding uncertainty. These considerations include uncertainty in key phenomena, uncertainty in operator behavior, uncertainty in system availability and behavior, and uncertainty in available information (i.e., instrumentation). The objective of this project is to develop a methodology for assessing severe accident management strategies given the key uncertainties mentioned above. Based on Decision Trees and Influence Diagrams, the methodology is currently being applied to two case studies: cavity flooding in a PWR to prevent vessel penetration or failure, and drywell flooding in a BWR to prevent containment failure

  12. Export strategy

    DEFF Research Database (Denmark)

    Knudsen, Thorbjørn; Koed Madsen, Tage

    2002-01-01

    It is argued here that traditional export strategy research (encompassing the study of internationalization processes and export performance) is characterized by weak theoretical foundations and could benefit from a reorientation towards a dynamic capabilities perspective (DCP). We seek to draw...... on insights from DCP in order to devise a theoretical basis that could enrich export strategy research. Although our development of DCP insights builds on previous work, it also adds a crucial distinction between knowledge stocks and informational architecture. Changes in architecture are of greater...

  13. Tag Content Access Control with Identity-based Key Exchange

    Science.gov (United States)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  14. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  15. Food waste on the agenda - key factors to be considered

    OpenAIRE

    Kusch, Sigrid

    2013-01-01

    Huge amounts of food waste are generated worldwide. Efficient valorisation strategies ensure that embedded energy and resources are at least partially recuperated. Food waste is a highly biodegradable material with high water content, and as such well destined for biogas production through anaerobic digestion. In order to ensure successful implementation of food waste valorisation via anaerobic digestion, a range of key factors related to the characteristics of the material as well as to more...

  16. Key Success Factors for Organizational Innovation in the Fashion Industry

    OpenAIRE

    Fabio De Felice; Antonella Petrillo

    2013-01-01

    In the current phase of globalization, the fashion industry is an important sector where firm strategies are frequently oriented towards product personalization – more than product customization – with a reduced price. The fashion industry relates to the ability to provide customized products or services through flexible processes in high volume and at a reasonably low cost, which are currently key variables for the fashion supply chain. Performance concepts – which usually refer to three pil...

  17. Security analysis of continuous-variable quantum key distribution scheme

    Institute of Scientific and Technical Information of China (English)

    Zhu Jun; He Guang-Qiang; Zeng Gui-Hua

    2007-01-01

    In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein- Podolsky- Rosen (EPR) pairs is investigated. A new approach for calculating the secret information rate △I is proposed by using the Shannon information theory. Employing an available parameter F which is associated with the entanglement of the EPR pairs, one can detect easily the eavesdropping. Results show that the proposed scheme is secure against individual beam splitter attack strategy with a proper squeeze parameter.

  18. Device calibration impacts security of quantum key distribution

    OpenAIRE

    Jain, Nitin; Wittmann, Christoffer; Lydersen, Lars; Wiechers, Carlos; Elser, Dominique; Marquardt, Christoph; Makarov, Vadim; Leuchs, Gerd

    2011-01-01

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy...

  19. Metacognitive Strategy Training in Reading Comprehension

    Institute of Scientific and Technical Information of China (English)

    DUAN Hai-ping

    2016-01-01

    Despite that language learning strategy (LLS) has been heatedly discussed since its emergence in 1975, its conceptual-ization, categorization and strategy training models are still in dispute. However, what commonly revealed by most studies is that there is a positive correlation between the use of language learning strategy and language learners’performance. This paper applies Dornyei’s classification, known as cognitive strategies, metacognitive strategies, social strategies and affective strate-gies. By reviewing previous studies on the application of metacognitive strategy in English as a second language (ESL) reading comprehension, plenty of useful implications for reading pedagogy are suggested. It further explains how certain important meta-cognitive strategies, namely Semantic Mapping (SM) and Experience-Text-Relationship (ETR), can be implemented in second language reading comprehension, aiming to encourage language learners to be aware of learning strategies,“learn how to learn”(Cohen, 1988, p66)!

  20. Tools For Installing Keys On A Stud

    Science.gov (United States)

    Goodoak, Robert D.

    1995-01-01

    Two tools designed to be used together to drive long locking keys axially to install them on stud. Tools are: supporter holding keys in correct relative alignment and driver having multiple prongs, each of which fits into one of holes in supporter. Tools prevent bending and breaking of keys during installation, and make possible to install all keys simultaneously, in one motion.