WorldWideScience

Sample records for applied key strategies

  1. Subsonic Transonic Applied Refinements By Using Key Strategies - STARBUKS In the NASA Langley Research Center National Transonic Facility

    Science.gov (United States)

    Paryz, Roman W.

    2014-01-01

    Several upgrade projects have been completed at the NASA Langley Research Center National Transonic Facility over the last 1.5 years in an effort defined as STARBUKS - Subsonic Transonic Applied Refinements By Using Key Strategies. This multi-year effort was undertaken to improve NTF's overall capabilities by addressing Accuracy and Validation, Productivity, and Reliability areas at the NTF. This presentation will give a brief synopsis of each of these efforts.

  2. Applied public-key steganography

    Science.gov (United States)

    Guillon, Pierre; Furon, Teddy; Duhamel, Pierre

    2002-04-01

    We consider the problem of hiding information in a steganographic framework, i.e. embedding a binary message within an apparently innocuous content, in order to establish a suspicion-free digital communication channel. The adversary is passive as no intentional attack is foreseen. The only threat is that she discovers the presence of a hidden communication. The main goal of this article is to find if the Scalar Costa Scheme, a recently published embedding method exploiting side information at the encoder, is suitable for that framework. We justify its use assessing its security level with respect to the Cachin's criterion. We derive a public-key stego-system following the ideas of R. Anderson and P. Petitcolas. This technique is eventually applied to PCM audio contents. Experimental performances are detailed in terms of bit-rate and Kullback-Leibler distance.

  3. State Key Laboratory of Applied Organic Chemistry

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    @@The State Key Laboratory of Applied Organic Chemistry (SKLAOC) was founded in 1987 with the approval of the State Planning Commission. Professor Liu Zhongli is the director of the Laboratory and Professor Zhang Lihe, an academician of the Chinese Academy of Sciences, is the chairman of its academic committee. There are 30 faculty members, among them 21 are professors, working in the Laboratory.

  4. Applying Evolutionary Algorithm to Public Key Cryptosystems

    Institute of Scientific and Technical Information of China (English)

    Tu Hang; Li Li; Wu Tao-jun; Li Yuan- xiang

    2003-01-01

    A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi degree parallel evolutionary algorithrn to evaluate synthetically the efficiency and security of the public key cryptography. The model con tributes to designing public key cryptography system too.

  5. Key performance indicators and companies logistic strategy evaluation

    OpenAIRE

    Galyna Tarasiuk; Oleg Rudkivskyi; Оlga Pohaydak

    2013-01-01

    In the article are proposed key performance indicators in company’s logistic strategy evaluation; defined a need to develop key performance indicators in company’s logistic strategy evaluation; disclosed the features of using key performance indicators in company’s logistic activity; proposed stages of key performance indicators system implementation in company’s logistic system; proposed use key performance indicators in accordance with the specific company’s logistic strategy (cost-oriented...

  6. Applied geology as key in modern geothermal exploration

    Science.gov (United States)

    Moeck, I. S.

    2012-12-01

    The renewed interest in geothermal energy resources arises from two major reasons: I) The recent development in Enhanced Geothermal System (EGS) technologies produces tangible pilot projects of future heat and power generation from low-enthalpy resources extending the worldwide geothermal potential, and (II) the political-social request for renewable energy to reduce climate gas emission. This new interest is tied with the question for economic risks and potential of individual geothermal resource types involving feasibility studies and utilization concepts to economically develop geothermal systems. From this perspective it is important to note that a geothermal system is part of a geologic system where geologic factors such as facies, faults, fractures, stress field, diagenesis, rock mechanics, fluid chemistry and geochemistry control key parameters as high porosity and high permeability domains, fluid flow, lateral and vertical temperature gradient, and overall reservoir behavior during injection and production. A site specific appropriate field development should therefore be based on a profound understanding of the geologic controls of a geothermal system involving a suite of modern exploration techniques. Applied geology is the key in this modern concept of geothermal exploration where geology is not only descriptive but also quantitative including 3D geological modeling and parametrisation. From different parts of the world various geothermal systems in both high and low enthalpy environments are described examined with individual exploration strategies. The first example from Western U.S.A. shows how structural geology, 3D geological modeling and surface geochemistry are combined to evidence permeability anisotropy controlled by faults. Another example from Indonesia demonstrates how secondary faults control the subsurface geochemistry and fluid flow in a geothermal system at the Sumatra mega shear zone. More examples from EGS resources in Alberta

  7. Key performance indicators and companies logistic strategy evaluation

    Directory of Open Access Journals (Sweden)

    Galyna Tarasiuk

    2013-11-01

    Full Text Available In the article are proposed key performance indicators in company’s logistic strategy evaluation; defined a need to develop key performance indicators in company’s logistic strategy evaluation; disclosed the features of using key performance indicators in company’s logistic activity; proposed stages of key performance indicators system implementation in company’s logistic system; proposed use key performance indicators in accordance with the specific company’s logistic strategy (cost-oriented, quality-oriented, time-oriented, productivity-oriented and return on investment in logistics oriented, was developed key performance indicators system of in company’s logistic cost-oriented strategy evaluation (proposed four indicators blocks: financial, customer, internal, study and growth components of logistic strategy.

  8. Key Vocabulary Learning Strategies in ESP And EGP Course Books

    Directory of Open Access Journals (Sweden)

    Zahra Akbari

    2015-01-01

    Full Text Available An increasing body of research evidence is showing the advantages of using certain skills and behaviours called language learning strategies in general and vocabulary learning strategies (VLSs in particular in the process of L2 acquisition. University students who require reading English texts in their fields of study have to expand their vocabulary knowledge in a much more efficient way than ordinary ESL/EFL learners.  And ELT course books are a good place to incorporate learner training in this regard. The purpose of this study is to see how vocabulary learning strategies are treated in both the book designer's claims section and the exercises of English for Specific Purposes (ESP course books for students of medicine and para-medicine on the one hand and English for General Purposes (EGP course book used commonly by these students in Isfahan University of Medical Sciences, Isfahan, Iran on the other. In other words, the specified course books were analyzed based on the insights gained from VLS research to gauge the extent to which they have incorporated VLSs and training in using them. These books were published under the supervision of the center for studying and compiling university books in humanities (SAMT. Based on the review of the relevant literature, three key strategies were identified and an analytic framework was devised. The framework was then applied to the course books. It was found that the treatments in the specified course books were deemed unlikely to improve students’ abilities with these important skills and strategies. Keywords: Vocabulary Learning Strategies (VLSs, English for General Purposes (EGP, English for Specific Purposes (ESP, medical course books, paramedical course books, University students

  9. TPM- A KEY STRATEGY FOR PRODUCTIVITY IMPROVEMENT

    Directory of Open Access Journals (Sweden)

    J.S. DUREJA

    2011-02-01

    Full Text Available During high growth era companies are making technical progress in automation and centralization of the plants, which needs large amount of manual work to maintain the automation systems. The strategy of maintaining the equipment of a plant is crucial for the effectiveness of manufacturing. Total productive maintenance (TPM is a maintenance program, which involves concepts for maintaining plant and equipments effectively. In this paper detailed implementation of TPM in the cold rolling plant is discussed. Results achieved are quite encouraging in terms of motivated employees, improvement in overall equipment effectiveness (OEE and reduction in no. of accidents on shop floor.

  10. Key Elements of a Successful Drive toward Marketing Strategy Making

    Science.gov (United States)

    Cann, Cynthia W.; George, Marie A.

    2003-01-01

    A conceptual model is presented that depicts the relationship between an internal marketing function and an organization's readiness to learn. Learning and marketing orientations are identified as components to marketing strategy making. Key organizational functions, including communication and decision-making, are utilized in a framework for…

  11. Applying Learning Strategy Questionnaires: Problems and Possibilities

    Science.gov (United States)

    Schellings, Gonny

    2011-01-01

    This article discusses measuring learning strategies by means of questionnaires. In "multi-method" research, in which think-aloud measures are compared with questionnaires, low or moderate correlations are found. A conclusion often drawn is that learners are not able to verbally report on their learning activities. Alternative explanations concern…

  12. Applying learning strategy questionnaires: problems and possibilities

    NARCIS (Netherlands)

    Schellings, G.

    2011-01-01

    This article discusses measuring learning strategies by means of questionnaires. In ‘multi-method’ research, in which think-aloud measures are compared with questionnaires, low or moderate correlations are found. A conclusion often drawn is that learners are not able to verbally report on their lear

  13. An investigation of DUA caching strategies for public key certificates

    Energy Technology Data Exchange (ETDEWEB)

    Cheung, T.C.

    1993-11-01

    Internet Privacy Enhanced Mail (PEM) provides security services to users of Internet electronic mail. PEM is designed with the intention that it will eventually obtain public key certificates from the X.500 directory service. However, such a capability is not present in most PEM implementations today. While the prevalent PEM implementation uses a public key certificate-based strategy, certificates are mostly distributed via e-mail exchanges, which raises several security and performance issues. In this thesis research, we changed the reference PEM implementation to make use of the X.500 directory service instead of local databases for public key certificate management. The thesis discusses some problems with using the X.500 directory service, explores the relevant issues, and develops an approach to address them. The approach makes use of a memory cache to store public key certificates. We implemented a centralized cache server and addressed the denial-of-service security problem that is present in the server. In designing the cache, we investigated several cache management strategies. One result of our study is that the use of a cache significantly improves performance. Our research also indicates that security incurs extra performance cost. Different cache replacement algorithms do not seem to yield significant performance differences, while delaying dirty-writes to the backing store does improve performance over immediate writes.

  14. The key elements of a comprehensive global mammal conservation strategy.

    Science.gov (United States)

    Rondinini, Carlo; Rodrigues, Ana S L; Boitani, Luigi

    2011-09-27

    A global strategy is necessary to achieve the level of coordination, synergy and therefore optimization of resources to achieve the broad goal of conserving mammals worldwide. Key elements for the development of such a strategy include: an institutional subject that owns the strategy; broad conservation goals, quantitative targets derived from them and appropriate indicators; data on the distribution of species, their threats, the cost-effectiveness of conservation actions; and a set of methods for the identification of conservation priorities. Previous global mammal research investigated phylogeny, extinction risk, and the species and areas that should be regarded as global conservation priorities. This theme issue presents new key elements: an updated Red List Index, a new list of evolutionarily distinct and globally endangered species, new high-resolution mammal distribution models, a global connectivity analysis and scenarios of future mammal distribution based on climate and land-cover change. Area prioritization schemes account for mammalian phylogeny, governance and cost-benefit of measures to abate habitat loss. Three discussion papers lay the foundations for the development of a global unifying mammal conservation strategy, which should not be further deterred by the knowledge gaps still existing.

  15. Applying a gaming approach to IP strategy.

    Science.gov (United States)

    Gasnier, Arnaud; Vandamme, Luc

    2010-02-01

    Adopting an appropriate IP strategy is an important but complex area, particularly in the pharmaceutical and biotechnology sectors, in which aspects such as regulatory submissions, high competitive activity, and public health and safety information requirements limit the amount of information that can be protected effectively through secrecy. As a result, and considering the existing time limits for patent protection, decisions on how to approach IP in these sectors must be made with knowledge of the options and consequences of IP positioning. Because of the specialized nature of IP, it is necessary to impart knowledge regarding the options and impact of IP to decision-makers, whether at the level of inventors, marketers or strategic business managers. This feature review provides some insight on IP strategy, with a focus on the use of a new 'gaming' approach for transferring the skills and understanding needed to make informed IP-related decisions; the game Patentopolis is discussed as an example of such an approach. Patentopolis involves interactive activities with IP-related business decisions, including the exploitation and enforcement of IP rights, and can be used to gain knowledge on the impact of adopting different IP strategies.

  16. "Applied" Aspects of the Drug Resistance Strategies Project

    Science.gov (United States)

    Hecht, Michael L.; Miller-Day, Michelle A.

    2010-01-01

    This paper discusses the applied aspects of our Drug Resistance Strategies Project. We argue that a new definitional distinction is needed to expand the notion of "applied" from the traditional notion of utilizing theory, which we call "applied.1," in order to consider theory-grounded, theory testing and theory developing applied research. We…

  17. Tales from the Field: Search Strategies Applied in Web Searching

    Directory of Open Access Journals (Sweden)

    Soohyung Joo

    2010-08-01

    Full Text Available In their web search processes users apply multiple types of search strategies, which consist of different search tactics. This paper identifies eight types of information search strategies with associated cases based on sequences of search tactics during the information search process. Thirty-one participants representing the general public were recruited for this study. Search logs and verbal protocols offered rich data for the identification of different types of search strategies. Based on the findings, the authors further discuss how to enhance web-based information retrieval (IR systems to support each type of search strategy.

  18. TEACHING ENGINEERING STUDENTS CREATIVITY: A REVIEW OF APPLIED STRATEGIES

    OpenAIRE

    Chunfang Zhou

    2012-01-01

    Recent studies have emphasized the necessity of educating creative engineers. This paper aims to provide a literature review by answering what strategies can be applied to develop creativity in engineering education. As the literature demonstrates, creativity has been studied by a diversity of perspectives such as psychology, social psychology and sociology. Studies on engineering creativity indicate the importance of problem-solving skills for engineers. For developing creativity, strategies...

  19. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Kern, Oliver

    2009-05-25

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  20. The Split-Apply-Combine Strategy for Data Analysis

    Directory of Open Access Journals (Sweden)

    Hadley Wickham

    2011-04-01

    Full Text Available Many data analysis problems involve the application of a split-apply-combine strategy, where you break up a big problem into manageable pieces, operate on each piece independently and then put all the pieces back together. This insight gives rise to a new R package that allows you to smoothly apply this strategy, without having to worry about the type of structure in which your data is stored.The paper includes two case studies showing how these insights make it easier to work with batting records for veteran baseball players and a large 3d array of spatio-temporal ozone measurements.

  1. Recognition: a key retention strategy for the mature nurse.

    Science.gov (United States)

    Bryant-Hampton, Linda; Walton, Ann Marie; Carroll, Tracy; Strickler, Laura

    2010-03-01

    Recognition of staff can be one of the easiest, cost-effective strategies to retain experienced mature nursing staff. The authors discuss the Senior and Generational Excellence initiative that identifies strategies and brings attention to the unique skills and needs of mature professional nurses.

  2. Characteristics of Key Update Strategies for Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Wireless sensor networks offer the advantages of simple and low-resource communication. Challenged by this simplicity and low-resources, security is of particular importance in many cases such as transmission of sensitive data or strict requirements of tamper-resistance. Updating the security keys...... is one of the essential points in security, which restrict the amount of data that may be exposed when a key is compromised. In this paper, we investigate key update methods that may be used in wireless sensor networks, and benefiting from stochastic model checking we derive characteristics...

  3. Recycling: key component of a sustainable development strategy

    Energy Technology Data Exchange (ETDEWEB)

    Clapham, M. [Natural Resources Canada, Mineral and Metal Policy Branch, Ottawa, ON (Canada)

    2001-07-01

    Challenges facing the recycling industry in Canada and elsewhere, some tools, standards and methods that are used to address these challenges and examples of how sustainable development strategies are being incorporated into the corporate business plans of the recycling industry are discussed. Support of senior management, commitment of resources and recognition that implementation of recycling strategies may take several years, are identified as some of the prerequisites to successful implementation of sustainable development strategies. The role government plays in encouraging the changing awareness by industry of the need for balancing environmental, economic and social needs are also reviewed. 10 refs.

  4. Development Strategies for Rural Key Circulation Service Network

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    The rural key circulation service network is an important channel for ensuring agricultural products’entry to market and urban industrial products’entry to rural areas.Through in-depth survey and research,we took a look at development changes and current situations of three circulation service networks,namely,circulation of nondurable consumer goods,circulation of agricultural means of production,and circulation of agricultural products.Based on several key problems in rural circulation service network,such as logistics problem,delivery problem,backward transaction mode,and the last kilometer information,we put forward corresponding development countermeasures.

  5. Collaboration is key for new global tuberculosis strategy.

    Science.gov (United States)

    Migliori, Giovanni Battista; Fleck, Fiona

    2014-05-01

    This month the World Health Assembly discusses the post-2015 global tuberculosis strategy and accompanying set of targets. Giovanni Battista Migliori tells Fiona Fleck how his institute - one of WHO's thousands of partners across the globe - can contribute in future to its implementation, once it is approved.

  6. Keys for successful growth strategies for entrepreneurs after economic crisis

    OpenAIRE

    Georgeta Ilie

    2011-01-01

    Entrepreneurs are important drivers of economic and social progress and change. The paper represents a systematic look inside the growth mechanism of early-stage companies from the perspective of eight different growth strategies for new business enterprises, underlining the opportunities and risks, growth accelerators, and growth challenges.

  7. TEACHING ENGINEERING STUDENTS CREATIVITY: A REVIEW OF APPLIED STRATEGIES

    Directory of Open Access Journals (Sweden)

    Chunfang Zhou

    2012-06-01

    Full Text Available Recent studies have emphasized the necessity of educating creative engineers. This paper aims to provide a literature review by answering what strategies can be applied to develop creativity in engineering education. As the literature demonstrates, creativity has been studied by a diversity of perspectives such as psychology, social psychology and sociology. Studies on engineering creativity indicate the importance of problem-solving skills for engineers. For developing creativity, strategies such as using thinking tools, learning by solving problems and building learning environment conductive to creativity have been suggested in engineering education. Problem-Based Learning (PBL is a good example of fostering creative engineers, so characteristics of PBL, learning cycle in PBL and methods for enhancing group dynamics in PBL are discussed in this paper.

  8. The VERB campaign: applying a branding strategy in public health.

    Science.gov (United States)

    Asbury, Lori D; Wong, Faye L; Price, Simani M; Nolin, Mary Jo

    2008-06-01

    A branding strategy was an integral component of the VERB Youth Media Campaign. Branding has a long history in commercial marketing, and recently it has also been applied to public health campaigns. This article describes the process that the CDC undertook to develop a physical activity brand that would resonate with children aged 9-13 years (tweens), to launch an unknown brand nationally, to build the brand's equity, and to protect and maintain the brand's integrity. Considerations for branding other public health campaigns are also discussed.

  9. Marketing strategy: a key leverage point for dietitians.

    Science.gov (United States)

    Jensen, T G; Brooks, B J

    1981-09-01

    The time is right for planned change in the profession of dietetics. The concept of the nutrition support team offers the clinical dietitian a means of increasing the visibility and effectiveness of dietetic services. Dietitians must take advantage of the renewed interest in nutrition and intervene assertively to improve nutritional care through role expansion. By focusing on a systematic marketing strategy to expand their current role, dietitians can become proactive participants in role change, rather than reactive victims to changes dictated by others. When goals, objectives, and plans are made explicit, definite progress toward desired role changes can be recognized. This case study demonstrates that this change in role is possible within the present state of health case systems and that physicians are willing and even eager to allow dietitians to assume a high degree of responsibility for nutritional care.

  10. Key strategies of hydrogen energy systems for sustainability

    Energy Technology Data Exchange (ETDEWEB)

    Midilli, Adnan [Department of Mechanical Engineering, Faculty of Engineering, Nigde University, Nigde 51100 (Turkey); Dincer, Ibrahim [Faculty of Engineering and Applied Science, University of Ontario Institute of Technology (UOIT), 2000 Simcoe Street North, Oshawa, Ont. (Canada)

    2007-04-15

    Here we conduct a parametric study to investigate the effects of hydrogen energy utilization on the global stability and sustainability. In this regard, in order to derive the hydrogen energy based sustainability ratio, the green energy based sustainability ratio, as developed earlier, is modified to come up with a new parameter, namely ''hydrogen energy utilization ratio through non-fossil fuels''. We take actual historical data from key sources to determine the role of hydrogen energy for sustainability and make some future projections as the road map for hydrogen economy. In addition, an illustrative example on the hydrogen energy based sustainability ratio is presented by considering green energy sources such as solar, wind, hydro and nuclear to make hydrogen economy more environmentally benign and sustainable. It is found that hydrogen energy based global stability and sustainability ratios increase with the rise of hydrogen energy utilization ratio. The best results for hydrogen energy based sustainability ratio are obtained for the highest hydrogen energy impact ratios between 73.33% and 100%. In case of 10% of hydrogen energy utilization ratio, hydrogen based sustainability ratios for year 2010 are, respectively, determined to be 0.21%, 0.23%, 0.25%, 0.27% and 0.29% in 2.92% of hydrogen based global stability ratio by depending on the hydrogen energy impact ratios (=73.33%, 80%, 86.67%, 93.33% and 100%). In case of 20% of hydrogen energy utilization ratio, the hydrogen energy based sustainability ratios are found to be 1.09%, 1.19%, 1.28%, 1.38% and 1.48% in 7.41%, respectively. The results are really encouraging in a way that hydrogen economy appears to be one of the most significant players for better sustainability. (author)

  11. Integrated preclinical photosafety testing strategy for systemically applied pharmaceuticals.

    Science.gov (United States)

    Schümann, Jens; Boudon, Stéphanie; Ulrich, Peter; Loll, Nathalie; Garcia, Déborah; Schaffner, René; Streich, Jeannine; Kittel, Birgit; Bauer, Daniel

    2014-05-01

    Phototoxic properties of systemically applied pharmaceuticals may be the cause of serious adverse drug reactions. Therefore, a reliable preclinical photosafety assessment strategy, combining in vitro and in vivo approaches in a quantitative manner, is important and has not been described so far. Here, we report the establishment of an optimized modified murine local lymph node assay (LLNA), adapted for phototoxicity assessment of systemically applied compounds, as well as the test results for 34 drug candidates in this in vivo photo-LLNA. The drug candidates were selected based on their ability to absorb ultraviolet/visible light and the photo irritation factors (PIFs) determined in the well-established in vitro 3T3 neutral red uptake phototoxicity test. An in vivo phototoxic potential was identified for 13 of these drug candidates. The use of multiple dose levels in the described murine in vivo phototoxicity studies enabled the establishment of no- and/or lowest-observed-adverse-effect levels (NOAELs/LOAELs), also supporting human photosafety assessment. An in vitro-in vivo correlation demonstrated that a drug candidate classified as "phototoxic" in vitro is not necessarily phototoxic in vivo. However, the probability for a drug candidate to cause phototoxicity in vivo clearly correlated with the magnitude of the phototoxicity identified in vitro.

  12. Computational Comminution and Its Key Technologies Applied to Materials Processing Procedure

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new concept named computational comminution is proposed in this paper, which is different from the traditional studies on materials processing procedure such as the study based on theoretic models, the study based on experiment models, which is based on information models. Some key technologies applied to materials processing procedure such as artificial neural networks, fuzzy sets, genetic algorithms and visualization technology are also presented, and a fusing methodology of these new technologies is studied. Application in the cement grinding process of Horomill shows that results in this paper are efficient.

  13. Key strategies for predictive exploration in mature environment: model innovation, exploration technology optimization and information integration

    Institute of Scientific and Technical Information of China (English)

    LIU Liang-ming; PENG Sheng-lin

    2005-01-01

    Prediction has become more and more difficult in mineral exploration, especially in the mature exploration environment such as Tongling copper district. For enhancing predictive discovery of hidden ore deposits in such mature environment, the key strategies which should be adopted include the innovation of the exploration models, application of the advanced exploration techniques and integration of multiple sets of information. The innovation of the exploration models should incorporate the new metallogenic concepts that are based on the geodynamic anatomization. The advanced techniques applied in the mature exploration environment should aim at the speciality and complexity of the geological setting and working environments. The information synthesis is to integrate multiple sets of data for giving a more credible and visual prospectivity map by using the geographic imformation system(GIS) and several mathematical methods, such as weight of evidence and fuzzy logic, which can extract useful information from every set of data as much as possible. Guided by these strategies, a predictive exploration in Fenghuangshan ore field of Tongling copper district was implemented, and a hidden ore deposit was discovered.

  14. Bussines strategy or bussines policy management applied in modern firms

    Directory of Open Access Journals (Sweden)

    Enea, C.

    2010-12-01

    Full Text Available In literature, the term widely used for all action levels of strategic management is that of strategy. For this reason, it is necessary to achieve a differentiation between corporate strategies (typical strategies, business strategies (with policies, operational strategies (business plans and operational strategies (programs and tactics.In the same context, strategies become the basis for the definition and implementation of policies, which differ by time horizon that is lower and their higher intake of detail. The latter are updated permanently, in order to remain set on, realistic, consistent with the changes that occur and detailing in concrete plans and programs as a logical scheme. So, strategic management is that management based on the application of strategies and policies with a view to setting and achieving goals.

  15. Localization Strategies in WSNs as applied to Landslide Monitoring (Invited)

    Science.gov (United States)

    Massa, A.; Robol, F.; Polo, A.; Giarola, E.; Viani, F.

    2013-12-01

    In the last years, heterogeneous integrated smart systems based on wireless sensor network (WSN) technology have been developed at the ELEDIA Research Center of the University of Trento [1]. One of the key features of WSNs as applied to distributed monitoring is that, while the capabilities of each single sensor node is limited, the implementation of cooperative schemes throughout the whole network enables the solution of even complex tasks, as the landslide monitoring. The capability of localizing targets respect to the position of the sensor nodes turns out to be fundamental in those application fields where relative movements arise. The main properties like the target typology, the movement characteristics, and the required localization resolution are different changing the reference scenario. However, the common key issue is still the localization of moving targets within the area covered by the sensor network. Many experiences were preparatory for the challenging activities in the field of landslide monitoring where the basic idea is mostly that of detecting slight soil movements. Among them, some examples of WSN-based systems experimentally applied to the localization of people [2] and wildlife [3] have been proposed. More recently, the WSN backbone as well as the investigated sensing technologies have been customized for monitoring superficial movements of the soil. The relative positions of wireless sensor nodes deployed where high probability of landslide exists is carefully monitored to forecast dangerous events. Multiple sensors like ultrasound, laser, high precision GPS, for the precise measurement of relative distances between the nodes of the network and the absolute positions respect to reference targets have been integrated in a prototype system. The millimeter accuracy in the position estimation enables the detection of small soil modifications and to infer the superficial evolution profile of the landslide. This information locally acquired also

  16. Apply current exponential de Finetti theorem to realistic quantum key distribution

    Science.gov (United States)

    Zhao, Yi-Bo; Yin, Zhen-Qiang

    2014-09-01

    In the realistic quantum key distribution (QKD), Alice and Bob respectively get a quantum state from an unknown channel, whose dimension may be unknown. However, while discussing the security, sometime we need to know exact dimension, since current exponential de Finetti theorem, crucial to the information-theoretical security proof, is deeply related with the dimension and can only be applied to finite dimensional case. Here we address this problem in detail. We show that if POVM elements corresponding to Alice and Bob's measured results can be well described in a finite dimensional subspace with sufficiently small error, then dimensions of Alice and Bob's states can be almost regarded as finite. Since the security is well defined by the smooth entropy, which is continuous with the density matrix, the small error of state actually means small change of security. Then the security of unknown-dimensional system can be solved. Finally we prove that for heterodyne detection continuous variable QKD and differential phase shift QKD, the collective attack is optimal under the infinite key size case.

  17. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  18. Optimization of Key Parameters of Energy Management Strategy for Hybrid Electric Vehicle Using DIRECT Algorithm

    Directory of Open Access Journals (Sweden)

    Jingxian Hao

    2016-11-01

    Full Text Available The rule-based logic threshold control strategy has been frequently used in energy management strategies for hybrid electric vehicles (HEVs owing to its convenience in adjusting parameters, real-time performance, stability, and robustness. However, the logic threshold control parameters cannot usually ensure the best vehicle performance at different driving cycles and conditions. For this reason, the optimization of key parameters is important to improve the fuel economy, dynamic performance, and drivability. In principle, this is a multiparameter nonlinear optimization problem. The logic threshold energy management strategy for an all-wheel-drive HEV is comprehensively analyzed and developed in this study. Seven key parameters to be optimized are extracted. The optimization model of key parameters is proposed from the perspective of fuel economy. The global optimization method, DIRECT algorithm, which has good real-time performance, low computational burden, rapid convergence, is selected to optimize the extracted key parameters globally. The results show that with the optimized parameters, the engine operates more at the high efficiency range resulting into a fuel savings of 7% compared with non-optimized parameters. The proposed method can provide guidance for calibrating the parameters of the vehicle energy management strategy from the perspective of fuel economy.

  19. The framing of politics as strategy and game: a review of concepts, operationalizations and key findings

    NARCIS (Netherlands)

    Aalberg, T.; Strömbäck, J.; de Vreese, C.H.

    2012-01-01

    A key concept in research on the media coverage of politics is the game or strategy frame. Contrasted with coverage of politics as issues, the framing of politics as a strategic game is marked by features such as winning and losing as the central concern and a focus on how candidates or parties are

  20. Particle swarm optimization with random keys applied to the nuclear reactor reload problem

    Energy Technology Data Exchange (ETDEWEB)

    Meneses, Anderson Alvarenga de Moura [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil). Coordenacao dos Programas de Pos-graduacao de Engenharia (COPPE). Programa de Engenharia Nuclear; Fundacao Educacional de Macae (FUNEMAC), RJ (Brazil). Faculdade Professor Miguel Angelo da Silva Santos; Machado, Marcelo Dornellas; Medeiros, Jose Antonio Carlos Canedo; Schirru, Roberto [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil). Coordenacao dos Programas de Pos-graduacao de Engenharia (COPPE). Programa de Engenharia Nuclear]. E-mails: ameneses@con.ufrj.br; marcelo@lmp.ufrj.br; canedo@lmp.ufrj.br; schirru@lmp.ufrj.br

    2007-07-01

    In 1995, Kennedy and Eberhart presented the Particle Swarm Optimization (PSO), an Artificial Intelligence metaheuristic technique to optimize non-linear continuous functions. The concept of Swarm Intelligence is based on the socials aspects of intelligence, it means, the ability of individuals to learn with their own experience in a group as well as to take advantage of the performance of other individuals. Some PSO models for discrete search spaces have been developed for combinatorial optimization, although none of them presented satisfactory results to optimize a combinatorial problem as the nuclear reactor fuel reloading problem (NRFRP). In this sense, we developed the Particle Swarm Optimization with Random Keys (PSORK) in previous research to solve Combinatorial Problems. Experiences demonstrated that PSORK performed comparable to or better than other techniques. Thus, PSORK metaheuristic is being applied in optimization studies of the NRFRP for Angra 1 Nuclear Power Plant. Results will be compared with Genetic Algorithms and the manual method provided by a specialist. In this experience, the problem is being modeled for an eight-core symmetry and three-dimensional geometry, aiming at the minimization of the Nuclear Enthalpy Power Peaking Factor as well as the maximization of the cycle length. (author)

  1. Vocabulary Developing Strategies Applied to Individuals with Hearing Impairments

    Science.gov (United States)

    Karasu, Guzin; Girgin, Umit; Uzuner, Yildiz; Kaya, Zehranur

    2016-01-01

    The general purpose of this research was to investigate the strategies utilized for vocabulary development of ten individuals (first year college students) in Graphic Art Department, School for The Handicapped, Anadolu University with hearing impairment. The reflective and cyclical data were consisted of videotape recordings of the actual lessons,…

  2. Applying change management metaphors to a national e-Health strategy.

    Science.gov (United States)

    Saunders, Chad; Scott, Richard E

    2014-01-01

    Recent attempts at a collective understanding of how to develop an e-Health strategy have addressed the individual organisation, collection of organisations, and national levels. At the national level the World Health Organisation's National eHealth Strategy Toolkit serves as an exemplar that consolidates knowledge in this area, guides practical implementations, and identifies areas for future research. A key implication of this toolkit is the considerable number of organisational changes required to successfully apply their ideas in practice. This study looks critically at the confluence of change management and e-Health strategy using metaphors that underpin established models of change management. Several of Morgan's organisational metaphors are presented (highlighting varied beliefs and assumptions regarding how change is enacted, who is responsible for the change, and guiding principles for that change), and used to provide a framework. Attention is then directed to several prominent models of change management that exemplify one or more of these metaphors, and these theoretical insights are applied to evaluate the World Health Organisation's National eHealth Strategy Toolkit. The paper presents areas for consideration when using the WHO/ITU toolkit, and suggestions on how to improve its use in practice. The goal is to seek insight regarding the optimal sequence of steps needed to ensure successful implementation and integration of e-health into health systems using change management models. No single model, toolkit, or guideline will offer all the needed answers, but clarity around the underlying metaphors informing the change management models being used provides valuable insight so potentially challenging areas can be avoided or mitigated.

  3. Saudi Counter-Terrorism Strategy: Identifying and Applying Lessons Learned

    Science.gov (United States)

    2013-03-01

    Quran and Sunna "Sharia". In Saudi Arabia it was necessary to frame these definitions in the legal framework issued by the legislative authority...fundamentalists”. In his book, Quranic Concept of War, S.K. Malik discusses some key aspects to understanding the religious aspect of terrorism. He says...designed to promote ideals of justice. In Chapter 11 verse 190 [of the Quran ] we have reference to the duty of Muslims to “fight in the cause of God

  4. Key Parameters Estimation and Adaptive Warning Strategy for Rear-End Collision of Vehicle

    Directory of Open Access Journals (Sweden)

    Xiang Song

    2015-01-01

    Full Text Available The rear-end collision warning system requires reliable warning decision mechanism to adapt the actual driving situation. To overcome the shortcomings of existing warning methods, an adaptive strategy is proposed to address the practical aspects of the collision warning problem. The proposed strategy is based on the parameter-adaptive and variable-threshold approaches. First, several key parameter estimation algorithms are developed to provide more accurate and reliable information for subsequent warning method. They include a two-stage algorithm which contains a Kalman filter and a Luenberger observer for relative acceleration estimation, a Bayesian theory-based algorithm of estimating the road friction coefficient, and an artificial neural network for estimating the driver’s reaction time. Further, the variable-threshold warning method is designed to achieve the global warning decision. In the method, the safety distance is employed to judge the dangerous state. The calculation method of the safety distance in this paper can be adaptively adjusted according to the different driving conditions of the leading vehicle. Due to the real-time estimation of the key parameters and the adaptive calculation of the warning threshold, the strategy can adapt to various road and driving conditions. Finally, the proposed strategy is evaluated through simulation and field tests. The experimental results validate the feasibility and effectiveness of the proposed strategy.

  5. Applying medicinal chemistry strategies to understand odorant discrimination

    Science.gov (United States)

    Poivet, Erwan; Peterlin, Zita; Tahirova, Narmin; Xu, Lu; Altomare, Clara; Paria, Anne; Zou, Dong-Jing; Firestein, Stuart

    2016-01-01

    Associating an odorant's chemical structure with its percept is a long-standing challenge. One hindrance may come from the adoption of the organic chemistry scheme of molecular description and classification. Chemists classify molecules according to characteristics that are useful in synthesis or isolation, but which may be of little importance to a biological sensory system. Accordingly, we look to medicinal chemistry, which emphasizes biological function over chemical form, in an attempt to discern which among the many molecular features are most important for odour discrimination. Here we use medicinal chemistry concepts to assemble a panel of molecules to test how heteroaromatic ring substitution of the benzene ring will change the odour percept of acetophenone. This work allows us to describe an extensive rule in odorant detection by mammalian olfactory receptors. Whereas organic chemistry would have predicted the ring size and composition to be key features, our work reveals that the topological polar surface area is the key feature for the discrimination of these odorants. PMID:27040654

  6. Applying medicinal chemistry strategies to understand odorant discrimination.

    Science.gov (United States)

    Poivet, Erwan; Peterlin, Zita; Tahirova, Narmin; Xu, Lu; Altomare, Clara; Paria, Anne; Zou, Dong-Jing; Firestein, Stuart

    2016-04-04

    Associating an odorant's chemical structure with its percept is a long-standing challenge. One hindrance may come from the adoption of the organic chemistry scheme of molecular description and classification. Chemists classify molecules according to characteristics that are useful in synthesis or isolation, but which may be of little importance to a biological sensory system. Accordingly, we look to medicinal chemistry, which emphasizes biological function over chemical form, in an attempt to discern which among the many molecular features are most important for odour discrimination. Here we use medicinal chemistry concepts to assemble a panel of molecules to test how heteroaromatic ring substitution of the benzene ring will change the odour percept of acetophenone. This work allows us to describe an extensive rule in odorant detection by mammalian olfactory receptors. Whereas organic chemistry would have predicted the ring size and composition to be key features, our work reveals that the topological polar surface area is the key feature for the discrimination of these odorants.

  7. Effectiveness of Compensatory Strategies applied to Cognitive impairment in Schizophrenia

    DEFF Research Database (Denmark)

    Hansen, Jens Peter; Østergaard, Birte; Nordentoft, Merete

      Background Between 75% and 85% of patients with schizophrenia have cognitive impairments. The impairments have a negative influence on the patient's ability to maintain work, maintain contact with friends, independent living and living in a social relationship. Compared to treatment as usual......, studies using Cognitive Adaptation Training (CAT), including training of compensatory strategies to sequence patient's adaptive behaviours, have shown improvement in social functioning, decreased relapse, better compliance to medical treatment and increased quality of life. However, no studies, up to now......, have investigated the effect of CAT in younger patients with schizophrenia   Purpose The purpose of this study is to evaluate the effect of CAT in comparison with treatment as usual, focusing on social functions, symptoms, relapse, re-hospitalisation, and quality of life in younger outpatients...

  8. Effectiveness of Compensatory Strategies applied to Cognitive impairment in Schizophrenia

    DEFF Research Database (Denmark)

    Hansen, Jens Peter; Østergaard, Birte; Nordentoft, Merete

    Background Bewteen 75% and 85% of patients with schizophrenia have cognitive impairments. The impairments have a negative influence on the patient's ability to maintain work, maintain contact with friends, independent living and living in a social relationship. Compared to treatment as usual......, studies using Cognitive Adaptation Training (CAT), including training of compensatory strategies to sequence patient's adaptive behaviours, have shown improvement in social functioning, decreased relapse, better compliance to medical treatment and increased quality of life. However, no studies, up to now......, have investigated the effect of CAT in younger patients with schizophrenia     Purpose The purpose of this study is to evaluate the effect of CAT in comparison with treatment as usual, focusing on social functions, symptoms, relapse, re-hospitalisation, and quality of life in younger outpatients...

  9. Constructing a strategy map for banking institutions with key performance indicators of the balanced scorecard.

    Science.gov (United States)

    Wu, Hung-Yi

    2012-08-01

    This study presents a structural evaluation methodology to link key performance indicators (KPIs) into a strategy map of the balanced scorecard (BSC) for banking institutions. Corresponding with the four BSC perspectives (finance, customer, internal business process, and learning and growth), the most important evaluation indicators of banking performance are synthesized from the relevant literature and screened by a committee of experts. The Decision Making Trial and Evaluation Laboratory (DEMATEL) method, a multiple criteria analysis tool, is then employed to determine the causal relationships between the KPIs, to identify the critical central and influential factors, and to establish a visualized strategy map with logical links to improve banking performance. An empirical application is provided as an example. According to the expert evaluations, the three most essential KPIs for banking performance are customer satisfaction, sales performance, and customer retention rate. The DEMATEL results demonstrate a clear road map to assist management in prioritizing the performance indicators and in focusing attention on the strategy-related activities of the crucial indicators. According to the constructed strategy map, management could better invest limited resources in the areas that need improvement most. Although these strategy maps of the BSC are not universal, the research results show that the presented approach is an objective and feasible way to construct strategy maps more justifiably. The proposed framework can be applicable to institutions in other industries as well.

  10. Performance of Differential-Phase-Shift Keying Protocol Applying 1310 nm Up-Conversion Single-Photon Detector

    Institute of Scientific and Technical Information of China (English)

    FENG Chen-Xu; JIAO Rong-Zhen; ZHANG Wen-Han

    2008-01-01

    The performance of the differential-phase-shift keying (DPSK) protocol applying a 1310nm up-conversion single-photon detector is analysed. The error rate and the communication rate as a function of distance for three quantum key distribution protocols, the Bennett-Brassard 1984, the Bennett-Brassard-Mermin 1992, and the DPSK, are presented. Then we compare the performance of these three protocols using the 1310 nm up-conversion detector. We draw the conclusion that the DPSK protocol applying the detector has significant advantage over the other two protocols. Longer transmission distance and lower error rate can be achieved.

  11. New Strategies on Molecular Biology Applied to Microbial Systematics

    Directory of Open Access Journals (Sweden)

    HÖFLING José F.

    1997-01-01

    Full Text Available Systematics is the study of diversity of the organisms and their relationships comprising classification, nomenclature and identification. The term classification or taxonomy means the arrangement of the organisms in groups (rate and the nomenclature is the attribution of correct international scientific names to organisms and identification is the inclusion of unknown strains in groups derived from classification. Therefore, classification for a stable nomenclature and a perfect identification are required previously. The beginning of the new bacterial systematics era can be remembered by the introduction and application of new taxonomic concepts and techniques, from the 50?s and 60?s. Important progress were achieved using numerical taxonomy and molecular taxonomy. Molecular taxonomy, brought into effect after the emergence of the Molecular Biology resources, provided knowledge that comprises systematics of bacteria, in which occurs great evolutionary interest, or where is observed the necessity of eliminating any environmental interference. When you study the composition and disposition of nucleotides in certain portions of the genetic material, you study searching their genome, much less susceptible to environmental alterations than proteins, codified based on it. In the molecular taxonomy, you can research both DNA and RNA, and the main techniques that have been used in the systematics comprise the build of restriction maps, DNA-DNA hybridization, DNA-RNA hybridization, sequencing of DNA sequencing of sub-units 16S and 23S of rRNA, RAPD, RFLP, PFGE etc. Techniques such as base sequencing, though they are extremely sensible and greatly precise, are relatively onerous and impracticable to the great majority of the bacterial taxonomy laboratories. Several specialized techniques have been applied to taxonomic studies of microorganisms. In the last years, these have included preliminary electrophoretic analysis of soluble proteins and isoenzymes

  12. Applying math onto mechanisms: mechanistic knowledge is associated with the use of formal mathematical strategies.

    Science.gov (United States)

    Liu, Allison S; Schunn, Christian D

    2017-01-01

    It is notoriously difficult for people to adaptively apply formal mathematical strategies learned in school to real-world contexts, even when they possess the required mathematical skills. The current study explores whether a problem context's mechanism can act as an "embodied analogy" onto which abstract mathematical concepts can be applied, leading to more frequent use of formal mathematical strategies. Participants were asked to program a robot to navigate a maze and to create a navigation strategy that would work for differently sized robots. We compared the strategy complexity of participants with high levels of mechanistic knowledge about the robot against participants with low levels of mechanistic knowledge about the robot. Mechanistic knowledge was significantly associated with the frequency and complexity of the mathematical strategies used by participants, suggesting that learning to recognize a problem context's mechanism may promote independent mathematical problem solving in applied contexts.

  13. Understanding Individual Problem-Solving Style: A Key to Learning and Applying Creative Problem Solving

    Science.gov (United States)

    Treffinger, Donald J.; Selby, Edwin C.; Isaksen, Scott G.

    2008-01-01

    More than five decades of research and development have focused on making the Creative Problem Solving process and tools accessible across a wide range of ages and contexts. Recent evidence indicates that when individuals, in both school and corporate settings, understand their own style of problem solving, they are able to learn and apply process…

  14. Research on Key Techniques for Video Surveillance System Applied to Shipping Channel Management

    Institute of Scientific and Technical Information of China (English)

    WANG Lin; ZHUANG Yan-bin; ZHENG Cheng-zeng

    2007-01-01

    A video patrol and inspection system is an important part of the government's shipping channel information management. This system is mainly applied to video information gathering and processing as a patrol is carried out. The system described in this paper can preview, edit, and add essential explanation messages to the collected video data. It then transfers these data and messages to a video server for the leaders and engineering and technical personnel to retrieve, play, chart, download or print. Each department of the government will use the system's functions according to that department's mission. The system can provide an effective means for managing the shipping enterprise. It also provides a valuable reference for the modernizing of waterborne shipping.

  15. Research on key techniques of virtual reality applied in mining industry

    Institute of Scientific and Technical Information of China (English)

    LIAO Jun; LU Guo-bin

    2009-01-01

    Based on the applications of virtual reality technology in many fields, introduced the virtual reality technical basic concept, structure type, related technique development, etc., tallied up applications of virtual reality technique in the present mining industry, inquired into core techniques related software and hardware, especially the optimization in the setup of various 3D models technique, and carried out a virtual scene to travel extensively in real-time by stereoscopic manifestation technique and so on. Then it brought forward the solution of virtual reality technique with software and hardware to the mining industry that can satisfy the demand of different aspects and levers. Finally, it show a fine prospect of virtual reality technique applied in the mining industry.

  16. Task shifting: A key strategy in the multipronged approach to reduce maternal mortality in India.

    Science.gov (United States)

    Bhushan, Himanshu; Bhardwaj, Ajey

    2015-10-01

    Task shifting from specialist to nonspecialist doctors (NSDs) is an important strategy that has been implemented in India to overcome the critical shortage of healthcare workers by using the human resources available to serve the vast population, particularly in rural areas. A competency-based training program in comprehensive emergency obstetric care was implemented to train and certify NSDs. Trained NSDs were able to provide key services in maternal health, which contribute toward reductions in maternal morbidity and mortality. The present article provides an overview of the maternal health challenges, shares important steps in program implementation, and shows how challenges can be overcome. The lessons learned from this experience contribute to understanding how task shifting can be used to address large-scale public health issues in low-resource countries and in particular solutions to address maternal health issues.

  17. Strategies and techniques of communication and public relations applied to non-profit sector

    Directory of Open Access Journals (Sweden)

    Ioana – Julieta Josan

    2010-05-01

    Full Text Available The aim of this paper is to summarize the strategies and techniques of communication and public relations applied to non-profit sector.The approach of the paper is to identify the most appropriate strategies and techniques that non-profit sector can use to accomplish its objectives, to highlight specific differences between the strategies and techniques of the profit and non-profit sectors and to identify potential communication and public relations actions in order to increase visibility among target audience, create brand awareness and to change into positive brand sentiment the target perception about the non-profit sector.

  18. Future scientific drilling in the Arctic Ocean: Key objectives, areas, and strategies

    Science.gov (United States)

    Stein, R.; Coakley, B.; Mikkelsen, N.; O'Regan, M.; Ruppel, C.

    2012-04-01

    Past, Present and Future Changes in Arctic Terrestrial and Marine Systems" (Kananaskis, Alberta/Canada, February 2012). During these workshops, key areas and key scientific themes as well as drilling and site-survey strategies were discussed. Major scientific themes for future Arctic drilling will include: - The Arctic Ocean during the transition from greenhouse to icehouse conditions and millennial scale climate changes; - Physical and chemical changes of the evolving Polar Ocean and Arctic gateways; - Impact of Pleistocene/Holocene warming and sea-level rise on upper continental slope and shelf gas hydrates and on shelf permafrost; - Land-ocean interactions; - Tectonic evolution and birth of the Arctic Ocean basin: Arctic ridges, sea floor spreading and global lithosphere processes. When thinking about future Arctic drilling, it should be clearly emphasized that for the precise planning of future Arctic Ocean drilling campaigns, including site selection, evaluation of proposed drill sites for safety and environmental protection, etc., comprehensive site survey data are needed first. This means that the development of a detailed site survey strategy is a major challenge for the coming years. Here, an overview of perspectives and plans for future Arctic Ocean drilling will be presented.

  19. Metacognitive Strategies Applied during Correcting Text-Related Answers of Three Students with Hearing Loss

    Science.gov (United States)

    Uzuner, Yildiz

    2008-01-01

    The purpose of this paper is to describe the metacognitive strategies applied during the controlling-correcting activities of three hearing-impaired youths' written answers to text-related questions. The data have been derived from a pilot action research effort. The research journal, students' portfolios, archival information, interviews, surveys…

  20. A sampling strategy for high-dimensional spaces applied to free-form gravitational lensing

    Science.gov (United States)

    Lubini, Mario; Coles, Jonathan

    2012-10-01

    We present a novel proposal strategy for the Metropolis-Hastings algorithm designed to efficiently sample general convex polytopes in 100 or more dimensions. This improves upon previous sampling strategies used for free-form reconstruction of gravitational lenses, but is general enough to be applied to other fields. We have written a parallel implementation within the lens modelling framework GLASS. Testing shows that we are able to produce uniform uncorrelated random samples which are necessary for exploring the degeneracies inherent in lens reconstruction.

  1. A Sampling Strategy for High-Dimensional Spaces Applied to Free-Form Gravitational Lensing

    CERN Document Server

    Lubini, Mario

    2012-01-01

    We present a novel proposal strategy for the Metropolis-Hastings algorithm designed to efficiently sample general convex polytopes in 100 or more dimensions. This improves upon previous sampling strategies used for free-form reconstruction of gravitational lenses, but is general enough to be applied to other fields. We have written a parallel implementation within the lens modeling framework GLASS. Testing shows that we are able to produce uniform uncorrelated random samples which are necessary for exploring the degeneracies inherent in lens reconstruction.

  2. Resilience Analysis of Key Update Strategies for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Severe resource limitations in certain types of networks lead to various open issues in security. Since such networks usually operate in unattended or hostile environments, revoking the cryptographic keys and establishing (also distributing) new keys – which we refer to as key update – is a criti...

  3. Performance Analysis of Data-Driven and Model-Based Control Strategies Applied to a Thermal Unit Model

    Directory of Open Access Journals (Sweden)

    Cihan Turhan

    2017-01-01

    Full Text Available The paper presents the design and the implementation of different advanced control strategies that are applied to a nonlinear model of a thermal unit. A data-driven grey-box identification approach provided the physically–meaningful nonlinear continuous-time model, which represents the benchmark exploited in this work. The control problem of this thermal unit is important, since it constitutes the key element of passive air conditioning systems. The advanced control schemes analysed in this paper are used to regulate the outflow air temperature of the thermal unit by exploiting the inflow air speed, whilst the inflow air temperature is considered as an external disturbance. The reliability and robustness issues of the suggested control methodologies are verified with a Monte Carlo (MC analysis for simulating modelling uncertainty, disturbance and measurement errors. The achieved results serve to demonstrate the effectiveness and the viable application of the suggested control solutions to air conditioning systems. The benchmark model represents one of the key issues of this study, which is exploited for benchmarking different model-based and data-driven advanced control methodologies through extensive simulations. Moreover, this work highlights the main features of the proposed control schemes, while providing practitioners and heating, ventilating and air conditioning engineers with tools to design robust control strategies for air conditioning systems.

  4. Research strategy for developing key information on bromate's mode of action.

    Science.gov (United States)

    Bull, Richard J; Cottruvo, Joseph A

    2006-04-17

    Bromate is produced when ozone is used to treat waters that contain trace amounts of bromide ion. It is also a contaminant of hypochlorite solutions produced by electrolysis of salt that contains bromide. Both ozone and hypochlorite are extensively used to disinfect drinking water, a process that is credited with reducing the incidence of waterborne infections diseases around the world. In studies on experimental animals, bromate has been consistently demonstrated to induce cancer, although there is evidence of substantial species differences in sensitivity (rat>mouse>hamster). There are no data to indicate bromate is carcinogenic in humans. An issue that is critical to the continued use of ozone as a disinfectant for drinking water in bromide-containing waters depends heavily on whether current predictions of carcinogenic risk based on carcinogenic responses in male rats treated with bromate are accurate at the much lower exposure levels of humans. Thiol-dependent oxidative damage to guanine in DNA is a plausible mode of action for bromate-induced cancer. However, other mechanisms may contribute to the response, including the accumulation of alpha2u-globulin in the kidney of the male rat. To provide direction to institutions that have an interest in clarifying the toxicological risks that bromate in drinking water might pose, a workshop funded by the Awwa Research Foundation was convened to lay out a research strategy that, if implemented, could clarify this important public health issue. The technical issues that underlie the deliberations of the workshop are provided in a series of technical papers. The present manuscript summarizes the conclusions of the workgroup with respect to the type and timing of research that should be conducted. The research approach is outlined in four distinct phases that lay out alternative directions as the research plan is implemented. Phase I is designed to quantify pre-systemic degradation, absorption, distribution, and

  5. IMPROVING STUDENTS’ SKIMMING AND SCANNING IN READING SKILL BY APPLYING METACOGNITIVE STRATEGY

    Directory of Open Access Journals (Sweden)

    Siti Mariam

    2016-07-01

    Full Text Available Reading is one of the main four language skills that a learner needs to master in order to ensure success in learning English. To facilitate students in comprehending a text, the effective strategies should be used. One of the strategies is Meta-cognitive strategies. The objectives of the research are to identify students’ responses during learned process by using Meta-cognitive strategies and to investigate how high students’ improvement of skimming and scanning reading skill after learned by using Meta-cognitive strategies in recount text. Meta-cognitive strategies improve students to reflect on thought processes and to plan, monitor, and evaluate aspects of their learning. The participants were third semester of English department students of Islamic Education and Teacher Training Faculty of Walisongo State Islamic University.The reserch design was Classroom Action Research with 1 preliminary cycle and 2 cycles. This research was conducted from March, 2th 2015 until March, 21th 2015. Data collection technique was tests. Observations were done in each cycle. Tests form was given the students, they should answer 20 questions of multiple choice test. Then, the data were analyzed using mean (descriptive statistics to find out the improvements. Meta-cognitive strategies were applied in the teaching learning process by giving plan (giving task for students, monitoring, evaluating, and problem solving to the students. After collecting the data, the result showed the improvements of the students. Students’ average score in pre cycle test was 60. In the first cycle, the average score increased became 70. This score hadn’t met the minimum standard score yet 75. Therefore, second cycle was conducted. Students’ average score increased became 82.16. Students’ engagements also increased since the first cycle. Consequently, the objectives were reached. Based on the result, it could be concluded that Meta-cognitive strategy can improve the

  6. Self-Regulated Learning Strategies Applied to Undergraduate, Graduate and Specialization Students from Civil Engineering

    Directory of Open Access Journals (Sweden)

    Jose Carlos Redaelli

    2013-03-01

    Full Text Available The current demand for civil engineering work requires new skills and knowledge and calls for new and effective learning methods. This paper shows self-regulated learning strategies applied to undergraduate, graduate and specialization students from Civil Engineering in a Brazilian University. A Scale of Evaluation of Learning Strategies was administered with a view to identifying students´ cognitive, metacognitive and dysfunctional learning strategies.

  7. How Do Deaf Children with and without Cochlear Implants Manage to Read Sentences: The Key Word Strategy

    Science.gov (United States)

    Domínguez, Ana-Belén; Carrillo, María-Soledad; González, Virginia; Alegria, Jesús

    2016-01-01

    The aim of this study is to examine the mechanisms used by deaf children with and without cochlear implants (CIs) to read sentences and the linguistic bases (vocabulary and syntax) underlying those reading mechanisms. Previous studies have shown that deaf persons read sentences using the key word strategy (KWS), which consists of identifying some…

  8. Eliminating health disparities through culturally and linguistically centered integrated health care: consensus statements, recommendations, and key strategies from the field.

    Science.gov (United States)

    Sanchez, Katherine; Chapa, Teresa; Ybarra, Rick; Martinez, Octavio N

    2014-05-01

    This report is the outcome of an expert consensus meeting sponsored by the United States Deparment of Health and Human Services Office of Minority Health, which was convened to formulate consensus statements, provide recommendations and identify key strategies from practice for implementing integrated health and behavioral health care intended to improve health status for underserved populations.

  9. Songbirds and humans apply different strategies in a sound sequence discrimination task

    Directory of Open Access Journals (Sweden)

    Yoshimasa eSeki

    2013-07-01

    Full Text Available The abilities of animals and humans to extract rules from sound sequences have previously been compared using observation of spontaneous responses and conditioning techniques. However, the results were inconsistently interpreted across studies possibly due to methodological and/or species differences. Therefore, we examined the strategies for discrimination of sound sequences in Bengalese finches and humans using the same protocol. Birds were trained on a GO/NOGO task to discriminate between two categories of sound stimulus generated based on an AAB or ABB rule. The sound elements used were taken from a variety of male (M and female (F calls, such that the sequences could be represented as MMF and MFF. In test sessions, FFM and FMM sequences, which were never presented in the training sessions but conformed to the rule, were presented as probe stimuli. The results suggested two discriminative strategies were being applied: 1 memorizing sound patterns of either GO or NOGO stimuli and generating the appropriate responses for only those sounds; and 2 using the repeated element as a cue. There was no evidence that the birds successfully extracted the abstract rule (i.e. AAB and ABB; MMF-GO subjects did not produce a GO response for FFM and vice versa. Next we examined whether those strategies were also applicable for human participants on the same task. The results and questionnaires revealed that participants extracted the abstract rule, and most of them employed it to discriminate the sequences. This strategy was never observed in bird subjects, although some participants used strategies similar to the birds when responding to the probe stimuli. Our results showed that the human participants applied the abstract rule in the task even without instruction but Bengalese finches did not, thereby reconfirming that humans have to extract abstract rules from sound sequences that is distinct from non-human animals.

  10. Shikimic acid production in Escherichia coli: From classical metabolic engineering strategies to omics applied to improve its production

    Directory of Open Access Journals (Sweden)

    Juan Andrés Martínez

    2015-09-01

    Full Text Available Shikimic acid (SA is an intermediate of the SA pathway that is present in bacteria and plants. SA has gained great interest because it is a precursor in the synthesis of the drug oseltamivir phosphate (OSF, an efficient inhibitor of the neuraminidase enzyme of diverse seasonal influenza viruses, the avian influenza virus H5N1, and the human influenza virus H1N1. For the purposes of OSF production, SA is extracted from the pods of Chinese star anise plants (Illicium spp., yielding up to 17% of SA (dry basis content. The high demand for OSF necessary to manage a major influenza outbreak is not adequately met by industrial production using SA from plants sources. As the SA pathway is present in the model bacteria Escherichia coli, several intuitive metabolically engineered strains have been applied for its successful overproduction by biotechnological processes, resulting in strains producing up to 71 g/L of SA, with high conversion yields of up to 0.42 (mol SA/mol Glc, in both batch and fed-batch cultures using complex fermentation broths, including glucose as a carbon source and yeast extract. Global transcriptomic analyses have been performed in SA producing strains, resulting in the identification of possible key target genes for the design of a rational strain improvement strategy. Because possible target genes are involved in the transport, catabolism and interconversion of different carbon sources and metabolic intermediates outside the central carbon metabolism and SA pathways, as genes involved in diverse cellular stress responses, the development of rational cellular strain improvement strategies based on omics data constitutes a challenging task to improve SA production in currently overproducing engineered strains. In this review, we discuss the main metabolic engineering strategies that have been applied for the development of efficient SA producing strains, as the perspective of omics analysis has focused on further strain improvement

  11. Microorganisms in heavy metal bioremediation: strategies for applying microbial-community engineering to remediate soils

    Directory of Open Access Journals (Sweden)

    Jennifer L. Wood

    2016-06-01

    Full Text Available The remediation of heavy-metal-contaminated soils is essential as heavy metals persist and do not degrade in the environment. Remediating heavy-metal-contaminated soils requires metals to be mobilized for extraction whilst, at the same time, employing strategies to avoid mobilized metals leaching into ground-water or aquatic systems. Phytoextraction is a bioremediation strategy that extracts heavy metals from soils by sequestration in plant tissues and is currently the predominant bioremediation strategy investigated for remediating heavy-metal-contaminated soils. Although the efficiency of phytoextraction remains a limiting feature of the technology, there are numerous reports that soil microorganisms can improve rates of heavy metal extraction.This review highlights the unique challenges faced when remediating heavy-metal-contaminated soils as compared to static aquatic systems and suggests new strategies for using microorganisms to improve phytoextraction. We compare how microorganisms are used in soil bioremediation (i.e. phytoextraction and water bioremediation processes, discussing how the engineering of microbial communities, used in water remediation, could be applied to phytoextraction. We briefly outline possible approaches for the engineering of soil communities to improve phytoextraction either by mobilizing metals in the rhizosphere of the plant or by promoting plant growth to increase the root-surface area available for uptake of heavy metals. We highlight the technological advances that make this research direction possible and how these technologies could be employed in future research.

  12. Restoration of natural capital: a key strategy on the path to sustainability

    NARCIS (Netherlands)

    Blignaut, J.N.; Aronson, J.; Groot, de R.S.

    2014-01-01

    Three intertwining braids or strategies to enable transition towards sustainability can be identified, namely: (i) appropriate sustainable technologies, (ii) revising behaviour including reproduction and consumption patterns, and (iii) investment in the restoration of natural capital (RNC). Less exp

  13. Implementing Key Strategies for Successful Network Integration in the Quebec Substance-Use Disorders Programme

    Directory of Open Access Journals (Sweden)

    Marie-Josée Fleury

    2016-04-01

    Full Text Available Background: Fragmentation and lack of coordination often occur among organisations offering treatment for individuals with substance-use disorders. Better integration from a system perspective within a network of organisations offering substance-use disorder services can be developed using various integration strategies at the administrative and clinical levels. This study aims to identify integration strategies implemented in Quebec substance-use disorder networks and to assess their strengths and limitations. Methods: A total of 105 stakeholders representing two regions and four local substance-use disorder networks participated in focus groups or individual interviews. Thematic qualitative and descriptive quantitative analyses were conducted. Results: Six types of service integration strategies have been implemented to varying degrees in substance-use disorder networks. They are: 1 coordination activities-governance, 2 primary-care consolidation models, 3 information and monitoring management tools, 4 service coordination strategies, 5 clinical evaluation tools and 6 training activities. Conclusion: Important investments have been made in Quebec for the training and assessment of individuals with substance-use disorders, particularly in terms of support for emergency room liaison teams and the introduction of standardised clinical evaluation tools. However, the development of integration strategies was insufficient to ensure the implementation of successful networks. Planning, consolidation of primary care for substance-use disorders and systematic implementation of various clinical and administrative integration strategies are needed in order to ensure a better continuum of care for individuals with substance-use disorders.

  14. A New Hybrid Forecasting Strategy Applied to Mean Hourly Wind Speed Time Series

    Directory of Open Access Journals (Sweden)

    Stylianos Sp. Pappas

    2014-01-01

    Full Text Available An alternative electric power source, such as wind power, has to be both reliable and autonomous. An accurate wind speed forecasting method plays the key role in achieving the aforementioned properties and also is a valuable tool in overcoming a variety of economic and technical problems connected to wind power production. The method proposed is based on the reformulation of the problem in the standard state space form and on implementing a bank of Kalman filters (KF, each fitting an ARMA model of different order. The proposed method is to be applied to a greenhouse unit which incorporates an automatized use of renewable energy sources including wind speed power.

  15. [Social marketing: applying commercial strategies to the prevention of nosocomial infections].

    Science.gov (United States)

    Sax, Hugo; Longtin, Yves; Alvarez-Ceyssat, Raymonde; Bonfillon, Chantal; Cavallero, Sabrina; Dayer, Pierre; Ginet, Claude; Herrault, Pascale

    2009-04-01

    Although a large proportion of healthcare-associated infections are avoidable, healthcare workers do not always practice evidence-based preventive strategies. Marketing technologies might help to improve patient safety. This article presents the basic principles of marketing and its potential use to promote good infection control practices. The marketing mix (Product, Price, Place, and Promotion) should be taken into account to induce behaviour change. By placing the emphasis on the perceived "profits" for healthcare workers the approach might lose its moral aspect and gain in effectiveness. VigiGerme, a non-commercial registered trademark, applies social marketing techniques to infection control and prevention.

  16. Achieving synergy between strategy and innovation: The key to value creation

    Directory of Open Access Journals (Sweden)

    Dobni, C.B.

    2010-01-01

    Full Text Available An innovation perspective provides an unencumbered clean sheet view of the future, as it is only concerned with what opportunities lie ahead. It prompts the organization to consider the question of 'what future state do we want to achieve?' as opposed to the orchestrated approaches of strategic planning that promotes incrementalism. The perspective chosen will often determine whether an organization is a competitive innovator and competitive imitator. In today's economic environment, organizations are required to create differentiable value. To do so requires a certain synergy between strategy and innovation. This article outlines the importance of innovation, but more importantly discusses the relationship between strategy and innovation. It argues that strategic innovation is logical, yet strategy and innovation are quite different, both in terms of definition and function. These differences are identified, and approaches to achieving synergy are outlined.

  17. On the Data Mining Technology Applied to Active Marketing Model of International Luxury Marketing Strategy in China— An Empirical Analysis

    Directory of Open Access Journals (Sweden)

    Qishen Zhou

    2013-09-01

    Full Text Available  This paper emphasizes the importance of active marketing in the customer relationship management. Especially, the data mining technology is applied to establish an active marketing model to empirically analyze the condition of the AH Jewelry Company. Michael Porter's Five Forces Model is employed to assess and calculate the similarity in the active marketing model. Then, the questionnaire analysis on the customer relationship management model is carried out to explain the target market and target customer groups of AH Jewelry Company. The cluster analysis and principal component analysis (PCA are applied as data mining tool to investigate factors and problems that influence marketing effect of the AH Jewelry Company. The analysis results show that it becomes a key problem to enhance the customer loyalty and retain the customers under the changeable consumption environment. Data mining technology can help to analyze the historical data to produce the clients set which is most closed to the customer behaviors, and regards the most interesting information as the recommendation to the customers. Hence, marketing optimization strategy could be proposed as reference to manage the luxury marketing.

  18. A model ternary heparin conjugate by direct covalent bond strategy applied to drug delivery system.

    Science.gov (United States)

    Wang, Ying; Xin, Dingcheng; Hu, Jiawen; Liu, Kaijian; Pan, Jiangao; Xiang, Jiannan

    2009-01-01

    A model ternary heparin conjugate by direct covalent bond strategy has been developed, in which modified heparin using active mix anhydride as intermediate conjugates with model drug molecule and model specific ligand, respectively. Designed ester bonds between model drug and heparin facilitate hydrolysis kinetics research. The strategy can be extended to design and synthesize a targeted drug delivery system. The key point is to use mixed anhydride groups as activating intermediates to mediate the synthesis of the ternary heparin conjugate. Formation of mixed anhydride is detected by the conductimetry experiment. The ternary heparin conjugate is characterized by (13)C NMR, FT-IR and GPC, respectively. The decreased trend on degree of substitution (DS) is consistent with that of introduced anticancer drug and specific ligand in drug delivery system. Moreover, their anticoagulant activity is evaluated by measuring activated partial thromboplastin time (APTT) and anti-factor Xa activity. The results show that model ternary heparin conjugate with reduced anticoagulant activity may avoid the risk of severe hemorrhagic complication during the administration and is potential to develop a safe and effective drug delivery system on anticancer research.

  19. The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

    Science.gov (United States)

    2003-02-01

    other buildings known as telecom hotels , collocation sites, or peering points instead of laying down new cable. ISPs also gravitated to these...and formalize responsibilities for assuring the security of mail transiting U.S. borders, both inbound and outbound (e.g., between the USPS and U.S...of government and commerce. The sites and structures that make up this key asset cate- gory typically draw large amounts of tourism and frequent

  20. Evaluating nest supplementation as a recovery strategy for the endangered rodents of the Florida Keys

    Science.gov (United States)

    Cove, Michael V.; Simons, Theodore R.; Gardner, Beth; Maurer, Andrew S.; O'Connell, Allan F.

    2016-01-01

    The Key Largo woodrat (Neotoma floridana smalli) and Key Largo cotton mouse (Peromyscus gossypinus allapaticola) are federally endangered subspecies endemic to the tropical hardwood hammocks of Key Largo, Florida. Woodrats are considered generalists in habitat and diet, yet a steady decline in natural stick nests and capture rates over the past several decades suggests that they are limited by the availability of nesting habitat due to habitat loss and fragmentation. The more specialized Key Largo cotton mouse appears to rely on old growth hammock, a habitat type that is rare following past land clearing. In 2004, the U.S. Fish and Wildlife Service started building supplemental nest structures to restore habitat quality and connectivity for these endangered rodents, but nest use requires evaluation. We used camera traps and occupancy models to evaluate the factors influencing woodrat and cotton mouse use of the supplemental nests. We detected woodrats at 65 and cotton mice at 175 of 284 sampled nest structures, with co-occurrence at 38 nests. Woodrat nest use followed a gradient from low nest use in the north to high nest use in the south, which might relate to the proximity of free-ranging domestic cat (Felis catus) colonies in residential developments. Cotton mouse nest use, however, was related positively to mature hammock and related negatively to disturbed areas (e.g. scarified lands). The two species occurred independently of each other. Stick-stacking behavior was observed at supplemental nests and, although it was correlated with detection of woodrats, it was not a strong predictor of their occurrence. We suggest that nest supplementation can be an important tool for species recovery as habitat quality continues to improve with succession.

  1. Contextualising change through a common strategy: Lecturers' perceptions and key role in supporting academic reform

    Science.gov (United States)

    Kindelan, Paz; Martin, Ana

    2014-05-01

    European universities are currently going through a process of change in order to meet the common goals set for higher education by the European Commission. They are revising their educational models to adjust them to the guidelines of the "Bologna Process" and are devising an institutional strategy for its implementation. In practical terms, this means aligning former national degrees and diplomas to standard European Bachelor and Masters degrees and PhD doctorates, by creating acknowledged professional qualification benchmarks that also include adjusted course lengths and contents. This process, in the end, mostly affects academic staff members who have a fundamental role to play in carrying out the pedagogical reforms on the teaching front. Besides presenting a commentary on the institutional approach of one particular technical university in Spain, the purpose of this paper is to propose, from the authors' point of view as lecturers, a strategy which has the potential to create a favourable atmosphere for carrying out such a reform. The article's main objective is to highlight a series of action points which may serve to reinforce and advance the main institutional strategy by relying on the powerful influence of its academic staff members.

  2. DSC: software tool for simulation-based design of control strategies applied to wastewater treatment plants.

    Science.gov (United States)

    Ruano, M V; Ribes, J; Seco, A; Ferrer, J

    2011-01-01

    This paper presents a computer tool called DSC (Simulation based Controllers Design) that enables an easy design of control systems and strategies applied to wastewater treatment plants. Although the control systems are developed and evaluated by simulation, this tool aims to facilitate the direct implementation of the designed control system to the PC of the full-scale WWTP (wastewater treatment plants). The designed control system can be programmed in a dedicated control application and can be connected to either the simulation software or the SCADA of the plant. To this end, the developed DSC incorporates an OPC server (OLE for process control) which facilitates an open-standard communication protocol for different industrial process applications. The potential capabilities of the DSC tool are illustrated through the example of a full-scale application. An aeration control system applied to a nutrient removing WWTP was designed, tuned and evaluated with the DSC tool before its implementation in the full scale plant. The control parameters obtained by simulation were suitable for the full scale plant with only few modifications to improve the control performance. With the DSC tool, the control systems performance can be easily evaluated by simulation. Once developed and tuned by simulation, the control systems can be directly applied to the full-scale WWTP.

  3. Prediction of key genes in ovarian cancer treated with decitabine based on network strategy.

    Science.gov (United States)

    Wang, Yu-Zhen; Qiu, Sheng-Chun

    2016-06-01

    The objective of the present study was to predict key genes in ovarian cancer before and after treatment with decitabine utilizing a network approach and to reveal the molecular mechanism. Pathogenic networks of ovarian cancer before and after treatment were identified based on known pathogenic genes (seed genes) and differentially expressed genes (DEGs) detected by Significance Analysis of Microarrays (SAM) method. A weight was assigned to each gene in the pathogenic network and then candidate genes were evaluated. Topological properties (degree, betweenness, closeness and stress) of candidate genes were analyzed to investigate more confident pathogenic genes. Pathway enrichment analysis for candidate and seed genes were conducted. Validation of candidate gene expression in ovarian cancer was performed by reverse transcriptase-polymerase chain reaction (RT-PCR) assays. There were 73 nodes and 147 interactions in the pathogenic network before treatment, while 47 nodes and 66 interactions after treatment. A total of 32 candidate genes were identified in the before treatment group of ovarian cancer, of which 16 were rightly candidate genes after treatment and the others were silenced. We obtained 5 key genes (PIK3R2, CCNB1, IL2, IL1B and CDC6) for decitabine treatment that were validated by RT-PCR. In conclusion, we successfully identified 5 key genes (PIK3R2, CCNB1, IL2, IL1B and CDC6) and validated them, which provides insight into the molecular mechanisms of decitabine treatment and may be potential pathogenic biomarkers for the therapy of ovarian cancer.

  4. The time-efficiency principle: time as the key diagnostic strategy in primary care.

    Science.gov (United States)

    Irving, Greg; Holden, John

    2013-08-01

    The test and retest opportunity afforded by reviewing a patient over time substantially increases the total gain in certainty when making a diagnosis in low-prevalence settings (the time-efficiency principle). This approach safely and efficiently reduces the number of patients who need to be formally tested in order to make a correct diagnosis for a person. Time, in terms of observed disease trajectory, provides a vital mechanism for achieving this task. It remains the best strategy for delivering near-optimal diagnoses in low-prevalence settings and should be used to its full advantage.

  5. Overcoming drug crystallization in electrospun fibers--Elucidating key parameters and developing strategies for drug delivery.

    Science.gov (United States)

    Seif, Salem; Franzen, Lutz; Windbergs, Maike

    2015-01-15

    For the development of novel therapeutics, uncontrolled crystallization of drugs within delivery systems represents a major challenge. Especially for thin and flexible polymeric systems such as oral films or dermal wound dressings, the formation and growth of drug crystals can significantly affect drug distribution and release kinetics as well as physical storage stability. In this context, electrospinning was introduced as a fabrication technique with the potential to encapsulate drugs within ultrafine fibers by rapid solvent evaporation overcoming drug crystallization during fabrication and storage. However, these effects could so far only be shown for specific drug-polymer combinations and an in-depth understanding of the underlying processes of drug-loaded fiber formation and influencing key parameters is still missing. In this study, we systematically investigated crystal formation of caffeine as a model drug in electrospun fibers comparing different polymers. The solvent polarity was found to have a major impact on the drug crystal formation, whereas only a minor effect was attributed to the electrospinning process parameters. Based on an in-depth understanding of the underlying processes determining drug crystallization processes in electrospun fibers, key parameters could be identified which allow for the rational development of drug-loaded electrospun fibers overcoming drug crystallization.

  6. Development of in-situ product removal strategies in biocatalysis applying scaled-down unit operations

    DEFF Research Database (Denmark)

    Heintz, Søren; Börner, Tim; Ringborg, Rolf Hoffmeyer;

    2017-01-01

    different process steps while operating it as a combined system, giving the possibility to test and characterize the performance of novel process concepts and biocatalysts with minimal influence of inhibitory products. Here the capabilities of performing process development by applying scaled-down unit......An experimental platform based on scaled-down unit operations combined in a plug-and-play manner enables easy and highly flexible testing of advanced biocatalytic process options such as in-situ product removal (ISPR) process strategies. In such a platform it is possible to compartmentalize......-automatically characterize ω-transaminases in a scaled-down packed-bed reactor (PBR) module, showing MPPA as a strong inhibitor. To overcome the inhibition, a two-step liquid-liquid extraction (LLE) ISPR concept was tested using scaled-down unit operations combined in a plug-and-play manner. Through the tested ISPR concept...

  7. Characteristics of couples applying for bibliotherapy via different recruitment strategies: a multivariate comparison.

    Science.gov (United States)

    van Lankveld, J J; Grotjohann, Y; van Lokven, B M; Everaerd, W

    1999-01-01

    This study compared characteristics of couples with different sexual dysfunctions who were recruited for participation in a bibliotherapy program via two routes: in response to media advertisements and through their presence on a waiting list for therapist-administered treatment in an outpatient sexology clinic. Data were collected from 492 subjects (246 couples). Male sexology patients were younger than media-recruited males. However, type of sexual dysfunction accounted for a substantially larger proportion of variance in the demographic and psychometric data. An interaction effect of recruitment strategy and sexual dysfunction type was found with respect to female anorgasmia. We conclude from the absence of differences between the two study groups that the Wills and DePaulo (1991) model of help-seeking behavior for mental problems does not apply to couples with sexual dysfunctions joining a bibliotherapy program who either primarily requested professional treatment or who responded to media advertising.

  8. Regional Economic Development Strategy Based Agro-Industries in Key Region Kandangan South of Kalimantan

    Directory of Open Access Journals (Sweden)

    Dewi Siska

    2016-06-01

    Full Text Available Agroindustry has become the main pillar in South Kalimantan development, it can be found in RPJPD 2005-2025. Kandangan mainstay region as one of three leading regions in South Kalimantan which potentially improved to push economy growth through agriculture based industry activity (agroindustry. The concept of agroindustry a side is expected to drive economic growth as well as to realize the equitable distribution of income. This research aims to: (1 identify to economic development of the region in Kandangan mainstay regions, (2 identify the main commodity, (3 identify means of supporting agroindustry, and (4 formulating development strategies based agroindustry region. Entropy analysis shows the development of the economy sufficiently developed in Kandangan mainstay region dominated by the agricultural sector, namely food crops subsector. LQ an SSA analysis shows corn and rice crops become competitive commodities. There are only few of supporting infrastructure agroindustry activities. Strategy formulation in the research is the improvement of infrastructure or infrastructure that can facilitate inter regional connectivity in the region mainstay Kandangan and the government as the leading actor agroindustry development.

  9. A Qualitative Study of Vocabulary Learning Strategies Applied by Iranian Undergraduate EFL Learners in Real Learning Setting

    Science.gov (United States)

    Yazdi, Mahdi; Kafipour, Reza

    2014-01-01

    This study tries to investigate real use of vocabulary learning strategies by Iranian EFL learners. To achieve this goal, the researcher applied a pure qualitative research method in which frequency of all strategies counted and then classified. To select participants for the current study, the researcher used cluster sampling and fish ball…

  10. The Impact of Employing Brainstorming Strategy on Improving Writing Performance of English Major Students at Balqa Applied University in Jordan

    Science.gov (United States)

    Amoush, Kholoud Hussein

    2015-01-01

    The study aimed at identifying the impact of employing brainstorming strategy on improving writing performance of English Major Students at Balqa Applied University in Jordan. The sample of the study which consisted of 80 male and female university students was distributed into two groups; experimental (taught by brainstorming strategy) and…

  11. High protein flexibility and reduced hydration water dynamics are key pressure adaptive strategies in prokaryotes

    KAUST Repository

    Martinez, N.

    2016-09-06

    Water and protein dynamics on a nanometer scale were measured by quasi-elastic neutron scattering in the piezophile archaeon Thermococcus barophilus and the closely related pressure-sensitive Thermococcus kodakarensis, at 0.1 and 40 MPa. We show that cells of the pressure sensitive organism exhibit higher intrinsic stability. Both the hydration water dynamics and the fast protein and lipid dynamics are reduced under pressure. In contrast, the proteome of T. barophilus is more pressure sensitive than that of T. kodakarensis. The diffusion coefficient of hydration water is reduced, while the fast protein and lipid dynamics are slightly enhanced with increasing pressure. These findings show that the coupling between hydration water and cellular constituents might not be simply a master-slave relationship. We propose that the high flexibility of the T. barophilus proteome associated with reduced hydration water may be the keys to the molecular adaptation of the cells to high hydrostatic pressure.

  12. High protein flexibility and reduced hydration water dynamics are key pressure adaptive strategies in prokaryotes

    Science.gov (United States)

    Martinez, N.; Michoud, G.; Cario, A.; Ollivier, J.; Franzetti, B.; Jebbar, M.; Oger, P.; Peters, J.

    2016-09-01

    Water and protein dynamics on a nanometer scale were measured by quasi-elastic neutron scattering in the piezophile archaeon Thermococcus barophilus and the closely related pressure-sensitive Thermococcus kodakarensis, at 0.1 and 40 MPa. We show that cells of the pressure sensitive organism exhibit higher intrinsic stability. Both the hydration water dynamics and the fast protein and lipid dynamics are reduced under pressure. In contrast, the proteome of T. barophilus is more pressure sensitive than that of T. kodakarensis. The diffusion coefficient of hydration water is reduced, while the fast protein and lipid dynamics are slightly enhanced with increasing pressure. These findings show that the coupling between hydration water and cellular constituents might not be simply a master-slave relationship. We propose that the high flexibility of the T. barophilus proteome associated with reduced hydration water may be the keys to the molecular adaptation of the cells to high hydrostatic pressure.

  13. RENEWABLE ENERGY, A KEY TO INTEGRATING COMPETITIVE POLICIES WITH ADVANCED ENVIRONMENT PROTECTION STRATEGIES

    Directory of Open Access Journals (Sweden)

    Cinade Lucian Ovidiu

    2011-12-01

    Full Text Available Development of competitive policies and improvement of environment protection strategies are two basic trends of the development of the European Unique Market. Energy, also known as 'industry bread', is basic product and strategic resource, where energy industry plays an obvious role in the economic and social development of any community. Traditional energy production is marred by three major drawbacks: it generates negative externalities by polluting; it is totally in the hands of the producers; hence, prices rise at their will, of fossil fuels such as oil and gas. Present study focuses on electric energy industry, yet bearing over the whole length of the chain producer-to-end-consumer, thus revealed as particularly complex. The question is do alternative energy sources meet the prerequisite of market being competitive meanwhile environment protection being highly observed. We identify limits in point, of the energy market; effects of market liberalization; entry barriers; interchangeability level of energy sources; active forces on the energy market. Competitive rivalry has been expressed as per market micro-economic analysis, based on Michael Porter's 5-forces model. It will thus be noticed that, morphologically, competition evolution depends firstly on the market type. For the time being, the consumer on the energy market stays captive, for various reasons such as: legislation; limits of energy transfer infrastructure; scarcity of resources; resources availability imbalance; no integrative strategy available, of renewable energy resources usage. Energy availability is vital for human society to function. Comparative advantages of renewable energy resources are twofold, as manifested: in terms of economics, i.e. improving competition by substitute products entered at the same time as new producers enter market; and in terms of ecology, by reducing CO2 emissions. As to energy production technology and transfer, the complementary nature will

  14. Applying strategies from libertarian paternalism to decision making for prostate specific antigen (PSA screening

    Directory of Open Access Journals (Sweden)

    Black Amanda

    2011-04-01

    Full Text Available Abstract Background Despite the recent publication of results from two randomized clinical trials, prostate specific antigen (PSA screening for prostate cancer remains a controversial issue. There is lack of agreement across studies that PSA screening significantly reduces prostate cancer mortality. In spite of these facts, the widespread use of PSA testing in the United States leads to overdetection and overtreatment of clinically indolent prostate cancer, and its associated harms of incontinence and impotence. Discussion Given the inconclusive results from clinical trials and incongruent PSA screening guidelines, the decision to screen for prostate cancer with PSA testing is an uncertain one for patients and health care providers. Screening guidelines from some health organizations recommend an informed decision making (IDM or shared decision making (SDM approach for deciding on PSA screening. These approaches aim to empower patients to choose among the available options by making them active participants in the decision making process. By increasing involvement of patients in the clinical decision-making process, IDM/SDM places more of the responsibility for a complex decision on the patient. Research suggests, however, that patients are not well-informed of the harms and benefits associated with prostate cancer screening and are also subject to an assortment of biases, emotion, fears, and irrational thought that interferes with making an informed decision. In response, the IDM/SDM approaches can be augmented with strategies from the philosophy of libertarian paternalism (LP to improve decision making. LP uses the insights of behavioural economics to help people better make better choices. Some of the main strategies of LP applicable to PSA decision making are a default decision rule, framing of decision aids, and timing of the decision. In this paper, we propose that applying strategies from libertarian paternalism can help with PSA

  15. Geodiversity, biodiversity and landscape - key elements in modern nature management strategies

    Science.gov (United States)

    Erikstad, Lars

    2014-05-01

    Nature consists of a diversity of systems of both abiotic and biotic character interlinked with each other. Often geodiversity provides fundamental elements for biodiversity in forming major ecosystem attributes. Bedrock geology and sediments contribute to nutrient and substrate conditions and terrain to drainage and moisture differences. But we also find the opposite relation, for example in formation of biogenetic sediments. Truly we are talking of nature diversity consisting of biodiversity and geodiversity in a variety of blends. This close scientific relationship should also be reflected in nature conservation practices to the benefit of both geodiversity and biodiversity. But as biodiversity has dominated the nature conservation debate for the last decades, geodiversity has had a tendency to be overlooked. This is unfortunate both for the sake of biodiversity as major parts of ecosystems that is not treated properly and geodiversity that does not get the recognition it deserves. Nature diversity can be described in a range of scale from the very small to the very great. A lot of management attention is put on a fairly detailed scale such as species (protection of species, red-listing of species etc.). The well-established imperative to look at different scales (from genes via species to ecosystems) is often too complicated for many management systems. The same can be the case in geoconservation were the focus on geosites (for scientific purposes) may favour the same detailed scale approach. On these scales the relation between geo- and biodiversity is easier to overlook. These detailed conservation efforts are sensible and necessary, but need to be supplemented by supplementary strategies that covers other scales. Exploring the relation between geodiversity and biodiversity makes the understanding and integration of geoconservation within nature management easier especially on a landscape scale. The landscapes have the potential to supplement the detailed

  16. Food choice as a key management strategy for functional gastrointestinal symptoms.

    Science.gov (United States)

    Gibson, Peter R; Shepherd, Susan J

    2012-05-01

    Recognition of food components that induce functional gut symptoms in patient's functional bowel disorders (FBD) has been challenging. Food directly or indirectly provides considerable afferent input into the enteric nervous system. There is an altered relationship between the afferent input and perception/efferent response in FBD. Defining the nature of food-related stimuli may provide a means of minimizing such an input and gut symptoms. Using this premise, reducing the intake of FODMAPs (fermentable oligo-, di-, and mono-saccharides and polyols)--poorly absorbed short-chain carbohydrates that, by virtue of their small molecular size and rapid fermentability, will distend the intestinal lumen with liquid and gas--improves symptoms in the majority of patients. Well-developed methodologies to deliver the diet via dietician-led education are available. Another abundant source of afferent input is natural and added food chemicals (such as salicylates, amines, and glutamates). Studies are needed to assess the efficacy of the low food chemical dietary approach. A recent placebo-controlled trial of FODMAP-poor gluten provided the first valid evidence that non-celiac gluten intolerance might actually exist, but its prevalence and underlying mechanisms require elucidation. Food choice via the low FODMAP and potentially other dietary strategies is now a realistic and efficacious therapeutic approach for functional gut symptoms.

  17. Integrated Management Strategies Increase Cottonseed, Oil and Protein Production: The Key Role of Carbohydrate Metabolism

    Science.gov (United States)

    Yang, Hongkun; Zhang, Xinyue; Chen, Binglin; Meng, Yali; Wang, Youhua; Zhao, Wenqing; Zhou, Zhiguo

    2017-01-01

    Cottonseed, oil, and protein, as the by-products of cotton production, have the potential to provide commodities to meet the increasing demand of renewable bio-fuels and ruminant feed. An increase in crop yield per unit area requires high-yielding cultivar management with an economic nitrogen (N) rate, an optimal N application schedule, high-yielding plant populations and strong seedlings. Whether the integration of these agronomic practices into a coherent management system can increase the productivity of cotton fiber, embryo oil and protein requires experimental elucidation. In this 2-year study, conventional management practices (CM) were used as a control, and two integrated management strategies (IMS1 and IMS2) were considered at two soil fertility levels (high soil fertility and low soil fertility) to analyze the metabolic and biochemical traits of cotton embryos. The results illustrate that the cottonseed, oil, and protein yields for IMS1 and IMS2 were significantly higher than those under CM at both soil fertility levels and the fiber yield increased as well. The IMS regulated the maternal photo thermal environment by delaying the flowering date, resulting in increases in the seed weight. In developing cotton embryos, the IMS increased the embryo weight accumulation rate and biomass partitioning into oil and protein, which were associated with high activities of H+-ATPase, H+-PPase, sucrose synthase (SuSy), and cell wall invertase (C-INV) and low activities of sucrose phosphate synthase (SPS) and vacuole invertase (V-INV). Increased hexoses (D-fructose, D-glucose) content contributed to the oil and protein contents. These results suggest that increased sucrose/H+ symport, sucrose hydrolysis, hexoses synthesis, and cumulative photo-thermal product (PTP), especially in the early stage of embryo growth, play a dominant role in the high productivity of cotton oil and protein. PMID:28194156

  18. A novel electronic assessment strategy to support applied Drosophila genetics training in university courses.

    Science.gov (United States)

    Fostier, Maggy; Patel, Sanjai; Clarke, Samantha; Prokop, Andreas

    2015-02-25

    The advent of "omic" technologies has revolutionized genetics and created a demand to focus classical genetics on its present-day applications (Redfield, 2012, PLoS Biol 10: e1001356). This demand can be met by training students in Drosophila mating scheme design, which is an important problem-solving skill routinely applied in many modern research laboratories. It promotes a thorough understanding and application of classical genetics rules and introduces to transgenic technologies and the use of model organisms. As we show here, such training can be implemented as a flexible and concise module (~1-day home study, ~8-hour course time) on university courses by using our previously published training package designed for fly researchers (Roote and Prokop, 2013, G3 (Bethesda) 3: 353-358). However, assessing this training to make it an accredited course element is difficult, especially in large courses. Here, we present a powerful assessment strategy based on a novel hybrid concept in which students solve crossing tasks initially on paper and then answer automatically marked questions on the computer (1.5 hours total). This procedure can be used to examine student performance on more complex tasks than conventional e-assessments and is more versatile, time-saving, and fairer than standard paper-based assignments. Our evaluation shows that the hybrid assessment is effective and reliably detects varying degrees of understanding among students. It also may be applicable in other disciplines requiring complex problem solving, such as mathematics, chemistry, physics, or informatics. Here, we describe our strategies in detail and provide all resources needed for their implementation.

  19. HIV elite controllers as a key to novel strategies in treatment of HIV infection

    Directory of Open Access Journals (Sweden)

    A Pronin

    2012-11-01

    measurements. These represent 11.32% (95% CI: 5.17%; 17.47% from EC and 0.45% (95% CI: 0.19%; 0.71% from population with A1 (asymptomatic HIV-disease. Conclusions: Among EC patients with “minimal change disease” were identified. They may represent: (i primarily persistent HIV infection (with reduced productive cycle, (ii low dose (localized HIV-infection, (iii rare successful immune-mediated elimination of HIV that could be the model for novel elimination strategies.

  20. Optimization strategies in the modelling of SG-SMB applied to separation of phenylalanine and tryptophan

    Science.gov (United States)

    Diógenes Tavares Câmara, Leôncio

    2014-03-01

    The solvent-gradient simulated moving bed process (SG-SMB) is the new tendency in the performance improvement if compared to the traditional isocratic solvent conditions. In such SG-SMB process the modulation of the solvent strength leads to significant increase in the purities and productivity followed by reduction in the solvent consumption. A stepwise modelling approach was utilized in the representation of the interconnected chromatographic columns of the system combined with a lumped mass transfer model between the solid and liquid phase. The influence of the solvent modifier was considered applying the Abel model which takes into account the effect of modifier volume fraction over the partition coefficient. Correlation models of the mass transfer parameters were obtained through the retention times of the solutes according to the volume fraction of modifier. The modelling and simulations were carried out and compared to the experimental SG-SMB separation unit of the amino acids Phenylalanine and Tryptophan. The simulation results showed the great potential of the proposed modelling approach in the representation of such complex systems. The simulations showed great agreement fitting the experimental data of the amino acids concentrations both at the extract as well as at the raffinate. A new optimization strategy was proposed in the determination of the best operating conditions which uses the phi-plot concept.

  1. Improving Students' Science Text Comprehension through Metacognitive Self-Regulation When Applying Learning Strategies

    Science.gov (United States)

    Leopold, Claudia; Leutner, Detlev

    2015-01-01

    In three experiments, students were trained to use strategies for learning from scientific texts: text highlighting (Experiment 1), knowledge mapping (Experiment 2), and visualizing (Experiment 3). Each experiment compared a control condition, cognitive strategy training, and a combined cognitive strategy plus metacognitive self-regulation…

  2. Anaerobic degradation of homocyclic aromatic compounds via arylcarboxyl-coenzyme A esters: organisms, strategies and key enzymes.

    Science.gov (United States)

    Boll, Matthias; Löffler, Claudia; Morris, Brandon E L; Kung, Johannes W

    2014-03-01

    Next to carbohydrates, aromatic compounds are the second most abundant class of natural organic molecules in living organic matter but also make up a significant proportion of fossil carbon sources. Only microorganisms are capable of fully mineralizing aromatic compounds. While aerobic microbes use well-studied oxygenases for the activation and cleavage of aromatic rings, anaerobic bacteria follow completely different strategies to initiate catabolism. The key enzymes related to aromatic compound degradation in anaerobic bacteria are comprised of metal- and/or flavin-containing cofactors, of which many use unprecedented radical mechanisms for C-H bond cleavage or dearomatization. Over the past decade, the increasing number of completed genomes has helped to reveal a large variety of anaerobic degradation pathways in Proteobacteria, Gram-positive microbes and in one archaeon. This review aims to update our understanding of the occurrence of aromatic degradation capabilities in anaerobic microorganisms and serves to highlight characteristic enzymatic reactions involved in (i) the anoxic oxidation of alkyl side chains attached to aromatic rings, (ii) the carboxylation of aromatic rings and (iii) the reductive dearomatization of central arylcarboxyl-coenzyme A intermediates. Depending on the redox potential of the electron acceptors used and the metabolic efficiency of the cell, different strategies may be employed for identical overall reactions.

  3. 汽车遥控钥匙按键策略%The Strategy of Remote Keyless Key

    Institute of Scientific and Technical Information of China (English)

    周靖

    2012-01-01

    汽车遥控门禁系统(RKE-remote keyless entry system)是一种应用于车辆的防盗技术.它可以用来远程遥控车门的上锁和解锁请求.该系统通过钥匙端发送一串特殊编码的数据,汽车防盗系统在接收到该数据后,进行解码运算来判断该数据的有效性,之后执行上锁或解锁的请求.由于无线干扰问题的存在,当钥匙和汽车间的通讯时间越长,受干扰的几率就越大.为了避免经常出错,对整个发送方式做一改进,以尽量减少受干扰的情况发生.%A Remote Keyless Entry System is an anti-theft technology for vehicles. It can be used to remote control door lock and unlock requests. The system sends a stream through a specially coded data, the receiver in car gets the data and decodes with encrypt algorithm. After decrypting the key information, the vehicle performs lock or unlock request. As wireless interference problems, the longer the communication spends between the key and the vehicle, the greater the chance of interference. In order to avoid these mistakes, this paper tries to improve the method for key fob's button strategy.

  4. Frequency of Applying Different Teaching Strategies and Social Teaching Methods in Primary Schools

    Science.gov (United States)

    Ivic, Sonja

    2016-01-01

    The question that every modern teacher raises in their daily work is the reflection on selecting teaching strategies and social forms of teaching. Unlike traditional teaching strategies in which knowledge transfer is mainly done by the teacher while the students are passive listeners and recipients of such knowledge, modern teaching strategies…

  5. Applying Foreign Entry Market Strategies to UK Higher Education Transnational Education Models

    Science.gov (United States)

    Lindsay, Victoria; Antoniou, Christos

    2016-01-01

    We take a multidisciplinary approach mapping the models used by UK higher education (HE) institutions against established international business foreign market entry strategies. We review the conditions in host markets that facilitate market entry and consider how these will determine foreign market entry strategy. We specifically consider four…

  6. Microorganisms in heavy metal bioremediation: strategies for applying microbial-community engineering to remediate soils

    OpenAIRE

    Jennifer L. Wood; Caixian Tang; Franks, Ashley E.; Wuxing Liu

    2016-01-01

    The remediation of heavy-metal-contaminated soils is essential as heavy metals persist and do not degrade in the environment. Remediating heavy-metal-contaminated soils requires metals to be mobilized for extraction whilst, at the same time, employing strategies to avoid mobilized metals leaching into ground-water or aquatic systems. Phytoextraction is a bioremediation strategy that extracts heavy metals from soils by sequestration in plant tissues and is currently the predominant bioremediat...

  7. Analysis and design of over-current limit control strategies applied in aeronautical power supplies

    Institute of Scientific and Technical Information of China (English)

    WANG Lin-bing; HE Xiang-ning

    2007-01-01

    Some Over-Current Limit Control strategies are analyzed and designed to meet the demands of high reliability and rapid dynamic response in the aeronautical power supply applications. The control schemes are both effective in DC-DC converters and DC-AC converters. Controller models are set up, and the over-current limit operation principles of analogy and digital control are analyzed too. An 800VA aeronautical power supply has been constructed to verify the performance of the proposed control strategy in various cases such as the sudden load change and the constant load. The analysis and experiments confirm the advantages of the proposed over-current limit strategies as follows: simple,effective and reliable.

  8. The cubature smooth variable structure filter estimation strategy applied to a quadrotor controller

    Science.gov (United States)

    Al-Shabi, M.; Gadsden, S. A.; Wilkerson, S. A.

    2015-05-01

    Unmanned aerial systems (UAS) are becoming increasingly popular in industry, military, and social environments. An UAS that provides good operating performance and robustness to disturbances is often quite expensive and prohibitive to the general public. To improve UAS performance without affecting the overall cost, an estimation strategy can be implemented on the internal controller. The use of an estimation strategy or filter reduces the number of required sensors and power requirement, and improves the controller performance. UAS devices are highly nonlinear, and implementation of filters can be quite challenging. This paper presents the implementation of the relatively new cubature smooth variable structure filter (CSVSF) on a quadrotor controller. The results are compared with other state and parameter estimation strategies.

  9. Gender-linked Choice of Politeness Strategies Applied to Translation of Persian Face-threatening Acts into English

    Directory of Open Access Journals (Sweden)

    Mojde Yaqubi

    2012-11-01

    Full Text Available In this article, we will concentrate on translation of Persian face-threatening acts (FTAs into English. The present paper possesses both social and pragmatic objectives. These objectives are: 1 to identify the politeness strategies (PSs applied for rendering FTAs in Persian and English languages, 2 compare and contrast the frequencies and kinds of these strategies between two source and target languages (SL and TL to examine the discrepancies in the presentation of the PSs in two cultures and 3 to focus on the renderings of two gender groups of translators in order to establish a comparison of male and female’s translations of FTAs based on their choice and number of PSs. To gather the data, the following steps were taken: first, twenty FTAs done with different PSs (Brown and Levinson. 1987 were extracted from five Persian movies. The collected data were given to twenty male and female Persian-speaking post- graduate students of translation studies to render them into English. Then, PSs used for translating these FTAs were found in target texts and their types of strategies and frequencies were compared and contrasted with the original. As the final stage, the same comparison and contrast were done in case of the renderings of two gender groups of translators. The findings of the study indicated that from among 14 PSs applied in Persian and English, 12 PSs were commonly used in both SL and TL. Further, analysis of the data showed that although male and female translators applied the same PSs, male translators applied more PSs than females. Finally results revealed that ‘give deference’ was the most frequent PS applied by male translators while female translators used ‘give hint’ more than other PSs. Keywords: Sociolinguists, Face-threatening acts (FTAs, Politeness Strategy (PS, Gender

  10. Finding uncontested markets for European Fruit and Vegetables through applying the Blue Ocean Strategy

    NARCIS (Netherlands)

    Wubben, E.F.M.; Düsseldorf, S.; Batterink, M.H.

    2012-01-01

    Purpose – The purpose of this paper is to discover an uncontested market space in the European fruit and vegetables industry (EFVI), and thereby assess the ex-ante applicability of the Blue Ocean Strategy of Kim and Mauborgne. Design/methodology/approach – The search for an untapped market space mad

  11. Connectivity strategies for higher-order neural networks applied to pattern recognition

    Science.gov (United States)

    Spirkovska, Lilly; Reid, Max B.

    1990-01-01

    Different strategies for non-fully connected HONNs (higher-order neural networks) are discussed, showing that by using such strategies an input field of 128 x 128 pixels can be attained while still achieving in-plane rotation and translation-invariant recognition. These techniques allow HONNs to be used with the larger input scenes required for practical pattern-recognition applications. The number of interconnections that must be stored has been reduced by a factor of approximately 200,000 in a T/C case and about 2000 in a Space Shuttle/F-18 case by using regional connectivity. Third-order networks have been simulated using several connection strategies. The method found to work best is regional connectivity. The main advantages of this strategy are the following: (1) it considers features of various scales within the image and thus gets a better sample of what the image looks like; (2) it is invariant to shape-preserving geometric transformations, such as translation and rotation; (3) the connections are predetermined so that no extra computations are necessary during run time; and (4) it does not require any extra storage for recording which connections were formed.

  12. Uncertainty contributions due to different measurement strategies applied to optomechanical hole plate

    DEFF Research Database (Denmark)

    Morace, Renate Erica; Hansen, Hans Nørgaard; De Chiffre, Leonardo

    2003-01-01

    The work described in this paper deals with influence parameters in optical measurements, with particular respect to the choice of measurement strategy, which strongly affects the results of measurement. In this investigation, an optomechanical hole plate developed by DTU was measured...

  13. Improv(ing) the Academy: Applied Improvisation as a Strategy for Educational Development

    Science.gov (United States)

    Rossing, Jonathan P.; Hoffmann-Longtin, Krista

    2016-01-01

    Improvisational theater training (or "improv") is a strategy employed by many business leaders and educators to cultivate creativity and collaboration amid change. Drawing on improv principles such as "Yes, And…" and "Make your scene partners look good," we explore the ways in which educational developers might apply…

  14. Applying an Experiential Learning Model to the Teaching of Gateway Strategy Board Games

    Science.gov (United States)

    Sato, Aiko; de Haan, Jonathan

    2016-01-01

    The board game hobby has rapidly grown and evolved in recent years, but most of the non-digital games lack tips and tutorials and remain difficult to learn and teach effectively. In this project, we integrated a popular hobbyist approach to teaching modern strategy games with classical experiential learning elements (i.e., demonstration,…

  15. Ergonomic analysis of working postures using OWAS in semi-trailer assembly, applying an individual sampling strategy.

    Science.gov (United States)

    Brandl, Christopher; Mertens, Alexander; Schlick, Christopher M

    2017-03-01

    In semi-trailer assembly, workers are exposed to several physical risk factors. Awkward working postures have not yet been investigated in semi-trailer assembly, although they are known to be a major risk factor for musculoskeletal disorders. We therefore conducted a comprehensive ergonomic analysis of working postures using the Ovako working posture analysing system (OWAS), with an individual sampling strategy. The postural load in semi-trailer assembly was assessed on the basis of 20,601 observations of 63 workers executing a representative set of nine work tasks. According to the OWAS, the postural load of various working postures and body part positions may have a harmful effect on the musculoskeletal system. We therefore give examples of corrective measures that could improve awkward working postures. Applying an individual sampling strategy was revealed to have advantages over a collective strategy, so this is recommended for future ergonomic analyses.

  16. Safeguards performance model for evaluation of potential safeguards strategies applied to pyroprocessing facilities

    Energy Technology Data Exchange (ETDEWEB)

    Riley, T.R., E-mail: riletony@isu.edu; Pope, C.L.; Benedict, R.W.

    2016-05-15

    Highlights: • A model was created for simulating safeguards strategies for a pyroprocessing facility. • The model is flexible and simulates process monitoring during steady state operations. • A sensitivity study revealed input spent fuel and storage mass measures most limiting. - Abstract: Electrochemical reprocessing has been proposed as a spent fuel disposition technique. If implemented on a commercial scale, traditional safeguards approaches used to satisfy IAEA requirements may be insufficient. To aid in testing safeguard strategies, a new tool was developed: the Pyroprocessing Safeguards Performance Model, a MATLAB/Simulink simulation of plant operations capable of calculating inventory differences for a specified balance period as well as sensitivity studies of detection measurements. This paper discusses the development of the model and a measurement uncertainty study performed using the model.

  17. Applying an Experiential Learning Model to the Teaching of Gateway Strategy Board Games

    Directory of Open Access Journals (Sweden)

    Aiko Sato

    2016-01-01

    Full Text Available The board game hobby has rapidly grown and evolved in recent years, but most of the non-digital games lack tips and tutorials and remain difficult to learn and teach effectively. In this project, we integrated a popular hobbyist approach to teaching modern strategy games with classical experiential learning elements (i.e., demonstration, observation, reflection, discussion and repeated experiences. We tested our model by teaching two modern board games to Japanese high school and university students. Questionnaires, gameplay data, self-ratings and discussions showed improved understanding and enjoyment, more strategic play and more interest in modern board games over the course of the instructional sequence. The model's repetition (the participants played each game three times was rated the most useful in terms of learning the games. Overall, the integrated model was largely successful in teaching strategy board games to new players, and we offer several recommendations for teachers, designers and researchers of board games.

  18. Economics in Counterinsurgency: Analyzing and Applying History’s Lessons on Economic Strategy

    Science.gov (United States)

    2014-06-13

    2013 SIGAR report describes: A US-funded school in Sheberghan, Afghanistan, trains aspiring Afghan teachers –and provides lessons to Americans on...government that ceaselessly urged Europeans to pursue national strategies of recovery that stressed exports, lower tariffs, and high investment in...Vickers, Rhiannon. Manipulating Hegemony: State Power, Labour , and the Marshall Plan in Britain. Hampshire: New York: Houndmills, Basingstoke, 2000. West

  19. A long-term evaluation of applied nucleation as a strategy to facilitate forest restoration.

    Science.gov (United States)

    Corbin, Jeffrey D; Robinson, George R; Hafkemeyer, Lauren M; Handel, Steven N

    2016-01-01

    Applied nucleation is a restoration technique that seeks to facilitate woody-plant establishment by attracting birds or other animals that may introduce seeds of dispersal-limited species. In 1991, an experimental test of applied nucleation was initiated in an abandoned landfill in New Jersey, USA. Trees and shrubs were planted into 16 10 x 10 m plots, covering land-use changes in the region. Despite the relatively low species richness of the community, this experiment demonstrated that reforestation of even severely degraded habitat can be achieved with minimal management after site preparation and cluster plantings.

  20. Applying Coaching Strategies to Support Youth- and Family-Focused Extension Programming

    Science.gov (United States)

    Olson, Jonathan R.; Hawkey, Kyle R.; Smith, Burgess; Perkins, Daniel F.; Borden, Lynne M.

    2016-01-01

    In this article, we describe how a peer-coaching model has been applied to support community-based Extension programming through the Children, Youth, and Families at Risk (CYFAR) initiative. We describe the general approaches to coaching that have been used to help with CYFAR program implementation, evaluation, and sustainability efforts; we…

  1. Geothermal potential assessment for a low carbon strategy : A new systematic approach applied in southern Italy

    NARCIS (Netherlands)

    Trumpy, E.; Botteghi, S.; Caiozzi, F.; Donato, A.; Gola, G.; Montanari, D.; Pluymaekers, M. P D; Santilano, A.; van Wees, J. D.; Manzella, A.

    2016-01-01

    In this study a new approach to geothermal potential assessment was set up and applied in four regions in southern Italy. Our procedure, VIGORThermoGIS, relies on the volume method of assessment and uses a 3D model of the subsurface to integrate thermal, geological and petro-physical data. The metho

  2. A strategy for sampling on a sphere applied to 3D selective RF pulse design.

    Science.gov (United States)

    Wong, S T; Roos, M S

    1994-12-01

    Conventional constant angular velocity sampling of the surface of a sphere results in a higher sampling density near the two poles relative to the equatorial region. More samples, and hence longer sampling time, are required to achieve a given sampling density in the equatorial region when compared with uniform sampling. This paper presents a simple expression for a continuous sample path through a nearly uniform distribution of points on the surface of a sphere. Sampling of concentric spherical shells in k-space with the new strategy is used to design 3D selective inversion and spin-echo pulses. These new 3D selective pulses have been implemented and verified experimentally.

  3. Business-oriented modeling and Simulation: Dynamic Scorecard method Applied the Formularization of Strategies

    Directory of Open Access Journals (Sweden)

    Josué Vitor

    2007-12-01

    Full Text Available The main goal of this research was to application the “Scorecard Dinâmico” method onstrategic formulation process in a small business. This method incorporate qualitative andsimulation tools from System Dynamics in the strategic map provided by Balanced Scorecardmaking the strategic management flexible in accordance with the organizational realitycomplexity. The research method adopted was the “research-action” and it was possible,with participating observation, the construction of strategic models on interaction with thecompany directors. During this process, it could be assessed organizing points thatinterfering in formulation of strategy of a small business during the research. Through thisprocess, company members mental models were explained in strategic map and qualitativemodels resulting on a simulation tool for control the results and alternative prospection offuture strategies and a higher level of learning organizational. As a result, it could be pointedthe method difficult implantation in virtue of the absence quantitative data and a higherunderstanding by the research participants of the problem resulting from the systemicstructural behavior in the small business.

  4. An Implementation Mechanisms of SVM Control Strategies Applied to Five Levels Cascaded Multi-Level Inverters

    Directory of Open Access Journals (Sweden)

    Mohammed Yaichi

    2014-03-01

    Full Text Available In the area of the energy control with high voltage and power, the multilevel inverters constitute a relatively recent research orientation. The current applications of this technology are in the domains of the high voltage (over hundred kV, variable speed drives, transport and distribution of a good quality of electrical energy (HVDC, FACTS system, ..... To improve the output voltage for such inverters, many different modulation strategies have been developed. Among these strategies, the SVM (Space Vector Modulation. The technique provide the nearest switching vectors sequence to the reference vector without involving trigonometric functions and provide the additional advantages of superior harmonic quality. In this paper, we analyze different mechanisms of the output voltage synthesis and the problem of even order harmonic production. With the proposed a new trajectory SVM, which can eliminate all the even order harmonics for five levels inverter. Show clearly how to deduce the trajectories from the sequences allowing to have better performances among several possible trajectories. It is dedicated to the application of two particular trajectories.

  5. Tissue engineering strategies applied in the regeneration of the human intervertebral disk.

    Science.gov (United States)

    Silva-Correia, Joana; Correia, Sandra I; Oliveira, Joaquim M; Reis, Rui L

    2013-12-01

    Low back pain (LBP) is one of the most common painful conditions that lead to work absenteeism, medical visits, and hospitalization. The majority of cases showing signs of LBP are due to age-related degenerative changes in the intervertebral disk (IVD), which are, in fact, associated with multiple spine pathologies. Traditional and more conservative procedures/clinical approaches only treat the symptoms of disease and not the underlying pathology, thus limiting their long-term efficiency. In the last few years, research and development of new approaches aiming to substitute the nucleus pulposus and annulus fibrosus tissue and stimulate its regeneration has been conducted. Regeneration of the damaged IVD using tissue engineering strategies appears particularly promising in pre-clinical studies. Meanwhile, surgical techniques must be adapted to this new approach in order to be as minimally invasive as possible, reducing recovering time and side effects associated to traditional surgeries. In this review, the current knowledge on IVD, its associated pathologies and current surgical procedures are summarized. Furthermore, it also provides a succinct and up-to-date overview on regenerative medicine research, especially on the newest tissue engineering strategies for IVD regeneration.

  6. Teaching Strategies to Apply in the Use of Technological Tools in Technical Education

    Directory of Open Access Journals (Sweden)

    Olga Arranz García

    2014-09-01

    Full Text Available The emergence of new technologies in education area is changing the way of organizing the educational processes. Teachers are not unrelated to these changes and must employ new strategies to adapt their teaching methods to the new circumstances. One of these adaptations is framed in the virtual learning, where the learning management systems have been revealed as a very effective means within the learning process. In this paper we try to provide teachers in engineering schools how to use in an appropriate way the different technological tools that are present in a virtual platform. Thus, in the experimental framework we show the results outcomes in the analysis of two data samples obtained before and after the implementation of the European Higher Education Area, that would be extrapolated for its innovative application to the learning techniques.

  7. SDRE control strategy applied to a nonlinear robotic including drive motor

    Energy Technology Data Exchange (ETDEWEB)

    Lima, Jeferson J. de, E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Tusset, Angelo M., E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Janzen, Frederic C., E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Piccirillo, Vinicius, E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Nascimento, Claudinor B., E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br [UTFPR-PONTA GROSSA, PR (Brazil); Balthazar, José M., E-mail: jmbaltha@rc.unesp.br [UNESP-BAURU, SP (Brazil); Brasil, Reyolando M. L. R. da Fonseca, E-mail: reyolando.brasil@ufabc.edu.br [UFABC-SANTO ANDRE, SP (Brazil)

    2014-12-10

    A robotic control design considering all the inherent nonlinearities of the robot-engine configuration is developed. The interactions between the robot and joint motor drive mechanism are considered. The proposed control combines two strategies, one feedforward control in order to maintain the system in the desired coordinate, and feedback control system to take the system into a desired coordinate. The feedback control is obtained using State-Dependent Riccati Equation (SDRE). For link positioning two cases are considered. Case I: For control positioning, it is only used motor voltage; Case II: For control positioning, it is used both motor voltage and torque between the links. Simulation results, including parametric uncertainties in control shows the feasibility of the proposed control for the considered system.

  8. SDRE control strategy applied to a nonlinear robotic including drive motor

    Science.gov (United States)

    de Lima, Jeferson J.; Tusset, Angelo M.; Janzen, Frederic C.; Piccirillo, Vinicius; Nascimento, Claudinor B.; Balthazar, José M.; Brasil, Reyolando M. L. R. da Fonseca

    2014-12-01

    A robotic control design considering all the inherent nonlinearities of the robot-engine configuration is developed. The interactions between the robot and joint motor drive mechanism are considered. The proposed control combines two strategies, one feedforward control in order to maintain the system in the desired coordinate, and feedback control system to take the system into a desired coordinate. The feedback control is obtained using State-Dependent Riccati Equation (SDRE). For link positioning two cases are considered. Case I: For control positioning, it is only used motor voltage; Case II: For control positioning, it is used both motor voltage and torque between the links. Simulation results, including parametric uncertainties in control shows the feasibility of the proposed control for the considered system.

  9. Optimality, Rational Expectations and Time Inconsistency Applied to Inflation Targeting Strategy

    Directory of Open Access Journals (Sweden)

    Marius-Corneliu Marinas

    2008-10-01

    Full Text Available The purpose of this paper is to analyse the characteristics of an inflation targeting strategy, using the Barro-Gordon model specific tools. This paper uses the initial Barro-Gordon concepts of inflationary social costs and benefits, adding a new dimension generated by the cost of output deviating from the potential level. The main contribution of this paper is the exhaustive study of the time inconsistency problem generated by the very existence of a policymaker-established inflation rate. The mathematic simulation of a model allowed a complete analysis of several parameters’ influence (parameters such as the optimal rate of inflation, the discount rate, the importance structure of inflationary social cost on the applicable range of the target inflation rate, range that guarantees that the policymakers have no incentive to break their own rules, or at least this incentive is somewhat inferior to the future cost of doing so.

  10. INDIAN COMMUNITIES IN LISBON: CREATIVITY APPLIED TO BUSINESS AND SOCIAL STRATEGIES?

    Directory of Open Access Journals (Sweden)

    Jorge Macaísta Malheiros

    2010-12-01

    Full Text Available Rather than interpreting the initial motivation behind the emergence of the business initiatives of Indian citizens resident in Lisbon, or identifying their sectors of activity, this work attempts to verify in what way their activities bring innovative elements into the city. To that end, the author considers three domains: 1 the invigoration and animation of degraded areas in economic terms, as well as the creation of a new spatial symbology; 2 the supply of new products and services associated with the implementation of new market practices, and 3 the opening-up of new long-distance trading links interpreted as a component of the secondary internationalisation of the city. The entrepreneurial activities of these citizens help, furthermore (albeit indirectly, to introduce new cultural practices and also to revise certain mechanisms for regulating economic activities, in terms of timetables, urban planning and commercial regulation, and others. In response to the question of what Indian immigrants are contributing to Lisbon’s urban dynamics, and in relation to the introduction of social changes, the author attempts to interpret the initiatives using the criterion of whether or not they represent creative social strategies. After an exhaustive analysis, the author concludes that, in fact, most of the commercial initiatives of immigrants with this origin incorporate innovative and creative features, and have clear, diverse impacts on the dynamic of the transformation of certain spaces in the metropolitan area of Lisbon; having said that, it would not seem justifiable to claim that they constitute, in themselves, Creative Social Strategies, in the fullest sense.

  11. Multicomponent venom of the spider Cupiennius salei: a bioanalytical investigation applying different strategies.

    Science.gov (United States)

    Trachsel, Christian; Siegemund, Doreen; Kämpfer, Urs; Kopp, Lukas S; Bühr, Claudia; Grossmann, Jonas; Lüthi, Christoph; Cunningham, Monica; Nentwig, Wolfgang; Kuhn-Nentwig, Lucia; Schürch, Stefan; Schaller, Johann

    2012-08-01

    The multicomponent venom of the spider Cupiennius salei was separated by three different chromatographic strategies to facilitate subsequent analysis of peptidic venom components by tandem mass spectrometry (MALDI-TOF-MS and ESI-MS), Edman degradation and amino acid analysis: (a) desalting of the crude venom by RP-HPLC only, (b) chromatographic separation of the crude venom into 42 fractions by RP-HPLC, and (c) multidimensional purification of the crude venom by size exclusion and cation exchange chromatography and RP-HPLC. A total of 286 components were identified in the venom of C. salei by mass spectrometry and the sequence of 49 new peptides was determined de novo by Edman degradation and tandem mass spectrometry; 30 were C-terminally amidated. The novel peptides were assigned to two main groups: (a) short cationic peptides and (b) Cys-containing peptides with the inhibitor cystine knot motif. Bioinformatics revealed a limited number of substantial similarities, namely with the peptides CpTx1 from the spider Cheiracantium punctorium and U3-ctenitoxin-Asp1a from the South American fishing spider (Ancylometes sp.) and with sequences from a Lycosa singoriensis venom gland transcriptome analysis. The results clearly indicate that the quality of the data is strongly dependent on the chosen separation strategy. The combination of orthogonal analytical methods efficiently excludes alkali ion and matrix adducts, provides indispensable information for an unambiguous identification of isomasses, and results in the most comprehensive repertoire of peptides identified in the venom of C. salei so far.

  12. Trend-Centric Motion Visualization: Designing and Applying a new Strategy for Analyzing Scientific Motion Collections

    Science.gov (United States)

    Schroeder, David; Korsakov, Fedor; Knipe, Carissa Mai-Ping; Thorson, Lauren; Ellingson, Arin M.; Nuckley, David; Carlis, John; Keefe, Daniel F

    2017-01-01

    In biomechanics studies, researchers collect, via experiments or simulations, datasets with hundreds or thousands of trials, each describing the same type of motion (e.g., a neck flexion-extension exercise) but under different conditions (e.g., different patients, different disease states, pre- and post-treatment). Analyzing similarities and differences across all of the trials in these collections is a major challenge. Visualizing a single trial at a time does not work, and the typical alternative of juxtaposing multiple trials in a single visual display leads to complex, difficult-to-interpret visualizations. We address this problem via a new strategy that organizes the analysis around motion trends rather than trials. This new strategy matches the cognitive approach that scientists would like to take when analyzing motion collections. We introduce several technical innovations making trend-centric motion visualization possible. First, an algorithm detects a motion collection’s trends via time-dependent clustering. Second, a 2D graphical technique visualizes how trials leave and join trends. Third, a 3D graphical technique, using a median 3D motion plus a visual variance indicator, visualizes the biomechanics of the set of trials within each trend. These innovations are combined to create an interactive exploratory visualization tool, which we designed through an iterative process in collaboration with both domain scientists and a traditionally-trained graphic designer. We report on insights generated during this design process and demonstrate the tool’s effectiveness via a validation study with synthetic data and feedback from expert musculoskeletal biomechanics researchers who used the tool to analyze the effects of disc degeneration on human spinal kinematics. PMID:26356978

  13. Applying the Taguchi method to river water pollution remediation strategy optimization.

    Science.gov (United States)

    Yang, Tsung-Ming; Hsu, Nien-Sheng; Chiu, Chih-Chiang; Wang, Hsin-Ju

    2014-04-15

    Optimization methods usually obtain the travel direction of the solution by substituting the solutions into the objective function. However, if the solution space is too large, this search method may be time consuming. In order to address this problem, this study incorporated the Taguchi method into the solution space search process of the optimization method, and used the characteristics of the Taguchi method to sequence the effects of the variation of decision variables on the system. Based on the level of effect, this study determined the impact factor of decision variables and the optimal solution for the model. The integration of the Taguchi method and the solution optimization method successfully obtained the optimal solution of the optimization problem, while significantly reducing the solution computing time and enhancing the river water quality. The results suggested that the basin with the greatest water quality improvement effectiveness is the Dahan River. Under the optimal strategy of this study, the severe pollution length was reduced from 18 km to 5 km.

  14. Life-Cycle Assessment of Seismic Retrofit Strategies Applied to Existing Building Structures

    Directory of Open Access Journals (Sweden)

    Umberto Vitiello

    2016-12-01

    Full Text Available In the last few years, the renovation and refurbishment of existing buildings have become the main activities of the construction industry. In particular, many studies have recently focused on the mechanical and energy performances of existing retrofitted/refurbished facilities, while some research has addressed the environmental effects of such operations. The present study aims to assess the environmental impact of some retrofit interventions on an existing reinforced concrete (RC building. Once the structural requirements have been satisfied and the environmental effects of these retrofit solutions defined, the final purpose of this study is to identify the most environmentally sustainable retrofit strategy. The environmental impact of the structural retrofit options is assessed using a life-cycle assessment (LCA. This paper sets out a systematic approach that can be adopted when choosing the best structural retrofit option in terms of sustainability performance. The final aim of the study is to also provide a tool for researchers and practitioners that reflects a deep understanding of the sustainability aspects of retrofit operations and can be used for future researches or practical activities.

  15. A new strategy for respiration compensation, applied toward 3D free-breathing cardiac MRI.

    Science.gov (United States)

    Madore, Bruno; Farnebäck, Gunnar; Westin, Carl-Fredrik; Durán-Mendicuti, Alejandra

    2006-07-01

    In thorax and abdomen imaging, image quality may be affected by breathing motion. Cardiac MR images are typically obtained while the patient holds his or her breath, to avoid respiration-related artifacts. Although useful, breath-holding imposes constraints on scan duration, which in turn limits the achievable resolution and SNR. Longer scan times would be required to improve image quality, and effective strategies are needed to compensate for respiratory motion. A novel approach at respiratory compensation, targeted toward 3D free-breathing cardiac MRI, is presented here. The method aims at suppressing the negative effects of respiratory-induced cardiac motion while capturing the heart's beating motion. The method is designed so that the acquired data can be reconstructed in two different ways: First, a time series of images is reconstructed to quantify and correct for respiratory motion. Then, the corrected data are reconstructed a final time into a cardiac-phase series of images to capture the heart's beating motion. The method was implemented, and initial results are presented. A cardiac-phase series of 3D images, covering the entire heart, was obtained for two free-breathing volunteers. The present method may prove especially useful in situations where breath-holding is not an option, for example, for very sick, mentally impaired or infant patients.

  16. Implementation Strategies for a Universal Acquisition and Tracking Channel Applied to Real GNSS Signals.

    Science.gov (United States)

    Fortin, Marc-Antoine; Landry, René

    2016-05-02

    This paper presents a universal GNSS receiver channel capable of tracking any civil GNSS signal. This fundamentally differs from dedicated channels, each customized for a given signal. A mobile device could integrate fewer universal channels to harvest all available signals. This would allow securing signal availability, while minimizing power consumption and chip size, thus maximizing battery lifetime. In fact, the universal channel allows sequential acquisition and tracking of any chipping rate, carrier frequency, FDMA channel, modulation, or constellation, and is totally configurable (any integration time, any discriminator, etc.). It can switch from one signal to another in 1.07 ms, making it possible for the receiver to rapidly adapt to its sensed environment. All this would consume 3.5 mW/channel in an ASIC implementation, i.e., with a slight overhead compared to the original GPS L1 C/A dedicated channel from which it was derived. After extensive surveys on GNSS signals and tracking channels, this paper details the implementation strategies that led to the proposed universal channel architecture. Validation is achieved using GNSS signals issued from different constellations, frequency bands, modulations and spreading code schemes. A discussion on acquisition approaches and conclusive remarks follow, which open up a new signal selection challenge, rather than satellite selection.

  17. Carbohydrate metabolism teaching strategy for the Pharmacy course, applying active teaching methodology

    Directory of Open Access Journals (Sweden)

    Uderlei Donizete Silveira Covizzi

    2012-12-01

    Full Text Available The traditional teaching method has been widely questioned on the development of skills and abilities in training healthcare professionals. In the traditional methodology the main transmitter of knowledge is the teacher while students assume passive spectator role. Some Brazilian institutions broke with this model, structuring the curriculum to student-centered learning. Some medical schools have adopted the Problem Based Learning (PBL, a methodology that presents problem questions, to be encountered by future physicians, for resolution in small tutorial groups. Our work proposes to apply an active teaching-learning methodology addressing carbohydrate metabolism during the discipline of biochemistry for under graduation students from pharmacy course. Thus, the academic content was presented through brief and objective talks. Later, learners were split into tutorial groups for the resolution of issues in context. During the activities, the teacher drove the discussion to the issues elucidation. At the end of the module learners evaluated the teaching methodology by means of an applied questionnaire and the developed content was evaluated by an usual individual test. The questionnaire analysis indicates that students believe they have actively participated in the teaching-learning process, being encouraged to discuss and understand the theme. The answers highlight closer ties between students and tutor. According to the professor, there is a greater student engagement with learning. It is concluded that an innovative methodology, where the primary responsibility for learning is centered in the student himself, besides to increase the interest in learning, facilitates learning by cases discussion in groups. The issues contextualization establishes a narrowing between theory and practice.

  18. Applying Business Process Re-Engineering to Public Sector as A New Public Management Strategy

    Directory of Open Access Journals (Sweden)

    Ropinder Oberoi

    2013-08-01

    Full Text Available The introduction of Business Process Reengineering (BPR to the public sector follows the much broader trend of New Public Management. BPR in the public sector mostly means amalgamation of business processes, computerization of various activities and removal of some unnecessary ones. BPR assimilates a radical premeditated scheme of business pro-cess reengineering and an additional progressive technique of uninterrupted process improvement with adequate information technology (IT and e-business infrastructure strategies. Public organizations have specific and exclusive features that differentiae-ate them from private sector organizations. Based on the literature review and examining of study find-ings, it is argued that a public sector organization can employ BPR to get better its process and overall organizational performance, if it (1 has accrues a collection of BPR-relevant resources and capabilities; (2 has embarked on BPR with adequate depth and breadth; (3 is developing a post-BPR complementary set of skills, systems and technologies, which are essential to further develop the organizational impact of the BPR; and (4 has successfully mitigated the effects of BPR implementation problems. In addition to its effect on administration and ser-vice delivery processes through reduction of the processing time, work steps and cost of government processes, BPR also contributes to enhancing citizen/customer and employee satisfaction, increasing organizational transparency and responsiveness which have also become an essential objective of New Public Management. Therefore, public sector BPR is emerging as an indispensable to performance of organizations in the developing economy. The essential questions addressed in this paper are: What are the scenario and impending problems of reengineering applications in the public sector? Can it be functional for the public sector in attending to frequent problems blockading bureaucracies of developed and

  19. Strategy for applying scaling technique to water retention curves of forest soils

    Science.gov (United States)

    Hayashi, Y.; Kosugi, K.; Mizuyama, T.

    2009-12-01

    Describing the infiltration of water in soils on a forested hillslope requires the information of spatial variability of water retention curve (WRC). By using a scaling technique, Hayashi et al. (2009), found that the porosity mostly characterizes the spatial variability of the WRCs on a forested hillslope. This scaling technique was based on a model, which assumes a lognormal pore size distribution and contains three parameters: the median of log-transformed pore radius, ψm, the variance of log-transformed pore radius, σ, and the effective porosity, θe. Thus, in the scaling method proposed by Hayashi et al. (2009), θe is a scaling factor, which should be determined for each individual soil, and that ψm and σ are reference parameter common for the whole data set. They examined this scaling method using θe calculated as a difference between the observed saturated water content and water content observed at ψ = -1000 cm for each sample and, ψm and σ derived from the whole data set of WRCs on the slope. Then it was showed that this scaling method could explain almost 90 % of the spatial variability in WRCs on the forested hillslope. However, this method requires the whole data set of WRCs for deriving the reference parameters (ψm and σ). For applying the scaling technique more practically, in this study, we tested a scaling method using the reference parameter derived from the WRCs at a small part of the slope. In order to examine the proposed scaling method, the WRCs for the 246 undisturbed forest soil samples, collected at 15 points distributed from downslope to upslope segments, were observed. In the proposed scaling method, we optimized the common ψm and σ to the WRCs for six soil samples, collected at one point on the middle-slope, and applied these parameters to a reference parameter for the whole data sets. The scaling method proposed by this study exhibited an increase of only 6 % in the residual sum of squares as compared with that of the method

  20. Management Strategy Evaluation Applied to Coral Reef Ecosystems in Support of Ecosystem-Based Management.

    Science.gov (United States)

    Weijerman, Mariska; Fulton, Elizabeth A; Brainard, Russell E

    2016-01-01

    Ecosystem modelling is increasingly used to explore ecosystem-level effects of changing environmental conditions and management actions. For coral reefs there has been increasing interest in recent decades in the use of ecosystem models for evaluating the effects of fishing and the efficacy of marine protected areas. However, ecosystem models that integrate physical forcings, biogeochemical and ecological dynamics, and human induced perturbations are still underdeveloped. We applied an ecosystem model (Atlantis) to the coral reef ecosystem of Guam using a suite of management scenarios prioritized in consultation with local resource managers to review the effects of each scenario on performance measures related to the ecosystem, the reef-fish fishery (e.g., fish landings) and coral habitat. Comparing tradeoffs across the selected scenarios showed that each scenario performed best for at least one of the selected performance indicators. The integrated 'full regulation' scenario outperformed other scenarios with four out of the six performance metrics at the cost of reef-fish landings. This model application quantifies the socio-ecological costs and benefits of alternative management scenarios. When the effects of climate change were taken into account, several scenarios performed equally well, but none prevented a collapse in coral biomass over the next few decades assuming a business-as-usual greenhouse gas emissions scenario.

  1. Management Strategy Evaluation Applied to Coral Reef Ecosystems in Support of Ecosystem-Based Management.

    Directory of Open Access Journals (Sweden)

    Mariska Weijerman

    Full Text Available Ecosystem modelling is increasingly used to explore ecosystem-level effects of changing environmental conditions and management actions. For coral reefs there has been increasing interest in recent decades in the use of ecosystem models for evaluating the effects of fishing and the efficacy of marine protected areas. However, ecosystem models that integrate physical forcings, biogeochemical and ecological dynamics, and human induced perturbations are still underdeveloped. We applied an ecosystem model (Atlantis to the coral reef ecosystem of Guam using a suite of management scenarios prioritized in consultation with local resource managers to review the effects of each scenario on performance measures related to the ecosystem, the reef-fish fishery (e.g., fish landings and coral habitat. Comparing tradeoffs across the selected scenarios showed that each scenario performed best for at least one of the selected performance indicators. The integrated 'full regulation' scenario outperformed other scenarios with four out of the six performance metrics at the cost of reef-fish landings. This model application quantifies the socio-ecological costs and benefits of alternative management scenarios. When the effects of climate change were taken into account, several scenarios performed equally well, but none prevented a collapse in coral biomass over the next few decades assuming a business-as-usual greenhouse gas emissions scenario.

  2. A Conserved Potential Development Framework Applies to Shoots of Legume Species with Contrasting Morphogenetic Strategies

    Science.gov (United States)

    Faverjon, Lucas; Escobar-Gutiérrez, Abraham J.; Litrico, Isabelle; Louarn, Gaëtan

    2017-01-01

    axis captured a trade-off between maximum leaf size and the ability to produce numerous phytomers, while the second distinguished morphogenetic strategies reliant on either petiole or internode expansion to achieve space colonization. The consequences of this quantitative framework are discussed, along with its possible applications regarding plant phenotyping and modeling.

  3. Four Perspectives of Sustainability Applied to the Local Food Strategy of Ghent (Belgium: Need for a Cycle of Democratic Participation?

    Directory of Open Access Journals (Sweden)

    Maarten Crivits

    2016-01-01

    Full Text Available As part of cities’ increasing commitment to sustainable development, local food systems are becoming a policy priority. In this article we focus on the case of a local food system in Ghent, Belgium. We adopt the notion of Hajer et al. (2015 that top-down steering of environmental issues (so-called “cockpit-ism” is insufficient, incomplete and in need of revision. Using their four perspectives on sustainable development (Hajer et al., 2015, we explore, analyze and valorize the potential of the actors, motives and logics for change within the agriculture and food system in the Ghent region. Applying these four perspectives, we have mapped the current positive developments as well as identified the weaknesses, pitfalls and opportunities of a local food strategy. The discussion section contains two important strategies for good governance of sustainable urban development: first, a governance approach to stimulate participation and representation in a complex, unequal and rapidly changing context; and second, a reflection on how local food strategies can drive global sustainability. In conclusion, we argue for the integration of a global sustainability approach within sustainable urban development.

  4. Applying the Creativity in Oder to Generate Innovation Projects: the Practical Case Study of a Didactic Strategy

    Directory of Open Access Journals (Sweden)

    Eliana Maria dos Santos Pereira Alves

    2015-08-01

    Full Text Available A current challenge in teaching practice is to transform classrooms into laboratories to exchange experiences in courses whose goal is to enhance the professional skills in a practical and meaningful way. The search for improvement demonstrates that, increasingly, professionals become aware that organizations coexist in highly competitive environments, seeking to conquer more markets based on sustainable competitive advantages demanding fast responses of its employees. Considering that the process of creativity can be stimulated through the establishment of a suitable environment, this study aims to discuss the application of a didactic strategy developed for this purpose. Using the single case study methodology, it was used the technique of unstructured observation (informal or single to carry out the collection and the recording of events that occurred during the strategy application. It discusses elements such as identifying opportunities, creativity, innovation and entrepreneurship, seeking their relationships to understand how it is possible to motivate the generation of proposals for innovative projects in educational environments. As a result, it is presented the perceptions of teachers on the didactic strategy applied, emphasizing that a suitable environment for the development of ideas encourages the student to propose solutions for the improbabilities, creating innovative alternatives to the identified needs.

  5. An empirical study on key factors for purchasing strategy on project based organizations: A case study of gas field development projects

    Directory of Open Access Journals (Sweden)

    Aboulfazl Kazazi

    2012-08-01

    Full Text Available One of the primary concerns in development of oil and gas resources is to find the critical success factors associated with different important projects. Purchasing and procurement plays a key role in these projects. There is no doubt that in history of similar studies, there are not much studies to determine key factors. The proposed study of this paper presents an empirical study to find these factors in one of the most important gas filed in Iran is now South Pars Gas Field. The study distributes a questionnaire consists of various questions associated with purchasing activities. We investigate the feedbacks gathered from decision makers using factor analysis. The results of our survey reveal that there are three categories of organizational strategy, the relative importance of strategy and risk according to factor analysis. Each factor consists of many other factors and the relative importance of all factors are investigated.

  6. Dyna-H: a heuristic planning reinforcement learning algorithm applied to role-playing-game strategy decision systems

    CERN Document Server

    Santos, Matilde; Lopez, Victoria

    2011-01-01

    In a Role-Playing Game, finding optimal trajectories is one of the most important tasks. In fact, the strategy decision system becomes a key component of a game engine. Determining the way in which decisions are taken (e.g. online, batch or simulated) and the consumed resources in decision making (e.g. execution time, memory) will influence, in mayor degree, the game performance. When classical search algorithms such as A* can be used, they are the very first option. Nevertheless, such methods rely on precise and complete models of the search space, and so there are many interesting scenarios where its application is not possible, hence model free methods for sequential decision making under uncertainty are the best choice. In this paper, we propose a heuristic planning strategy to incorporate, into a Dyna agent, the ability of heuristic-search in path-finding. The proposed Dyna-H algorithm, as A* does, selects branches more likely to produce outcomes than other branches. However, it has the advantages, A* ha...

  7. The implementation of the import substitution strategy as the key to the development of export potential of industrial enterprises

    Directory of Open Access Journals (Sweden)

    T.V. Vashchenko

    2015-09-01

    Full Text Available The aim of the article. The article examines the preconditions and prospects of import substitution implementation by native producers of machine-building industry. It is based on the analysis of the different countries experiences in import substitution implementation for their economic growth and renovation. The rational explanation of the import substitution strategy formation and implementation at the management level of enterprise development is given. It allows to form more clearly the mission and objectives of enterprise’s effective management in an unstable external environment. The results of the analysis. The definition of the concept «industrial enterprise import substitution strategy» was formulated. The scientific and methodical aspects to the definition of the perspective directions for the import substitution strategy were developed. It allows to choose the best solution while considering the set of criteria. The matrix «the group's share in the product portfolio of an enterprise – the priority directions of the import substitution strategy realization» was developed using the method of hierarchies analysis. It helps to choose direction of the import substitution strategy implementation. According to the matrix it is possible to distinguish five zones in which it is ossible to choose the direction of the import substitution strategy implementation at industrial enterprises. Conclusions and directions of further researches. It is proved that for the purpose of determining of strategically effective directions of industrial enterprise development it is advisable to use principle of «sales funnel» phased selection of promising groups of product portfolio according to the criteria «degree of market risk and the additional ratio of return per unit of risk investment». The analysis of these indicators provides an opportunity to identify risk of attractive investment project and growth of the commodity portfolio groups

  8. Impact of metal ions in porphyrin-based applied materials for visible-light photocatalysis: Key information from ultrafast electronic spectroscopy

    KAUST Repository

    Kar, Prasenjit

    2014-07-10

    ProtoporphyrinIX-zinc oxide (PP-ZnO) nanohybrids have been synthesized for applications in photocatalytic devices. High-resolution transmission electron microscopy (HRTEM), X-ray diffraction (XRD), and steady-state infrared, absorption, and emission spectroscopies have been used to analyze the structural details and optical properties of these nanohybrids. Time-resolved fluorescence and transient absorption techniques have been applied to study the ultrafast dynamic events that are key to photocatalytic activities. The photocatalytic efficiency under visible-light irradiation in the presence of naturally abundant iron(III) and copper(II) ions has been found to be significantly retarded in the former case, but enhanced in the latter case. More importantly, femtosecond (fs) transient absorption data have clearly demonstrated that the residence of photoexcited electrons from the sensitizer PP in the centrally located iron moiety hinders ground-state bleach recovery of the sensitizer, affecting the overall photocatalytic rate of the nanohybrid. The presence of copper(II) ions, on the other hand, offers additional stability against photobleaching and eventually enhances the efficiency of photocatalysis. In addition, we have also explored the role of UV light in the efficiency of photocatalysis and have rationalized our observations from femtosecond- to picosecond-resolved studies. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. Formative Assessment for College Readiness: Measuring Skill and Growth in Five Key Cognitive Strategies Associated with Postsecondary Success

    Science.gov (United States)

    Conley, David; Lombardi, Allison; Seburn, Mary; McGaughy, Charis

    2009-01-01

    This study reports the preliminary results from a field test of the College-readiness Performance Assessment System (C-PAS), a large-scale, 6th-12th grade criterion-referenced assessment system that utilizes classroom-embedded performance tasks to measure student progress toward the development of key cognitive skills associated with success in…

  10. Comparative Analysis of Interval, Skipped, and Key-vertebral Pedicle Screw Strategies for Correction in Patients With Lenke Type 1 Adolescent Idiopathic Scoliosis.

    Science.gov (United States)

    Wang, Fei; Xu, Xi-Ming; Lu, Yanghu; Wei, Xian-Zhao; Zhu, Xiao-Dong; Li, Ming

    2016-03-01

    Pedicle screw constructs have become the mainstay for surgical correction in patients with spinal deformities. To reduce or avoid the risk of pedicle screw-based complications and to decrease the costs associated with pedicle screw instrumentation, some authors have introduced interval, skipped, and key-vertebral pedicle screw strategies for correction. However, there have been no comparisons of outcomes among these 3 pedicle screw-placement strategies.The aim of this study was to compare the correlative clinical outcomes of posterior correction and fusion with pedicle screw fixation using these 3 surgical strategies.Fifty-six consecutive patients with Lenke type 1 adolescent idiopathic scoliosis were included in this study. Twenty patients were treated with the interval pedicle screw strategy (IPSS), 20 with the skipped pedicle screw strategy (SPSS), and 16 with the key-vertebral pedicle screw strategy (KVPSS). Coronal and sagittal radiographs were analyzed before surgery, at 1 week after surgery, and at the last follow-up after surgery.There were no significant differences among the 3 groups regarding preoperative radiographic parameters. No significant difference was found between the IPSS and SPSS groups in correction of the main thoracic curve (70.8% vs 70.0%; P = 0.524). However, there were statistically significant differences between the IPSS and KVPSS groups (70.8% vs 64.9%) and between the SPSS and KVPSS groups (70.0% vs 64.9%) in correction of the main thoracic curve (P SPSS group was significantly higher than those in the IPSS (P SPSS and KVPSS groups (P SPSS, it can achieve a satisfactory clinical outcome and is more cost-effective.

  11. Multi-Objective Thermo-Economic Optimization Strategy for ORCs Applied to Subcritical and Transcritical Cycles for Waste Heat Recovery

    Directory of Open Access Journals (Sweden)

    Steven Lecompte

    2015-04-01

    Full Text Available Organic Rankine cycles (ORCs are an established technology to convert waste heat to electricity. Although several commercial implementations exist, there is still considerable potential for thermo-economic optimization. As such, a novel framework for designing optimized ORC systems is proposed based on a multi-objective optimization scheme in combination with financial appraisal in a post-processing step. The suggested methodology provides the flexibility to quickly assess several economic scenarios and this without the need of knowing the complex design procedure. This novel way of optimizing and interpreting results is applied to a waste heat recovery case. Both the transcritical ORC and subcritical ORC are investigated and compared using the suggested optimization strategy.

  12. Quantitative versus qualitative approaches: a comparison of two research methods applied to identification of key health issues for working horses in Lesotho.

    Science.gov (United States)

    Upjohn, M M; Attwood, G A; Lerotholi, T; Pfeiffer, D U; Verheyen, K L P

    2013-03-01

    The relative merits and potential complementarity of participatory methods and classical epidemiological techniques in veterinary-related research is a current topic of discussion. Few reported studies have applied both methodologies within the same research framework to enable direct comparison. The aim of this study was to compare issues identified by a classical epidemiological study of horses and their owners with those identified by owner communities using participatory approaches. In 2009, a cross-sectional survey was undertaken as part of an impact assessment study of farrier and saddler training programmes, and a small-scale nutrition trial, implemented in Lesotho by a UK-based equine charity. In total, 245 horses and their 237 owners participated in the survey which comprised a face-to-face structured questionnaire covering knowledge and practices relating to equine husbandry and primary healthcare, clinical examination and sampling of horses, and examination of tack used on those horses. In early 2010, 56 owners in three survey regions, some of whom participated in the survey, attended a participatory workshop. Each workshop group created a local resource map whilst discussing and identifying key issues associated with horse ownership and what might have an adverse impact on horse health and work. Following map completion, each group began by prioritising the identified issues, and then ranked them using a pairwise/ranking matrix to reflect how important issues were in relation to each other. Overall priority issues were: mouth problems, hunger and nutrition, diseases (including infectious diseases, parasites and colic), husbandry (including wound management), and feet and limb problems. Major health issues identified by cross-sectional study included sharp enamel points on teeth, endo- and ectoparasite infestation, suboptimal nutrition, tack-associated wounds, overgrown and poorly balanced feet and poor owner husbandry knowledge and practices. Whilst

  13. Service-Learning Might be the Key: Learning From the Challenges and Implementation Strategies in EFL Teacher Education in Oman

    Directory of Open Access Journals (Sweden)

    Thuwayba Al Barwani

    2013-07-01

    Full Text Available Service-learning, a major reform in higher education, is considered essential for developing citizenship for the 21st century. This paper reports a study aimed at investigating the problems and challenges faced when implementing service-learning in pre-service education of teachers of English as a Foreign Language (EFL and carried out in the Sultanate of Oman. The study also investigated the strategies that could possibly be used to overcome the challenges. A two-part questionnaire was designed and administered to a sample of 65 respondents comprising EFL instructors, pre-service student-teachers, administrators and administrative support staff. The first part of the questionnaire included 26 items covering 5 dimensions of challenges and the second consisted of 14 dimensions that covered a total of 77 strategies for overcoming the challenges identified. In general, the challenges were perceived to present serious problems in implementing service-learning; there were no significant differences between respondent groups on account of gender. The study also found that the strategies suggested were perceived to be very helpful in overcoming the challenges with no significant differences between faculty and administrators.

  14. Improving the sampling strategy of the Joint Danube Survey 3 (2013) by means of multivariate statistical techniques applied on selected physico-chemical and biological data.

    Science.gov (United States)

    Hamchevici, Carmen; Udrea, Ion

    2013-11-01

    The concept of basin-wide Joint Danube Survey (JDS) was launched by the International Commission for the Protection of the Danube River (ICPDR) as a tool for investigative monitoring under the Water Framework Directive (WFD), with a frequency of 6 years. The first JDS was carried out in 2001 and its success in providing key information for characterisation of the Danube River Basin District as required by WFD lead to the organisation of the second JDS in 2007, which was the world's biggest river research expedition in that year. The present paper presents an approach for improving the survey strategy for the next planned survey JDS3 (2013) by means of several multivariate statistical techniques. In order to design the optimum structure in terms of parameters and sampling sites, principal component analysis (PCA), factor analysis (FA) and cluster analysis were applied on JDS2 data for 13 selected physico-chemical and one biological element measured in 78 sampling sites located on the main course of the Danube. Results from PCA/FA showed that most of the dataset variance (above 75%) was explained by five varifactors loaded with 8 out of 14 variables: physical (transparency and total suspended solids), relevant nutrients (N-nitrates and P-orthophosphates), feedback effects of primary production (pH, alkalinity and dissolved oxygen) and algal biomass. Taking into account the representation of the factor scores given by FA versus sampling sites and the major groups generated by the clustering procedure, the spatial network of the next survey could be carefully tailored, leading to a decreasing of sampling sites by more than 30%. The approach of target oriented sampling strategy based on the selected multivariate statistics can provide a strong reduction in dimensionality of the original data and corresponding costs as well, without any loss of information.

  15. Bacterial Biofilms and Catheters: A Key to Understanding Bacterial Strategies in Catheter-Associated Urinary Tract Infection

    Directory of Open Access Journals (Sweden)

    J Curtis Nickel

    1992-01-01

    Full Text Available Despite major technological improvements in catheter drainage systems, the indwelling Foley catheter remains the most common cause of nosocomial infection in medical practice. By approaching this common complicated urinary tract infection from the perspective of the biofilm strategy bacteria appear to use to overcome obstacles to produce bacteriuria, one appreciates a new understanding of these infections. An adherent biofilm of bacteria in their secretory products ascends the luminal and external surface of the catheter and drainage system from a contaminated drainage spigot or urethral meatus into the bladder. If the intraluminal route of bacterial ascent is delayed by strict sterile closed drainage or addition of internal modifications to the system, the extraluminal or urethral route assumes greater importance in the development of bacteriuria, but takes significantly longer. Bacterial growth within these thick coherent biofilms confers a large measure of relative resistance to antibiotics even though the individual bacterium remains sensitive, thus accounting for the failure of antibiotic therapy. With disruption of the protective mucous layer of the bladder by mechanical irritation, the bacteria colonizing the catheter can adhere to the bladder’s mucosal surface and cause infection. An appreciation of the role of bacterial biofilms in these infections should suggest future directions for research that may ultimately reduce the risk of catheter-associated infection.

  16. Marketing 'less harmful, low-tar' cigarettes is a key strategy of the industry to counter tobacco control in China.

    Science.gov (United States)

    Yang, Gonghuan

    2014-03-01

    While the 'low-tar' scheme has been widely recognised as a misleading tactic used by the tobacco industry to deceive the public about the true risks of cigarette smoking, a similar campaign using the slogan of 'less harmful, low tar' was launched by the Chinese tobacco industry, that is, State Tobacco Monopoly Administration/China National Tobacco Corporation and began to gain traction during the last decade. Despite the fact that no sufficient research evidence supports the claims made by the industry that these cigarettes are safer, the Chinese tobacco industry has continued to promote them using various health claims. As a result, the production and sales of 'less harmful, low-tar' cigarettes have increased dramatically since 2000. Recently, a tobacco industry senior researcher, whose main research area is 'less harmful, low-tar' cigarettes, was elected as an Academician to the prestigious Chinese Academy of Engineering for his contribution to developing 'less harmful, low-tar' cigarettes. The tobacco researcher's election caused an outcry from the tobacco control community and the general public in China. This paper discusses the Chinese tobacco industry's 'less harmful, low-tar' initiatives and calls for the Chinese government to stop the execution of this deceptive strategy for tobacco marketing.

  17. Protein homeostasis disorders of key enzymes of amino acids metabolism: mutation-induced protein kinetic destabilization and new therapeutic strategies.

    Science.gov (United States)

    Pey, Angel L

    2013-12-01

    Many inborn errors of amino acids metabolism are caused by single point mutations affecting the ability of proteins to fold properly (i.e., protein homeostasis), thus leading to enzyme loss-of-function. Mutations may affect protein homeostasis by altering intrinsic physical properties of the polypeptide (folding thermodynamics, and rates of folding/unfolding/misfolding) as well as the interaction of partially folded states with elements of the protein homeostasis network (such as molecular chaperones and proteolytic machineries). Understanding these mutational effects on protein homeostasis is required to develop new therapeutic strategies aimed to target specific features of the mutant polypeptide. Here, I review recent work in three different diseases of protein homeostasis associated to inborn errors of amino acids metabolism: phenylketonuria, inherited homocystinuria and primary hyperoxaluria type I. These three different genetic disorders involve proteins operating in different cell organelles and displaying different structural complexities. Mutations often decrease protein kinetic stability of the native state (i.e., its half-life for irreversible denaturation), which can be studied using simple kinetic models amenable to biophysical and biochemical characterization. Natural ligands and pharmacological chaperones are shown to stabilize mutant enzymes, thus supporting their therapeutic application to overcome protein kinetic destabilization. The role of molecular chaperones in protein folding and misfolding is also discussed as well as their potential pharmacological modulation as promising new therapeutic approaches. Since current available treatments for these diseases are either burdening or only successful in a fraction of patients, alternative treatments must be considered covering studies from protein structure and biophysics to studies in animal models and patients.

  18. N'Dow sees water as key to a sustainable peace. Outlines a new strategy for the new century.

    Science.gov (United States)

    Singh, V

    1996-06-01

    Water availability has emerged as the most important element of peace, so it is central to the UN's peacekeeping mandate as it moves into the next century, Wally N'Dow said Wednesday. Addressing a panel on the growing water needs of cities, N'Dow, the Secretary General of Habitat II, said lack of water is one of the 'most critical factors' that cause conflict. N'Dow urged city officials, nongovernmental organizations and other Habitat players to act on the recommendations of the panel, which he labeled "the single most important dialogue at this conference." N'Dow stressed cost effectiveness, better technology, and new management systems as the three most important elements of a new strategy. More than 1 billion people worldwide--mostly in poor countries--do not have access to safe drinking water. Also, most of the world's largest cities, including some in rich countries, do not treat their waste water adequately. The challenge for growing cities, UN officials say, is not just to provide safe water but also to ensure the poor can afford it. "Habitat is a wake-up call, as 40% of city residents do not have water," said Beatrice Labonne, director of the UN's Division for Environment Management and Social Development. Currently, subsidies skew water prices overwhelmingly in favor of the rich. In Jakarta, Indonesia, piped water accounts for only 14% of the total water supply, according to the World Bank. Many poor residents shut out of the system have to pay more than 20 times the price paid by the rich. Water pricing has long been a hot political issue, which is partly why the World Bank and the UN have called for privatization of the water sector. But, they say, governments must regulate the firms to guarantee safe water and fair pricing. Privatization is seen as a solution to manipulation of government utilities by vested interests. For example, governments often grant huge concessions to industry as a means of helping the latter create more jobs. Last March, Habitat

  19. A novel fermentation strategy for removing the key inhibitor acetic acid and efficiently utilizing the mixed sugars from lignocellulosic hydrolysates

    Energy Technology Data Exchange (ETDEWEB)

    Mark A. Eiteman PHD; Elliot Altman Phd

    2009-02-11

    As part of preliminary research efforts, we have completed several experiments which demonstrate 'proof of concept.' These experiments addressed the following three questions: (1) Can a synthetic mixed sugar solution of glucose and xylose be efficiently consumed using the multi-organism approach? (2) Can this approach be used to accumulate a model product? (3) Can this approach be applied to the removal of an inhibitor, acetate, selectively from mixtures of xylose and glucose? To answer the question of whether this multi-organism approach can effectively consume synthetic mixed sugar solutions, we first tested substrate-selective uptake using two strains, one unable to consume glucose and one unable to consume xylose. The xylose-selective strain ALS998 has mutations in the three genes involved in glucose uptake, rendering it unable to consume glucose: ptsG codes for the Enzyme IICB{sup Glc} of the phosphotransferase system (PTS) for carbohydrate transport (Postma et al., 1993), manZ codes for the IID{sup Man} domain of the mannose PTS permease (Huber, 1996), glk codes for glucokinase (Curtis and Epstein 1975) We also constructed strain ALS1008 which has a knockout in the xylA gene encoding for xylose isomerase, rendering ALS1008 unable to consume xylose. Two batch experiments and one continuous bioprocess were completed. In the first experiment, each strain was grown separately in a defined medium of 8 g/L xylose and 15 g/L glucose which represented xylose and glucose concentrations that can be generated by actual biomass. In the second experiment, the two strains were grown together in batch in the same defined, mixed-sugar medium. In a third experiment, we grew the strains continuously in a 'chemostat', except that we shifted the concentrations of glucose and xylose periodically to observe how the system would respond. (For example, we shifted the glucose concentration suddenly from 15 g/L to 30 g/L in the feed).

  20. Employee retention: applying hospital strategies to EMS. With increasing demand for and decreasing supply of EMTs and paramedics, retention strategies should be a priority for EMS organizations.

    Science.gov (United States)

    Powers, Robert

    2007-10-01

    Retention strategies are a priority for EMS organizations. These strategies must be broad and varied to address the variety of reasons employees leave healthcare organizations. The value of creating these programs should manifest itself through increased employee satisfaction and an increased sense of belonging to the organization.

  1. Key Problems and Strategy Research of Medical Health Big Data%医疗健康大数据关键问题及对策研究

    Institute of Scientific and Technical Information of China (English)

    黄晓琴

    2016-01-01

    医疗健康大数据分析能发挥区域卫生信息平台上汇聚采集的数据价值。针对目前医疗健康大数据分析存在的一些关键问题,结合在上海市卫计委医疗健康大数据分析的项目案例,探讨了医疗健康大数据关键问题的对策。研究成果表明解决医疗健康大数据关键问题非常重要,包括确定医疗健康大数据业务主题、医疗健康大数据技术架构、医疗健康数据的数据分类、医疗健康数据标准制定策略、医疗健康数据治理策略和医疗健康大数据分析关键技术。案例研究表明,解决医疗健康大数据的关键问题对已有医疗健康数据做科研分析、临床指导、医学经济研究等具有重要意义。%In view of the present medical health the key problems of big data analysis, combined the case of medical health big data analysis of Shanghai regional health projects, put forward the countermeasures to solve the key problems of medical health big data. Research shows that solving the medical health big data problems is very important. Including expounds the medical health big data application research status quo and necessity, discusses the medical health big data analysis key problems, medical health big data analysis strategy are given, including determine the medical health big data business subject, determine medical health big data technical architecture, medical health data classification, medical health data standards formulate strategy, medical health data governance policies, medical health big data analysis key technology. Case study shows that, solve the critical issue of medical health big data analysis has the vital significance, to existing medical health data to do scientific research, clinical guidance, and medical economic research.

  2. A new co-operative inversion strategy via fuzzy clustering technique applied to seismic and magnetotelluric data

    Science.gov (United States)

    Thong Kieu, Duy; Kepic, Anton

    2015-04-01

    better way to handle this limitation on prior petrophysical knowledge is to integrate complementary information of seismic reflection and MT data using a co-operative inversion process. This strategy can utilize the high resolution of seismic data to support low resolution of MT data and vice versa; the seismic reflection model, which lacks low frequency information, benefits from the general background produced by MT data. Hence, the most comprehensive process is to use co-operative inversion of seismic reflection and MT data constrained by petrophysics via FCM. Using synthetic examples, we show that our methods can effectively recover the true earth models. Separate inversion of seismic and MT using FCM produces significantly better results than a conventional inversion process. The co-operative inversion of seismic and MT data demonstrate that seismic data increases the effective resolution of MT data and in turn seismic impedance models benefit from the lower frequency data in the MT model. Key words: seismic inversion; magnetotelluric inversion; co-operative inversion; petrophysical constraint; fuzzy c-means

  3. OSGi Key Technology and the Applying Research%O SG i关键技术及其应用研究

    Institute of Scientific and Technical Information of China (English)

    胡佳慧; 吴思竹; 方安

    2015-01-01

    The paper summarizes and shares the current key technology of OSGi including the hierarchical model, the extended func-tion, the realization framework and the technical features.It illustrates OSGi's special advantages in service-oriented development of the modern information application system by giving examples and combining the three typical application fields, namely medical and health service, scientific research platform construction and remote information processing.%总结和分析目前OSGi关键技术,包括分层模型、扩展功能、实现框架和技术特点,结合医疗卫生服务、科研平台建设和远程信息处理3个典型应用领域,举例说明OSGi在以服务为导向的现代信息应用系统开发中的独特优势。

  4. Applying Future Studies Methods to Understanding the Impact of University Information and Communication Technology Strategies on Learning

    Science.gov (United States)

    Aczel, J. C.; Hardy, P.

    2007-01-01

    This article aims to explore the potential of certain future studies techniques to provide insight into the question of the impact of higher education information and communication technology (ICT) strategies on student learning. The approach is to consider three case studies of new universities in different countries, and to identify the main…

  5. [STRATEGY OF USE AND MAINTENANCE OF CLINICAL HOSPITAL CENTER RIJEKA IN ACCORDANCE WITH KEY PERFORMANCE INDICATORS FOR STRATEGIC HEALTHCARE FACILITIES MAINTENANCE].

    Science.gov (United States)

    Sjekavica, Mariela; Haller, Herman; Cerić, Anita

    2015-01-01

    Building usage is the phase in the building life cycle that is most time-consuming, most functional, most significant due to building purpose and often systematically ignored. Maintenance is the set of activities that ensure the planned duration of facility exploitation phase in accordance with the requirements for quality maintenance of a large number of important building features as well as other elements immanent to the nature of facilities' life. The aim of the study is to show the analysis of the current state of organized, planned and comprehensive managerial approach in hospital utilization and maintenance in the Republic of Croatia, given on the case study of Clinical hospital center in Rijeka. The methodology used consists of relevant literature section of theory of facility utilization, maintenance and management in general, hospital buildings especially, display of practice on case study, and comparison of key performance indicators values obtained through interview with those that author Igal M. Shohet defined in his study by field surveys and statistical analyses. Despite many positive indicators of Clinical hospital center Rijeka maintenance, an additional research is needed in order to define a more complete national hospital maintenance strategy.

  6. Applying Systems Engineering to Improve the Main Gas Turbine Exhaust System Maintenance Strategy for the CG-47 Ticonderoga Class Cruiser

    Science.gov (United States)

    2015-09-01

    been accomplished without the support of my command and supervisor, Kevin Campbell. Thank you for tolerating my time away from work to research, study ...strategies must be developed with the risk of potential growth and new work in mind. D. THE RIGHT PRICE The Navy maintenance community strives to balance ...service life is receiving considerable attention from Navy leadership. The balance of cost, schedule, and performance parameters associated with ship

  7. Applying peripheral auditory model to improve CIS strategy for cochlear implant%采用听觉外周模型改进电子耳蜗CIS方案

    Institute of Scientific and Technical Information of China (English)

    孙文业; 陶智; 孙宝印; 倪赛华; 王振明; 顾济华

    2014-01-01

    提出了一种改进的CIS电子耳蜗的脉冲刺激方案。利用听觉外周模型产生一种符合听神经发放机制的刺激脉冲序列来刺激电极,代替传统的均匀交替刺激方案,不仅可以通过包络而且可以通过脉冲间隔来传递语音信息,确保了语音的空间编码和时间编码。听觉仿真实验表明,相对于其他两种方案,方案可以有效地传递更多更丰富的语音信息,在汉语声调识别实验中至少提高19.2%识别率,在可懂度的对比实验中具有最高可懂度。%A stimulation strategy for cochlear implant is proposed. The proposed strategy applies the stochastic firing characteristic of peripheral auditory nerve to generate the impulse train stimulating the corresponding electrode, instead of traditional uniform alternating stimulating strategy. Therefore, speech information can be conveyed not only by the envelope but also impulse intervals by the proposed strategy, which ensure both the space principle and time principle. Auditory simulation experiments show that the proposed strategy can efficiently convey more speech information when comparing with the other strategies. The proposed strategy improves the recognition rate at least 19.2% at the Chinese tone recogni-tion experiment, and has the highest intelligibility at the intelligibility contrast experiment.

  8. New cleaning strategies based on carbon nanomaterials applied to the deteriorated marble surfaces: A comparative study with enzyme based treatments

    Energy Technology Data Exchange (ETDEWEB)

    Valentini, Federica, E-mail: federica.valentini@uniroma2.it [Dipartimento di Scienze e Tecnologie Chimiche, Universita degli Studi di Roma Tor Vergata, Via della Ricerca Scientifica 1, 00133 Rome (Italy); Diamanti, Alessia; Carbone, M. [Dipartimento di Scienze e Tecnologie Chimiche, Universita degli Studi di Roma Tor Vergata, Via della Ricerca Scientifica 1, 00133 Rome (Italy); Bauer, E.M. [Istituto di Struttura della Materia del Consiglio Nazionale delle Ricerche (ISM-CNR), RM 1, Via Salaria km 29.3, 00015 Monterotondo (Italy); Palleschi, Giuseppe [Dipartimento di Scienze e Tecnologie Chimiche, Universita degli Studi di Roma Tor Vergata, Via della Ricerca Scientifica 1, 00133 Rome (Italy)

    2012-06-01

    Pentelic marbles from Basilica Neptuni in Rome-Italy (27-25 B.C.) show the signs of deterioration phenomena, which can be identified as black crust as well as black and grey patina. The present study has the twofold objective of assessing the entity of the deterioration and proposing new cleaning strategies based on nanotechnologies. The former is achieved by performing optical microscopy, differential interference contrast (DIC), stereomicroscopy, scanning electron microscopy/energy dispersive X-ray analysis (SEM/EDX) and infrared Fourier transform spectroscopy (FT-IR) analysis. The second objective of this study, involves different treatments based on a new cleaning strategy with carbon nanomaterials and bio-cleaning (used here for comparison) performed with enzymes, as glucose oxidase (GOD) and lipase. Nanomicelles assembled with functionalised carbon nano-fibres (CNF-COOH) and dispersed in Tween 20 medium show the highest cleaning performances in terms of removal of the black crust, compared with the pristine single-wall carbon nanotubes (SWCNTs) and the enzyme-based cleaning treatments. In particular, in these last two cases, the GOD-based biocleaning is efficient in removing the grey and dark patina, but works slow on the black crust. Finally, the lipase based cleaning approach is efficient in the black patina removal, though at the working temperature of 38 Degree-Sign C.

  9. On the Data Mining Technology Applied to Active Marketing Model of International Luxury Marketing Strategy in China— An Empirical Analysis

    OpenAIRE

    Qishen Zhou; Shanhui Wang; Zuowei Yin

    2013-01-01

     This paper emphasizes the importance of active marketing in the customer relationship management. Especially, the data mining technology is applied to establish an active marketing model to empirically analyze the condition of the AH Jewelry Company. Michael Porter's Five Forces Model is employed to assess and calculate the similarity in the active marketing model. Then, the questionnaire analysis on the customer relationship management model is carried out to explain the target market and t...

  10. AN ANALYSIS OF STUDENTS’ SKILL IN APPLYING THE PROBLEM SOLVING STRATEGY TO THE PHYSICS PROBLEM SETTLEMENT IN FACING AEC AS GLOBAL COMPETITION

    Directory of Open Access Journals (Sweden)

    A Halim

    2016-04-01

    Full Text Available The results of previous studies show that students of Physics Education (S1 and S2, FKIP Syiah Kuala University more than 50% do not understand the programs and roadmap of Pilar ASEAN Socio-Cultural Community as a part of the ASEAN Economic Community (AEC. The inference of those results to the implementation of learning physics and science education system needs to be implemented through a link and match learning model that can improve the ability to think critically and creatively, and students need to be trained to be problem solvers, not the problem makers.Based on these problems, through this research has been applied physics learning by using Problem Solving strategies on 25 students of Master of Physical Education and Science. At the end of the implementation study measured the ability of students to apply problem-solving strategies in accordance with Answer Sections of Problem Solving adopted from previous research. The results showed that the majority of students (78% are able to implement the stage I (Focus on Problem with a complete, almost all respondents (91% was only able to implement the stage II (Describe the Physics of about 40%, almost all respondents (91% can apply for the stage III (Plan The Solution approximately 80% of all respondents have been able to implement the stage IV (Excute the Plan perfectly, and all respondents have been able to apply the stage V (Evaluate the Answer completely. It is expected that all staff of teaching Science materials (Physics, they are recommended strongly to implement Problem Solving as an alternative strategy for preparing students to face global competition in the ASEAN Economic Community (AEC.

  11. A spatial model with pulsed releases to compare strategies for the sterile insect technique applied to the mosquito Aedes aegypti.

    Science.gov (United States)

    Oléron Evans, Thomas P; Bishop, Steven R

    2014-08-01

    We present a simple mathematical model to replicate the key features of the sterile insect technique (SIT) for controlling pest species, with particular reference to the mosquito Aedes aegypti, the main vector of dengue fever. The model differs from the majority of those studied previously in that it is simultaneously spatially explicit and involves pulsed, rather than continuous, sterile insect releases. The spatially uniform equilibria of the model are identified and analysed. Simulations are performed to analyse the impact of varying the number of release sites, the interval between pulsed releases and the overall volume of sterile insect releases on the effectiveness of SIT programmes. Results show that, given a fixed volume of available sterile insects, increasing the number of release sites and the frequency of releases increases the effectiveness of SIT programmes. It is also observed that programmes may become completely ineffective if the interval between pulsed releases is greater that a certain threshold value and that, beyond a certain point, increasing the overall volume of sterile insects released does not improve the effectiveness of SIT. It is also noted that insect dispersal drives a rapid recolonisation of areas in which the species has been eradicated and we argue that understanding the density dependent mortality of released insects is necessary to develop efficient, cost-effective SIT programmes.

  12. Multidimensional Strategy for Sensitive Phosphoproteomics Incorporating Protein Prefractionation Combined with SIMAC, HILIC, and TiO(2) Chromatography Applied to Proximal EGF Signaling

    DEFF Research Database (Denmark)

    Engholm-Keller, Kasper; Hansen, Thomas Aarup; Palmisano, Giuseppe;

    2011-01-01

    applied to 400 µg of protein from EGF stimulated HeLa cells. The proteins are separated into membrane and cytoplasmic fractions using sodium carbonate combined with ultracentrifugation. The phosphopeptides were separated into mono-phosphorylated and multi-phosphorylated pools using Sequential elution from...... IMAC (SIMAC) followed by hydrophilic interaction liquid chromatography of the mono- and non-phosphorylated peptides and subsequent titanium dioxide chromatography of the HILIC fractions. This strategy facilitated the identification of >4,700 unique phosphopeptides, while 636 phosphosites were changing...

  13. Empirical Studies on Legitimation Strategies: A Case for International Business Research Extension

    DEFF Research Database (Denmark)

    Turcan, Romeo V.; Marinova, Svetla Trifonova; Rana, Mohammad Bakhtiar

    2012-01-01

    The paper focuses on legitimation and legitimation strategies applied by companies. Following the process of systematic review, we analyze empirical studies exploring legitimation and legitimation strategies from different theoretical perspectives. Using the key findings by reconnoitering and com...

  14. Sustained Reduction of the Dengue Vector Population Resulting from an Integrated Control Strategy Applied in Two Brazilian Cities

    Science.gov (United States)

    Regis, Lêda N.; Acioli, Ridelane Veiga; Silveira, José Constantino; Melo-Santos, Maria Alice Varjal; Souza, Wayner Vieira; Ribeiro, Cândida M. Nogueira.; da Silva, Juliana C. Serafim.; Monteiro, Antonio Miguel Vieira; Oliveira, Cláudia M. F.; Barbosa, Rosângela M. R.; Braga, Cynthia; Rodrigues, Marco Aurélio Benedetti; Silva, Marilú Gomes N. M.; Ribeiro Jr., Paulo Justiniano; Bonat, Wagner Hugo; de Castro Medeiros, Liliam César; Carvalho, Marilia Sa; Furtado, André Freire

    2013-01-01

    Aedes aegypti has developed evolution-driven adaptations for surviving in the domestic human habitat. Several trap models have been designed considering these strategies and tested for monitoring this efficient vector of Dengue. Here, we report a real-scale evaluation of a system for monitoring and controlling mosquito populations based on egg sampling coupled with geographic information systems technology. The SMCP-Aedes, a system based on open technology and open data standards, was set up from March/2008 to October/2011 as a pilot trial in two sites of Pernambuco -Brazil: Ipojuca (10,000 residents) and Santa Cruz (83,000), in a joint effort of health authorities and staff, and a network of scientists providing scientific support. A widespread infestation by Aedes was found in both sites in 2008–2009, with 96.8%–100% trap positivity. Egg densities were markedly higher in SCC than in Ipojuca. A 90% decrease in egg density was recorded in SCC after two years of sustained control pressure imposed by suppression of >7,500,000 eggs and >3,200 adults, plus larval control by adding fishes to cisterns. In Ipojuca, 1.1 million mosquito eggs were suppressed and a 77% reduction in egg density was achieved. This study aimed at assessing the applicability of a system using GIS and spatial statistic analysis tools for quantitative assessment of mosquito populations. It also provided useful information on the requirements for reducing well-established mosquito populations. Results from two cities led us to conclude that the success in markedly reducing an Aedes population required the appropriate choice of control measures for sustained mass elimination guided by a user-friendly mosquito surveillance system. The system was able to support interventional decisions and to assess the program’s success. Additionally, it created a stimulating environment for health staff and residents, which had a positive impact on their commitment to the dengue control program. PMID:23844059

  15. Sustained reduction of the dengue vector population resulting from an integrated control strategy applied in two Brazilian cities.

    Directory of Open Access Journals (Sweden)

    Lêda N Regis

    Full Text Available Aedes aegypti has developed evolution-driven adaptations for surviving in the domestic human habitat. Several trap models have been designed considering these strategies and tested for monitoring this efficient vector of Dengue. Here, we report a real-scale evaluation of a system for monitoring and controlling mosquito populations based on egg sampling coupled with geographic information systems technology. The SMCP-Aedes, a system based on open technology and open data standards, was set up from March/2008 to October/2011 as a pilot trial in two sites of Pernambuco -Brazil: Ipojuca (10,000 residents and Santa Cruz (83,000, in a joint effort of health authorities and staff, and a network of scientists providing scientific support. A widespread infestation by Aedes was found in both sites in 2008-2009, with 96.8%-100% trap positivity. Egg densities were markedly higher in SCC than in Ipojuca. A 90% decrease in egg density was recorded in SCC after two years of sustained control pressure imposed by suppression of >7,500,000 eggs and >3,200 adults, plus larval control by adding fishes to cisterns. In Ipojuca, 1.1 million mosquito eggs were suppressed and a 77% reduction in egg density was achieved. This study aimed at assessing the applicability of a system using GIS and spatial statistic analysis tools for quantitative assessment of mosquito populations. It also provided useful information on the requirements for reducing well-established mosquito populations. Results from two cities led us to conclude that the success in markedly reducing an Aedes population required the appropriate choice of control measures for sustained mass elimination guided by a user-friendly mosquito surveillance system. The system was able to support interventional decisions and to assess the program's success. Additionally, it created a stimulating environment for health staff and residents, which had a positive impact on their commitment to the dengue control program.

  16. Crossover versus Mutation: A Comparative Analysis of the Evolutionary Strategy of Genetic Algorithms Applied to Combinatorial Optimization Problems

    Science.gov (United States)

    Osaba, E.; Carballedo, R.; Diaz, F.; Onieva, E.; de la Iglesia, I.; Perallos, A.

    2014-01-01

    Since their first formulation, genetic algorithms (GAs) have been one of the most widely used techniques to solve combinatorial optimization problems. The basic structure of the GAs is known by the scientific community, and thanks to their easy application and good performance, GAs are the focus of a lot of research works annually. Although throughout history there have been many studies analyzing various concepts of GAs, in the literature there are few studies that analyze objectively the influence of using blind crossover operators for combinatorial optimization problems. For this reason, in this paper a deep study on the influence of using them is conducted. The study is based on a comparison of nine techniques applied to four well-known combinatorial optimization problems. Six of the techniques are GAs with different configurations, and the remaining three are evolutionary algorithms that focus exclusively on the mutation process. Finally, to perform a reliable comparison of these results, a statistical study of them is made, performing the normal distribution z-test. PMID:25165731

  17. Crossover versus Mutation: A Comparative Analysis of the Evolutionary Strategy of Genetic Algorithms Applied to Combinatorial Optimization Problems

    Directory of Open Access Journals (Sweden)

    E. Osaba

    2014-01-01

    Full Text Available Since their first formulation, genetic algorithms (GAs have been one of the most widely used techniques to solve combinatorial optimization problems. The basic structure of the GAs is known by the scientific community, and thanks to their easy application and good performance, GAs are the focus of a lot of research works annually. Although throughout history there have been many studies analyzing various concepts of GAs, in the literature there are few studies that analyze objectively the influence of using blind crossover operators for combinatorial optimization problems. For this reason, in this paper a deep study on the influence of using them is conducted. The study is based on a comparison of nine techniques applied to four well-known combinatorial optimization problems. Six of the techniques are GAs with different configurations, and the remaining three are evolutionary algorithms that focus exclusively on the mutation process. Finally, to perform a reliable comparison of these results, a statistical study of them is made, performing the normal distribution z-test.

  18. Crossover versus mutation: a comparative analysis of the evolutionary strategy of genetic algorithms applied to combinatorial optimization problems.

    Science.gov (United States)

    Osaba, E; Carballedo, R; Diaz, F; Onieva, E; de la Iglesia, I; Perallos, A

    2014-01-01

    Since their first formulation, genetic algorithms (GAs) have been one of the most widely used techniques to solve combinatorial optimization problems. The basic structure of the GAs is known by the scientific community, and thanks to their easy application and good performance, GAs are the focus of a lot of research works annually. Although throughout history there have been many studies analyzing various concepts of GAs, in the literature there are few studies that analyze objectively the influence of using blind crossover operators for combinatorial optimization problems. For this reason, in this paper a deep study on the influence of using them is conducted. The study is based on a comparison of nine techniques applied to four well-known combinatorial optimization problems. Six of the techniques are GAs with different configurations, and the remaining three are evolutionary algorithms that focus exclusively on the mutation process. Finally, to perform a reliable comparison of these results, a statistical study of them is made, performing the normal distribution z-test.

  19. Preparing nursing students to be competent for future professional practice: applying the team-based learning-teaching strategy.

    Science.gov (United States)

    Cheng, Ching-Yu; Liou, Shwu-Ru; Hsu, Tsui-Hua; Pan, Mei-Yu; Liu, Hsiu-Chen; Chang, Chia-Hao

    2014-01-01

    Team-based learning (TBL) has been used for many years in business and science, but little research has focused on its application in nursing education. This quasi-experimental study was to apply the TBL in four nursing courses at a university in Taiwan and to evaluate its effect on students' learning outcomes and behaviors. Adult health nursing, maternal-child nursing, community health nursing, and medical-surgical nursing were the 4 designated courses for this study. Three hundred ninety-nine students in 2-year registered nurse-bachelor of science in nursing, and regular 4-year nursing programs enrolled in the designated courses were contacted. Three hundred eighty-seven students agreed to participate in the data collection. Results showed that the TBL significantly improved the learning behaviors of students in both programs, including class engagement (p learning (p learning behaviors and academic performance. These learning behaviors are important and beneficial for the students' future professional development. The TBL method can be considered for broader application in nursing education.

  20. An up-close look at Urban Regeneration. Cultural approaches and applied strategies for the rebirth of cities

    Directory of Open Access Journals (Sweden)

    Eliana Cangelli

    2015-11-01

    Full Text Available The term Regeneration defines new approaches to the transformation of cities, designed in such a way to move beyond traditional urban-restoration efforts centred around large-scale plans by proposing minimal, non-invasive initiatives that stress listening to the citizenry while bringing to bear creative capabilities and a knowledge of the new-generation technology that has taken on strategic importance when it comes to the development of urban areas. Emphasising an ethical awareness that the city constitutes a shared resource, and that any transformations it undergoes must meet the needs of the public as a whole, endowing the local territory with a strong core structure but a light architecture, is one promising approach to actual renewal efforts. In examining the characteristics of Italian cities, the author focuses on the potential for establishing an environmental balance of the urban metabolism through work on outlying areas, describing the technical and scientific contribution made to date by Technological and Environmental Planning and Design while identifying project design and planning as the path to be taken to arrive at applied assessment and confirmation of the hypothetical approaches explored.

  1. Applied mathematics

    CERN Document Server

    Logan, J David

    2013-01-01

    Praise for the Third Edition"Future mathematicians, scientists, and engineers should find the book to be an excellent introductory text for coursework or self-study as well as worth its shelf space for reference." -MAA Reviews Applied Mathematics, Fourth Edition is a thoroughly updated and revised edition on the applications of modeling and analyzing natural, social, and technological processes. The book covers a wide range of key topics in mathematical methods and modeling and highlights the connections between mathematics and the applied and nat

  2. Enterprise IT governance key decision-making based on strategy alignment and analytic hierarchy process%基于战略匹配和层次分析的企业IT治理关键问题决策

    Institute of Scientific and Technical Information of China (English)

    计春阳; 唐志豪

    2012-01-01

    The alignment between business strategy and IT strategy is the bases for good IT governance performance. And enterprises have to do five key decisions for their IT governance. To convert the alignment ideal into quantitative model so as to support enterprise IT governance decision, the Analytic Network Process (ANP) algorithm was introduced , and collaboration between business and IT strategy was simulated. Business strategy management of Porter, and strategy alignment management of Henderson were borrowed to represent business strategy and IT strategy. An IT governance key decision-making model based on the quantitative results of strategic alignment was put forward and validated through computation and analysis of real cases.%企业战略与IT战略之间的匹配是确保IT治理取得良好绩效的重要前提.企业的IT治理必须完成五个关键问题的决策.为有效地将战略对应的思想转化为量化模型,支持企业决策,本文引入网络层次分析法模拟企业战略与IT战略之间的匹配关系,分别借用Porter的战略管理理论和Henderson的战略匹配模型代表企业战略和IT战略,提出了基于战略匹配的企业IT治理五个关键问题决策模型,并通过实例分析与运算验证了该模型的有效性.

  3. Starting Right: Using "Biophilia," Organism Cards, & Key Themes in Biology to Introduce Student-Centered Active-Learning Strategies at the Beginning of a Course

    Science.gov (United States)

    Metzger, Kelsey

    2013-01-01

    To create rich learning experiences, it is important to engage students from the very beginning of a course and lay the foundation for constructing a community of active learners. The activities described here using "organism cards" connect students' previous knowledge to course goals and address key themes in biology while initiating…

  4. Systematic Management of Change Is the Key to Successful Staff Development. An Initial Study of the Bloomfield Public Schools Staff Development Project. Teacher Essentials, Styles & Strategies (TESS).

    Science.gov (United States)

    Celso, Nicholas; Morris, Harold

    Confronted by a maturing staff, lower teacher turnover rates, declining enrollments, and more sophisticated instructional methods, the Bloomfield (New Jersey) Public School District adopted an ambitious staff development initiative in 1983. This paper describes the planning and implementation strategies used to launch Bloomfield's Teaching…

  5. ID-based Key-insulated Authenticated Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yuan; CHENG Xiao-ming; CHAI Zhen-chuan

    2007-01-01

    The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information. Comparing with the traditional certificate-based cryptography, identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate. However, exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost. In this paper, an ID-based authenticated key agreement protocol was presented. For solving the problem of key exposure of the basic scheme, the technique of key insulation was applied and a key insulated version is developed.

  6. Applying process mapping and analysis as a quality improvement strategy to increase the adoption of fruit, vegetable, and water breaks in Australian primary schools.

    Science.gov (United States)

    Biggs, Janice S; Farrell, Louise; Lawrence, Glenda; Johnson, Julie K

    2014-03-01

    Over the past decade, public health policy in Australia has prioritized the prevention and control of obesity and invested in programs that promote healthy eating-related behaviors, which includes increasing fruit and vegetable consumption in children. This article reports on a study that used process mapping and analysis as a quality improvement strategy to improve the delivery of a nutrition primary prevention program delivered in primary schools in New South Wales, Australia. Crunch&Sip® has been delivered since 2008. To date, adoption is low with only 25% of schools implementing the program. We investigated the cause of low adoption and propose actions to increase school participation. We conducted semistructured interviews with key stakeholders and analyzed the process of delivering Crunch&Sip to schools. Interviews and process mapping and analysis identified a number of barriers to schools adopting the program. The analyses identified the need to simplify and streamline the process of delivering the program to schools and introduce monitoring and feedback loops to track ongoing participation. The combination of stakeholder interviews and process mapping and analysis provided important practical solutions to improving program delivery and also contributed to building an understanding of factors that help and hinder program adoption. The insight provided by this analysis helped identify usable routine measures of adoption, which were an improvement over those used in the existing program plan. This study contributed toward improving the quality and efficiency of delivering a health promoting program to work toward achieving healthy eating behaviors in children.

  7. Relationship Between Competitive Strategies and the Success Perception of Polish Born Globals

    Directory of Open Access Journals (Sweden)

    Baranowska-Prokop Ewa

    2014-09-01

    Full Text Available The key objective of this paper is to describe and evaluate the competitive strategies applied by Polish born global enterprises. To reveal these strategies, two competitive models developed by M.E. Porter are applied to an original data set obtained from 256 small and medium Polish enterprises through a survey employing the CATI technique. The outcomes of these strategies, as perceived by the companies applying them, are also evaluated against two hypotheses. We conclude that Polish firms apply both basic strategies of competition, i.e. cost leadership strategies and differentiation strategies and that a substantial majority of companies perceive themselves to have succeeded on the market.

  8. Global Strategy

    DEFF Research Database (Denmark)

    Li, Peter Ping

    2013-01-01

    Global strategy differs from domestic strategy in terms of content and process as well as context and structure. The content of global strategy can contain five key elements, while the process of global strategy can have six major stages. These are expounded below. Global strategy is influenced...... by rich and complementary local contexts with diverse resource pools and game rules at the national level to form a broad ecosystem at the global level. Further, global strategy dictates the interaction or balance between different entry strategies at the levels of internal and external networks....

  9. 试论地理核心素养的内涵、特征及其培养策略%Analysis on the Connotation and Characteristics of Geographic Key Competences,and Its Development Strategy

    Institute of Scientific and Technical Information of China (English)

    牛超; 刘玉振

    2015-01-01

    Geographic key competences are that students learn by geography course, and form initial geograph-ic competences, then on this basis, combine the common key competences in basic education curriculum, extract essential character and key ability of being more concerned about personal lifelong development and social develop-ment from geography.Geographic key competences have the characteristics of being comprehensive, developmen-tal, and lifelong .The effective training strategies of geographic key competences are:deepening the research of ge-ographical key competences, helping teachers establish the core concept of key competences, focus on the combi-nation of geographic logic and key competences, leading students' thinking by inquiry-based teaching, transla-ting the key competences into observable explicit performance to evaluate, and creating the geography teaching sit-uation which is close to real-life.%地理核心素养是指学生通过地理课程的学习,初步形成地理学科的素养,并在此基础上有机结合基础教育课程的共同核心素养,提炼出地理学科中那些更为关注个人终身发展和社会发展的必备品格和关键能力. 地理核心素养具有综合性、发展性、终身性的特点,深化对地理核心素养内容的研究、树立教师核心素养教育理念、注重学科逻辑和核心素养培养的融合、运用探究式教学引领学生思维、将核心素养转化为可观察的外显表现进行评价、创设贴近真实生活的地理教学情境是地理核心素养培养的有效策略.

  10. Creating a vision for the future: key competencies and strategies for culturally competent practice with lesbian, gay, bisexual, and transgender (LGBT) older adults in the health and human services.

    Science.gov (United States)

    Fredriksen-Goldsen, Karen I; Hoy-Ellis, Charles P; Goldsen, Jayn; Emlet, Charles A; Hooyman, Nancy R

    2014-01-01

    Sexual orientation and gender identity are not commonly addressed in health and human service delivery, or in educational degree programs. Based on findings from Caring and Aging with Pride: The National Health, Aging and Sexuality Study (CAP), the first national federally-funded research project on LGBT health and aging, this article outlines 10 core competencies and aligns them with specific strategies to improve professional practice and service development to promote the well-being of LGBT older adults and their families. The articulation of key competencies is needed to provide a blueprint for action for addressing the growing needs of LGBT older adults, their families, and their communities.

  11. Early Entry for Youth into the Ocean Science Pipeline Through Ocean Science School Camp and Summer Camp Programs: A Key Strategy for Enhancing Diversity in the Ocean Sciences

    Science.gov (United States)

    Crane, N. L.; Wasser, A.; Weiss, T.; Sullivan, M.; Jones, A.

    2004-12-01

    Educators, policymakers, employers and other stakeholders in ocean and other geo-science fields face the continuing challenge of a lack of diversity in these fields. A particular challenge for educators and geo-science professionals promoting ocean sciences is to create programs that have broad access, including access for underrepresented youth. Experiential learning in environments such as intensive multi-day science and summer camps can be a critical captivator and motivator for young people. Our data suggest that youth, especially underrepresented youth, may benefit from exposure to the oceans and ocean science through intensive, sustained (eg more than just an afternoon), hands-on, science-based experiences. Data from the more than 570 youth who have participated in Camp SEA Lab's academically based experiential ocean science camp and summer programs provide compelling evidence for the importance of such programs in motivating young people. We have paid special attention to factors that might play a role in recruiting and retaining these young people in ocean science fields. Over 50% of program attendees were underrepresented youth and on scholarship, which gives us a closer look at the impact of such programs on youth who would otherwise not have the opportunity to participate. Both cognitive (knowledge) and affective (personal growth and motivation) indicators were assessed through surveys and questionnaires. Major themes drawn from the data for knowledge growth and personal growth in Camp SEA Lab youth attendees will be presented. These will be placed into the larger context of critical factors that enhance recruitment and retention in the geo-science pipeline. Successful strategies and challenges for involving families and broadening access to specialized programs such as Camp SEA Lab will also be discussed.

  12. 基于大客户营销的工业品营销策略研究%A Study on Industrial Product Marketing Strategies Targeting on Key Accounts

    Institute of Scientific and Technical Information of China (English)

    穆小红

    2012-01-01

    Managing key accounts means managing a company's future. In industrial product industry, key account management greatly influences the market position and future of an industrial product business. By means of marketing strategies, to set up good coordination with key accounts demands marketing ideas focusing on the key accounts and targeted marketing activities, which could help an enterprise obtain the maximum value from the whole value chain and sustained and steady development in a market of fierce competition. The mar- keting strategies may go through four stages: to position, defend, attack and find. In detail, we need to draw a PDAF circle diagram based on a thorough analysis on the key account marketing process to lead a company into a virtuous cycle, so as to promote the core competitive- ness and the market occupation rate.%管理大客户就是管理企业的未来。工业品行业中大客户管理工作的好坏将严重制约着工业品企业的市场地位和未来发展。工业品营销中通过大客户营销战略的实施,与大客户形成良好的协作关系,必须树立以大客户为中心的营销理念,有针对性地开展系列营销活动,从整个价值链条上获取最大价值,从而使企业在竞争激烈的市场环境中获得持续稳定的发展。对大客户的营销策略,可以通过四个阶段来实现,即通过详细划分定位、防守、进攻和寻找阶段,对大客户营销过程展开深入细致的分析,并在此基础上构建PDAF循环图,引导企业进入一个良性循环轨道,提升企业核心竞争力,从而实现较高的市场占有空间。

  13. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Establishment of a Method for Content Determination of Polysaccharide in Membranous milkveteh root Applied in Fisheries Yu Xiao-qing et al. (1) Abstract Some chemical component in the traditional Chinese medicine Membranous milkvetch root can improve the ability of disease-prevention of animal and it can be applied in fisheries. In the paper, the method about content determination of polysaccharide in the root was established based on orthogonal experimental design Key words medicine; polysaccharide in Membranous milkvetch root; method of determination

  14. Security of Quantum Key Distribution

    CERN Document Server

    Renner, R

    2005-01-01

    We propose various new techniques in quantum information theory, including a de Finetti style representation theorem for finite symmetric quantum states. As an application, we give a proof for the security of quantum key distribution which applies to arbitrary protocols.

  15. NSTL全国服务体系监测平台的构建策略和关键技术*%The Construction Strategy and Key Technologies of NSTL Monitoring Platform

    Institute of Scientific and Technical Information of China (English)

    王莉; 郝春云; 刘玉海

    2013-01-01

    This paper proposes the strategy of NSLT Monitoring Platform, including monitoring indicators, three-level framework, and the core business logic of data col ection, tracking, alarm and storage, and describes key technologies such as Shel programming, JMX framework, data storage and alarm mechanisms.%  文章提出NSTL全国服务体系监测平台的构建策略,包括监测指标、三级监测体系,以及从数据收集、跟踪、告警到存储的核心业务逻辑分析,对Shell编程、JMX框架、数据存储和报警机制等关键技术进行了描述。

  16. Efficient Quantum Key Distribution

    CERN Document Server

    Ardehali, M; Chau, H F; Lo, H K

    1998-01-01

    We devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in public. As the number of transmitted signals increases, the efficiency of our scheme can be made to approach 100%. The security of our scheme (against single-photon eavesdropping strategies) is guaranteed by a refined analysis of accepted data which is employed to detect eavesdropping: Instead of lumping all the accepted data together to estimate a single error rate, we separate the accepted data into various subsets according to the basis employed and estimate an error rate for each subset individually. Our scheme is the first quantum key distribution with an efficiency greater than 50%. We remark that our idea is rath...

  17. Towards elimination of hepatitis B and C in European Union and European Economic Area countries: monitoring the World Health Organization's global health sector strategy core indicators and scaling up key interventions.

    Science.gov (United States)

    Duffell, Erika F; Hedrich, Dagmar; Mardh, Otilia; Mozalevskis, Antons

    2017-03-02

    The World Health Organization 'Global Health Sector Strategy on Viral Hepatitis 2016-2021' aimed at the elimination of viral hepatitis as a public health threat provides a significant opportunity to increase efforts for tackling the epidemics of hepatitis B and hepatitis C virus infections across Europe. To support the implementation and monitoring of this strategy, core epidemiological and programmatic indicators have been proposed necessitating specific surveys, the systematic collection of programmatic data and the establishment of monitoring across the care pathway. European Union and European Economic Area countries already made progress in recent years implementing primary and secondary prevention measures. Indeed, harm reduction measures among people who inject drugs reach many of those who need them and most countries have a universal hepatitis B vaccination programme with high coverage above 95%. However, while a further scaling up of prevention interventions will impact on incidence of new infections, treating those already infected is necessary to achieve reductions in mortality. The epidemiological, demographic and socio-political situation in Europe is complex, and considerable diversity in the programmatic responses to the hepatitis epidemic exists. Comprehension of such issues alongside collaboration between key organisations and countries will underpin any chance of successfully eliminating hepatitis.

  18. Electronic Strategies To Manage Key Relationships.

    Science.gov (United States)

    Carr, Nora

    2003-01-01

    Describes how Charlotte-Mecklenburg (North Carolina) district used a relational database, e-mail, electronic newsletters, cable television, telecommunications, and the Internet to enhance communications with their constituencies. (PKP)

  19. CAR:应用型办学环境下大学生学习动力提升的关键--基于期望理论的视角%A Key to Learning Motivation Boost of College Students under the Applied Education Environment:Based on the Perspective of Expectancy Theory

    Institute of Scientific and Technical Information of China (English)

    尚从永; 张伟

    2015-01-01

    文章以期望理论为基础,从期望值、工具值和目标价值三种影响大学生行为的促动因素出发,分别从个人努力寅学业成绩、学业成绩寅组织奖励及组织奖励寅个人满意三个环节分析了应用型办学环境下大学生学习动力不足的原因。接着,根据20/80法则,抓住解决大学生学习动力不足的关键要素,进而提出了由课程激励、学业评价激励和组织奖励激励所构成的CAR激励策略。%The paper is to begin with three kinds of actuation factors influencing college student's behavior which are Expectancy, Instrumentality and Valence based on the expectancy theory. It analyzes the causes of deficiency of college students' learning motivation from three links which are respectively from personal efforts to academic performance,from academic performance to organization reward and from organization reward to Personal satisfaction under the applied education environment. And then, it grasps the key factors to solve the deficiency of college students' learning motivation according to the 20/80 rule. After that, The"CAR"motivation strategies are put forward, which consist of Course Motivation, Academy Appraisal Motivation and Reward Motivation of Organization.

  20. 运用创新教学策略 培养创新学习品质——建设高效课堂的一点体会%Applying Innovative Teaching Strategies and Cultivating Innovative Learning Quality

    Institute of Scientific and Technical Information of China (English)

    王一平

    2011-01-01

    New curriculum reform needs teachers possessing innovative teaching strategies and new trend needs students of innovative quality. Therefore, "innovation" is very important in modem teaching, and teachers should apply new teaching strategies to cultivate%新课改需要有创新教学策略的教师,新形势需要有创新品质的学生。所以,“创新”在现代教学中非常重要,教师要运用新的教学策略,培养学生的创新学习品质。

  1. The fate of fresh and stored 15N-labelled sheep urine and urea applied to a sandy and a sandy loam soil using different application strategies

    DEFF Research Database (Denmark)

    Sørensen, P.; Jensen, E.S.

    1996-01-01

    The fate of nitrogen from N-15-labelled sheep urine and urea applied to two soils was studied under field conditions. Labelled and stored urine equivalent to 204 kg N ha(-1) was either incorporated in soil or applied to the soil surface prior to sowing of Italian ryegrass (Lolium multiflorum L.),...... mineralized in the sandy loam soil, when urine was applied prior to sowing. Thus, the fertilizer effect of urine N may be significantly lower than that of urea N on fine-textured soils, even when gaseous losses of urine N are negligible....

  2. Security of quantum key distribution using two-mode squeezed states against optimal beam splitter attack

    Institute of Scientific and Technical Information of China (English)

    He Guang-Qiang; Zhu Si-Wei; Guo Hong-Bin; Zeng Gui-Hua

    2008-01-01

    For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack.

  3. Applying self-regulated strategy development model of instruction to teach writing skill: Effects on writing performance and writing motivation of EFL learners

    Directory of Open Access Journals (Sweden)

    Mansoor Fahim

    2015-01-01

    Full Text Available The present study examined the effect of self-regulated strategy development (SRSD, an instructional model to teach writing, on writing performance and writing motivation of EFL learners. To this end, 30 pre-intermediate EFL writers received a ten-session self-regulatory strategy development instruction on persuasive writing with specific focus on planning, goal-setting, monitoring, and evaluating. Several instruments including persuasive probes together with a validated Writing Motivation Questionnaire were utilized to collect data. The comparison of pretest and posttest scores on different measures revealed that SRSD instructional model resulted in improved writing performance of EFL learners. Moreover, the results of data analysis indicated an increase in the motivation of participants as regards foreign language writing.

  4. Comparative Analysis of Strategies Applied in Persian and English Translations of Quranic-Arabic Culture Bound Term “Jilbab” (33:59

    Directory of Open Access Journals (Sweden)

    Fatemeh Zahra Nazari Robati

    2016-03-01

    Full Text Available Today TS focus has altered from linguistics to cultural studies. Culture is the way of life; as such every text is culture-bound and includes items that are culture-specific. Translating these cultural-specific items (henceforth CSI has made translation a complicated task. Hijab, one of the controversial issues of the present day of Islam in the world is defined in one way through presenting terms for women clothing such as “Jilbab” in Quran. Using Davies' (2003 strategies of translating CSIs, as the theoretical framework, taking the Quranic-Arabic culture bound term “Jilbab” (33:59 as the object of the study, this corpus-based comparative descriptive research was an attempt to compare totally 64 Persian and English (54 in Persian and 12 in English translations of this term with two concerns regarding the adopted translation strategies: a linguistic (Persian and English concern, and b translators' gender concern (male and female. The analysis of data showed that the most adopted strategy in both Persian and English corpus was localization (in Persian 35.71%, and in English 46.66%. Male translators in Persian had more tendency to use localization (36.53% and female translators to addition and globalization (each 50%. Male translators in English were more inclined to localization (45.83%, and the female have used preservation, addition, globalization and localization with the same frequency (25%. Totally male translators were inclined to localization (39.47%, while the female to globalization and addition (33.33%. Keywords: CSI, Translation strategies, Comparative analysis, Quran, “Jilbab”

  5. Comparing de novo and reference-based transcriptome assembly strategies by applying them to the blood-sucking bug Rhodnius prolixus.

    Science.gov (United States)

    Marchant, A; Mougel, F; Mendonça, V; Quartier, M; Jacquin-Joly, E; da Rosa, J A; Petit, E; Harry, M

    2016-02-01

    High Throughput Sequencing capabilities have made the process of assembling a transcriptome easier, whether or not there is a reference genome. But the quality of a transcriptome assembly must be good enough to capture the most comprehensive catalog of transcripts and their variations, and to carry out further experiments on transcriptomics. There is currently no consensus on which of the many sequencing technologies and assembly tools are the most effective. Many non-model organisms lack a reference genome to guide the transcriptome assembly. One question, therefore, is whether or not a reference-based genome assembly gives better results than de novo assembly. The blood-sucking insect Rhodnius prolixus-a vector for Chagas disease-has a reference genome. It is therefore a good model on which to compare reference-based and de novo transcriptome assemblies. In this study, we compared de novo and reference-based genome assembly strategies using three datasets (454, Illumina, 454 combined with Illumina) and various assembly software. We developed criteria to compare the resulting assemblies: the size distribution and number of transcripts, the proportion of potentially chimeric transcripts, how complete the assembly was (completeness evaluated both through CEGMA software and R. prolixus proteome fraction retrieved). Moreover, we looked for the presence of two chemosensory gene families (Odorant-Binding Proteins and Chemosensory Proteins) to validate the assembly quality. The reference-based assemblies after genome annotation were clearly better than those generated using de novo strategies alone. Reference-based strategies revealed new transcripts, including new isoforms unpredicted by automatic genome annotation. However, a combination of both de novo and reference-based strategies gave the best result, and allowed us to assemble fragmented transcripts.

  6. 调适性销售战略的影响因素及其成功关键%INFLUENCING FACTORS AND KEYS TO SUCCESS FOR THE ADAPTIVE MARKETING STRATEGY

    Institute of Scientific and Technical Information of China (English)

    郭国庆; 李屹松; 汪晓凡

    2009-01-01

    As an innovation of marketing strategy, adaptive selling plays a significant role in improving enterprise performance. The motivation and ability of sales personnel as well as constrains in the environment are the key factors for successful implementation of adaptive selling. Therefore, from a strategic perspective, it is necessary for enterprises to foster information utilization ability of sales personnel and train them to improve their marketing knowledge.%调适性销售作为创新的营销战略,对提升企业绩效意义重大.销售人员的动机、能力和环境制约对调适性销售战略的成功实施具有明显的影响.从战略高度看待调适性销售,着力提高销售人员的信息利用能力,强化销售人员的知识技能培训,是成功调适性销售战略的

  7. Research on Modes, Development Strategies and Key Technologies of Mobile Virtual Network Operator%移动虚拟运营的模式、发展策略和关键技术研究

    Institute of Scientific and Technical Information of China (English)

    方琰崴; 孙彪

    2013-01-01

    在我国,移动虚拟运营MVNO渐行渐近。文章介绍MVNO(Mobile Virtual Network Operator,移动虚拟运营商)的三种主要模式(移动分销商、简单MVNO和完整MVNO)以及完整MVNO模式下两种典型的组网架构MOCN和GWCN,分析MVNO的发展策略,提出分账计费、号码段分配、标识显示和国际漫游等几个关键技术问题的解决方案。%Mobile Virtual Network Operator approaches in China. With introduction of wholesales, simple MVNO and ful MVNO which are main modes of MVNO, the paper describes typical MOCN and GWCN architectures in ful MVNO. Furthermore, it analyzes development strategies of MVNO, and presents solutions for key technical issues including accounting and biling, segment alocation, operator LOGO displaying and international roaming.

  8. On the Necessity of Changes in the Strategy of Utilization Ship Boiler Technical Condition Maintenance in the Aspect of LNG Applied as Fuel

    Science.gov (United States)

    Adamkiewicz, Andrzej; Zeńczak, Wojciech

    2017-03-01

    Heavy oils (HFO fuels) used on ships play a part in degradation of technical condition of heat exchange surfaces of utilization boilers especially on the exhaust gas side. Presence of sulphur in these fuels is the main factor favouring degradation. The upper limit for sulphur content in the fuel used outside the SECA areas equal to 3.5% is currently in force, at least until the year 2020 or 2025. The recommended by classification societies overhauls of utilization boilers are, therefore characterized by a specially chosen strategy thanks to which it is possible to maintain their appropriate technical condition. The requirement to use fuels with low sulphur content (LSFO), which are significantly more expensive than MDO fuels, in the areas of controlled sulphur emissions also led to a further introduction of alternative fuels, such as methanol and above all liquefied natural gas (LNG), onto ships. That is especially valid for the ship owners whose vessels e.g. ferries sail mainly within SCECA This article analyses the consequences of the introduced fuel change on utilization boiler maintenance. A change in the technical condition maintenance strategy for utilization boilers has been suggested.

  9. ON THE NECESSITY OF CHANGES IN THE STRATEGY OF UTILIZATION SHIP BOILER TECHNICAL CONDITION MAINTENANCE IN THE ASPECT OF LNG APPLIED AS FUEL

    Directory of Open Access Journals (Sweden)

    Andrzej ADAMKIEWICZ

    2017-01-01

    Full Text Available Heavy oils (HFO fuels used on ships play a part in degradation of technical condition of heat exchange surfaces of utiliza-tion boilers especially on the exhaust gas side. Presence of sulphur in these fuels is the main factor favouring degrada-tion. The upper limit for sulphur content in the fuel used outside the SECA areas equal to 3.5% is currently in force, at least until the year 2020 or 2025. The recommended by classification societies overhauls of utilization boilers are, there-fore characterized by a specially chosen strategy thanks to which it is possible to maintain their appropriate technical condition. The requirement to use fuels with low sulphur content (LSFO, which are significantly more expensive than MDO fuels, in the areas of controlled sulphur emissions also led to a further introduction of alternative fuels, such as methanol and above all liquefied natural gas (LNG, onto ships. That is especially valid for the ship owners whose vessels e.g. ferries sail mainly within SCECA This article analyses the consequences of the introduced fuel change on utilization boiler maintenance. A change in the technical condition maintenance strategy for utilization boilers has been suggested.

  10. [An experience applying the teaching strategies of cooperative learning and creative thinking in a mental-health nursing practicum for undergraduates at a technical college].

    Science.gov (United States)

    Huang, Yu-Hsien; Lin, Mei-Feng; Ho, Hsueh-Jen; Chang, Lu-Na; Chen, Shiue

    2015-04-01

    Lack of knowledge and experience is prevalent in undergraduate students who are taking their clinical practicum for mental-health nursing. This issue negatively affects the learning process. This article shares an experience of implementing a practicum-teaching program. This program was developed by the authors to facilitate the cooperative learning and clinical care competence of students. A series of multidimensional teaching activities was designed by integrating the strategies of peer cooperation and creative thinking to promote group and individual learning. Results indicate that the program successfully encouraged the students to participate more actively in the learning process. Additionally, the students demonstrated increased competence in empathetic caring toward patients, stronger friendship relationships with peers, and improved self-growth. The authors hope this teaching program provides a framework to increase the benefits for students of participating in clinical practicums and provides a teaching reference for clinical instructors.

  11. 动态电压恢复器的快速检测及补偿策略%Fast Detection and Compensation Strategy Applied for Dynamic Voltage Restorer

    Institute of Scientific and Technical Information of China (English)

    杨浩; 王宇; 石巍; 方太勋; 刘为群

    2015-01-01

    Low voltage ride through(LVRT)is an important technical problem for power quality.In order to study LVRT,this paper designed an LVRT experimental system composed of dynamic voltage restorer(DVR),and used voltage dq integrated value and its change rate as detection criterion for voltage drops,and used the voltage feed forward and resonance control loop as the compensation strategy,which can achieve fast compensation of low voltage power grid fault.The experiment is completed using above platform.The test results show that DVR which adopts above detection and compensation strategy can achieve the compensation for low voltage fault quickly.%为了研究低电压穿越问题,设计了一套由动态电压恢复器组成的低电压穿越试验系统。提出采用电压 dq 综合值结合其变化率作为低电压故障发生检测判据,采用电压差前馈结合谐振控制环作为补偿策略,实现对电网低电压故障的快速补偿。经电压补偿试验表明,采用上述低电压故障检测及补偿策略的动态电压恢复器能够快速实现电压补偿。

  12. Applying Memory Strategy to Improve Junior High School Students' English Vocabulary Learning Ability%运用记忆策略提高初中生英语词汇学习能力

    Institute of Scientific and Technical Information of China (English)

    顾吟声

    2012-01-01

    英语词汇学习策略,尤其是记忆策略越来越受到重视,这从一个侧面反映了目前学生英语词汇学习的现状。本文运用实例着重论述了记忆英语词汇过程中如何实际运用记忆策略来提高记忆效果,探讨了学生记忆策略水平提高的具体方法和手段。%English vocabulary learning strategy, especially me~mory strategy is paid more and more attention, it effects the status quo of students Enghsh vocabulary learning from a side. This paper mainly expounds how to apply memory strategy to improve memory effect in the processof memorizing English vocabulary and discusses the specific methods and instruments of improving students' memory strategy competence.

  13. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  14. 论应用写作教学设计理念的实施策略%Implementation Strategy of Teaching Design of Applied Writing

    Institute of Scientific and Technical Information of China (English)

    袁丽

    2012-01-01

    应用文写作作为高校普遍开设的一门专业必修课和素质技能课,对于其教学理论与实践的研究层出不穷,尤其致力于其教学方法上的研究和探讨颇多,而教师采用何种教学方法,又受制于对该门课程前期设计理念的构想和实施,本文拟从应用写作课程理念入手,以期抛砖引玉,共同探讨该课教学艺术。%Applied Writing is a professional course and quality class. There are researches about its teaching theory and teaching practice, especially on its teaching methods. However, the teaching method is decided by the teaching philosophy. This thesis researches on the art of Applied Writing teaching from investigating the teaching philosophy.

  15. What Is Green Growth Strategy for Government Link Company?

    Science.gov (United States)

    Jamilah Asha'ari, Maryam; Daud, Salina; Hassan, Hasmaizan

    2016-03-01

    Disasters around the world are very extreme because of the global warming and climate change. Malaysia firms have to play their role in handling the challenging of environmental problems in order to sustain. The feature of the new strategy which is green growth strategy has been identified. The study focuses on the features of the green growth strategy which discuss on the keys to sustaining the strategy, marketing emphasis, production emphasis, product line, basis of competitive advantage and strategic target. Business had contributed to the industrialisation era positively or negatively and therefore there is a must for business people to use the best strategy in reducing the environmental risks. By 2020, Malaysia will achieve the target in becoming an advanced economy by applying the right strategy. The objective of this paper is to propose a feature for new strategy known as green growth strategy. Future study is to propose to conduct an empirical analysis to confirm the green growth strategy features.

  16. 防爆变频器在煤矿应用中的关键技术%Key Technologies of Explosion-proof Frequency Converter Applied in Coal Mine

    Institute of Scientific and Technical Information of China (English)

    祝龙记; 张旭立

    2012-01-01

    分析了防爆变频器在煤矿井下使用过程中存在的电压等级、散热、电磁兼容性、逆变器转换效率等问题,详细介绍了解决这些问题的方法,即通过采用隔爆兼本质安全型技术和热管散热技术解决变频器的防爆和散热问题,使防爆变频器具有性能高、功能强、噪音低等特点;通过改变变频器的电路拓扑结构、改进控制策略等技术手段解决变频器的电磁兼容性和能耗问题,使防爆变频器满足煤矿生产的现代化要求.%The paper analyzed problems of voltage level, heat dissipation, EMC and conversion efficiency of inverter existed in using process of explosion-proof frequency converter in coal mine underground, and introduced methods of solving these problems in details, namely using technologies of flameproof and intrinsic safety and heat dissipation with heat pipes to solve problems of explosion-proof and heat dissipation of frequency converter, which can make explosion-proof frequency converter has characteristics of high performance, strong functions and low noise; using technical means of changing circuit topology and improving control strategy of frequency converter to solve problems of EMC and energy consumption of frequency converter, which can make explosion-proof frequency converter meet with requirements of modernization of coal mine production.

  17. Target spectrum matrix definition for multiple-input- multiple-output control strategies applied on direct-field- acoustic-excitation tests

    Science.gov (United States)

    Alvarez Blanco, M.; Janssens, K.; Bianciardi, F.

    2016-09-01

    During the last two decades there have been several improvements on environmental acoustic qualification testing for launch and space vehicles. Direct field excitation (DFAX) tests using Multiple-Input-Multiple-Output (MIMO) control strategies seems to become the most cost-efficient way for component and subsystem acoustic testing. However there are still some concerns about the uniformity and diffusivity of the acoustic field produced by direct field testing. Lately, much of the documented progresses aimed to solve the non-uniformity of the field by altering the sound pressure level requirement, limiting responses and adding or modifying control microphones positions. However, the first two solutions imply modifying the qualification criteria, which could lead to under-testing, potentially risking the mission. Furthermore, adding or moving control microphones prematurely changes the system configuration, even if it is an optimal geometric layout in terms of wave interference patterns control. This research investigates the target definition as an initial condition for the acoustic MIMO control. Through experiments it is shown that for a given system configuration the performance of a DFAX test strongly depends on the target definition procedure. As output of this research a set of descriptors are presented describing a phenomenon defined as “Energy- sink”.

  18. Risk assessment of the introduction of H5N1 highly pathogenic avian influenza as a tool to be applied in prevention strategy plan.

    Science.gov (United States)

    Corbellini, L G; Pellegrini, D C P; Dias, R A; Reckziegel, A; Todeschini, B; Bencke, G A

    2012-04-01

    Risks of the introduction of highly pathogenic avian influenza (HPAI) H5N1 through migratory birds to the main wintering site for wild birds in southern Brazil and its consequences were assessed. Likelihoods were estimated by a qualitative scale ranging from negligible to high. Northern migrants that breed in Alaska and regularly migrate to South America (primary Charadriiformes) can have contact with birds from affected areas in Asia. The likelihood of the introduction of HPAI H5N1 through migratory birds was found to be very low as it is a probability conditioned to successful transmission in breeding areas and the probabilities of an infected bird migrating and shedding the virus as far as southern Brazil. The probability of wild species becoming exposed to H5N1-infected birds is high as they nest with northern migrants from Alaska, whereas for backyard poultry it is moderate to high depending on proximity to wetlands and the presence of species that could increase the likelihood of contact with wild birds such as domestic duck. The magnitude of the biological and economic consequences of successful transmission to poultry or wild birds would be low to severe depending on the probability of the occurrence of outbreak scenarios described. As a result, the risk estimate is greater than negligible, and HPAI H5N1 prevention strategy in the region should always be carefully considered by the veterinary services in Brazil.

  19. 大学英语四级短文听力的信息解码策略%The Decoding Information Strategy Applied in Passage Listening of CET-4

    Institute of Scientific and Technical Information of China (English)

    陈文雅

    2012-01-01

    文章通过对信息解码的理论和实践研究分析,深刻探讨解码策略,帮助解决学生在短文听力过程中存在的难以突破的障碍,从而提高学生英语听力理解能力的技巧。%The paper profoundly discusses the decoding information strategy applied in passage listening by both theories and practical analysis. It helps the students find out solutions to their listening problems so as to improve the comprehensive listening skills.

  20. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  1. LC-MS/MS screening strategy for unknown adducts to N-terminal valine in hemoglobin applied to smokers and nonsmokers.

    Science.gov (United States)

    Carlsson, Henrik; von Stedingk, Hans; Nilsson, Ulrika; Törnqvist, Margareta

    2014-12-15

    Electrophilically reactive compounds have the ability to form adducts with nucleophilic sites in DNA and proteins, constituting a risk for toxic effects. Mass spectrometric detection of adducts to N-terminal valine in hemoglobin (Hb) after detachment by modified Edman degradation procedures is one approach for in vivo monitoring of exposure to electrophilic compounds/metabolites. So far, applications have been limited to one or a few selected reactive species, such as acrylamide and its metabolite glycidamide. This article presents a novel screening strategy for unknown Hb adducts to be used as a basis for an adductomic approach. The method is based on a modified Edman procedure, FIRE, specifically developed for LC-MS/MS analysis of N-terminal valine adducts in Hb detached as fluorescein thiohydantoin (FTH) derivatives. The aim is to detect and identify a priori unknown Hb adducts in human blood samples. Screening of valine adducts was performed by stepwise scanning of precursor ions in small mass increments, monitoring four fragments common for the FTH derivative of valine with different N-substitutions in the multiple-reaction mode, covering a mass range of 135 Da (m/z 503-638). Samples from six smokers and six nonsmokers were analyzed. Control experiments were performed to compare these results with known adducts and to check for artifactual formation of adducts. In all samples of smokers and nonsmokers, seven adducts were identified, of which six have previously been studied. Nineteen unknown adducts were observed, and 14 of those exhibited fragmentation patterns similar to earlier studied FTH derivatives of adducts to valine. Identification of the unknown adducts will be the focus of future work. The presented methodology is a promising screening tool using Hb adducts to indicate exposure to potentially toxic electrophilic compounds and metabolites.

  2. Key Issues in Business English Curriculum Design

    Institute of Scientific and Technical Information of China (English)

    计越波

    2009-01-01

    This article aims to explore the key factors involved in business English curriculum design and the ways of analyzing the needs of teachers and students,course design as well as the teaching strategies.

  3. IOT-based data acquisition and transmission strategy applied to tubular pile production enterprises%一种用于管桩业的制造物联数据采集传输策略

    Institute of Scientific and Technical Information of China (English)

    姚晏之; 程良伦

    2014-01-01

    There are often many sensor nodes with limited energy in IOT. In order to make the nodes to work for a long time normally, an appropriate data acquisition and transmission strategy is indispensable. A data acquisition and transmission strategy applied to tubular pile production enterprises was designed in combination with available IOT technology. With this strategy, the light weight of data procesing was implemented, the limitation of network bandwidth was remitted, the energy consumption of system was lowered, and the real-time performance and robustness were enhanced.%物联网中一般节点较多且节点的能量有限。为了使节点能长时间的正常工作,良好的数据采集和传输策略是必不可少的。文中结合现有的物联网应用数据技术,设计了一种应用于管桩生产企业的物联网数据采集传输策略,从而实现了数据过程的轻量化,缓解了网络带宽,降低了系统能耗,增加了系统的实时性和鲁棒性。

  4. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  5. The keys to successful diversification: lessons from leading hospital systems.

    Science.gov (United States)

    Shortell, S M; Morrison, E; Hughes, S

    1989-01-01

    Hospitals have engaged in a variety of diversification activities over the past five years--many of which have not met expectations. Based on a nationwide study of 570 hospitals belonging to eight leading hospital systems (both investor-owned and not-for-profit), four key factors are identified that differentiate the winners from the losers. These include strategies for working effectively with physicians; learning to combine centralized and decentralized strategic planning approaches; understanding partially related diversification; and effectively applying the experience curve. Putting these lessons to work will increase the probability of a more effectively diversified health care system in the future.

  6. Applied superconductivity

    CERN Document Server

    Newhouse, Vernon L

    1975-01-01

    Applied Superconductivity, Volume II, is part of a two-volume series on applied superconductivity. The first volume dealt with electronic applications and radiation detection, and contains a chapter on liquid helium refrigeration. The present volume discusses magnets, electromechanical applications, accelerators, and microwave and rf devices. The book opens with a chapter on high-field superconducting magnets, covering applications and magnet design. Subsequent chapters discuss superconductive machinery such as superconductive bearings and motors; rf superconducting devices; and future prospec

  7. Quantum key management

    Science.gov (United States)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  8. An Investigation Into College English Vocabulary Learning Strategies

    Institute of Scientific and Technical Information of China (English)

    马慧

    2008-01-01

    This article focuses on the investigation into college English vocabulary learning strategies.The non-English major students should be instructed and encouraged by the teachers to apply various kinds of VLS that can facilitate their learning achievement because the versatile strategy use is not only a way to meet the increasing demand for vocabulary learning,but also a key to success in the learning of the English language.

  9. Applying Cost Imposition Strategies against China

    Science.gov (United States)

    2015-01-01

    will likely approach $300 billion, while US defense spending will likely remain close to $550 billion.59 By 2030 , China’s budget could reach $500...claims— has dominated the People’s Liberation Army’s (PLA) force moderniza- tion agenda for the last 15 years.70 While the 2008 defense white paper

  10. Efficiencies from Applying a Rotational Equipping Strategy

    Science.gov (United States)

    2011-01-01

    aviation brigade CDU critical dual use CONUS continental United States DoD Department of Defense FA brigade field artillery brigade FMTV family of...use ( CDU ) items, meaning that they are important to the ARNG for both “domestic and war fighting missions.”4 CDU items are important when...fulfill their domestic responsibili- ties. Since CDU equipment will not rotate through ARNG units, the potential for reducing the total stock of CDU

  11. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  12. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  13. Applied Enzymology.

    Science.gov (United States)

    Manoharan, Asha; Dreisbach, Joseph H.

    1988-01-01

    Describes some examples of chemical and industrial applications of enzymes. Includes a background, a discussion of structure and reactivity, enzymes as therapeutic agents, enzyme replacement, enzymes used in diagnosis, industrial applications of enzymes, and immobilizing enzymes. Concludes that applied enzymology is an important factor in…

  14. Quantum dense key distribution

    CERN Document Server

    Degiovanni, I P; Castelletto, S; Rastello, M L; Bovino, F A; Colla, A M; Castagnoli, G C

    2004-01-01

    This paper proposes a new protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than BB84 one. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  15. 企业识别系统在科技期刊发展中的作用与应用策略分析%Contribution and applied strategies of corporate identity system in development of sci-tech journals

    Institute of Scientific and Technical Information of China (English)

    周志新

    2011-01-01

    With the continuous intensive competition of journal publishing market and gradual deepening of publication reform, introducing and applying the corporate identity system ( CIS ) has become the inexorable tendency in the administration and development of modern sci-tech journals. This paper briefly discusses the contribution of CIS in the development of modern sci- tech journals, such as improving the competitive strength and corporate image, increasing the cohesiveness. At the same time, the applied strategies of CIS are also analyzed through the mind identity, behavior identity and visual identity.%简要论述企业识别系统(CIS)在科技期刊发展中的作用,如有利于提升竞争力和形象、增强凝聚力等,同时从理念识别、行为识别和视觉识别3个方面分析CIS在科技期刊中的应用策略。

  16. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  17. Applied dynamics

    CERN Document Server

    Schiehlen, Werner

    2014-01-01

    Applied Dynamics is an important branch of engineering mechanics widely applied to mechanical and automotive engineering, aerospace and biomechanics as well as control engineering and mechatronics. The computational methods presented are based on common fundamentals. For this purpose analytical mechanics turns out to be very useful where D’Alembert’s principle in the Lagrangian formulation proves to be most efficient. The method of multibody systems, finite element systems and continuous systems are treated consistently. Thus, students get a much better understanding of dynamical phenomena, and engineers in design and development departments using computer codes may check the results more easily by choosing models of different complexity for vibration and stress analysis.

  18. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  19. Talent Management: Working lines and key processes

    Directory of Open Access Journals (Sweden)

    Alvaro Alonso

    2014-12-01

    Full Text Available Purpose: Talent management represents today a challenge for companies, since the contribution of value comes increasingly from the area of intangible capital. The current paradigm of expanding technology and competitive dynamics, makes talent management that companies realize a critical success factor in today's markets. However, there is no generally accepted theoretical framework and empirical studies sufficient to demonstrate the role of talent management in creating competitive advantage. Therefore, the first objective of this paper is to analyze the evolution of talent management, to understand more deeply their fundamental dimensions: people and key positions in the organization. From these dimensions, as a second objective of the research is proposed to classify and characterize the literature about four alternative ways of study, according to the treatment they receive such dimensions and thus improve understanding of the role of talent management in business strategyDesign/methodology: To develop this paper we have selected the major contributions to the field of talent management, with particular emphasis on certain meta-analysis very quoted by the scientific community (Lewis and Heckman, 2006; Mellahi and Collings, 2009; Tarique and Schuler, 2010. In addition we have select additional papers published in high impact journals seen in ABI/Inform, Science Direct, SCOPUS, and EBSCO (Business Source Complete, through the keywords "Gestion del talento", "Plan de Gestion del Talento" and "Modelo de Gestion de Talento" and its English equivalent "Talent Management ", "Talent Management Plans/Systems" and "Talent Management Framework/Model ".Findings: From this review, we extracted the existence of different ways of understanding and talent management apply in organizations and even different understandings of what is talent itself. For this, we describe the basic dimensions of talent management (people and key positions and four alternative

  20. Key Issues and Policy Considerations in Promoting Lifelong Learning in Selected African Countries: Ethiopia, Kenya, Namibia, Rwanda and Tanzania. UIL Publication Series on Lifelong Learning Policies and Strategies. No. 1

    Science.gov (United States)

    Walters, Shirley; Yang, Jim; Roslander, Peter

    2014-01-01

    This cross-national study focuses on key issues and policy considerations in promoting lifelong learning in Ethiopia, Kenya, Namibia, Rwanda, and Tanzania (the five African countries that took part in a pilot workshop on "Developing Capacity for Establishing Lifelong Learning Systems in UNESCO Member States: at the UNESCO Institute for…

  1. Key Account Management

    OpenAIRE

    Dvořák, Dalibor

    2007-01-01

    This note tries to explain concept of key account management (KAM), factors leading to importance of this emerging concept, criteria to determine key accounts from customer base, benefits to both buyers and sellers agreeing to practice it, stages of KAM relationship, conditions under which power lies with buyer or seller, outlines risks faced by both the parties, key success factors, challenges faced in implementing this concept and relevance to infrastructure sector.

  2. Applied Literature for Healing,

    Directory of Open Access Journals (Sweden)

    Susanna Marie Anderson

    2014-11-01

    Full Text Available In this qualitative research study interviews conducted with elite participants serve to reveal the underlying elements that unite the richly diverse emerging field of Applied Literature. The basic interpretative qualitative method included a thematic analysis of data from the interviews yielding numerous common elements that were then distilled into key themes that elucidated the beneficial effects of engaging consciously with literature. These themes included developing a stronger sense of self in balance with an increasing connection with community; providing a safe container to engage challenging and potentially overwhelming issues from a stance of empowered action; and fostering a healing space for creativity. The findings provide grounds for uniting the work being done in a range of helping professions into a cohesive field of Applied Literature, which offers effective tools for healing, transformation and empowerment. Keywords: Applied Literature, Bibliotherapy, Poetry Therapy, Arts in Corrections, Arts in Medicine

  3. Targeted blood-to-brain drug delivery --10 key development criteria.

    Science.gov (United States)

    Gaillard, Pieter J; Visser, Corine C; Appeldoorn, Chantal C M; Rip, Jaap

    2012-09-01

    Drug delivery to the brain remains challenging due to the presence of the blood-brain barrier. In this review, 10 key development criteria are presented that are important for successful drug development to treat CNS diseases by targeted drug delivery systems. Although several routes of delivery are being investigated, such as intranasal delivery, direct injections into the brain or CSF, and transient opening of the blood-brain barrier, the focus of this review is on physiological strategies aiming to target endogenous transport mechanisms. Examples from literature, focusing on targeted drug delivery systems that are being commercially developed, will be discussed to illustrate the 10 key development criteria. The first four criteria apply to the targeting of the blood-brain barrier: (1) a proven inherently safe receptor biology, (2) a safe and human applicable ligand, (3) receptor specific binding, and (4) applicable for acute and chronic indications. Next to an efficient and safe targeting strategy, as captured in key criteria 1 to 4, a favorable pharmacokinetic profile is also important (key criterion 5). With regard to the drug carriers, two criteria are important: (6) no modification of active ingredient and (7) able to carry various classes of molecules. The final three criteria apply to the development of a drug from lab to clinic: (8) low costs and straightforward manufacturing, (9) activity in all animal models, and (10) strong intellectual property (IP) protection. Adhering to these 10 key development criteria will allow for a successful brain drug development.

  4. Implementing the Strategy of“Combination of Teaching and Learning”to Enhance the Ability of Applying Language%实施“教学做合一”提升语言文字应用能力

    Institute of Scientific and Technical Information of China (English)

    陈慕贞

    2014-01-01

    语言文字应用能力是学生职业素养的重要内容,提升语言文字应用能力,对高职师范类专业学生来说具有极其重要的意义。当前高职师范类专业学生语言文字应用能力方面存在语音不够标准、用字不够规范等问题,产生这些问题的原因主要是受语言环境、阅读量及现行教育制度的影响。实施“教学做合一”,让学生树立语言文字规范意识,多阅读文学名著及正规的读物,注意使用规范化的语言,就可以提高学生的语言文字应用能力。%The ability of applying language is the basic of students’ vocational quality, and improving this ability is of great importance to these normal school students. Nowadays, as to these students, there exist certain prbolems such as non-standard pronunciation, mis-spelling, etc., which is caused by language environment, reading and current education system. And it may improve students’ ability of applying language to implement the strategy of“combination of teaching and learning”, to let students to know the importance of using standard language, to do some reading and to use standard language.

  5. 浅析保障性住房绿色运营管理策略%Analysis on the Strategy of Green Operation and Management Applied to Affordable Housing

    Institute of Scientific and Technical Information of China (English)

    徐立

    2016-01-01

    在保障性住房中推行绿色建筑,不仅可以有效降低建筑资源能源消耗,提高保障性住房的质量和舒适度,同时也是推动绿色建筑发展的良好契机。针对保障性住房绿色建筑运营管理的现状与问题,从绿色建筑技术管理、绿色建筑运营管理方式、绿色建筑物业管理服务3个层面提出了保障性住房绿色建筑运营管理策略,旨在为弥补绿色建筑推进中的“短板”,实现绿色运营管理提供思路。%The implementation of green buildings to affordable housing can not only effectively reduce the energy consumption of building resources so as to improve the quality and comfort of affordable housing, but it also is a good opportunity to promote the development of green buildings. Regarding the current operation and management status and problems of green buildings applied to the affordable housing, the paper puts forward the strategy of green building operation and management applied to affordable housing from three levels which are the technological management of green buildings, the operation and management of green buildings and the property management service of green buildings. It aims to make up for the performing disadvantage of green building and to provide ideas for the achievement of green operation and management.

  6. The compact key

    NARCIS (Netherlands)

    NN,

    1966-01-01

    Here is given a sample of a new sort of identification key, recently developed by Dr. P. W. Leenhouts of the Rijksherbarium. Having to sort many specimens of Sapindaceae into genera, he became dissatisfied with the common dichotomous key, which too often does not work when the material is not comple

  7. Financial Key Ratios

    Directory of Open Access Journals (Sweden)

    Tănase Alin-Eliodor

    2014-08-01

    Full Text Available This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  8. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  9. Issues in Learner Strategy

    Institute of Scientific and Technical Information of China (English)

    刘剑英

    2004-01-01

    There is an urgent need in China that learning strategy and strategy training be given the attenion and status that it deserves.Strategy training can help students make effcetive use of multiple strategies.Studying good language learners has proved a useful way of investigating how strategies affect language learning.The first approach to strategy training suggested by Cohen is targets isolated strategies by including explicit modeling and explanation of the benefits of applying a specific strategy,extensive functional practice with the strategy.The second approach outlined by Oxford is to raise students' awareness as to the purpose and rationale of strategy use.The third approach by Cohen is to help students to complete language learning tasks through planning,monitoring,problem solving and evaluation.Teachers play an important part in strategy training.

  10. Putting leadership back into strategy.

    Science.gov (United States)

    Montgomery, Cynthia A

    2008-01-01

    In recent decades an infusion of economics has lent the study of strategy much needed theory and empirical evidence. Strategy consultants, armed with frameworks and techniques, have stepped forward to help managers analyze their industries and position their companies for strategic advantage. Strategy has come to be seen as an analytical problem to be solved. But, says Montgomery, the Timken Professor of Business Administration at Harvard Business School, the benefits of this rigorous approach have attendant costs: Strategy has become a competitive game plan, separate from the company's larger sense of purpose. The CEO's unique role as arbiter and steward of strategy has been eclipsed. And an overemphasis on sustainable competitive advantage has obscured the importance of making strategy a dynamic tool for guiding the company's development over time. For any company, intelligent guidance requires a clear sense of purpose, of what makes the organization truly distinctive. Purpose, Montgomery says, serves as both a constraint on activity and a guide to behavior. Creativity and insight are key to forging a compelling organizational purpose; analysis alone will never suffice. As the CEO--properly a company's chief strategist--translates purpose into practice, he or she must remain open to the possibility that the purpose itself may need to change. Lou Gerstner did this in the 1990s, when he decided that IBM would evolve to focus on applying technology rather than on inventing it. So did Steve Jobs, when he rescued Apple from a poorly performing strategy and expanded the company into attractive new businesses. Watching over strategy day in and day out is the CEO's greatest opportunity to shape the firm as well as outwit the competition.

  11. Metacognitive Strategies.

    Science.gov (United States)

    Schiff, Rachel; Nuri Ben-Shushan, Yohi; Ben-Artzi, Elisheva

    This study assessed the effect of metacognitive instruction on the spelling and word reading of Hebrew-speaking children with specific language impairment (SLI). Participants were 67 kindergarteners with SLI in a supported learning context. Children were classified into three spelling instruction groups: (a) metalinguistic instruction (ML), (b) ML that integrates metacognitive strategies (MCML), and (c) a control group. Letter naming, letter sounding, word spelling, and word recognition were assessed at pretest and posttest. Findings from spelling and reading tests as well as interviews indicated that both the ML and MCML groups made statistically significant gains in all measures, whereas the control group did not. However, children with SLI who received training in metacognitive strategies significantly outperformed those who received ML alone in spelling and reading skills. This study provides evidence that children with SLI benefit from applying of metacognitive strategies to spelling practices when acquiring early spelling and reading skills.

  12. Perceptions of food risk management among key stakeholders

    DEFF Research Database (Denmark)

    van Kleef, Ellen; Frewer, Lynn J.; Chryssochoidis, George M.;

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management.......In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management....

  13. Fuzzy & Predictive Control Strategy Applied to Industry Rotary Kiln Control System%模糊和预测控制在工业回转窑控制中的应用

    Institute of Scientific and Technical Information of China (English)

    蔡永昶

    2011-01-01

    Aiming at the automation control effect of Lithopone rotary kiln's calcination process and kilnhead temperature, which is the key process parameter,is not good, the software & hardware system were improved and perfected. According to the difficulty of product's performance index which has to be tested offline, and object structure characteristic and process flow, predictive control strategy was adopted to improve the control of calcination process, on the basis that kiln-head temperature was controlled to be more stable with the use of fuzzy & PID methods. The structure and configuration of hardware system, and the design method of the predictive controller were introduced in detail. The result of application shows the steady-state behavior of the kiln-head is better, and the stability and quality of product's performance index have been improved.%针对锌钡白工业回转窑煅烧过程和关键工艺参数窑头温度的自动控制效果不理想,对软硬件系统进行了改进和完善.根据产品性能指标只能离线检验这一难点,结合对象的结构特点和工艺流程,在采用模糊结合PID的方法对窑头温度进一步控制稳定的基础上,运用预测控制的方法改进了煅烧过程的控制.详细介绍了系统硬件结构和选型,预测控制器的设计方法.运行结果表明,窑头温度稳态性能得到较大改善,产品性能指标的稳定性和质量得到提高.

  14. Applied combustion

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-12-31

    From the title, the reader is led to expect a broad practical treatise on combustion and combustion devices. Remarkably, for a book of modest dimension, the author is able to deliver. The text is organized into 12 Chapters, broadly treating three major areas: combustion fundamentals -- introduction (Ch. 1), thermodynamics (Ch. 2), fluid mechanics (Ch. 7), and kinetics (Ch. 8); fuels -- coal, municipal solid waste, and other solid fuels (Ch. 4), liquid (Ch. 5) and gaseous (Ch. 6) fuels; and combustion devices -- fuel cells (Ch. 3), boilers (Ch. 4), Otto (Ch. 10), diesel (Ch. 11), and Wankel (Ch. 10) engines and gas turbines (Ch. 12). Although each topic could warrant a complete text on its own, the author addresses each of these major themes with reasonable thoroughness. Also, the book is well documented with a bibliography, references, a good index, and many helpful tables and appendices. In short, Applied Combustion does admirably fulfill the author`s goal for a wide engineering science introduction to the general subject of combustion.

  15. Introduction: Experimental Green Strategies

    DEFF Research Database (Denmark)

    Peters, Terri

    2011-01-01

    Defining new ways in which archietcts are responding to the challenge of creating sustainable architecture , Experimental Green Strategies present a state of the art in applied ecological architectural research.......Defining new ways in which archietcts are responding to the challenge of creating sustainable architecture , Experimental Green Strategies present a state of the art in applied ecological architectural research....

  16. E-commerce strategy

    CERN Document Server

    Qin, Zheng; Li, Shundong; Li, Fengxiang

    2014-01-01

    This book helps deepen understanding of key e-commerce strategies. It brings together theoretical perspectives based on academic research, integrated use of technologies and a large amount of cases, especially those of China.

  17. An Alternative to Keys

    Science.gov (United States)

    O'Hagan, James

    1977-01-01

    For the secondary school, the author discourages the use of dichotomous keys in favor of a punch-card system. The system is readily constructed by students for use in plant and animal classification. (CP)

  18. Key concepts in energy

    CERN Document Server

    Madureira, Nuno Luis

    2014-01-01

    Highlights how key energy concepts surfaced, tracing their evolution throughout history to encompasses four economic concepts and four technological-engineering concepts developed through their history to conclude with current economic and environmental sciences Considers the process of energy-substitutions through complementary usages, hybridization and technological mixes Combines a conceptual approach with key theoretical concepts from engineering, geological and economic sciences providing cross disciplinary overview of energy fundamentals in a short and focused reading

  19. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  20. Development of commercial hybrid electric vehicle with native key components

    Directory of Open Access Journals (Sweden)

    S. V. Bakhmutov

    2014-01-01

    Full Text Available The perspectives of development of medium weight cargo vehicles with hybrid powertrain including Russian native key components are considered in this article. Series-parallel scheme of HEV is more relevant owing to limitations of series and parallel schemes. An example of this technology is described. This technical solution has good facilities for variation of HEV and AWD type. The authors have patented it. In addition, another main issue is to choose the types of key components with good correlation for parameters of ICE, electric motors, batteries, and inverter. Using mathematical model of the vehicle a selection and correlation of technical characteristics were carried out to meet ecological and economical requirements. After computing calculation two control strategies were accepted. The first strategy contributes to good fuel consumption, while the other one is aimed at ecology. Researchers use test benches to confirm the results of calculation, and this one was built by the authors applying native components. The result of experiment on the test bench is the growth of fuel consumption of the medium weight cargo vehicle by 25% and compliance with ecological class Euro-4.

  1. Key variables of organisation design in servitization

    DEFF Research Database (Denmark)

    Kreye, Melanie; Jensen, Per Langaa

    2014-01-01

    to external environment to ensure performance. We present a case in the European renewable energy sector. The findings show three key variables: (i) processes need to enable information flow between business departments; (ii) servitization strategy needs to be translated into service-centred activities...

  2. Keys through ARQ

    CERN Document Server

    Latif, Mohamed Abdel; Gamal, Hesham El

    2009-01-01

    This paper develops a novel framework for sharing secret keys using the well-known Automatic Repeat reQuest (ARQ) protocol. The proposed key sharing protocol does not assume any prior knowledge about the channel state information (CSI), but, harnesses the available opportunistic secrecy gains using only the one bit feedback, in the form of ACK/NACK. The distribution of key bits among multiple ARQ epochs, in our approach, allows for mitigating the secrecy outage phenomenon observed in earlier works. We characterize the information theoretic limits of the proposed scheme, under different assumptions on the channel spatial and temporal correlation function, and develop low complexity explicit implementations. Our analysis reveals a novel role of "dumb antennas" in overcoming the negative impact of spatial correlation, between the legitimate and eavesdropper channels, on the achievable secrecy rates. We further develop an adaptive rate allocation policy which achieves higher secrecy rates by exploiting the channe...

  3. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  4. Key strategies for enhancing the cycling stability and rate capacity of LiNi0.5Mn1.5O4 as high-voltage cathode materials for high power lithium-ion batteries

    Science.gov (United States)

    Yi, Ting-Feng; Mei, Jie; Zhu, Yan-Rong

    2016-06-01

    Spinel LiNi0.5Mn1.5O4 (LNMO) is one of the most promising high voltage cathode materials for future application due to its advantages of large reversible capacity, high thermal stability, low cost, environmental friendliness, and high energy density. LNMO can provide 20% and 30% higher energy density than traditional cathode materials LiCoO2 and LiFePO4, respectively. Unfortunately, LNMO-based batteries with LiPF6-based carbonate electrolytes always suffer from severe capacity deterioration and poor thermostability because of the oxidization of organic carbonate solvents and decomposition of LiPF6, especially at elevated temperatures and water-containing environment. Hence, it is necessary to systematically and comprehensively summarize the progress in understanding and modifying LNMO cathode from various aspects. In this review, the structure, transport properties and different reported possible fading mechanisms of LNMO cathode are first discussed detailedly. And then, the major goal of this review is to highlight new progress in using proposed strategies to improve the cycling stability and rate capacity of LNMO-based batteries, including synthesis, control of special morphologies, element doping and surface coating etc., especially at elevated temperatures. Finally, an insight into the future research and further development of LNMO cathode is discussed.

  5. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  6. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  7. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  8. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without infor

  9. Analysis and discussion of key technical strategies for measles prevention and control%现阶段消除麻疹关键防控技术策略分析与探讨

    Institute of Scientific and Technical Information of China (English)

    刘爱国; 杨会利

    2011-01-01

    Based on data on measles surveillance in the Taian area from the past 12 years, this study analyzed the major characteristics of measles outbreaks and incidence, including the month or date that the initial case of measles appeared each year, dips in seasonal incidence, nosocomial infection, and the high proportion of patients with measles among infants <8 months of age and adults. Such characteristics are crucial to predicting measles incidence and measles control efforts. Key technical measures are discussed and the importance of standardized emergency responses and administrative intervention in the event of a measles outbreak are emphasized.%基于对泰安市1999~2010年麻疹监测与防控工作,分析了当前麻疹发生与流行的主要特征,提出了麻疹首例病例、疫情季节性流行低谷、医院感染、小于8月龄及成人病例为主的两极年龄分布等特征对于疫情预测与防控工作的重要意义,重点探讨消除麻疹关键防控技术措施,强调规范疫情应急处置及强化行政干预的重要性,并力求纠正当前消除麻疹工作中存在的一些问题.

  10. The Key and Long-term Strategy of De-leveraging to Local Government Debt%地方政府债务:去杠杆的关键与长期方略

    Institute of Scientific and Technical Information of China (English)

    陆铭

    2016-01-01

    In today’s China, local government financial vehicles are deeply involved in the financial system. They borrow a lot in commercial banking, and also finance in the shadow banking paying high interest, while the private sector has great difficulty in financing. The high debt-GDP ratio reflects poor efficiency in public investment, which is more inefficient in lagged regions. To solve these problems, the key is to separate public finance and private banking. In the long run, to reduce the debt burden in lagged regions, cross-region labor mobility should be encouraged.%在当前中国,地方政府融资平台深度介入金融体系,既在商业银行体系中大量借贷,同时,也在影子银行中以高利率融资,而大量民营企业却出现融资难的问题。地方政府债务与GDP之比高企,反映的是相应投资的投入-产出效率差的现状,而这一问题又在欠发达地区更为严重。针对上述问题,去杠杆的关键是财政和金融分家。在长期,对于欠发达地区,降债务的关键是促进劳动力跨地区流动。

  11. THE MANAGEMENT OF KNOWLEDGE WORKERS – KEY FACTOR OF SUCCES

    Directory of Open Access Journals (Sweden)

    Claudia-Elena ŢUCLEA

    2007-01-01

    Full Text Available The traditional companies are built on familiar bedrock of buildings, plants, and inventories. Competitive advantage is viewed in terms of scale and volume stemming from high-capacity use of machine-based factories. Such an approach fails to recognize how the leverage of knowledge is becoming a key to long-term success. Nowadays, organizations must recognize that power resides in the minds of their best people, who are diffused throughout the business and the organizations are becoming more dependent on people than ever before. The recruitment and the employment of knowledge workers are becoming very important issues from Romanian managers. The competitiveness is the only chance to deal with a very challenging market, especially after European integration. In this paper we present the results of a survey of the opinions of Romanian managers about the most effective strategies for recruitment, motivation and retention the knowledge workers. The study investigated two groups of managers: the first group included the managers who never were involved in activities related to human resources, and the second, the managers who have been involved. The managers from the first group chose theoretical the strategies they considered most effective; the managers for the second group indicated the strategies they applied.

  12. An Efficient Key Agreement Framework to MANET

    Institute of Scientific and Technical Information of China (English)

    WANG Shun-man; TAO Ran; WANG Yue

    2006-01-01

    Protocols for key management are compared and evaluated from the point of view on mobile ad hoc networks (MANET). The issues of fault-tolerance and efficiency of key distribution protocols for group communications in MANET are addressed. Most key distribution protocols existing today are primarily designed for wire-line networks. These protocols either fail to work as intended or cannot work at all when they are applied to the demanding environment of MANET. Parameters and performance of different protocols are analyzed, and then a flat is given out, on which new protocols or existing ones are designed and modified, so that they can be robust, scalable and efficient in MANET.

  13. Key Distribution based on Three Player Quantum Games

    CERN Document Server

    Toyota, Norihito

    2010-01-01

    We study a new QKD that is different from the scheme proposed by \\cite{Ramz2}, though it essentially takes our ground on three-player quantum games and Greenberg-Horne-Zeilinger triplet entangled state (GHZ state) \\cite{Gree} is used. In our scheme proposed in this article, Bob and Charlie (and Alice also) that they are players in a game get some common key or information (applied strategies and their payoffs in the game) by knowing some results of the measurement made by Alice. There is not any arbiter in our scheme, since existence of an arbiter increase the risk of wiretapping. For it is difficult to detect wiretapping, when an arbiter repeatedly sends classical information. Lastly we discuss robustness for eavesdrop. We show that though maximally entangled case and non-entangled case provided essentially equivalent way in QKD, the latter is not available in the case there are some eavesdroppers.

  14. Radial oil injection applied to main engine bearings: evaluation of injection control rules

    DEFF Research Database (Denmark)

    Estupiñan, EA; Santos, Ilmar

    2012-01-01

    The performance of main bearings in a combustion engine affects key functions such as durability, noise and vibration. Thus, with the aim of reducing friction losses and vibrations between the crankshaft and the bearings, the work reported here evaluates different strategies for applying controll......The performance of main bearings in a combustion engine affects key functions such as durability, noise and vibration. Thus, with the aim of reducing friction losses and vibrations between the crankshaft and the bearings, the work reported here evaluates different strategies for applying......, the dynamic behaviour of the main bearing of a medium-size engine is theoretically analysed when the engine operates with controllable radial oil injection and four different injection control rules. The theoretical investigation is based on a single-cylinder combustion engine model. The performance...

  15. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  16. Ancel Keys: a tribute.

    Science.gov (United States)

    Vanitallie, Theodore B

    2005-02-14

    Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study - which was immediately recognized to be a classic - continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  17. k-Connectivity of Random Key Graphs

    CERN Document Server

    Zhao, Jun; Gligor, Virgil

    2015-01-01

    Random key graphs represent topologies of secure wireless sensor networks that apply the seminal Eschenauer-Gligor random key predistribution scheme to secure communication between sensors. These graphs have received much attention and also been used in diverse application areas beyond secure sensor networks; e.g., cryptanalysis, social networks, and recommender systems. Formally, a random key graph with $n$ nodes is constructed by assigning each node $X_n$ keys selected uniformly at random from a pool of $Y_n$ keys and then putting an undirected edge between any two nodes sharing at least one key. Considerable progress has been made in the literature to analyze connectivity and $k$-connectivity of random key graphs, where $k$-connectivity of a graph ensures connectivity even after the removal of $k$ nodes or $k$ edges. Yet, it still remains an open question for $k$-connectivity in random key graphs under $X_n \\geq 2$ and $X_n = o(\\sqrt{\\ln n})$ (the case of $X_n=1$ is trivial). In this paper, we answer the a...

  18. 基于市场需求导向的高职会计学生关键能力培养策略%Study on the Strategies of Developing the Key Ability of Higher Vocational Accounting Majors Based on Market Demand

    Institute of Scientific and Technical Information of China (English)

    宋建军

    2014-01-01

    Accounting is a profession closely connected with social and economic development. It is an important task for accounting education how to provide accounting talents to meet the demands of social and economic development. Higher vocational accounting education cultivates a large number of accounting personnel with solid professional knowledge and strong practical operative abilities for the society. However, in the face of changing conditions and requirements, they lack key abilities and the career development is thus severely constrained. Higher vocational accounting education need explore the strategies of developing students' critical abilities based on market demand. The"overall strategy","penetrating strategy"and"experience strategy"should be adopted to train students' critical abilities through multidimensional and three-dimen-sional ways in the teaching and non-teaching activities.%会计是与社会经济发展密不可分的职业,如何提供适应社会经济发展需求的会计人才是会计教育面临的重要课题。高职会计教育为社会培养大量专业知识扎实,操作能力强的会计人员,但面对不断变化的环境和要求,其关键能力欠缺,职业生涯发展受到较大制约。高职会计教育必须寻求基于市场需求的学生关键能力培养策略,采取“整体策略”、“渗透策略”和“体验策略”,在教学与非教学活动中通过“多维度、立体化”的途径培养学生关键能力。

  19. Identification key to Quivira milkweeds

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document is a key to milkweed identification at Quivira National Wildlife Refuge. It contains a dichotomous key as well as a picture key. Milkweeds found on the...

  20. Ancel Keys: a tribute

    OpenAIRE

    VanItallie Theodore B

    2005-01-01

    Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recogni...

  1. Synthesis of the key intermediate of ramelteon

    Institute of Scientific and Technical Information of China (English)

    Shan Bao Yu; Hao Min Liu; Yu Luo; Wei Lu

    2011-01-01

    Asymmetric conjugated addition of allylcopper reagents derived from an allyl Grignard reagent and CuBr·Me2S to chiral α,β-unsaturated N-acyl oxazolidinones has been achieved. The synthetic procedure was applied to the preparation of the key intermediate of the novel nonbenzodiazepine hypnotic drug, ramelteon.

  2. Five types of organizational strategy

    DEFF Research Database (Denmark)

    Steensen, Elmer Fly

    2014-01-01

    Models in the strategy field defining the strategy concept emphasize schools of thought or strategy perspectives, but not how to define the idiosyncratic composition of an organization’s strategy content. Based on a literature review in which meanings have been attached to the concept, this paper...... presents a new model including five types of organizational strategy. The model emphasizes that key influencers may make heterogeneous contributions to an organization’s strategy and also that significant effects may result from interaction between types of strategy.......Models in the strategy field defining the strategy concept emphasize schools of thought or strategy perspectives, but not how to define the idiosyncratic composition of an organization’s strategy content. Based on a literature review in which meanings have been attached to the concept, this paper...

  3. Quantum Key Distribution Protocol with Private-Public Key

    OpenAIRE

    Serna, Eduin H.

    2009-01-01

    A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol [1] and its many variants [2,3] two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key. A three related system of key distribution are described.

  4. Chaos control applied to heart rhythm dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Borem Ferreira, Bianca, E-mail: biaborem@gmail.com [Universidade Federal do Rio de Janeiro, COPPE, Department of Mechanical Engineering, P.O. Box 68.503, 21.941.972 Rio de Janeiro, RJ (Brazil); Souza de Paula, Aline, E-mail: alinedepaula@unb.br [Universidade de Brasi' lia, Department of Mechanical Engineering, 70.910.900 Brasilia, DF (Brazil); Amorim Savi, Marcelo, E-mail: savi@mecanica.ufrj.br [Universidade Federal do Rio de Janeiro, COPPE, Department of Mechanical Engineering, P.O. Box 68.503, 21.941.972 Rio de Janeiro, RJ (Brazil)

    2011-08-15

    Highlights: > A natural cardiac pacemaker is modeled by a modified Van der Pol oscillator. > Responses related to normal and chaotic, pathological functioning of the heart are investigated. > Chaos control methods are applied to avoid pathological behaviors of heart dynamics. > Different approaches are treated: stabilization of unstable periodic orbits and chaos suppression. - Abstract: The dynamics of cardiovascular rhythms have been widely studied due to the key aspects of the heart in the physiology of living beings. Cardiac rhythms can be either periodic or chaotic, being respectively related to normal and pathological physiological functioning. In this regard, chaos control methods may be useful to promote the stabilization of unstable periodic orbits using small perturbations. In this article, the extended time-delayed feedback control method is applied to a natural cardiac pacemaker described by a mathematical model. The model consists of a modified Van der Pol equation that reproduces the behavior of this pacemaker. Results show the ability of the chaos control strategy to control the system response performing either the stabilization of unstable periodic orbits or the suppression of chaotic response, avoiding behaviors associated with critical cardiac pathologies.

  5. Interactive simulations for quantum key distribution

    CERN Document Server

    Kohnle, Antje

    2016-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualization Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different quantum key distribution protocols. The simulations use either...

  6. Identification of Key Barriers in Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  7. 75 FR 39656 - Availability of Seats for the Florida Keys National Marine Sanctuary Advisory Council

    Science.gov (United States)

    2010-07-12

    ... (member), Research and Monitoring (alternate), South Florida Ecosystem Restoration (member), Tourism--Lower Keys (member), Tourism Lower Keys (alternate), and Tourism Upper Keys (member). Applicants are... applying; community and professional affiliations; philosophy regarding the protection and management...

  8. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Determination of the Estrogen Alkylphenols and Bisphenol A in Marine Sediments by Gas Chromatography-Mass Spectrometry Deng Xu-xiu et al. (1) Abstract Octylphenol, nonylphenol and bisphenol A are recognized environmental endocrine disruptors. A quantitative method was established for the simultaneous determination of octylphenol, nonylphenol and bisphenol A in marine sediments by gas chromatography-mass spectrometry. The test sample was extracted by methanol with ultrasonic technique, purified with copper powder and carbon solid phase extraction column, and derived with heptafluorobutyric anhydride. Then the analytes were separated on HP-5ms column and determined by gas chromatography-mass. The recovery of the method was between 84.3% and 94.5%, and the LOQ of 4-N- octylphenol, nonylphenol and bisphenol A was 0.25 g/kg, 0.15 g/kg and 0.15 g/kg. Key words octylphenol; nonylphenol; bisphenol A; gas chromatography-mass spectrometry

  9. Paediatric pharmacokinetics: key considerations

    Science.gov (United States)

    Batchelor, Hannah Katharine; Marriott, John Francis

    2015-01-01

    A number of anatomical and physiological factors determine the pharmacokinetic profile of a drug. Differences in physiology in paediatric populations compared with adults can influence the concentration of drug within the plasma or tissue. Healthcare professionals need to be aware of anatomical and physiological changes that affect pharmacokinetic profiles of drugs to understand consequences of dose adjustments in infants and children. Pharmacokinetic clinical trials in children are complicated owing to the limitations on blood sample volumes and perception of pain in children resulting from blood sampling. There are alternative sampling techniques that can minimize the invasive nature of such trials. Population based models can also limit the sampling required from each individual by increasing the overall sample size to generate robust pharmacokinetic data. This review details key considerations in the design and development of paediatric pharmacokinetic clinical trials. PMID:25855821

  10. Creativity Management Key Elements

    Directory of Open Access Journals (Sweden)

    Rosa María Fuchs Ángeles

    2015-09-01

    Full Text Available Organizations are constantly looking towards innovation. In order to reach it they must foment creativity. This paper analyzes a series of elements considered in the organizational creativity management and proposes a model with the indispensable factors that organizations should consider to reach it. These elements are: culture and organizational environment, strategy, structure, communication, relation with customers, human resources (recruiting, training, job design, compensation, promotion, and performance evaluation, long term orientation and the organizational life cycle. Having the analysis of those elements as a basis, the indispensable pillars on management creativity are identified. The proposed model is based on 5 pillars: the alignment between strategic, culture and organizational structure, called by the authors 'Holy Trinity'; intern publicity; customer’s voice; recognition and a look towards future. Finally, the case of an innovative Peruvian enterprise is presented from the model’s perspective and the study conclusions.

  11. Stakeholder engagement: a key component of integrating genomic information into electronic health records.

    Science.gov (United States)

    Hartzler, Andrea; McCarty, Catherine A; Rasmussen, Luke V; Williams, Marc S; Brilliant, Murray; Bowton, Erica A; Clayton, Ellen Wright; Faucett, William A; Ferryman, Kadija; Field, Julie R; Fullerton, Stephanie M; Horowitz, Carol R; Koenig, Barbara A; McCormick, Jennifer B; Ralston, James D; Sanderson, Saskia C; Smith, Maureen E; Trinidad, Susan Brown

    2013-10-01

    Integrating genomic information into clinical care and the electronic health record can facilitate personalized medicine through genetically guided clinical decision support. Stakeholder involvement is critical to the success of these implementation efforts. Prior work on implementation of clinical information systems provides broad guidance to inform effective engagement strategies. We add to this evidence-based recommendations that are specific to issues at the intersection of genomics and the electronic health record. We describe stakeholder engagement strategies employed by the Electronic Medical Records and Genomics Network, a national consortium of US research institutions funded by the National Human Genome Research Institute to develop, disseminate, and apply approaches that combine genomic and electronic health record data. Through select examples drawn from sites of the Electronic Medical Records and Genomics Network, we illustrate a continuum of engagement strategies to inform genomic integration into commercial and homegrown electronic health records across a range of health-care settings. We frame engagement as activities to consult, involve, and partner with key stakeholder groups throughout specific phases of health information technology implementation. Our aim is to provide insights into engagement strategies to guide genomic integration based on our unique network experiences and lessons learned within the broader context of implementation research in biomedical informatics. On the basis of our collective experience, we describe key stakeholder practices, challenges, and considerations for successful genomic integration to support personalized medicine.

  12. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Directory of Open Access Journals (Sweden)

    Ting Zhang

    Full Text Available This paper aims to identify the key fields and their key technical points of oncology by patent analysis.Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC and the International Patent Classification (IPC, respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012 and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year and the standardized values of patent applications in seven years (2006-2012 was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones.The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and

  13. Key Update Assistant for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Key update is a challenging task in resource-constrained networks where limitations in terms of computation, memory, and energy restrict the proper use of security mechanisms. We present an automated tool that computes the optimal key update strategy for any given resource-constrained network. We...

  14. Integrating Key Competences in School Physical Education Programmes

    Science.gov (United States)

    Lleixà, Teresa; González-Arévalo, Carles; Braz-Vieira, Marcelo

    2016-01-01

    In 2006, the European Union published its recommendations on competences for lifelong learning. Since then, key competences have been integrated into the official curriculum in Spain. The objectives of the present study are: a) to describe the strategies used most frequently by physical education teachers to incorporate key competences in their…

  15. ACHIEVING VALUE FROM ICT IN SMES: KEY MANAGEMENT STRATEGIES

    Directory of Open Access Journals (Sweden)

    K. Johnston

    2009-01-01

    Full Text Available ICT covers a broad range of fields in business and therefore makes ICT value difficult to simply define. The main factors that influence the use of ICT are therefore important to look at, as they give a good understanding of the how much influence the organisation has, on achieving value in its given context. The transformational model of ICT use was analysed to establish how SMEs in South Africa achieve business value from ICT and what management practices are most effective. Implications of the research are that management practices are an important factor that influences the value from ICT, and that the more management practices organisations implement, the greater the business value from ICT. Further findings of this study deduced that organisations that are more ICT aware, gain greater business value from ICT, with value achievement from ICT largely within the organisation’s control. This paper concludes with recommendations for future research.

  16. Internal Employability as a Strategy for Key Employee Retention

    Directory of Open Access Journals (Sweden)

    Ángela Sánchez-Manjavacas

    2014-05-01

    Full Text Available Economies the world over and particularly those in southern Europe, are suffering the crippling effects of the extremely complex economic and financial crisis. This study looks at the impact of certain human resource policies geared towards increasing internal employability as a means of retaining valued employees and promoting job flexibility within the firm, as well as increasing positive attitudes towards organizational citizenship. Satisfaction and commitment are proposed as intermediating variables of the relationship between perceived internal employability and ITQ/OCB. The proposed research model is contrasted using structural equation modeling (LISREL. The results obtained from the empirical study indicate that employability should be considered an essential factor in achieving the desired commitment, loyalty, adaptability and productivity from employees by strengthening the psychological contract between firm and worker through professional recognition.

  17. Decentralization and Faculty Ownership: Keys to a Successful Assessment Strategy.

    Science.gov (United States)

    Foley, Terrence; And Others

    In an effort to prepare for a North Central Association accreditation visit, Henry Ford Community College (HFCC), in Michigan, developed and implemented a decentralized and faculty-driven assessment plan. First, a faculty member was assigned to begin the groundwork for the assessment plan and an Instructional Assessment Committee was formed to…

  18. 桥头堡建设背景下的云南公安出入境管理争取国家政策支持的思考%Thinking On Applying for National Policy Support of Exit and Entry Administration of Yunnan Public Security on the Background of Bridgehead Strategy

    Institute of Scientific and Technical Information of China (English)

    肖震宇

    2012-01-01

    "两强一堡"战略是统领云南社会经济发展的主体,云南公安出入境管理工作积极争取国家政策支持,为"桥头堡"建设提供良好环境。本文试从上述观点出发,结合实际工作,提出对策建议和政策支持。%The Strategy of Building Province of Green Economy and Ethnic Culture Strength and the Bridgehead Strategy are principles of social and economic development of Yunnan province. The exit and entry administration of Yunnan public security shall apply for national policy support actively, providing a favorable environment for implementing the Bridgehead strategy. This essay, based on the mentioned standpoint, combi- ning practice of this field, proposes measures, ,suggestion, and supporting policy.

  19. ICT for AQA applied as single award

    CERN Document Server

    Wilson, Barbara

    2007-01-01

    This book has been written specifically for teachers and students following AQA's Applied AS ICT specification and covers the key elements of the units of the course, including the coursework requirements.

  20. Reading comprehension metacognitive strategies as a means for controlling behavior

    Directory of Open Access Journals (Sweden)

    Dinorah Aladina Caballero López

    2014-07-01

    Full Text Available Textual comprehension implies the use of various metacognitive strategies by the students when they have to face a text to be competent readers. That is why the objective of this article is to illustrate the application of metacognitive strategies in order to achieve an efficient textual comprehension, taking into account the self – regulation the student exerts over his own learning process. It is applied as the main method historical-logical studies based on a professional-researching systematic practice; at the same time observation is largely used. The main result is the introduction of metacognitive strategies in reading comprehension, which subsequently favor the self-control of personal behavior. The article is the result of a research project sponsored by the department of Special Education. Key words: reading comprehension, metacognitive strategies, behavior self-control.

  1. Nanofluids research: key issues.

    Science.gov (United States)

    Wang, Liqiu; Fan, Jing

    2010-05-22

    Nanofluids are a new class of fluids engineered by dispersing nanometer-size structures (particles, fibers, tubes, droplets) in base fluids. The very essence of nanofluids research and development is to enhance fluid macroscopic and megascale properties such as thermal conductivity through manipulating microscopic physics (structures, properties and activities). Therefore, the success of nanofluid technology depends very much on how well we can address issues like effective means of microscale manipulation, interplays among physics at different scales and optimization of microscale physics for the optimal megascale properties. In this work, we take heat-conduction nanofluids as examples to review methodologies available to effectively tackle these key but difficult problems and identify the future research needs as well. The reviewed techniques include nanofluids synthesis through liquid-phase chemical reactions in continuous-flow microfluidic microreactors, scaling-up by the volume averaging and constructal design with the constructal theory. The identified areas of future research contain microfluidic nanofluids, thermal waves and constructal nanofluids.

  2. Nanofluids Research: Key Issues

    Directory of Open Access Journals (Sweden)

    Wang Liqiu

    2010-01-01

    Full Text Available Abstract Nanofluids are a new class of fluids engineered by dispersing nanometer-size structures (particles, fibers, tubes, droplets in base fluids. The very essence of nanofluids research and development is to enhance fluid macroscopic and megascale properties such as thermal conductivity through manipulating microscopic physics (structures, properties and activities. Therefore, the success of nanofluid technology depends very much on how well we can address issues like effective means of microscale manipulation, interplays among physics at different scales and optimization of microscale physics for the optimal megascale properties. In this work, we take heat-conduction nanofluids as examples to review methodologies available to effectively tackle these key but difficult problems and identify the future research needs as well. The reviewed techniques include nanofluids synthesis through liquid-phase chemical reactions in continuous-flow microfluidic microreactors, scaling-up by the volume averaging and constructal design with the constructal theory. The identified areas of future research contain microfluidic nanofluids, thermal waves and constructal nanofluids.

  3. 写作策略知识在小学语文教学中应用状况的分析%Analysis of the Situation of Writing Strategies Applied Knowledge in Language Teaching in Primary Schools

    Institute of Scientific and Technical Information of China (English)

    王秋萍

    2014-01-01

    In primary school language teaching, writing is an important part. The level of writing and language learning level have a direct link, through writing, students are observed the overall quality of the language.Therefore, this paper describes the importance of writing strategies, and explore writing strategies knowledge application status of language teaching in primary schools, for reference.%在小学语文教学中,写作是重要组成部分。写作水平的高低与语文学习水平有直接的联系,通过写作,可以观察学生的整体语文素质。因此,主要探究写作策略知识的重要性及在小学语文教学中的应用状况,以供参考。

  4. The advertising strategies

    Institute of Scientific and Technical Information of China (English)

    YAKOUBI Mohamed Lamine

    2013-01-01

    We will try to demonstrate, through the display of the various advertising creation strategies and their evolution, how the advertising communication passed from of a vision or a strategy focused on the product, to a vision focused on the brand. The first advertising strategy that was applied by advertising agencies is the"Unique Selling Proposition";it focused only on the product advantages and its philosophy dominated the advertising world, throughout its various evolutions, till the nineties but this is without counting the introduction of the new advertising strategies that brought a more brand oriented philosophy to the ground.

  5. Key Updating Methods for Combinatorial Design Based Key Management Schemes

    Directory of Open Access Journals (Sweden)

    Chonghuan Xu

    2014-01-01

    Full Text Available Wireless sensor network (WSN has become one of the most promising network technologies for many useful applications. However, for the lack of resources, it is different but important to ensure the security of the WSNs. Key management is a corner stone on which to build secure WSNs for it has a fundamental role in confidentiality, authentication, and so on. Combinatorial design theory has been used to generate good-designed key rings for each sensor node in WSNs. A large number of combinatorial design based key management schemes have been proposed but none of them have taken key updating into consideration. In this paper, we point out the essence of key updating for the unital design based key management scheme and propose two key updating methods; then, we conduct performance analysis on the two methods from three aspects; at last, we generalize the two methods to other combinatorial design based key management schemes and enhance the second method.

  6. Improving quality of care in substance abuse treatment using five key process improvement principles.

    Science.gov (United States)

    Hoffman, Kim A; Green, Carla A; Ford, James H; Wisdom, Jennifer P; Gustafson, David H; McCarty, Dennis

    2012-07-01

    Process and quality improvement techniques have been successfully applied in health care arenas, but efforts to institute these strategies in alcohol and drug treatment are underdeveloped. The Network for the Improvement of Addiction Treatment (NIATx) teaches participating substance abuse treatment agencies to use process improvement strategies to increase client access to, and retention in, treatment. NIATx recommends five principles to promote organizational change: (1) understand and involve the customer, (2) fix key problems, (3) pick a powerful change leader, (4) get ideas from outside the organization, and (5) use rapid cycle testing. Using case studies, supplemented with cross-agency analyses of interview data, this paper profiles participating NIATx treatment agencies that illustrate successful applications of each principle. Results suggest that organizations can successfully integrate and apply the five principles as they develop and test change strategies, improving access and retention in treatment, and agencies' financial status. Upcoming changes requiring increased provision of behavioral health care will result in greater demand for services. Treatment organizations, already struggling to meet demand and client needs, will need strategies that improve the quality of care they provide without significantly increasing costs. The five NIATx principles have potential for helping agencies achieve these goals.

  7. A threshold key escrow scheme based on public key cryptosystem

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.

  8. ENHANCEMENTS STRATEGY OF CLOUD STORAGE ACCESS CONTROL APPLIED TO POWER GRID ENTERPRISE%应用于电网企业的云存储访问控制增强策略

    Institute of Scientific and Technical Information of China (English)

    张鸿辉; 刘伟; 李永强

    2014-01-01

    针对电力信息云存储管理应用的安全需求,以降低传统访问控制方案在访问规则上的系统开销为目标,提出一种基于实体属性和安全标记相结合的云存储访问控制增强策略。采用面向实体属性管理权限方法优化访问控制,降低权限管理开销,避免访问权限与用户、存储进程、平台客体间的直接联系;通过多级安全标记,进行权限分配、确保策略在实施后维护上的灵活性。并以某电网企业的电力信息云存储管理系统为例,详细阐述该策略的具体配置过程。经过性能分析表明,所设计访问控制策略在可维护性、存储开销、安全性能等方面表现良好,具有应用可行性。%For the security need of cloud storage applications in power information management,we propose an enhancement strategy of cloud storage access control,which is based on the combination of entity attributes and security tag,and is targeted at reducing the system overhead of conventional access control schemes in regard to access rules. The strategy utilises entity attributes-oriented privileges management method to optimise the access control,reduces privileges management overhead,and prevents the direct contacts between the access privileges and the user,storage process and platform object.Moreover,it also uses multi-level security tag to carry out privileges allocation and to ensure the flexibility of the strategy in maintenance when implemented.A power information cloud storage management system at a certain power grid enterprises is taken for example to elaborate the specific configuration process of the strategy.It is illustrated by the performance analysis that the access control strategy designed in the paper has good performance in maintainability,storage overhead, security and other aspects,and has application feasibility.

  9. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  10. Research on development strategy of state key laboratories cultivation base co-constructed by Hebei Province%河北省省部共建国家重点实验室培育基地发展战略研究

    Institute of Scientific and Technical Information of China (English)

    师伟力; 郑卫北

    2013-01-01

    研究了省部共建国家重点实验室培育基地的基本情况和重要作用.提出河北省省部共建实验室的发展战略问题:一是要促进多学科交叉融合,进一步提高理论研究水平和科研竞争力;二是要加强开放与联合,积极为河北省支柱产业发展提供科技支撑.%The state key laboratories cultivation base co-constructed by province and the ministry is the main force to strengthen basic research and applied basic research,which provides scientific and technological support for local economic and social development.Not only the ministry but also Hebei Province gives strong support in the capital,the environment and the introduction of talents for provincial state key laboratories cultivation base construction.After years of cultivation,co-constructing labs by province and ministry build their own development,while leading the other laboratories to construct and develop in Hebei.For further development and improvement of the provincial state key laboratories cultivation base construction,the labs should strengthen the interdisciplinary fusion,further be opening and combined.It will raise the level of theoretical research and scientific competitiveness and service to promote the development of pillar industry in Hebei Province.

  11. Multi-objective optimization of the control strategy of electric vehicle electro-hydraulic composite braking system with genetic algorithm

    OpenAIRE

    Zhang Fengjiao; Wei Minxiang

    2015-01-01

    Optimization of the control strategy plays an important role in improving the performance of electric vehicles. In order to improve the braking stability and recover the braking energy, a multi-objective genetic algorithm is applied to optimize the key parameters in the control strategy of electric vehicle electro-hydraulic composite braking system. Various limitations are considered in the optimization process, and the optimization results are verified by a software simulation platform of el...

  12. Sets, Subsets, and Dichotomous Keys

    Science.gov (United States)

    Cole, E. James

    1973-01-01

    Discusses the procedures that should be observed in constructing a dichotomous key. The keying exercise described was used as a laboratory activity in a biology course for elementary education majors, however it could be used in other courses. (JR)

  13. Water management strategy overview

    Energy Technology Data Exchange (ETDEWEB)

    Ducette, B. [Suncor Energy Inc. Oil Sands, Fort McMurray, AB (Canada)

    2003-07-01

    Suncor's oil sands operations produce 225,000 bbl/day of crude oil products from Alberta's Fort McMurray area. Water is a key resource used for enhanced recovery methods to produce crude oil products from oil sands. A water management strategy is required to monitor and control the amount of water used in the bitumen liberation process, cooling, the steam assisted gravity drainage process, steam for cogeneration, an energy transfer medium, a transportation medium, feedstock, and potable water. The water management strategy is designed to manage both short and long term water issues and develop sustainable water management strategies in an integrated manner. The strategy also encourages open communication on water to optimize synergy between operators, energy producers, and governments. The opportunities and challenges of a water management strategy were outlined with reference to recycling opportunities, managing water chemistry, and improving the ability to measure water use.

  14. Analysing ZigBee Key Establishment Protocols

    CERN Document Server

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  15. Key Concepts in Informatics: Algorithm

    Science.gov (United States)

    Szlávi, Péter; Zsakó, László

    2014-01-01

    "The system of key concepts contains the most important key concepts related to the development tasks of knowledge areas and their vertical hierarchy as well as the links of basic key concepts of different knowledge areas." (Vass 2011) One of the most important of these concepts is the algorithm. In everyday life, when learning or…

  16. MOBILE PAYMENTMETHODBASED ON PUBLIC-KEY CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Adnan A. Hnaif

    2015-03-01

    Full Text Available Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash, cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is summarized in three processes: firstly, the authentication process, which involves the authentication phases for the applied customers. Secondly, the member recognition process which tests and ensures the customer membership by the market server. Finally, payment processwhich will be done by ciphering the customer information using public-key encryption cryptosystem (RSA, to be submitted over an insecure network to the market server. Actually, this mobile payment methodis more efficient than otherpayment methods since the customer can pay from his/her own mobilephone without any extra cost and effort. The RSA public-key encryption system ensures the security of the proposed method. However, to prevent a brute force attack, the choice of the key size becomes crucial.

  17. Experimental quantum key distribution with source flaws

    Science.gov (United States)

    Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong

    2015-09-01

    Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.

  18. Capacity estimation and preliminary strategy for reducing the release of dioxins in China

    Institute of Scientific and Technical Information of China (English)

    YU Gang; ZHANG Qing; HUANG Jun; CAI Zhenxiao; SUI Qian

    2007-01-01

    As a party of the Stockholm Convention on Persistent Organic Pollutants,China must submit its national implementation plan(NIP)for this convention.The strategy and action plan for reducing the release of dioxins in China are the most important components of the NIP.Three problems are key points for developing such strategy and action plan-what are the key sources for applying the best available technology/best environmental practice(BAT/BEP)to reduce the release of dioxins?How about the capacity for reducing the dioxins release from the key sources?Where are the areas of priority for applying BAT/BEP?This paper shows the efforts towards the solution of these problems.The list of key sources covering about half of the total dioxins release was determined considering four criteria.The capacity of key sources were estimated based on the difference between the emission factor corresponding to the actual situation in 2004 and that corresponding to the scenario that all key sources have been applied BAT/BEP to reduce the dioxins release.The priority analysis using the geographical information system(GIS)tool has revealed that eastern provinces should be of high priority in the future reduction activities of dioxins release in China.

  19. Fuzzy MADM Approach for Identification of Key Sectors of Tajikistan Economy

    Institute of Scientific and Technical Information of China (English)

    ASADULLO Abdulhamidov; TANG Bing-yong; LI Dan

    2006-01-01

    The development strategy, focused on the promotion of the efficient and prospective production sectors required for effectively solving social, economic and other problems becomes very important in resource allocation decision making process of developing countries. The structural hierarchy, comprising social, economic, technological and environmental aspects, which is involved in the selection of sectors constructed according to the hierarchical system of objectives. The Fuzzy Multi-attribute Decision Making method is used to rank the sectors by indicating the degree to which an alternative satisfies the global objectives of criteria obtained by aggregation operations in fuzzy environment. By applying the developed approach to defming and identifying the key sectors of an economy, we can rank the aggregated 17 sectors of the Tajikistan economy according to their degree of achievement in satisfying key criteria.

  20. 储能逆变器预测控制误差形成机理及其抑制策略%Formation Mechanism and Suppression Strategy of Prediction Control Error Applied in a Battery Energy Storage Inverter

    Institute of Scientific and Technical Information of China (English)

    方支剑; 段善旭; 陈天锦; 陈昌松; 刘宝其

    2013-01-01

    在大功率储能系统中,由于储能逆变器开关频率低,采样、计算等引入的延时将恶化输出电能质量甚至引起系统的不稳定。采用预测控制可消除储能逆变器控制中延时的影响,但预测值受模型精确程度和输入扰动的影响与实际值存在差异。在储能逆变器数字化预测控制策略的基础上,推导预测误差与直流电压、负载电流和模型参数误差之间的传递函数,然后分析预测误差对逆变器数字化控制的影响,从而提出一种基于输出误差积分量和状态预测值的全维状态反馈控制策略,其外环采用输出电压误差积分以抑制预测误差,控制器采用后向差分形式的积分环节消除输出电压反馈引入的延时影响。该控制策略可有效消除逆变器控制中的延时,并且抑制了预测控制中的误差。最后设计一台30 kW 原理样机,输出稳态误差由9%降到1%,验证了所提控制策略的正确性。%In high power storage system, time consumption in sampling and calculating of digital processors could reduce the performances of output voltage and even make the system unstable at some serious condition, as the battery energy storage inverter has high power and low switching frequency. The predict control strategy can eliminate the influence of time consumption, while the surge of input voltage and model error could generate the prediction error. Based on the digital strategy of prediction control in battery energy storage inverter, this paper calculated the functions between model error, input change and prediction error. After analyzing the influence of prediction error on digital control strategy for inverter, a full-state feedback control strategy based on integral of output error was given. The outer loop used the integral of output voltage error to suppress the prediction error and the digital controller selected the integral of backward difference to reduce the degrees

  1. Some Key Principles for Developing Grammar Skills

    Institute of Scientific and Technical Information of China (English)

    张威

    2008-01-01

    Grammar is sometimes defined aft"the way words are put together to make correct sentences"(Ur,2004,P.75).The aim of teaching grammar is to raise the rates of the correctness of language use and help the students transfer the isolated language points to apply language.In this essay,the author introduces two kinds of Conlnlon methods in English grammar class. And there are some key principles in grammar teaching.

  2. 应用心理学专业研究生实践能力培养策略研究%A Strategy Research about Practical Ability Training of Graduate Students Specializing in Applied Psychology

    Institute of Scientific and Technical Information of China (English)

    唐海波; 李赛兰

    2012-01-01

    Practical ability is a very important quality for graduate students of applied psychology. To train the practical ability need to build a professional course system which is good for practice ability. Improve the teaching methods of applied psychology professional courses. Change the management concept of applied psychology graduates education. Play the mentors' influence and strengthening the practical ability of graduate students.%实践能力是应用心理学专业研究生重要的素质,培养应用心理学研究生实践能力需要构建有利于实践能力培养的专业课程体系;优化应用心理学专业课程的教学方法;转变应用心理学研究生教育管理观念;发挥导师在应用心理学研究生实践能力培养上的影响;研究生自身加强实践能力的培养.

  3. Applying evolutionary anthropology.

    Science.gov (United States)

    Gibson, Mhairi A; Lawson, David W

    2015-01-01

    Evolutionary anthropology provides a powerful theoretical framework for understanding how both current environments and legacies of past selection shape human behavioral diversity. This integrative and pluralistic field, combining ethnographic, demographic, and sociological methods, has provided new insights into the ultimate forces and proximate pathways that guide human adaptation and variation. Here, we present the argument that evolutionary anthropological studies of human behavior also hold great, largely untapped, potential to guide the design, implementation, and evaluation of social and public health policy. Focusing on the key anthropological themes of reproduction, production, and distribution we highlight classic and recent research demonstrating the value of an evolutionary perspective to improving human well-being. The challenge now comes in transforming relevance into action and, for that, evolutionary behavioral anthropologists will need to forge deeper connections with other applied social scientists and policy-makers. We are hopeful that these developments are underway and that, with the current tide of enthusiasm for evidence-based approaches to policy, evolutionary anthropology is well positioned to make a strong contribution.

  4. Multiple hashes of single key with passcode for multiple accounts

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However, human memorability constrains the number of keys. Single sign-on server, key hashing, key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name, but numeric 4-digit passcode, key hashing, key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts.

  5. Limitations on quantum key repeaters.

    Science.gov (United States)

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  6. From art to applied science.

    Science.gov (United States)

    Schatzberg, Eric

    2012-09-01

    Before "applied science" and "technology" became keywords, the concept of art was central to discourse about material culture and its connections to natural knowledge. By the late nineteenth century, a new discourse of applied science had replaced the older discourse of art. This older discourse of art, especially as presented in Enlightenment encyclopedias, addressed the relationship between art and science in depth. But during the nineteenth century the concept of fine art gradually displaced the broader meanings of "art," thus undermining the utility of the term for discourse on the relationship between knowledge and practice. This narrowed meaning of "art" obscured key aspects of the industrial world. In effect, middle-class agents of industrialism, including "men of science," used the rhetoric of "applied science" and, later, "technology" to cement the exclusion of artisanal knowledge from the discourse of industrial modernity.

  7. Benefits of a health impact assessment in relation to fuel poverty: assessing Luton's Affordable Warmth Strategy and the need for a national mandatory strategy.

    Science.gov (United States)

    Stewart, Jill; Habgood, Veronica

    2008-05-01

    The links between fuel poverty and poor health are well documented, yet there is no statutory requirement on local authorities to develop fuel poverty strategies, which tend to be patchy nationally and differ substantially in quality. Fuel poverty starts from the perspective of income, even though interventions can improve health. The current public health agenda calls for more partnership-based, cost-effective strategies based on sound evidence. Fuel poverty represents a key area where there is currently little local evidence quantifying and qualifying health gain arising from strategic interventions. As a result, this initial study sought to apply the principles of a health impact assessment to Luton's Affordable Warmth Strategy, exploring the potential to identify health impact arising--as a baseline for future research--in the context of the public health agenda. A national strategy would help ensure the promotion of targeted fuel poverty strategies.

  8. Conversation Analysis in Applied Linguistics

    DEFF Research Database (Denmark)

    Kasper, Gabriele; Wagner, Johannes

    2014-01-01

    with understanding fundamental issues of talk in action and of intersubjectivity in human conduct. The field has expanded its scope from the analysis of talk—often phone calls—towards an integration of language with other semiotic resources for embodied action, including space and objects. Much of this expansion has...... been driven by applied work. After laying out CA's standard practices of data treatment and analysis, this article takes up the role of comparison as a fundamental analytical strategy and reviews recent developments into cross-linguistic and cross-cultural directions. The remaining article focuses......For the last decade, conversation analysis (CA) has increasingly contributed to several established fields in applied linguistics. In this article, we will discuss its methodological contributions. The article distinguishes between basic and applied CA. Basic CA is a sociological endeavor concerned...

  9. Schools for Strategy: Teaching Strategy for 21st Century Conflict

    Science.gov (United States)

    2009-11-01

    a person who is educated in more than strategy. A liberal education in the classical sense must be helpful to the human performance that is a key...paragraphs to this monograph have emphasized the all too human dimension to strategy. Our subject may be the teaching of strategy, but history and...interdependence among the three—yet another crucial threesome—is perilously underrated by the hierarchical model.19 The flow chart showing ideal

  10. Quantum Key Distribution Using Decoy State Protocol

    Directory of Open Access Journals (Sweden)

    Sellami Ali

    2009-01-01

    Full Text Available Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible for sophisticated eavesdroppers to launch various subtle eavesdropping attacks including the Photon Number Splitting (PNS attack. The decoy state protocols recently proposed to beat PNS attack and to improve dramatically distance and secure key generation rate of Quantum Key Distribution (QKD. Approach: Objective of this study was experimental implementation of weak decoy + vacuum states QKD for increasing the performance of QKD system. To show conceptually how simple it was to apply the weak decoy + vacuum state idea to a commercial QKD system, we chosen ID-3000 commercial quantum key distribution system manufactured by id quantique. To implement the weak decoy + vacuum state protocol, we had to add some new optical and electronics components to id quantique and to attenuate each signal to the intensity of either signal state or weak decoy or vacuum state randomly. Results: In our implementation, the attenuation will be done by placing a VOA (variable optical attenuator in Alice’s side. Specifically, our QKD system required the polarizations of 2 pulses from the same signal to be orthogonal. Therefore the VOA must be polarization independent so as to attenuate the two pulses equally. The VOA utilized in experiment to attenuate signals dynamically was Intensity Modulator (IM. We had implemented weak + vacuum protocol on a modified commercial QKD system over a 25 km of telecom fibers with an unconditionally secure key rate of 6.2931x10-4 per pulse. Conclusion: By making simple modifications to a commercial quantum key distribution system, we could achieve much better performance with substantially higher key generation rate and longer distance than

  11. Finite-key security against coherent attacks in quantum key distribution

    CERN Document Server

    Sheridan, Lana; Scarani, Valerio

    2010-01-01

    The work by Christandl, K\\"onig and Renner [Phys. Rev. Lett. 102, 020504 (2009)] provides in particular the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols. We spell out this bound from their general formalism. Then we apply it to the study of a recently proposed protocol [Laing et al., Phys. Rev. A 82, 012304 (2010)]. This protocol is meaningful when the alignment of Alice's and Bob's reference frames is not monitored and may vary with time. In this scenario, the notion of asymptotic key rate has hardly any operational meaning, because if one waits too long time, the average correlations are smeared out and no security can be inferred. Therefore, finite-key analysis is necessary to find the maximal achievable secret key rate and the corresponding optimal number of signals.

  12. A Key to the Art of Letters

    DEFF Research Database (Denmark)

    Jensen-Rix, Robert William

    2008-01-01

    The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...... grammatical theory, there has been no comprehensive study of its innovative methods and radical proposals for a new national curriculum. Its challenge to Latin and French is analyzed in a historical perspective, and the impact of Lane's ideas during the eighteenth century is traced. The article shows...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science...

  13. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  14. Cloud computing strategies

    CERN Document Server

    Chorafas, Dimitris N

    2011-01-01

    A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy. Based on extensive research, it examines the opportunities and challenges that loom in the cloud. It explains exactly what cloud computing is, what it has to offer, and calls attention to the important issues management needs to consider before passing the point of no return regarding financial commitments.

  15. BIM技术在输变电工程造价管理中应用的推进策略研究%Research on the Promoting Strategy of BIM Technology Applied in Cost Management in Power Grid Project

    Institute of Scientific and Technical Information of China (English)

    刘宏志; 靳书栋; 屠庆波; 王艳梅; 韩义成

    2016-01-01

    Combining with the application value of BIM technology in construction project cost management field,the paperfirstly analyzes the suitability of power grid project cost management with BIM. Then,studies the promoting strategy of power grid project cost management based on BIM from three aspects,including graphical quantity,3D cooperative design and whole process management. Finally,proposes the guarantee mechanism from policy guidance,industry standard,BIM platform construction and personnel training,provides reference for the application of BIM technology in power grid project cost management.%结合BIM技术在工程造价领域的应用价值,首先分析BIM技术在输变电工程造价管理中应用的适用性;然后从图形算量、三维设计、全过程管理方面逐层研究BIM技术在输变电工程造价管理中应用的推进策略;最后从政策引导、行业标准、BIM平台建设、BIM人才培养方面提出BIM技术在输变电工程造价管理中的应用保障机制,以期为BIM技术在输变电工程造价管理中应用推广提供参考。

  16. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  17. 少儿志愿者激励策略初探--基于应用行为分析之强化原理%Probe into the Motivation Strategy for Children ’s Volunteers---Based on the Reinforcement Principal of Applied Behavior Analysis

    Institute of Scientific and Technical Information of China (English)

    袁嘉芮

    2015-01-01

    阐述了少儿志愿者活动中存在的问题,基于应用行为分析之强化原理,探讨了针对少儿心理行为特点建立激励策略的措施。%ABSTRACT:This paper expounds some problems existing in children’s volunteer activities, and based on the reinforcement principal of applied behavior analysis, probes into the measures for establishing the motivation strategies in the light of children’s psychological behavior characteristics.

  18. Applied large eddy simulation.

    Science.gov (United States)

    Tucker, Paul G; Lardeau, Sylvain

    2009-07-28

    Large eddy simulation (LES) is now seen more and more as a viable alternative to current industrial practice, usually based on problem-specific Reynolds-averaged Navier-Stokes (RANS) methods. Access to detailed flow physics is attractive to industry, especially in an environment in which computer modelling is bound to play an ever increasing role. However, the improvement in accuracy and flow detail has substantial cost. This has so far prevented wider industrial use of LES. The purpose of the applied LES discussion meeting was to address questions regarding what is achievable and what is not, given the current technology and knowledge, for an industrial practitioner who is interested in using LES. The use of LES was explored in an application-centred context between diverse fields. The general flow-governing equation form was explored along with various LES models. The errors occurring in LES were analysed. Also, the hybridization of RANS and LES was considered. The importance of modelling relative to boundary conditions, problem definition and other more mundane aspects were examined. It was to an extent concluded that for LES to make most rapid industrial impact, pragmatic hybrid use of LES, implicit LES and RANS elements will probably be needed. Added to this further, highly industrial sector model parametrizations will be required with clear thought on the key target design parameter(s). The combination of good numerical modelling expertise, a sound understanding of turbulence, along with artistry, pragmatism and the use of recent developments in computer science should dramatically add impetus to the industrial uptake of LES. In the light of the numerous technical challenges that remain it appears that for some time to come LES will have echoes of the high levels of technical knowledge required for safe use of RANS but with much greater fidelity.

  19. Compositional Advantage and Strategy

    DEFF Research Database (Denmark)

    Li, Xin

    In this paper, I first critique the composition-based view of Yadong Luo and John Child for understanding how resource-poor firms survive and thrive. To remedy the deficiencies in their perspective, I then propose a dynamic theory of compositional advantage and strategy. Here, the compositional...... advantage is redefined as the attractiveness of the composition of the producer’s offering in terms of scope and perceived value/price ratio. I identify five ways or basic compositional strategies to improve the value/price ratio. A firm may have an overall compositional strategy that is composed of some...... or all of the five basic compositional strategies. I argue there are three indispensable key success factors for a composition-based competition, i.e., aspiration (ambition-position asymmetry), attitude (being ALERT), and action (turning asymmetry into advantage). I also discuss the particular relevance...

  20. Cell-Based Strategies for Meniscus Tissue Engineering

    Science.gov (United States)

    Niu, Wei; Guo, Weimin; Han, Shufeng; Zhu, Yun; Liu, Shuyun; Guo, Quanyi

    2016-01-01

    Meniscus injuries remain a significant challenge due to the poor healing potential of the inner avascular zone. Following a series of studies and clinical trials, tissue engineering is considered a promising prospect for meniscus repair and regeneration. As one of the key factors in tissue engineering, cells are believed to be highly beneficial in generating bionic meniscus structures to replace injured ones in patients. Therefore, cell-based strategies for meniscus tissue engineering play a fundamental role in meniscal regeneration. According to current studies, the main cell-based strategies for meniscus tissue engineering are single cell type strategies; cell coculture strategies also were applied to meniscus tissue engineering. Likewise, on the one side, the zonal recapitulation strategies based on mimicking meniscal differing cells and internal architectures have received wide attentions. On the other side, cell self-assembling strategies without any scaffolds may be a better way to build a bionic meniscus. In this review, we primarily discuss cell seeds for meniscus tissue engineering and their application strategies. We also discuss recent advances and achievements in meniscus repair experiments that further improve our understanding of meniscus tissue engineering. PMID:27274735

  1. Cell-Based Strategies for Meniscus Tissue Engineering

    Directory of Open Access Journals (Sweden)

    Wei Niu

    2016-01-01

    Full Text Available Meniscus injuries remain a significant challenge due to the poor healing potential of the inner avascular zone. Following a series of studies and clinical trials, tissue engineering is considered a promising prospect for meniscus repair and regeneration. As one of the key factors in tissue engineering, cells are believed to be highly beneficial in generating bionic meniscus structures to replace injured ones in patients. Therefore, cell-based strategies for meniscus tissue engineering play a fundamental role in meniscal regeneration. According to current studies, the main cell-based strategies for meniscus tissue engineering are single cell type strategies; cell coculture strategies also were applied to meniscus tissue engineering. Likewise, on the one side, the zonal recapitulation strategies based on mimicking meniscal differing cells and internal architectures have received wide attentions. On the other side, cell self-assembling strategies without any scaffolds may be a better way to build a bionic meniscus. In this review, we primarily discuss cell seeds for meniscus tissue engineering and their application strategies. We also discuss recent advances and achievements in meniscus repair experiments that further improve our understanding of meniscus tissue engineering.

  2. Essays in applied microeconomics

    Science.gov (United States)

    Wang, Xiaoting

    In this dissertation I use Microeconomic theory to study firms' behavior. Chapter One introduces the motivations and main findings of this dissertation. Chapter Two studies the issue of information provision through advertisement when markets are segmented and consumers' price information is incomplete. Firms compete in prices and advertising strategies for consumers with transportation costs. High advertising costs contribute to market segmentation. Low advertising costs promote price competition among firms and improves consumer welfare. Chapter Three also investigates market power as a result of consumers' switching costs. A potential entrant can offer a new product bundled with an existing product to compensate consumers for their switching cost. If the primary market is competitive, bundling simply plays the role of price discrimination, and it does not dominate unbundled sales in the process of entry. If the entrant has market power in the primary market, then bundling also plays the role of leveraging market power and it dominates unbundled sales. The market for electric power generation has been opened to competition in recent years. Chapter Four looks at issues involved in the deregulated electricity market. By comparing the performance of the competitive market with the social optimum, we identify the conditions under which market equilibrium generates socially efficient levels of electric power. Chapter Two to Four investigate the strategic behavior among firms. Chapter Five studies the interaction between firms and unemployed workers in a frictional labor market. We set up an asymmetric job auction model, where two types of workers apply for two types of job openings by bidding in auctions and firms hire the applicant offering them the most profits. The job auction model internalizes the determination of the share of surplus from a match, therefore endogenously generates incentives for an efficient division of the matching surplus. Microeconomic

  3. Classroom Questioning Strategies

    Institute of Scientific and Technical Information of China (English)

    陈小林

    2013-01-01

      Interaction has been playing a more and more important role in language research since the early 1970s,when the communicative teaching method was widely applied in language teaching. Questioning is the most common classroom interaction. This thesis analyzed the influence on students' immediate oral production by applying different teacher questioning strategies including teacher's question types,teacher question modification and teacher feedback.

  4. Keys to the Natural World.

    Science.gov (United States)

    Misiti, Frank L., Jr.

    1996-01-01

    Presents a lesson that uses the learning cycle to introduce the concept of classification and the use of dichotomous keys to identify plants and animals. Encourages students to become better observers and helps them gain confidence and experience in using simple classification keys. (JRH)

  5. Key Findings for Interpersonal Skills

    Science.gov (United States)

    2013-12-04

    2005). Beyond difference and domination? Intercultural communication in legal contexts. Intercultural discourse and communication . The essential...trainable and consequential to warfighters in being good strangers. These key skills include observing and adapting to variation in communicative norms...warfighters in being good strangers. These key skills include observing and adapting to variation in communicative norms; allowing civilian

  6. Emotional Value of Applied Textiles

    DEFF Research Database (Denmark)

    Bang, Anne Louise

    2011-01-01

    The present PhD thesis is conducted as an Industrial PhD project in collaboration with the Danish company Gabriel A/S (Gabriel), which designs and produces furniture textiles and ‘related products’ for manufacturers of furniture. A ‘related textile product’ is e.g. processing of piece goods...... at Gabriel face while trying to implement an innovative and process-oriented business strategy. The focal point has been the section of the strategy which aims at developing Blue Ocean products, which have a functional and an emotional value for the user. The thesis examines and explores emotional value...... (procedures of user and stakeholder involvement). In the course of the thesis I explain and elaborate on four themes each of which contributes to the outcome of the project. 1) Creating a frame of reference for the textile design process and a systematic approach to applied textiles. In chapter three I...

  7. Strategie podniku

    OpenAIRE

    Podhradská, Martina

    2013-01-01

    This paper deals with a process of strategy definition of Starkl -- zahradník s.r.o. company. The main target of this diploma thesis is to elaborate external and internal analysis and to assess present strategy, alternatively to suggest a new strategy reflecting competitive environment.

  8. Estrategias de Enseñanza a Distancia sobre Control No-Lineal Aplicada al Péndulo Invertido Strategies for Distance Learning Courses on Nonlinear Control Applied to the Inverted Pendulum

    Directory of Open Access Journals (Sweden)

    Sergio García-Nieto

    2007-01-01

    Full Text Available Este artículo describe el desarrollo de una herramienta software/hardware destinada al estudio, en el ámbito de la enseñanza universitaria, de sistemas de control distribuidos en tiempo real. El sistema se empleará en el control de procesos no lineales. Esta herramienta presenta tres partes claramente diferenciadas, las cuales pueden ser analizadas y modificadas por los estudiantes: i se introduce el modelo físico del péndulo invertido; ii el controlador es implementado en un sistema distribuido de tiempo real; y iii todo el sistema es manejado mediante una aplicación desarrollada en JAVA. Por lo tanto, los estudiantes tienen todos los elementos necesarios para trabajar con sistemas complejos no lineales, como el problema del péndulo invertido que se discute en este trabajo. Las pruebas realizadas muestran que la plataforma proporciona un método rápido y seguro de experimentación para los estudiantes.This paper presents a software/hardware tool to study, at university level, distributed control systems in real time. This platform is applied to control nonlinear processes. The system has three different parts which students can evaluate and modify; i a virtual model represents the physic model of the inverted pendulum; the controller is implemented by a real time distributed control system; and iii the whole system is managed with a JAVA application. Therefore, students have all the necessary elements to practice with complex nonlinear systems, such as the inverted pendulum discussed in this work. The tests done show that the plattform represents a fast and reliable method for experimentation by the students.

  9. Quality-aware scheduling for key-value data stores

    CERN Document Server

    Xu, Chen

    2015-01-01

    This book comprehensively illustrates quality-ware scheduling in key-value stores. In addition, it provides scheduling strategies and a prototype framework of quality-aware scheduler as well as a demonstration of online applications. The book offers a rich blend of theory and practice which is suitable for students, researchers and practitioners interested in distributed systems, NoSQL key-value stores and scheduling.

  10. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Harinarayan Tiwari; Nayan Sharma

    2015-10-01

    This paper presents fundamental outcomes from an experimental study on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). Hydrodynamic performance was tested in a circulated open channel that comprised of PKW and sand bed (d50 = 0.25 mm). Instantaneous velocities were measured at 20 cross sections using Laser Doppler Velocimeter (LDV) with constant discharge and depth. Average velocity and turbulence intensities in both directions were investigated. Average longitudinal velocities are found very much consistent at every point and maximum around the midway of inlet key. In transverse direction, flow is bifurcating in two directions which are also confirmed by average transverse velocity estimation. Variation of turbulence intensity presents average 10 times higher transverse turbulence than longitudinal turbulence near inlet key of PKW.

  11. Introducing an Evidential Reasoning Approach for Selecting Knowledge Management Strategies

    Directory of Open Access Journals (Sweden)

    Mohammad Shariatmadari

    2013-04-01

    Full Text Available In a knowledge economy, a key source of sustainable competitive advantage relies on the way to create, share, and utilize knowledge. In order to react to an increasingly competitive business environment, many companies emphasize the importance of Knowledge Management (KM, and base their KM strategy on their unique resources and capabilities. Although numerous works discuss the issues of how to perform a KM strategy and implement it successfully, few have provided methods that can systematically evaluate and model the KM strategy involving several complex factors. In this paper, the evidential reasoning (ER approach is applied as a method for KM strategy selection. The process of building a multiple criteria decision model of a hierarchical structure is presented, in which both quantitative and qualitative information is represented in a unified manner. The KM strategy selection is then fully investigated using the ER approach in a real case study in Academic Center for Education, Culture and Research (ACECR. Both the advantages of applying this model in practice and the analysis process itself are discussed.

  12. The Effective Key Length of Watermarking Schemes

    CERN Document Server

    Bas, Patrick

    2012-01-01

    Whereas the embedding distortion, the payload and the robustness of digital watermarking schemes are well understood, the notion of security is still not completely well defined. The approach proposed in the last five years is too theoretical and solely considers the embedding process, which is half of the watermarking scheme. This paper proposes a new measurement of watermarking security, called the effective key length, which captures the difficulty for the adversary to get access to the watermarking channel. This new methodology is applied to additive spread spectrum schemes where theoretical and practical computations of the effective key length are proposed. It shows that these schemes are not secure as soon as the adversary gets observations in the Known Message Attack context.

  13. Unconditional Security In Quantum Key Distribution

    CERN Document Server

    Yuen, Horace P

    2012-01-01

    It has been widely claimed and believed that many protocols in quantum key distribution, especially the single-photon BB84 protocol, have been proved unconditionally secure at least in principle, for both asymptotic and finite protocols with realistic bit lengths. In this paper it is pointed out that the only known quantitative justification for such claims is based on incorrect assertions. The precise security requirements are described in terms of the attacker's sequence and bit error probabilities in estimating the key. The extent to which such requirements can be met from a proper trace distance criterion is established. The results show that the quantitative security levels obtainable in concrete protocols with ideal devices do not rule out drastic breach of security unless privacy amplification is more properly applied.

  14. Modern applied U-statistics

    CERN Document Server

    Kowalski, Jeanne

    2008-01-01

    A timely and applied approach to the newly discovered methods and applications of U-statisticsBuilt on years of collaborative research and academic experience, Modern Applied U-Statistics successfully presents a thorough introduction to the theory of U-statistics using in-depth examples and applications that address contemporary areas of study including biomedical and psychosocial research. Utilizing a "learn by example" approach, this book provides an accessible, yet in-depth, treatment of U-statistics, as well as addresses key concepts in asymptotic theory by integrating translational and cross-disciplinary research.The authors begin with an introduction of the essential and theoretical foundations of U-statistics such as the notion of convergence in probability and distribution, basic convergence results, stochastic Os, inference theory, generalized estimating equations, as well as the definition and asymptotic properties of U-statistics. With an emphasis on nonparametric applications when and where applic...

  15. Key elements of swat physical training and its implementation strategy:a case study of Nanjing Forest Police College Swat Training%特警身体素质训练的关键要素分析与实施策略研究

    Institute of Scientific and Technical Information of China (English)

    周波; 刘昱欣; 周维方

    2015-01-01

    培养出真正能够胜任重担的特警是公安教育10余年来一直努力探索的重要问题之一,特别是特警身体素质的训练问题。南京森林警察学院有着近15年特警培养历史,在公安特警教育方面处于领头羊位置,以其特警培养为例展开研究。研究认为,特警队员的自身条件、教官的训练水平、管理水平、训练装备与场馆、营养补给、机能恢复与心理干预情况和训练时间保障在特警身体素质训练中起着关键性作用,并藉此进行了实施策略的研究。%Swat,as a new police classification in China,bear the responsibility in the emergencies.How to cultivate truly competent swat is one of the important problems of the heavy burden of police education for more than10 years,especially swat physical training. Nanjing Forest Police Collage is in the leading position which has over 15 years of history in swat education,so it is taken as a case study in this paper.The study suggests that swat team members'physical conditions,instructors'training and management level,training equipment and venues,nutritional supplement,functional recovery and psychological intervention and the training time is the key elements of swat's physical training,and research the implementation of the strategy.

  16. Bagunça na escola: estratégias para serem aplicadas entre escola e grupos / Mess in the school: strategies to be applied among schools and groups

    Directory of Open Access Journals (Sweden)

    Cleiton Estevam da Silva

    2011-06-01

    Full Text Available Partindo de uma perspectiva intercultural, este artigo pretende cartografar algumas práticas de alunos e grupos de alunos em sala de aula, a conhecida bagunça, comumente tratadas como prejudiciais ao ensino e organização escolares. Baseando-se na reconstrução documentária de grupos de discussão e entrevistas com alunos do quinto ano de diferentes sistemas escolares (público e privado no Brasil e escolas de baixa e alta qualificação educacionais na Alemanha, discutiremos o conceito de bagunça considerando a sua função social em relação à constituição de grupos de amigos, à carreira escolar e a um descontentamento ou crítica do aluno sobre qualidade de ensino. Função esta que se diferencia e configura de acordo com o contexto social, econômico e cultural do aluno revelando-se, muitas vezes, como sua voz face à obsolescência e ao fracasso da instituição escolar. Do ponto de vista metodológico, empregamos o método de pesquisa qualitativa relacionada a investigações interculturais assim como o método de triangulação sobre o material cultural relacionado.Based on a cross-cultural study in this paper we outline practices of groups of students in the class room, known as ‘disruptive behaviour’, which are seen as disruptions to classroom and school’s order. Using documentary reconstructions of data from interview and group discussions with 5th graders from different schools and school systems (public and private schools in Brazil, lower and higher qualifying schools in Germany, we discuss the concept of ‘bagunça’ in relation to its social functions concerning the construction of peer-groups, school careers and school-related attitudes. A fundamental difference between pupil on different educational and social contexts can be seen concerning the function of school critique, which is only applied in schools of lower educational or social status. From a methodological point of view we address questions of class

  17. Key Performance Indicators of the ITRF2014 Products

    Science.gov (United States)

    Altamimi, Zuheir; Rebischung, Paul; Métivier, Laurent; Collilieux, Xavier

    2016-04-01

    The ITRF2014 was constructed with two main innovations, namely modeling the annual and semi-annuals signals present in the station position time series, and Post-Seismic Deformations (PSD) for sites subject to major Earthquakes. In addition, a rigorous and improved combination strategy was applied, following the Least Squares adjustment principles, such as iteratively rejecting or down-weighting outliers whose normalized residuals exceed a threshold of 3-sigma. In order to evaluate the precision and accuracy of the ITRF2014 products, we explore some key performance indicators of its main products. These indicators include the performance of the seasonal signals and PSD models, the level of consistency of the four techniques, upon not only the ITRF2014 defining parameters (origin, scale, orientation), but also upon tie and velocity discrepancies at co-location sites, as well as polar motion components. A particular emphasis will be given to show evidences regarding the level of frame scale agreement between VLBI and SLR solutions.

  18. 3 keys to defeating unconscious bias watch, think, act

    CERN Document Server

    Thiederman, Sondra

    2015-01-01

    Have you ever had a biased thought? If the answer is “yes,” join the club. Everybody has biases and, although that doesn’t make us bad people, it does mean we compromise our ability to get along with people who are different from us. The good news is, there’s a lot we can do to defeat bias. Calling on Dr. Sondra Thiederman’s twenty-five years of experience in the diversity/inclusion field, the book lays out an innovative WATCH, THINK, ACT strategy that each of us can immediately apply to the task. Easy-to-read and filled with anecdotes and activities, 3 Keys shows the reader: • How to WATCH their thoughts, experiences, and actions to identify unconscious biases and target them for extinction. • How to THINK in such a way as to weaken and control our biases. • How to ACT to defeat our biases and cultivate the kind of common ground that we know to be inhospitable to the survival of bias. Designed to motivate real change, the answer to defeating our biases is in these pages. The rest is up to you...

  19. Smartphones Could Make Keys Obsolete

    Institute of Scientific and Technical Information of China (English)

    Matt Richtel

    2011-01-01

    @@ Front pockets and purses are slowly being emptied of one of civilization's most basic and enduring tools: the key.It's being swallowed by the cellphone.New technology lets smartphones unlock hotel, office and house doors and open garages and even car doors. It's a not-too-distant cousin of the technology that allows key fobs to remotely unlock automobiles or key cards to be waved beside electronic pads at office entrances.What's new is that it is on the device more people are using as the Swiss Army knife of electronics, in equal parts phone, memo pad, stereo, map, GPS unit, and camera and game machine.

  20. Sensemaking and strategy

    DEFF Research Database (Denmark)

    Nielsen, Renate

    of these processes my focus will be on how sensemaking processes are transformed into strategy and policies to be applied in daily routines. This way, I believe, we can learn more about how organisations develop and use this knowledge to gain further competitiveness. I will look at these processes on various...

  1. Essays in Applied Microeconomics

    Science.gov (United States)

    Ge, Qi

    This dissertation consists of three self-contained applied microeconomics essays on topics related to behavioral economics and industrial organization. Chapter 1 studies how sentiment as a result of sports event outcomes affects consumers' tipping behavior in the presence of social norms. I formulate a model of tipping behavior that captures consumer sentiment following a reference-dependent preference framework and empirically test its relevance using the game outcomes of the NBA and the trip and tipping data on New York City taxicabs. While I find that consumers' tipping behavior responds to unexpected wins and losses of their home team, particularly in close game outcomes, I do not find evidence for loss aversion. Coupled with the findings on default tipping, my empirical results on the asymmetric tipping responses suggest that while social norms may dominate loss aversion, affect and surprises can result in freedom on the upside of tipping. Chapter 2 utilizes a novel data source of airline entry and exit announcements and examines how the incumbent airlines adjust quality provisions as a response to their competitors' announcements and the role of timing in such responses. I find no evidence that the incumbents engage in preemptive actions when facing probable entry and exit threats as signaled by the competitors' announcements in either short term or long term. There is, however, evidence supporting their responses to the competitors' realized entry or exit. My empirical findings underscore the role of timing in determining preemptive actions and suggest that previous studies may have overestimated how the incumbent airlines respond to entry threats. Chapter 3, which is collaborated with Benjamin Ho, investigates the habit formation of consumers' thermostat setting behavior, an often implicitly made decision and yet a key determinant of home energy consumption and expenditures. We utilize a high frequency dataset on household thermostat usage and find that

  2. Secret Key Generation From Mobility

    CERN Document Server

    Gungor, Onur; Koksal, C Emre

    2011-01-01

    We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.

  3. Key Statistics for Thyroid Cancer

    Science.gov (United States)

    ... and Treatment? Thyroid Cancer About Thyroid Cancer Key Statistics for Thyroid Cancer How common is thyroid cancer? ... remains very low compared with most other cancers. Statistics on survival rates for thyroid cancer are discussed ...

  4. Slips of the Typewriter Key.

    Science.gov (United States)

    Berg, Thomas

    2002-01-01

    Presents an analysis of 500 submorphemic slips of the typewriter key that escaped the notice of authors and other proofreaders and thereby made their way into the published records of scientific research. (Author/VWL)

  5. Wiki keys on mobile devices

    OpenAIRE

    Weber, Gisela; Hagedorn, Gregor

    2010-01-01

    The development of increasingly powerful mobile devices like PDAs (Personal Digital Assistants) and Smartphones, with larger displays and greater resolution makes them increasingly suitable for identification tools available directly “in the field”. One of several approaches towards this aim in the KeyToNature project is based on wiki-stored documents. Important features of wiki-based keys, such as hidden text and media information as well as links to glossary entries are su...

  6. China's New Energy Strategy

    Institute of Scientific and Technical Information of China (English)

    Cui Shuhong

    2004-01-01

    @@ At one of the routine meetings recently held by the State Council, the Chinese Government discussed and approved in principle the draft "Platform of Energy Development Plan (2004-2020)". This platform document is regarded as important to China's energy industrial development,according to the industrial insiders. In an interview with news media, Director of Energy Research Institute of State Development and Reform Commission Zhou Dadi specified eight key points of the new energy strategy.

  7. Block Based Symmetry Key Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Satyendra Nath Mandal

    2012-08-01

    Full Text Available Visual cryptography is a method for protecting image-based secrets that has a computation-free decoding process. In this technique, numbers of shares have been generated from one image. The shares are sent through any channel to the receiver and the receiver can again produce original image by stacking all the shares in proper order. But, this method wastes a lot of bandwidth of the network. The techniques of generating shares have been used in several existing methods which are not unique. The different methods have been used in different types of images like binary, gray and color images. In this paper, a block based symmetry key visual cryptography algorithm has been proposed to convert image in encrypted form and decrypt the encrypted image into original form. The symmetric key has been generated from a real number. The encryption and decryption algorithm have been designed based on symmetry key. The algorithm with key has been used to encrypt image into single share and decrypt the single share into original image. The real number has been used to form the key may be predefined or may be sent by secure channel to the receiver. The proposed algorithm can be applied to any type images i.e. binary, gray scale and color images. A comparison has been made of the proposed algorithm with different existing algorithms like Ceaser cipher, transpose of matrix, bit comp, and transposition cipher based on the performance. The pixels distributed in original and share images have also been tested. Finally, it has shown that breaking of security level of proposed algorithm i.e. to guess the real number is huge time consuming.

  8. Finite-key security analysis for multilevel quantum key distribution

    Science.gov (United States)

    Brádler, Kamil; Mirhosseini, Mohammad; Fickler, Robert; Broadbent, Anne; Boyd, Robert

    2016-07-01

    We present a detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite-key-length scenario. The finite secret key rates (in bits per detected photon) are calculated as a function of the length of the sifted key by (i) generalizing the uncertainly relation-based insight from BB84 to any d-level 2-MUB QKD protocol and (ii) by adopting recent advances in the second-order asymptotics for finite block length quantum coding (for both d-level 2- and 3-MUB QKD protocols). Since the finite and asymptotic secret key rates increase with d and the number of MUBs (together with the tolerable threshold) such QKD schemes could in principle offer an important advantage over BB84. We discuss the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons.

  9. A New Distribution Strategy : The Omnichannel Strategy

    Directory of Open Access Journals (Sweden)

    Mihaela Gabriela Belu

    2014-06-01

    Full Text Available In an increasingly globalized world, dependent on information technology, distribution companies are searching for new marketing models meant to enrich the consumer’s experience. Therefore, the evolution of new technologies, the changes in the consumer’s behaviour are the main factors that determine changes in the business model in the distribution field. The following article presents different forms of distribution, focusing on the omnichannel strategy. In the last part of the paper, the authors analyse the Romanian retail market, namely, the evolution of the market, its key competitors and the new distribution models adopted by retaileres in our country.

  10. Forces in strategy formation

    DEFF Research Database (Denmark)

    Steensen, Elmer Fly

    2008-01-01

    This chapter proposes that organizational strategy formation should be characterized theoretically as a process that is subject to several interacting forces, rather than represented by separate discrete decisionmodels or theoretic perspectives, as is commonly done in the strategic management...... literature. Based on an extensive review of relevant theory and empirical work in strategic decision-making, organizational change theory, cognitive and social psychology, and strategy processes, seven kinds of ''forces'' - rational, imposed, teleological, learning, political, heuristic, and social...... - are identified as interacting in and having significant influence on the strategy formation process. It is further argued that by applying a holistic ''forces-view'' of the significant and interacting influences on strategy formation, we can better understand the dynamics and challenges in managing the process...

  11. Policy strategies to address sustainability of Alaskan boreal forests in response to a directionally changing climate

    OpenAIRE

    2006-01-01

    Human activities are altering many factors that determine the fundamental properties of ecological and social systems. Is sustainability a realistic goal in a world in which many key process controls are directionally changing? To address this issue, we integrate several disparate sources of theory to address sustainability in directionally changing social–ecological systems, apply this framework to climate-warming impacts in Interior Alaska, and describe a suite of policy strategies that eme...

  12. Environmental strategy

    DEFF Research Database (Denmark)

    Zabkar, Vesna; Cater, Tomaz; Bajde, Domen

    2013-01-01

    Environmental issues and the inclusion of environmental strategies in strategic thinking is an interesting subject of investigation. In general, managerial practices organized along ecologically sound principles contribute to a more environmentally sustainable global economy. From the managerial...... perspective, appropriate environmental strategies in compliance with environmental requirements aim at building competitive advantages through sustainable development. There is no universal “green” strategy that would be appropriate for each company, regardless of its market requirements and competitive...

  13. A belief-based evolutionarily stable strategy.

    Science.gov (United States)

    Deng, Xinyang; Wang, Zhen; Liu, Qi; Deng, Yong; Mahadevan, Sankaran

    2014-11-21

    As an equilibrium refinement of the Nash equilibrium, evolutionarily stable strategy (ESS) is a key concept in evolutionary game theory and has attracted growing interest. An ESS can be either a pure strategy or a mixed strategy. Even though the randomness is allowed in mixed strategy, the selection probability of pure strategy in a mixed strategy may fluctuate due to the impact of many factors. The fluctuation can lead to more uncertainty. In this paper, such uncertainty involved in mixed strategy has been further taken into consideration: a belief strategy is proposed in terms of Dempster-Shafer evidence theory. Furthermore, based on the proposed belief strategy, a belief-based ESS has been developed. The belief strategy and belief-based ESS can reduce to the mixed strategy and mixed ESS, which provide more realistic and powerful tools to describe interactions among agents.

  14. Compositional Advantage and Strategy

    DEFF Research Database (Denmark)

    Li, Xin

    advantage is redefined as the attractiveness of the composition of the producer’s offering in terms of scope and perceived value/price ratio. I identify five ways or basic compositional strategies to improve the value/price ratio. A firm may have an overall compositional strategy that is composed of some...... or all of the five basic compositional strategies. I argue there are three indispensable key success factors for a composition-based competition, i.e., aspiration (ambition-position asymmetry), attitude (being ALERT), and action (turning asymmetry into advantage). I also discuss the particular relevance...... of the present theory to understanding Chinese firms. I conclude with managerial implications and suggestions for future research....

  15. Comment on "Quantum key distribution without alternative measurements"

    CERN Document Server

    Zhang Yu Shun; Guo Guang Can; Zhang, Yong-Sheng; Li, Chuan-Feng; Guo, Guang-Can

    2001-01-01

    In a recent paper [A. Cabello, Phys. Rev. A 61, 052312 (2000)], a quantum key distribution protocol based on entanglement swapping was proposed. However, in this comment, it is shown that this protocol is insecure if Eve use a special strategy to attack.

  16. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  17. The locks and keys to industrial biotechnology.

    Science.gov (United States)

    Wohlgemuth, Roland

    2009-04-01

    The sustainable use of resources by Nature to synthesize the required products at the right place, when they are needed, continues to be the role model for total synthesis and production in general. The combination of molecular and engineering science and technology in the biotechnological approach needs no protecting groups at all and has therefore been established for numerous large-scale routes to both natural and synthetic products in industry. The use of biobased raw materials for chemical synthesis, and the economy of molecular transformations like atom economy and step economy are of growing importance. As safety, health and environmental issues are key drivers for process improvements in the chemical industry, the development of biocatalytic reactions or pathways replacing hazardous reagents is a major focus. The integration of the biocatalytic reaction and downstream processing with product isolation has led to a variety of in situ product recovery techniques and has found numerous successful applications. With the growing collection of biocatalytic reactions, the retrosynthetic thinking can be applied to biocatalysis as well. The introduction of biocatalytic reactions is uniquely suited to cost reductions and higher quality products, as well as to more sustainable processes. The transfer of Nature's simple and robust sensing and control principles as well as its reaction and separation organization into useful technical systems can be applied to different fermentations, biotransformations and downstream processes. Biocatalyst and pathway discovery and development is the key towards new synthetic transformations in industrial biotechnology.

  18. Symmetric-key cryptosystem with DNA technology

    Institute of Scientific and Technical Information of China (English)

    LU MingXin; LAI XueJia; XIAO GuoZhen; QIN Lei

    2007-01-01

    DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred to as DNA symmetric-key cryptosystem (DNASC). In DNASC,both encryption and decryption keys are formed by DNA probes, while its ciphertext is embedded in a specially designed DNA chip (microarray). The security of this system is mainly rooted in difficult biology processes and problems, rather than conventional computing technology, thus it is unaffected by changes from the attack of the coming quantum computer. The encryption process is a fabrication of a specially designed DNA chip and the decryption process is the DNA hybridization.In DNASC, billions of DNA probes are hybridized and identified at the same time,thus the decryption process is conducted in a massive, parallel way. The great potential in vast parallelism computation and the extraordinary information density of DNA are displayed in DNASC to some degree.

  19. Perspectives on Applied Ethics

    OpenAIRE

    2007-01-01

    Applied ethics is a growing, interdisciplinary field dealing with ethical problems in different areas of society. It includes for instance social and political ethics, computer ethics, medical ethics, bioethics, envi-ronmental ethics, business ethics, and it also relates to different forms of professional ethics. From the perspective of ethics, applied ethics is a specialisation in one area of ethics. From the perspective of social practice applying eth-ics is to focus on ethical aspects and ...

  20. Advances in Applied Mechanics

    OpenAIRE

    2014-01-01

    Advances in Applied Mechanics draws together recent significant advances in various topics in applied mechanics. Published since 1948, Advances in Applied Mechanics aims to provide authoritative review articles on topics in the mechanical sciences, primarily of interest to scientists and engineers working in the various branches of mechanics, but also of interest to the many who use the results of investigations in mechanics in various application areas, such as aerospace, chemical, civil, en...

  1. Fatores críticos para o sucesso no desempenho de novos produtos: um estudo aplicado ao setor moveleiro da Serra Gaúcha Key factors for success in the new product development: an applied study in the furniture industry of Serra Gaúcha

    Directory of Open Access Journals (Sweden)

    Deonir De Toni

    2011-01-01

    Full Text Available Uma melhor performance de um novo produto no mercado pode ser alcançada pela adoção de um conjunto de estratégia e ações que sirvam de suporte para a gestão de novos projetos. A questão central deste estudo é: por que alguns novos produtos são bem-sucedidos enquanto muitos outros fracassam? A partir disso, o estudo teve por objetivo testar um modelo visando dar respostas a esta questão de pesquisa. Para tanto, foi implementada uma pesquisa do tipo survey em empresas do setor moveleiro da Serra Gaúcha utilizando um instrumento de pesquisa que integra fatores mercadológicos, organizacionais, operacionais e o desempenho do processo de desenvolvimento de novos produtos (PDNP. Com isso, foi possível fazer um comparativo entre esta pesquisa e dois estudos anteriores realizados com o mesmo enfoque (BOEHE; MILAN; DE TONI, 2009; DE TONI; BOEHE, 2006. Os resultados são semelhantes e contribuem com a literatura existente, pois têm a preocupação de integrar essas três dimensões, analisando como elas estão relacionadas e qual o seu impacto no PDNP. Com a finalidade de testar as hipóteses do modelo proposto, foram utilizados três modelos de regressão múltipla hierárquica. Os resultados sugerem que, para a amostra analisada, a estratégia de inovação e a reação dos concorrentes são os dois fatores que mais impactam no desempenho do PDNP. Dessa forma, observou-se que o desempenho no PDNP não depende apenas de uma única dimensão ou fator. Mais do que isso, os resultados da regressão múltipla indicam que a combinação entre as três dimensões, organizacional, mercadológica e operacional, explica de maneira mais significativa o desempenho do PDNP.A better performance of a product in the market may be achieved by adopting a new set of strategies and actions that support the management of new products. The central issue of this study is: why do some products succeed while others fail? Starting from this point, this study aims

  2. Applied Neuroscience Laboratory Complex

    Data.gov (United States)

    Federal Laboratory Consortium — Located at WPAFB, Ohio, the Applied Neuroscience lab researches and develops technologies to optimize Airmen individual and team performance across all AF domains....

  3. Teaching reading comprehension strategies

    Directory of Open Access Journals (Sweden)

    Majlinda Lika

    2017-03-01

    Full Text Available The academic debate nowadays is focused on producing an applied science of learning, aiming to teach students how to learn and be strategic in their acquisition. The aim of the study is to identify and discuss the reading comprehension instruction approach applied in the Albanian system of education. Findings from 10 classes of Albanian language and literature with students of third grade were directly observed and analyzed, in order to gather evidence based on indicators and instruments that assess the way of reading comprehension. Findings were categorized according to strategy use; the frequency of their application in different classes was counted and represented in percentages. In this paper we will try to respond to questions like: What are students' main barriers of comprehending? Does the instructional approach respond to students’ needs and level of comprehension? Are teachers prepared to teach comprehension strategies? Furthermore, examples of procedures on how to deliver instruction of comprehension strategies in natural contexts will be represented. Results from teacher practices during lessons of reading comprehension confirmed that teachers use limited teaching strategies to deliver lessons. They mainly use strategies to test comprehension; while the approach of teaching students to read independently and strategically is an unknown practice.

  4. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  5. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  6. Key Revocation System for DNSSEC

    Directory of Open Access Journals (Sweden)

    Gilles Guette

    2008-06-01

    Full Text Available The Doma in Name System (DNS is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions (DNSSEC has been designed to protect the DNS protocol using public key cryptography and digital signatures. In this paper, we show how DNSSEC can be attacked using compromised keys and the consequences of such attacks. Then, we propose a new revocation scheme for DNSSEC based on two new resource records. There is currently no revocation system defined in the DNSSEC standard.

  7. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  8. Evaluation Strategy

    DEFF Research Database (Denmark)

    Coto Chotto, Mayela; Wentzer, Helle; Dirckinck-Holmfeld, Lone

    2009-01-01

    The paper presents an evaluation strategy based on deliberate ideals and principles of dialogue design. The evaluation strategy is based on experiential phenomenology taking the point of departure for design and evaluation processes in the experienced practitioners themselves. The article present...... the evaluation strategy and methodology of a research project Making Online Path to Enter new Markets, MOPEM. It is an EU-research project with partners from different Educational Institutions of Technology and Business in five European Countries.......The paper presents an evaluation strategy based on deliberate ideals and principles of dialogue design. The evaluation strategy is based on experiential phenomenology taking the point of departure for design and evaluation processes in the experienced practitioners themselves. The article presents...

  9. Succeeding with freemium: Strategies for implementation

    DEFF Research Database (Denmark)

    Holm, Anna B.; Günzel-Jensen, Franziska

    2017-01-01

    in an online digital business. Research limitations/implications: The research is limited to digital companies applying a freemium business model and offering their products and services online. Practical implications: The findings and recommendations can help new and existing companies first, to evaluate......Purpose: The freemium business model has recently become one of the most dominant business models in online markets. However, entrepreneurs and managers still have a limited understanding of why some companies using freemium business models become successful and sustainable while others do not...... succeeded or failed to develop a sustainable freemium model. These are LinkedIn, Spotify, Box, Eventbrite, Chargify, Gasketball, and TravelCrony. Findings: The article describes the generic strategy and the key strategic choices that enable and support successful freemium business model execution...

  10. Psycholinguistics in Applied Linguistics: Trends and Perspectives.

    Science.gov (United States)

    de Bot, Kees

    2000-01-01

    Discusses the relationship between the terms psycholinguistics and applied linguistics, and in the process explores key issues in multilingual processing, such as the structure of the bilingual lexicon, language choice in production and perception, and the language mode. (Author/VWL)

  11. Image remapping strategies applied as protheses for the visually impaired

    Science.gov (United States)

    Johnson, Curtis D.

    1993-01-01

    Maculopathy and retinitis pigmentosa (rp) are two vision defects which render the afflicted person with impaired ability to read and recognize visual patterns. For some time there has been interest and work on the use of image remapping techniques to provide a visual aid for individuals with these impairments. The basic concept is to remap an image according to some mathematical transformation such that the image is warped around a maculopathic defect (scotoma) or within the rp foveal region of retinal sensitivity. NASA/JSC has been pursuing this research using angle invariant transformations with testing of the resulting remapping using subjects and facilities of the University of Houston, College of Optometry. Testing is facilitated by use of a hardware device, the Programmable Remapper, to provide the remapping of video images. This report presents the results of studies of alternative remapping transformations with the objective of improving subject reading rates and pattern recognition. In particular a form of conformal transformation was developed which provides for a smooth warping of an image around a scotoma. In such a case it is shown that distortion of characters and lines of characters is minimized which should lead to enhanced character recognition. In addition studies were made of alternative transformations which, although not conformal, provide for similar low character distortion remapping. A second, non-conformal transformation was studied for remapping of images to aid rp impairments. In this case a transformation was investigated which allows remapping of a vision field into a circular area representing the foveal retina region. The size and spatial representation of the image are selectable. It is shown that parametric adjustments allow for a wide variation of how a visual field is presented to the sensitive retina. This study also presents some preliminary considerations of how a prosthetic device could be implemented in a practical sense, vis-a-vis, size, weight and portability.

  12. Interdisciplinary Instructional Reading Strategies: An Applied Application for Business Education

    Science.gov (United States)

    Polkinghorne, Frederick W.; Bland, Zinna L.

    2011-01-01

    The contemporary workforce requires technical and reading skills (Shanahan & Shanahan, 2008; The Conference Board, Corporate Voices for Working Families, Partnership for 21st Century Skills, Society of Human Resource Management, 2006). Technical skills allow workers to perform specific workforce tasks, while reading skills are generally needed by…

  13. Applying Deterrence Strategy to Agents of Asymmetrical Threats

    Science.gov (United States)

    2014-09-01

    crime deterrent. A costly divorce is a deterrent to unfaithfulness in a spouse. Hell is a 13 deterrent from evil acts, for those who believe (see...terrorist-associated activity, any threat to influence behaviour will be coercive and not deterrent because the aim will be altering the status quo; to put...Square bomber, had a strained marriage at the time of his attempted act, and his wife had previously taken their two children to Saudi Arabia to live

  14. Typhoid fever vaccination strategies.

    Science.gov (United States)

    Date, Kashmira A; Bentsi-Enchill, Adwoa; Marks, Florian; Fox, Kimberley

    2015-06-19

    Typhoid vaccination is an important component of typhoid fever prevention and control, and is recommended for public health programmatic use in both endemic and outbreak settings. We reviewed experiences with various vaccination strategies using the currently available typhoid vaccines (injectable Vi polysaccharide vaccine [ViPS], oral Ty21a vaccine, and injectable typhoid conjugate vaccine [TCV]). We assessed the rationale, acceptability, effectiveness, impact and implementation lessons of these strategies to inform effective typhoid vaccination strategies for the future. Vaccination strategies were categorized by vaccine disease control strategy (preemptive use for endemic disease or to prevent an outbreak, and reactive use for outbreak control) and vaccine delivery strategy (community-based routine, community-based campaign and school-based). Almost all public health typhoid vaccination programs used ViPS vaccine and have been in countries of Asia, with one example in the Pacific and one experience using the Ty21a vaccine in South America. All vaccination strategies were found to be acceptable, feasible and effective in the settings evaluated; evidence of impact, where available, was strongest in endemic settings and in the short- to medium-term. Vaccination was cost-effective in high-incidence but not low-incidence settings. Experience in disaster and outbreak settings remains limited. TCVs have recently become available and none are WHO-prequalified yet; no program experience with TCVs was found in published literature. Despite the demonstrated success of several typhoid vaccination strategies, typhoid vaccines remain underused. Implementation lessons should be applied to design optimal vaccination strategies using TCVs which have several anticipated advantages, such as potential for use in infant immunization programs and longer duration of protection, over the ViPS and Ty21a vaccines for typhoid prevention and control.

  15. Formulation of price strategies in the software sector: outsourcing of development and maintenance software product case

    Directory of Open Access Journals (Sweden)

    Antonio Cezar Bornia

    2008-07-01

    Full Text Available The main goal of this article is to discuss the formulation of price strategies in the software sector. In the intention of reaching the proposed goal, strategies models of prices are introduced along with the procedure to the formulation of price strategies, composed by five stages: external and internal analyses, consolidation, positioning, price strategy formalization and market attendance. As for the methodology, the study is classified as qualitative, exploratory, descriptive, documental, of field and case study, according to the approach of Vergara (1998. In the case study, the model to the formulation of price strategies is applied in a company’s software sector, being analyzed the outsourcing of development and maintenance software product. As main contributions, it is highlighted the price procedure application that emphasizes strategic price logic and prices strategies formulations, with base in the analysis of five main factors: quality, comparison with the competition, company life cycle, product life cycle and characteristics of the segment-objective. Based on the analyzed factors, a possible strategy to be adopted considering the characteristics of the product and the company is the price strategy and superior value. Key-words: Pricing Strategies. Price Formulation. Software Enterprises.

  16. Swift residue-screening identifies key N-glycosylated asparagines sufficient for surface expression of neuroglycoprotein Lingo-1.

    Science.gov (United States)

    Zhong, Xiaotian; Pocas, Jennifer; Liu, Yan; Wu, Paul W; Mosyak, Lidia; Somers, Will; Kriz, Ron

    2009-03-18

    Advances in genomics and proteomics have generated the needs for the efficient identification of key residues for structure and function of target proteins. Here we report the utilization of a new residue-screening approach, which combines a mammalian high-throughput transient expression system with a PCR-based expression cassette, for the study of the post-translational modification. Applying this approach results in a quick identification of essential N-glycosylation sites of a heavily glycosylated neuroglycoprotein Lingo-1, which are sufficient for the support of its surface expression. These key N-glycosylated sites uniquely locate on the concave surface of the elongated arc-shape structure of the leucine-rich repeat domain. The swift residue-screening approach may provide a new strategy for structural and functional analysis.

  17. What are applied ethics?

    Science.gov (United States)

    Allhoff, Fritz

    2011-03-01

    This paper explores the relationships that various applied ethics bear to each other, both in particular disciplines and more generally. The introductory section lays out the challenge of coming up with such an account and, drawing a parallel with the philosophy of science, offers that applied ethics may either be unified or disunified. The second section develops one simple account through which applied ethics are unified, vis-à-vis ethical theory. However, this is not taken to be a satisfying answer, for reasons explained. In the third section, specific applied ethics are explored: biomedical ethics; business ethics; environmental ethics; and neuroethics. These are chosen not to be comprehensive, but rather for their traditions or other illustrative purposes. The final section draws together the results of the preceding analysis and defends a disunity conception of applied ethics.

  18. Ten Keys to the Portal

    Science.gov (United States)

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  19. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin;

    2016-01-01

    We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...

  20. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  1. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so...

  2. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  3. Key Skills Influencing Student Achievement

    Science.gov (United States)

    Balch, Tonya; Gruenert, Steve

    2009-01-01

    A predictive, non-experimental, cross-sectional design (Johnson, 2001) was used to conduct a study to determine if elementary administrators' key counseling skills and select demographics predicted state-level student performance indicators in their respective schools. A secondary purpose of this study was to develop a valid and reliable on-line…

  4. Overview, conclusions, and key recommendations

    NARCIS (Netherlands)

    Loeber, R.; Farrington, D.P.; Howell, J.C.; Hoeve, M.; Loeber, R.; Farrington, D.P.

    2012-01-01

    Section I of this chapter summarizes the most important points of Chapters 2 to 5 and relevant portions of Chapter 10 (which concerns European issues) by addressing key findings that are relevant for juveniles’ transition of offending from adolescence (up to age 18) into adulthood. Section I focuses

  5. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken...

  6. Analysis of Muji's Business Strategy

    Institute of Scientific and Technical Information of China (English)

    范晶

    2011-01-01

    This article is a report of analysis of Muji's business strategy.First,the vision and mission are introduced.Second,the current strategy is identified.Then the industry analysis,industry driving forces,key success factors,value chain analysis,competitive advantage,competitive power of the competitive advantage were analyzed.At last,on the basis of the former analysis the SWOT analysis was worked out.

  7. Applying critical thinking to college EFL teaching

    Institute of Scientific and Technical Information of China (English)

    刘迁

    2016-01-01

    In college EFL teaching, critical thinking has long been regarded as an advanced stage and skill of thinking. However, most Chinese EFL instructors stress language skills rather than critical thinking in class. this article mainly explores the strategies of applying critical thinking in college EFL teaching.

  8. The Key Drivers behind Novo Nordisk’s Growth in the Diabetes Market in China

    Directory of Open Access Journals (Sweden)

    Hind Louiza CHITOUR

    2013-12-01

    Full Text Available To enter the Chinese Pharmaceutical market, “Big Pharma” has adopted different strategies to tackle the challenges specific to the country in terms of size, demographics, specific sales channels and logistics adjustments. While the majority of Global Pharmaceutical players have opted for an aggressive M&A approach to penetrate the Chinese market and gain local insight; the Danish Novo Nordisk has instead chosen a strategy focusing on innovation and developing its R&D structure to capitalize on the local talent pool. To illustrate Novo Nordisk’s growth strategy in the Mainland, we analyzed its competitiveness in the diabetes market by demonstrating the key drivers behind this success. We applied a various set of tools for this research: Novo Nordisk, Dong Bao Pharmaceutical executives’ interviews and personal observations accounting for the primary data, we also reviewed secondary data to perform a PEST analysis in addition to Porter’s competitive advantage model in order to extract the reasons behind Novo Nordisk’s marching success in the Mainland.

  9. International Marketing Strategies and the relationship with the export performance and export marketing orientation

    Directory of Open Access Journals (Sweden)

    Marlon Dalmoro

    2010-04-01

    Full Text Available This work aims to identify the relationship between marketing strategies of exporting Taquari Valley firms with the export performance and export market orientation. To achieve the goal sought proposed is the development of theoretical benchmark, made up items strategies for international marketing, export performance and export market orientation. In epistemological level was conducted a survey, applying for a questionnaire to a sample of 25 exporting companies that have industrial activities, chosen in a not probabilistic manner. Finally, it was observed that the key decisions on how to act in various markets in terms of strategies for international marketing - satisfaction with the internal market, international consistency, adaptation and localization level of the strategies - have relationship with the export market orientation and the export performance of studied companies.

  10. Export strategy

    DEFF Research Database (Denmark)

    Knudsen, Thorbjørn; Koed Madsen, Tage

    2002-01-01

    It is argued here that traditional export strategy research (encompassing the study of internationalization processes and export performance) is characterized by weak theoretical foundations and could benefit from a reorientation towards a dynamic capabilities perspective (DCP). We seek to draw...... on insights from DCP in order to devise a theoretical basis that could enrich export strategy research. Although our development of DCP insights builds on previous work, it also adds a crucial distinction between knowledge stocks and informational architecture. Changes in architecture are of greater...... importance. Following this elaboration of the dynamic capabilities perspective, we outline some implications and guidelines for future export strategy research....

  11. Mask strategy at International SEMATECH

    Science.gov (United States)

    Kimmel, Kurt R.

    2002-08-01

    International SEMATECH (ISMT) is a consortium consisting of 13 leading semiconductor manufacturers from around the globe. Its objective is to develop the infrastructure necessary for its member companies to realize the International Technology Roadmap for Semiconductors (ITRS) through efficiencies of shared development resources and knowledge. The largest area of effort is lithography, recognized as a crucial enabler for microelectronics technology progress. Within the Lithography Division, most of the efforts center on mask-related issues. The development strategy at International SEMATCH will be presented and the interlock of lithography projects clarified. Because of the limited size of the mask production equipment market, the business case is weak for aggressive investment commensurate with the pace of the International Technology Roadmap for Semiconductors. With masks becoming the overwhelming component of lithography cost, new ways of reducing or eliminating mask costs are being explored. Will mask technology survive without a strong business case? Will the mask industry limit the growth of the semiconductor industry? Are advanced masks worth their escalating cost? An analysis of mask cost from the perspective of mask value imparted to the user is presented with examples and generic formulas for the reader to apply independently. A key part to the success for both International SEMATECH and the industry globally will be partnerships on both the local level between mask-maker and mask-user, and the macro level where global collaborations will be necessary to resolve technology development cost challenges.

  12. Security of a key agreement protocol based on chaotic maps

    Energy Technology Data Exchange (ETDEWEB)

    Han Song [Curtin University of Technology, G.P.O. Box U1987 Perth, WA 6845 (Australia)], E-mail: s.han@curtin.edu.au

    2008-11-15

    Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev's encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.'s system. In order to address Bergamo et al.' attack, Xiao et al. proposed a novel key agreement protocol. In this paper, we will present two attacks on Xiao et al.'s key agreement protocol using chaotic maps. Our new attack method is different from the one that Bergamo et al. developed. The proposed attacks work in a way that an adversary can prevent the user and the server from establishing a shared session key even though the adversary cannot get any private information from the user and the server's communications.

  13. The social strategy cone: Towards a framework for evaluating social media strategies

    NARCIS (Netherlands)

    Effing, Robin; Spil, Ton A.M.

    2016-01-01

    Social media is growing rapidly. Providing both risks and opportunities for organizations as it does. The social strategy cone is developed for evaluating social media strategies. This framework comprises of seven key elements of social media strategies as based on a systematic literature review and

  14. Cetacean Strategies.

    Science.gov (United States)

    Gilliland, Denise DelGrosso

    1991-01-01

    Suggested are activities about whales for children in schools not near the ocean. Activities designed to pique students' interest in whales and to investigate the size, breathing, buoyancy, and feeding strategies of whales are discussed. (CW)

  15. Mesothelioma Applied Research Foundation

    Science.gov (United States)

    ... Percentage Donations Tribute Wall Other Giving/Fundraising Opportunities Bitcoin Donation Form FAQs Speak with Mary Hesdorffer, Nurse ... Percentage Donations Tribute Wall Other Giving/Fundraising Opportunities Bitcoin Donation Form FAQs © 2017 Mesothelioma Applied Research Foundation, ...

  16. Applied eye tracking research

    NARCIS (Netherlands)

    Jarodzka, Halszka

    2011-01-01

    Jarodzka, H. (2010, 12 November). Applied eye tracking research. Presentation and Labtour for Vereniging Gewone Leden in oprichting (VGL i.o.), Heerlen, The Netherlands: Open University of the Netherlands.

  17. Computer and Applied Ethics

    OpenAIRE

    越智, 貢

    2014-01-01

    With this essay I treat some problems raised by the new developments in science and technology, that is, those about Computer Ethics to show how and how far Applied Ethics differs from traditional ethics. I take up backgrounds on which Computer Ethics rests, particularly historical conditions of morality. Differences of conditions in time and space explain how Computer Ethics and Applied Ethics are not any traditional ethics in concrete cases. But I also investigate the normative rea...

  18. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  19. Key drivers of airline loyalty

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  20. Key Questions in Thoracic Surgery

    OpenAIRE

    Subotic, Dragan R.

    2016-01-01

    This 1000-page textbook encompasses much more than the title suggests. In fact, the title “Key questions in thoracic surgery and pulmonology” would be more fitting. The specific format of the book, with precise questions and evidence-based, but equally clear answers covering all relevant fields of pulmonology and thoracic surgery, makes this 40-chapter book a “must read” not only for residents, but also for senior pulmonologists and thoracic surgeons.

  1. Innovation, Key to Lasting Success

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ Oerlikon Textile will be exhibiting at ITMA ASIA 2010 in Shanghai on its 750- -plus stand C 51/C 52 in hall W2 from 22 to 26 June 2010. Highlights of the five brands under the umbrella of the textile machinery manufacturer include the new Autoconer X5 winding machine, a new FDY technology and the Era embroidery machine. Their technological innovations illustrate the slogan under which Oerlikon Textile is appearing at the show: Innovation remains the key to success.

  2. Key to Language Learning Success

    OpenAIRE

    2015-01-01

    This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these rol...

  3. Influence of the Personalization and Codification Strategies on Successful Knowledge Management Case Study: National Iranian Oil Company

    Directory of Open Access Journals (Sweden)

    Roghyeh Nouri

    2013-06-01

    Full Text Available Successful implementation of Knowledge Management (KM involves on identification the most effective associated factors. Hence well-thought-out of organization strategy often is absent in implementing KM. Moreover resource restrictions lead us to prioritize them. Consequently, organizations are looking to prioritize the projects for deploying KM in order to invest on the infrastructural projects based on that. The purpose of this study is on identifying, classifying and ranking the enablers related to four key factors of people, process, leadership and information technology based on two given KM strategies. The quantitative approach was utilized in collecting data through questionnaire. In order to approve and classify the identified enablers in each key factor, a quantitative approach was utilized in collecting data through a few justifiable reliable questionnaires. We designed them using Delphi method and distributed among organization experts. Significant factors extracted from applying an exploratory factor analysis using the SPSS package. In order to prioritize the extracted enabler’s a fuzzy multi-criteria decision making technique is then applied. The results shows that among thirty identified enablers in personalization strategy, twenty seven ones and among the nineteen identified enablers in codification strategy, sixteen of are significant. Accordingly by ranking the factors and enablers in nine management organizations of the National Iranian Oil Company (NIOC, the leadership factor in personalization strategy and also information technology in codification strategy have higher ranks by weighing 0.259 and 0.267respectively.

  4. SIX KEY POINTS FOR ACUPUNCTURE TREATMENT

    Institute of Scientific and Technical Information of China (English)

    付玮

    2004-01-01

    In the present paper, the author puts forward six key points for acupuncture treatment of diseases, namely, ① careful examination, ② definite diagnosis, ③ precise and appropriate identification of syndromes, ④ accurate location of the acupoint, ⑤ flexible application of needling manipulations, and ⑥Deqi". The first three aspects are the foundation, accurate location and flexible needling manipulations are also the prerequisite for effective treatment of diseases. In addition, sound theoretical basic knowledge of both traditional Chinese medicine (TCM) and modern medicine, and flexibly applying suitable needling maneuvers, stimulating quantity and duration of needle retaining in accordance with the concrete state of disease and the patient's conditions are also very important in clinical practice of acupuncture.

  5. Motivational Strategies in Medical English Classroom

    Institute of Scientific and Technical Information of China (English)

    TIAN Jun-ying

    2014-01-01

    Objective:To explore strategies to motivate students in the classroom of Medical English. Methods:The motivational strategies applied in medical English classroom including defining course goals early in the semester, appropriate teacher behavior, creating real context and giving helpful and frequent Feedback were recommended. Results & Conclusion: The motivational strategies make a positive impact on students’motivation in medical English classroom.

  6. 24 CFR 954.103 - Housing strategy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Housing strategy. 954.103 Section... INDIAN HOME PROGRAM Applying for Assistance § 954.103 Housing strategy. Grantees are not required to submit a housing strategy to receive HOME funds. However, the application must demonstrate how...

  7. Human capital strategy: talent management.

    Science.gov (United States)

    Nagra, Michael

    2011-01-01

    Large organizations, including the US Army Medical Department and the Army Nurse Corps, are people-based organizations. Consequently, effective and efficient management of the human capital within these organizations is a strategic goal for the leadership. Over time, the Department of Defense has used many different systems and strategies to manage people throughout their service life-cycle. The current system in use is called Human Capital Management. In the near future, the Army's human capital will be managed based on skills, knowledge, and behaviors through various measurement tools. This article elaborates the human capital management strategy within the Army Nurse Corps, which identifies, develops, and implements key talent management strategies under the umbrella of the Corps' human capital goals. The talent management strategy solutions are aligned under the Nurse Corps business strategy captured by the 2008 Army Nurse Corps Campaign Plan, and are implemented within the context of the culture and core values of the organization.

  8. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  9. Geography: Key to World Understanding.

    Science.gov (United States)

    Dando, William A.

    1990-01-01

    Delineates the nature of applied geography, asserting that geography links the natural and social sciences. Underscores geography's role in data analysis and problem solving on a global scale. Traces the discipline's history. Maps geography's status in higher education institutions. Discusses new technologies used by geographers. Summarizes career…

  10. Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States

    Institute of Scientific and Technical Information of China (English)

    何广强; 朱俊; 曾贵华

    2011-01-01

    A continuous variable ping-pong scheme, which is utilized to generate deterministic private key, is proposed. The proposed scheme is implemented physically by using Ganssian-modulated squeezed states. The deterministic char- acteristic, i.e., no basis reconciliation between two parties, leads a nearly two-time efficiency comparing to the standard quantum key distribution schemes. Especially, the separate control mode does not need in the proposed scheme so that it is simpler and more available than previous ping-pong schemes. The attacker may be detected easily through the fidelity of the transmitted signal, and may not be successful in the beam splitter attack strategy.

  11. Experiments with the hot list strategy

    Energy Technology Data Exchange (ETDEWEB)

    Wos, L.

    1997-10-01

    Experimentation strongly suggests that, for attacking deep questions and hard problems with the assistance of an automated reasoning program, the more effective paradigms rely on the retention of deduced information. A significant obstacle ordinarily presented by such a paradigm is the deduction and retention of one or more needed conclusions whose complexity sharply delays their consideration. To mitigate the severity of the cited obstacle, the author formulates and features in this report the hot list strategy. The hot list strategy asks the researcher to choose, usually from among the input statements, one or more clauses that are conjectured to play a key role for assignment completion. The chosen clauses - conjectured to merit revisiting, again and again - are placed in an input list of clauses, called the hot list. When an automated reasoning program has decided to retain a new conclusion C - before any other clause is chosen to initiate conclusion drawing - the presence of a nonempty hot list (with an appropriate assignment of the input parameter known as heat) causes each inference rule in use to be applied to C together with the appropriate number of members of the hot list. Members of the hot list are used to complete applications of inference rules and not to initiate applications. The use of the hot list strategy thus enables an automated reasoning program to briefly consider a newly retained conclusion whose complexity would otherwise prevent its use for perhaps many CPU-hours. To give evidence of the value of the strategy, the author focuses on four contexts: (1) dramatically reducing the CPU time required to reach a desired goal; (2) finding a proof of a theorem that had previously resisted all but the more inventive automated attempts; (3) discovering a proof that is more elegant than previously known; and (4) answering a question that had steadfastly eluded researchers relying on an automated reasoning program.

  12. Applied chemical engineering thermodynamics

    CERN Document Server

    Tassios, Dimitrios P

    1993-01-01

    Applied Chemical Engineering Thermodynamics provides the undergraduate and graduate student of chemical engineering with the basic knowledge, the methodology and the references he needs to apply it in industrial practice. Thus, in addition to the classical topics of the laws of thermodynamics,pure component and mixture thermodynamic properties as well as phase and chemical equilibria the reader will find: - history of thermodynamics - energy conservation - internmolecular forces and molecular thermodynamics - cubic equations of state - statistical mechanics. A great number of calculated problems with solutions and an appendix with numerous tables of numbers of practical importance are extremely helpful for applied calculations. The computer programs on the included disk help the student to become familiar with the typical methods used in industry for volumetric and vapor-liquid equilibria calculations.

  13. PSYCHOANALYSIS AS APPLIED AESTHETICS.

    Science.gov (United States)

    Richmond, Stephen H

    2016-07-01

    The question of how to place psychoanalysis in relation to science has been debated since the beginning of psychoanalysis and continues to this day. The author argues that psychoanalysis is best viewed as a form of applied art (also termed applied aesthetics) in parallel to medicine as applied science. This postulate draws on a functional definition of modernity as involving the differentiation of the value spheres of science, art, and religion. The validity criteria for each of the value spheres are discussed. Freud is examined, drawing on Habermas, and seen to have erred by claiming that the psychoanalytic method is a form of science. Implications for clinical and metapsychological issues in psychoanalysis are discussed.

  14. Renewable: A key component of our global energy future

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, D.

    1995-12-31

    Inclusion of renewable energy sources in national and international energy strategies is a key component of a viable global energy future. The global energy balance is going to shift radically in the near future brought about by significant increases in population in China and India, and increases in the energy intensity of developing countries. To better understand the consequences of such global shifts in energy requirements and to develop appropriate energy strategies to respond to these shifts, we need to look at the factors driving choices among supply options by geopolitical consumers and the impact these factors can have on the future energy mix.

  15. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  16. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory......, is responsible for the report, which is based on literature studies. Post Doc Stefan Krüger Nielsen, Risø National Laboratory, has contributed to parts of the report, including the description of the IEA energyscenarios, the IEA statistics on R&D and the description of the science and technology base of biomass...

  17. Key paediatric messages from Amsterdam

    Directory of Open Access Journals (Sweden)

    Jonathan Grigg

    2016-04-01

    Full Text Available The Paediatric Assembly of the European Respiratory Society (ERS maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress.

  18. Key Obama officials leave administration

    Science.gov (United States)

    Showstack, Randy

    2013-01-01

    Secretary of the Interior Ken Salazar is one of the latest members of the Obama administration to announce that he is leaving his position near the start of President Obama's second term in office. Salazar, who has served as interior secretary since January 2009, intends to leave the department by the end of March, the department noted on 16 January. Salazar joins a number of other key officials who are planning to leave the administration. They include Environmental Protection Agency administrator Lisa Jackson, National Oceanic and Atmospheric Administration administrator Jane Lubchenco, and U.S. Geological Survey director Marcia McNutt.

  19. Applied mathematics made simple

    CERN Document Server

    Murphy, Patrick

    1982-01-01

    Applied Mathematics: Made Simple provides an elementary study of the three main branches of classical applied mathematics: statics, hydrostatics, and dynamics. The book begins with discussion of the concepts of mechanics, parallel forces and rigid bodies, kinematics, motion with uniform acceleration in a straight line, and Newton's law of motion. Separate chapters cover vector algebra and coplanar motion, relative motion, projectiles, friction, and rigid bodies in equilibrium under the action of coplanar forces. The final chapters deal with machines and hydrostatics. The standard and conte

  20. Introduction to applied thermodynamics

    CERN Document Server

    Helsdon, R M; Walker, G E

    1965-01-01

    Introduction to Applied Thermodynamics is an introductory text on applied thermodynamics and covers topics ranging from energy and temperature to reversibility and entropy, the first and second laws of thermodynamics, and the properties of ideal gases. Standard air cycles and the thermodynamic properties of pure substances are also discussed, together with gas compressors, combustion, and psychrometry. This volume is comprised of 16 chapters and begins with an overview of the concept of energy as well as the macroscopic and molecular approaches to thermodynamics. The following chapters focus o

  1. Retransmission Steganography Applied

    CERN Document Server

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    This paper presents experimental results of the implementation of network steganography method called RSTEG (Retransmission Steganography). The main idea of RSTEG is to not acknowledge a successfully received packet to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field. RSTEG can be applied to many network protocols that utilize retransmissions. We present experimental results for RSTEG applied to TCP (Transmission Control Protocol) as TCP is the most popular network protocol which ensures reliable data transfer. The main aim of the performed experiments was to estimate RSTEG steganographic bandwidth and detectability by observing its influence on the network retransmission level.

  2. On applying cognitive psychology.

    Science.gov (United States)

    Baddeley, Alan

    2013-11-01

    Recent attempts to assess the practical impact of scientific research prompted my own reflections on over 40 years worth of combining basic and applied cognitive psychology. Examples are drawn principally from the study of memory disorders, but also include applications to the assessment of attention, reading, and intelligence. The most striking conclusion concerns the many years it typically takes to go from an initial study, to the final practical outcome. Although the complexity and sheer timescale involved make external evaluation problematic, the combination of practical satisfaction and theoretical stimulation make the attempt to combine basic and applied research very rewarding.

  3. Applied Electromagnetism and Materials

    CERN Document Server

    Moliton, André

    2007-01-01

    Applied Electromagnetism and Materials picks up where the author's Basic Electromagnetism and Materials left off by presenting practical and relevant technological information about electromagnetic material properties and their applications. This book is aimed at senior undergraduate and graduate students as well as researchers in materials science and is the product of many years of teaching basic and applied electromagnetism. Topics range from the spectroscopy and characterization of dielectrics and semiconductors, to non-linear effects and electromagnetic cavities, to ion-beam applications in materials science.

  4. Applied Astronomy: Asteroid Prospecting

    Science.gov (United States)

    Elvis, M.

    2013-09-01

    In the age of asteroid mining the ability to find promising ore-bearing bodies will be valuable. This will give rise to a new discipline- "Applied Astronomy". Just as most geologists work in industry, not in academia, the same will be true of astronomers. Just how rare or common ore-rich asteroids are likely to be, and the skills needed to assay their value, are discussed here, with an emphasis on remote - telescopic - methods. Also considered are the resources needed to conduct extensive surveys of asteroids for prospecting purposes, and the cost and timescale involved. The longer-term need for applied astronomers is also covered.

  5. Key Dimensions of a Multicultural Art Education Curriculum

    Science.gov (United States)

    Chin, Christina

    2013-01-01

    In an effort to encourage further integration of multicultural curricula, this article aims to detail several key dimensions of multicultural education, particularly as they apply to art education. Drawing on Banks's (1994b, 1995b, 1996e, 2004) dimensions for multicultural education, these dimensions include content integration, equity…

  6. Management strategies for fibromyalgia

    Directory of Open Access Journals (Sweden)

    Le Marshall KF

    2011-07-01

    Full Text Available Kim Francis Le Marshall, Geoffrey Owen LittlejohnDepartments of Rheumatology and Medicine, Monash Medical Centre and Monash University, Victoria, AustraliaDate of preparation: 14 June 2011Clinical question: What are the effective, evidence-based strategies available for the management of fibromyalgia?Conclusion: There are a number of management strategies available with robust evidence to support their use in clinical practice.Definition: Fibromyalgia is a complex pain syndrome characterized by widespread, chronic muscular pain and tenderness, disordered sleep, emotional distress, cognitive disturbance, and fatigue. Its prevalence is estimated to be 3%–5% in the population and higher yet in patients with comorbid rheumatic diseases.Level of evidence: Systematic reviews, meta-analyses, randomized controlled trials (RCTs.Search sources: PubMed, Cochrane Library, manual searchConsumer summary: Key messages for patients and clinicians are:1. There are many effective pharmacological management strategies available for fibromyalgia.2. A nonpharmacological, multicomponent approach utilizing education, aerobic exercise, psychological therapy, and other strategies is also effective for fibromyalgia.3. Despite the significant and, at times, disabling physical and psychological symptoms, fibromyalgia can be a manageable condition with a potentially good outcome.Keywords: fibromyalgia, pain, treatment, management, evidence 

  7. 77 FR 23425 - Revisions of Boundaries, Regulations and Zoning Scheme for Florida Keys National Marine Sanctuary...

    Science.gov (United States)

    2012-04-19

    ... Morkill, Refuge Manager, U.S. Fish and Wildlife Service, 28950 Watson Blvd., Big Pine Key, FL 33043... conservation strategies, expressed during and subsequent to management plan reviews; Periodic evaluation of..., zoning scheme, backcountry management agreement, environmental evaluation, and, if...

  8. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  9. Metacognitive Strategy Training in Reading Comprehension

    Institute of Scientific and Technical Information of China (English)

    DUAN Hai-ping

    2016-01-01

    Despite that language learning strategy (LLS) has been heatedly discussed since its emergence in 1975, its conceptual-ization, categorization and strategy training models are still in dispute. However, what commonly revealed by most studies is that there is a positive correlation between the use of language learning strategy and language learners’performance. This paper applies Dornyei’s classification, known as cognitive strategies, metacognitive strategies, social strategies and affective strate-gies. By reviewing previous studies on the application of metacognitive strategy in English as a second language (ESL) reading comprehension, plenty of useful implications for reading pedagogy are suggested. It further explains how certain important meta-cognitive strategies, namely Semantic Mapping (SM) and Experience-Text-Relationship (ETR), can be implemented in second language reading comprehension, aiming to encourage language learners to be aware of learning strategies,“learn how to learn”(Cohen, 1988, p66)!

  10. Africa and Applied Linguistics.

    Science.gov (United States)

    Makoni, Sinfree, Ed.; Meinhof, Ulrike H., Ed.

    2003-01-01

    This collection of articles includes: "Introducing Applied Linguistics in Africa" (Sinfree Makoni and Ulrike H. Meinhof); "Language Ideology and Politics: A Critical Appraisal of French as Second Official Language in Nigeria" (Tope Omoniyi); "The Democratisation of Indigenous Languages: The Case of Malawi" (Themba…

  11. Applying Literature to ELT

    Institute of Scientific and Technical Information of China (English)

    翟悦

    2007-01-01

    Literature is no longer a frightening word to English language learner. Interactive teaching methods and attractive activities can help motivating Chinese university English learners. This essay will first elaborate the reasons to use literature in ELT ( English Language Teaching) class and how to apply literature to ELT class.

  12. Essays on Applied Microeconomics

    Science.gov (United States)

    Mejia Mantilla, Carolina

    2013-01-01

    Each chapter of this dissertation studies a different question within the field of Applied Microeconomics. The first chapter examines the mid- and long-term effects of the 1998 Asian Crisis on the educational attainment of Indonesian children ages 6 to 18, at the time of the crisis. The effects are identified as deviations from a linear trend for…

  13. Applied Statistics with SPSS

    Science.gov (United States)

    Huizingh, Eelko K. R. E.

    2007-01-01

    Accessibly written and easy to use, "Applied Statistics Using SPSS" is an all-in-one self-study guide to SPSS and do-it-yourself guide to statistics. What is unique about Eelko Huizingh's approach is that this book is based around the needs of undergraduate students embarking on their own research project, and its self-help style is designed to…

  14. Applied Studies on Ion Beam Score Rich Achievements

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    @@ Commissioned by the Ministry of Science and Technology, a panel recently made an evaluation on applied studies of ion beam, a project supported by the national key technology research and development program during the five year from 2001 to 2005.

  15. Key Issues to Consider in Therapy with Muslim Families.

    Science.gov (United States)

    Weatherhead, Stephen; Daiches, Anna

    2015-12-01

    We present the key issues to consider in therapy with Muslim families. Following a brief introduction, five themes are presented: self, family dynamics, causation, and coping strategies. The section on "self" includes a discussion of three terms which link the four Islamic models of "self" identified through the review. The family dynamics section pays particular attention to interconnectedness, family roles, and gender. Causation is discussed with reference to supernatural and spiritual causes. On the theme of coping strategies, religious responses are discussed as are the roles of religious leaders, and professional mental health services. Clinical implications from the key themes are also discussed in addition to limitations of the published literature in this area. This includes a discussion of the epistemological and paradigmatic issues related to the research. The review concludes by summarising these issues and presenting areas for further research.

  16. [Potentiation strategies].

    Science.gov (United States)

    Doumy, Olivier; Bennabi, Djamila; El-Hage, Wissam; Allaïli, Najib; Bation, Rémy; Bellivier, Frank; Holtzmann, Jérôme; Bubrovszky, Maxime; Camus, Vincent; Charpeaud, Thomas; Courvoisier, Pierre; d'Amato, Thierry; Garnier, Marion; Haesebaert, Frédéric; Bougerol, Thierry; Lançon, Christophe; Moliere, Fanny; Nieto, Isabel; Richieri, Raphaëlle; Saba, Ghassen; Courtet, Philippe; Vaiva, Guillaume; Leboyer, Marion; Llorca, Pierre-Michel; Aouizerate, Bruno; Haffen, Emmanuel

    2016-03-01

    Lithium is among the most classically recommended add-on therapeutic strategy for the management of depressive patients showing unsuccessful response to standard antidepressant medications. The effectiveness of the add-on strategy with lithium requires achieving plasma levels above 0.5 mEq/L. Mood-stabilizing antiepileptic drugs such as carbamazepine, valproate derivatives or lamotrigine have not demonstrated conclusive therapeutic effects for the management of depressive patients showing unsuccessful response to standard antidepressant medications. Thyroid hormones are considered among the currently recommended add-on therapeutic strategy for the management of depressive patients showing unsuccessful response to standard antidepressant medications. The effectiveness of the add-on strategy with thyroid hormones requires achieving plasma concentration of TSH close to the lower limits at the normal range (0.4 μUI/L) or even below it. Second-generation antipsychotics such as aripiprazole or quetiapine have consistently demonstrated significant therapeutic effects for the management of depressive patients showing unsuccessful response to standard antidepressant medications. Second-generation antipsychotics however require the careful monitoring of both cardiovascular and metabolic adverse effects.

  17. Establishing a Common Vocabulary of Key Concepts for the Effective Implementation of Applied Behavior Analysis

    Directory of Open Access Journals (Sweden)

    Traci M. CIHON

    2016-12-01

    Full Text Available The technical language of behavior analysis is arguably necessary to share ideas and research with precision among each other. However, it can hinder effective implementation of behavior analytic techniques when it prevents clear communication between the supervising behavior analyst and behavior technicians. The present paper provides a case example of the development of a shared vocabulary, using plain English when possible, among supervisors and supervisees at a large public school district in which behavior analytic services were provided for children diagnosed with autism spectrum disorders. A list of terms and definitions are provided as well as suggestions on how to develop shared vocabularies within the readers’ own service provision context.

  18. Image Encryption using chaos functions and fractal key

    Directory of Open Access Journals (Sweden)

    Houman Kashanian

    2016-09-01

    Full Text Available Many image in recent years are transmitted via internet and stored on it. Maintain the confidentiality of these data has become a major issue. So that encryption algorithms permit only authorized users to access data which is a proper solution to this problem.This paper presents a novel scheme for image encryption. At first, a two dimensional logistic mapping is applied to permutation relations between image pixels. We used a fractal image as an encryption key. Given that the chaotic mapping properties such as extreme sensitivity to initial values, random behavior, non-periodic, certainty and so on, we used theses mappings in order to select fractal key for encryption. Experimental results show that proposed algorithm to encrypt image has many features. Due to features such as large space key, low relations between the pixels of encrypted image, high sensitivity to key and high security, it can effectively protect the encrypted image security.

  19. Key Success Factors for Organizational Innovation in the Fashion Industry

    OpenAIRE

    Fabio De Felice; Antonella Petrillo

    2013-01-01

    In the current phase of globalization, the fashion industry is an important sector where firm strategies are frequently oriented towards product personalization – more than product customization – with a reduced price. The fashion industry relates to the ability to provide customized products or services through flexible processes in high volume and at a reasonably low cost, which are currently key variables for the fashion supply chain. Performance concepts – which usually refer to three pil...

  20. Security analysis of continuous-variable quantum key distribution scheme

    Institute of Scientific and Technical Information of China (English)

    Zhu Jun; He Guang-Qiang; Zeng Gui-Hua

    2007-01-01

    In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein- Podolsky- Rosen (EPR) pairs is investigated. A new approach for calculating the secret information rate △I is proposed by using the Shannon information theory. Employing an available parameter F which is associated with the entanglement of the EPR pairs, one can detect easily the eavesdropping. Results show that the proposed scheme is secure against individual beam splitter attack strategy with a proper squeeze parameter.

  1. Quantum Public-Key Cryptosystem

    Science.gov (United States)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-03-01

    Quantum one-way functions play a fundamental role in cryptography because of its necessity for the secure encryption schemes taking into account the quantum computer. In this paper our purpose is to establish a theoretical framework for a candidate of the quantum one-way functions and quantum trapdoor functions based on one-parameter unitary groups. The dynamics of parameterized unitary groups ensure the one-wayness and quantum undistinguishability in different levels, and the physical feasibility are derived from the simultaneous approximation of its infinitesimal generators. Moreover, these special functions are used to construct new cryptosystems-the quantum public-key cryptosystems for encrypting both the classical and quantum information.

  2. New Weak Keys in RSA

    Institute of Scientific and Technical Information of China (English)

    WANG Baocang; LIU Shuanggen; HU Yupu

    2006-01-01

    The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown that the RSA number n=pq can be easily factored if p and q have the special form of p=as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).

  3. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  4. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  5. Some keys to reread authority.

    Directory of Open Access Journals (Sweden)

    Edgar Straehle

    2015-12-01

    Full Text Available This article vindicates a rereading of the concept of authority and tries to dissociate this concept from the concept of power in order to undo their identification and thereby the oblivion of the specific nature (or the history of authority. Besides, this rereading must not be confused with an apology of authority but with an exploration about this complicated and ambivalent category. The key point of this distinction lies in that authority, unlike power, depends not on itself but on the other person, the person who acknowledges another one as authority. Therefore, authority can be compatible with freedom and can appear as an exteriority of power, which undermines it or even becomes a counterpower. Hence the logical endeavours of power to monopolize and instrumentalize authority.

  6. Active steering control strategy for articulated vehicles

    Institute of Scientific and Technical Information of China (English)

    Kyong-il KIM; Hsin GUAN; Bo WANG; Rui GUO; Fan LIANG

    2016-01-01

    To improve maneuverability and stability of articulated vehicles, we design an active steering controller, including tractor and trailer controllers, based on linear quadratic regulator (LQR) theory. First, a three-degree-of-freedom (3-DOF) model of the tractor-trailer with steered trailer axles is built. The simulated annealing particle swarm optimization (SAPSO) algorithm is applied to identify the key parameters of the model under specified vehicle speed and steering wheel angle. Thus, the key pa-rameters of the simplified model can be obtained according to the vehicle conditions using an online look-up table and interpola-tion. Simulation results show that vehicle parameter outputs of the simplified model and TruckSim agree well, thus providing the ideal reference yaw rate for the controller. Then the active steering controller of the tractor and trailer based on LQR is designed to follow the desired yaw rate and minimize their side-slip angle of the center of gravity (CG) at the same time. Finally, simulation tests at both low speed and high speed are conducted based on the TruckSim-Simulink program. The results show significant effects on the active steering controller on improving maneuverability at low speed and lateral stability at high speed for the articulated vehicle. The control strategy is applicable for steering not only along gentle curves but also along sharp curves.

  7. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  8. Applied Control Systems Design

    CERN Document Server

    Mahmoud, Magdi S

    2012-01-01

    Applied Control System Design examines several methods for building up systems models based on real experimental data from typical industrial processes and incorporating system identification techniques. The text takes a comparative approach to the models derived in this way judging their suitability for use in different systems and under different operational circumstances. A broad spectrum of control methods including various forms of filtering, feedback and feedforward control is applied to the models and the guidelines derived from the closed-loop responses are then composed into a concrete self-tested recipe to serve as a check-list for industrial engineers or control designers. System identification and control design are given equal weight in model derivation and testing to reflect their equality of importance in the proper design and optimization of high-performance control systems. Readers’ assimilation of the material discussed is assisted by the provision of problems and examples. Most of these e...

  9. Developments in life cycle assessment applied to evaluate the environmental performance of construction and demolition wastes.

    Science.gov (United States)

    Bovea, M D; Powell, J C

    2016-04-01

    This paper provides a review of the literature that applies the life cycle assessment (LCA) methodology to the assessment of the environmental performance of the life cycle of construction and demolition waste (CDW) management systems. This article is focused on generating a general mapping of the literature and on identifying the best practices in compliance with LCA framework and proposing directions for future LCA studies in this field. The temporal evolution of the research in this field and the aim of the studies have grown in parallel with the legal framework related to waste and energy efficiency of buildings. Most studies have been published in Europe, followed by USA. Asia and Australia, being at an incipient application stage to the rest of the world. Topics related to "LCA of buildings, including their EoL" and "LCA of general CDW management strategies" are the most frequently analysed, followed by "LCA of EoL of construction elements" and "LCA of natural material vs recycled material". Regarding the strategies, recycling off-site and incineration, both combined with landfill for the rejected fractions, are the most commonly applied. Re-use or recycling on-site is the strategy least applied. The key aspect when LCA is applied to evaluate CDW management systems is the need to normalise which processes to include in the system boundary and the functional unit, the use of inventory data adapted to the context of the case study and the definition of a common set of appropriate impact assessment categories. Also, it is important to obtain results disaggregated by unit processes. This will allow the comparison between case studies.

  10. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  11. Evaluating economic costs and benefits of climate resilient livelihood strategies

    Directory of Open Access Journals (Sweden)

    S. Liu

    2016-01-01

    Full Text Available A major challenge for international development is to assist the poorest regions to achieve development targets while taking climate change into account. Such ‘climate resilient development’ (CRD must identify and implement adaptation strategies for improving livelihoods while also being cost-effective. While the idea that climate resilience and development goals should be compatible is often discussed, empirical evaluations of the economic impacts of actual CRD investments are practically non-existent. This paper outlines a framework to evaluate economic returns to CRD and applies it in two adaptation strategies trialed in Nusa Tenggara Barat Province, eastern Indonesia. The evaluation framework is composed of three models: a household benefit cost model, a diffusion model, and a regional benefit cost model. The models draw upon the impact evaluation, technology diffusion, and risk assessment literatures, respectively. The analyzes are based on expert opinion and locally-derived information, and hence can be applied in data-poor situations typical of developing countries. Our results explore economic costs and benefits at the household and regional scale, and we identify key input variables that greatly influence the economic returns of the strategies. These variables should therefore be a focus of ongoing investment. We also discuss how the framework is more generally applicable, its limitations including challenges in accounting for less tangible social and ecosystem service benefits, potentially leading to the underestimation of impacts, and how the approach should be complemented by qualitative methods.

  12. Applied longitudinal analysis

    CERN Document Server

    Fitzmaurice, Garrett M; Ware, James H

    2012-01-01

    Praise for the First Edition "". . . [this book] should be on the shelf of everyone interested in . . . longitudinal data analysis.""-Journal of the American Statistical Association   Features newly developed topics and applications of the analysis of longitudinal data Applied Longitudinal Analysis, Second Edition presents modern methods for analyzing data from longitudinal studies and now features the latest state-of-the-art techniques. The book emphasizes practical, rather than theoretical, aspects of methods for the analysis of diverse types of lo

  13. Applied statistics for economists

    CERN Document Server

    Lewis, Margaret

    2012-01-01

    This book is an undergraduate text that introduces students to commonly-used statistical methods in economics. Using examples based on contemporary economic issues and readily-available data, it not only explains the mechanics of the various methods, it also guides students to connect statistical results to detailed economic interpretations. Because the goal is for students to be able to apply the statistical methods presented, online sources for economic data and directions for performing each task in Excel are also included.

  14. Applied Economics in Teaching

    Institute of Scientific and Technical Information of China (English)

    朱红萍

    2009-01-01

    This paper explains some plain phenomena in teaching and class management with an economic view. Some basic economic principles mentioned therein are: everything has its opportunity cost; the marginal utility of consumption of any kind is diminishing; Game theory is everywhere. By applying the economic theories to teaching, it is of great help for teachers to understand the students' behavior and thus improve the teaching effectiveness and efficiency.

  15. Methods of applied mathematics

    CERN Document Server

    Hildebrand, Francis B

    1992-01-01

    This invaluable book offers engineers and physicists working knowledge of a number of mathematical facts and techniques not commonly treated in courses in advanced calculus, but nevertheless extremely useful when applied to typical problems in many different fields. It deals principally with linear algebraic equations, quadratic and Hermitian forms, operations with vectors and matrices, the calculus of variations, and the formulations and theory of linear integral equations. Annotated problems and exercises accompany each chapter.

  16. Cost Control Strategies for Zero Energy Buildings: High-Performance Design and Construction on a Budget (Brochure)

    Energy Technology Data Exchange (ETDEWEB)

    2014-09-01

    There is mounting evidence that zero energy can, in many cases, be achieved within typical construction budgets. To ensure that the momentum behind zero energy buildings and other low-energy buildings will continue to grow, this guide assembles recommendations for replicating specific successes of early adopters who have met their energy goals while controlling costs. Contents include: discussion of recommended cost control strategies, which are grouped by project phase (acquisition and delivery, design, and construction) and accompanied by industry examples; recommendations for balancing key decision-making factors; and quick reference tables that can help teams apply strategies to specific projects.

  17. Identifying A National Leadership Skills Training And Development Strategy For Leaders Within Sector Education Training Authorities (SETAS

    Directory of Open Access Journals (Sweden)

    Florus P. J. Prinsloo

    2005-11-01

    Full Text Available Through a literature survey and a qualitative survey of the views of a selected sample of key role-players in the implementation of the South African Skills Development Strategy a number of transformational leadership competencies were identified that influence the effectiveness of Sector Education and Training Authorities (SETAs. A subsequent quantitative survey of the views of a random sample of SETA managers and Board members ranked the identified leadership competencies in terms of relevance to and importance for effectiveness of SETA leadership teams. The research results were applied to propose a learning programme strategy to develop the identified transformational leadership competencies amongst SETA leaders.

  18. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee....

  19. SLAR image interpretation keys for geographic analysis

    Science.gov (United States)

    Coiner, J. C.

    1972-01-01

    A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.

  20. DOT strategies versus orbiter strategies

    NARCIS (Netherlands)

    Rutten, R.J.

    2001-01-01

    The Dutch Open Telescope is a high-resolution solar imager coming on-line at La Palma. The definition of the DOT science niche, strategies, and requirements resemble Solar Orbiter considerations and deliberations. I discuss the latter in the light of the former, and claim that multi-line observation

  1. Efficient algorithms for extracting biological key pathways with global constraints

    DEFF Research Database (Denmark)

    Baumbach, Jan; Friedrich, T.; Kötzing, T.

    2012-01-01

    The integrated analysis of data of different types and with various interdependencies is one of the major challenges in computational biology. Recently, we developed KeyPathwayMiner, a method that combines biological networks modeled as graphs with disease-specific genetic expression data gained...... this strategy GLONE (global node exceptions); the previous problem we call INES (individual node exceptions). Since finding GLONE-components is computationally hard, we developed an Ant Colony Optimization algorithm and implemented it with the KeyPathwayMiner Cytoscape framework as an alternative to the INES...... algorithms. KeyPathwayMiner 3.0 now offers both the INES and the GLONE algorithms. It is available as plugin from Cytoscape and online at http://keypathwayminer.mpi-inf. mpg.de. © 2012 ACM....

  2. [Elucidation of key genes in sex determination in genetics teaching].

    Science.gov (United States)

    Li, Meng; He, Zhumei

    2014-06-01

    Sex is an important and complex feature of organisms, which is controlled by the genetic and environmental factors. The genetic factors, i.e., genes, are vital in sex determination. However, not all the related genes play the same roles, and some key genes play a vital role in the sex determination and differentiation. With the development of the modern genetics, a great progress on the key genes has been made in sex determination. In this review, we summarize the mechanism of sex determination and the strategy of how to study the key genes in sex determination. It will help us to understand the mechanism of sex determination better in the teaching of genetics.

  3. A novel key management scheme using biometrics

    Science.gov (United States)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  4. KEY PERFORMANCE INDICATORS DISCLOSURES BY THE INTEGRATED REPORTING

    Directory of Open Access Journals (Sweden)

    BOBITAN ROXANA-IOANA

    2016-02-01

    Full Text Available We are in a new era of corporate reporting where the corporate reporting landscape was changed. Institutional and small investors, financial analysts and other key stakeholders are demanding more information about long-term strategies and profitability of companies. Also, the increasing complexity of business models, growing awareness of climate change and resource scarcity and communication are expectations of the role of business in the 21st century and which the key of performance indicators (KPIs is. The companies must change the way these KPIs are being incorporated throughout the annual report and how these are linked to the company’s strategy and business model, their risks and risk mitigation, and their incentive schemes. Regarding this, integrated reporting, continue to gain momentum, the spotlight on the depth, breadth and quality of KPIs being reported will only strengthen. The aim of this discussion paper is to describe which are the most important key performance indicators in sprit of integrating reporting. A good and very known example for the integrated reporting is Philips Electronics, the Dutch healthcare and lighting company, a pioneer that embrace this concept, and the paper make an analysis of the most important key performance indicators.

  5. Vulnerable Children's Access to Examinations at Key Stage 4. Research Report RR639

    Science.gov (United States)

    Kendall, Sally; Johnson, Annie; Martin, Kerry; Kinder; Kay

    2005-01-01

    This research project was commissioned by the Department for Education and Skills (DfES) in 2004 to examine barriers to vulnerable children accessing examinations at the end of key stage 4 and to identify strategies employed to overcome these barriers. Key groups of vulnerable children identified by the DfES included: (1) Looked-after children;…

  6. Exploring the 12-Key Approach: Perceptions and Experiences of Improvising Jazz Vocalists

    Science.gov (United States)

    Hargreaves, Wendy

    2016-01-01

    The 12-key approach is considered a foundational practice strategy for jazz instrumentalists. Its relevance to vocalists, however, seems less clear. This article investigates improvising jazz vocalists' perceptions and experiences of using the 12-key approach as distinguished from instrumentalists'. It uses data from a two-phase, mixed methods…

  7. Applying WCET Analysis at Architectural Level

    OpenAIRE

    Gilles, Olivier; Hugues, Jérôme

    2008-01-01

    Real-Time embedded systems must enforce strict timing constraints. In this context, achieving precise Worst Case Execution Time is a prerequisite to apply scheduling analysis and verify system viability. WCET analysis is usually a complex and time-consuming activity. It becomes increasingly complex when one also considers code generation strategies from high-level models. In this paper, we present an experiment made on the coupling of the WCET analysis tool Bound-T and our AADL to code ...

  8. Information Strategy Design and Practices

    CERN Document Server

    Mohapatra, Sanjay

    2012-01-01

    aiaiInformation Strategy Design and Practices develops a framework for designing information technology strategy for an organization. Beyond this, it establishes an approach to not only implement it, but sustain it. The framework explains how IT strategy should have an alignment to business to reap the benefits of business. The book contains five case studies in different domains: retail, real estate development, IT product development, development sector, and education sector. These case studies have been applied to different countries, providing a global prospective to this emerging trend.

  9. Disease management as a performance improvement strategy.

    Science.gov (United States)

    McClatchey, S

    2001-11-01

    Disease management is a strategy of organizing care and services for a patient population across the continuum. It is characterized by a population database, interdisciplinary and interagency collaboration, and evidence-based clinical information. The effectiveness of a disease management program has been measured by a combination of clinical, financial, and quality of life outcomes. In early 1997, driven by a strategic planning process that established three Centers of Excellence (COE), we implemented disease management as the foundation for a new approach to performance improvement utilizing five key strategies. The five implementation strategies are outlined, in addition to a review of the key elements in outcome achievement.

  10. VOCABULARY STRATEGIES AND VOCABULARY LEARNING

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This research is a comparative study of Chinese EFLgradutes′vocabulary strategies applied in their EGeneralAP(English for General Academic Purposes)and ESpecialAP(English for Special Academic Purpose)learning.Participantswere the first-year graduates of non-English major in ChinaPharmaceutical University(N=102).The present study uses ataxonomy of strategies developed by O’Malley and Chamot(1990),which was modified to more accurately reflectvocabulary strategies(altogether 31 sub-strategy variables within16 strategies).Analysis through SAS(Statistic Analysis System)on the collected date has revealed that:1)Learners apply more types of vocabulary stategies inEGeneralAP than in ESpecialAP vocabulary learning.2)Translation and Extensive Reading gain higher frequencyof application in ESpecialAP learning.3)11 vocabulary strategies strongly predict EGeneralAPvocabulary achievement and only 6 strategies strongly predictESpecialAp vocabulary achievement.At the end of the paper,some practical suggestions aremade for EFL graduate teachers to adjust their teaching targetand methods.

  11. Applied ALARA techniques

    Energy Technology Data Exchange (ETDEWEB)

    Waggoner, L.O.

    1998-02-05

    The presentation focuses on some of the time-proven and new technologies being used to accomplish radiological work. These techniques can be applied at nuclear facilities to reduce radiation doses and protect the environment. The last reactor plants and processing facilities were shutdown and Hanford was given a new mission to put the facilities in a safe condition, decontaminate, and prepare them for decommissioning. The skills that were necessary to operate these facilities were different than the skills needed today to clean up Hanford. Workers were not familiar with many of the tools, equipment, and materials needed to accomplish:the new mission, which includes clean up of contaminated areas in and around all the facilities, recovery of reactor fuel from spent fuel pools, and the removal of millions of gallons of highly radioactive waste from 177 underground tanks. In addition, this work has to be done with a reduced number of workers and a smaller budget. At Hanford, facilities contain a myriad of radioactive isotopes that are 2048 located inside plant systems, underground tanks, and the soil. As cleanup work at Hanford began, it became obvious early that in order to get workers to apply ALARA and use hew tools and equipment to accomplish the radiological work it was necessary to plan the work in advance and get radiological control and/or ALARA committee personnel involved early in the planning process. Emphasis was placed on applying,ALARA techniques to reduce dose, limit contamination spread and minimize the amount of radioactive waste generated. Progress on the cleanup has,b6en steady and Hanford workers have learned to use different types of engineered controls and ALARA techniques to perform radiological work. The purpose of this presentation is to share the lessons learned on how Hanford is accomplishing radiological work.

  12. Applied linear regression

    CERN Document Server

    Weisberg, Sanford

    2005-01-01

    Master linear regression techniques with a new edition of a classic text Reviews of the Second Edition: ""I found it enjoyable reading and so full of interesting material that even the well-informed reader will probably find something new . . . a necessity for all of those who do linear regression."" -Technometrics, February 1987 ""Overall, I feel that the book is a valuable addition to the now considerable list of texts on applied linear regression. It should be a strong contender as the leading text for a first serious course in regression analysis."" -American Scientist, May-June 1987

  13. SIFT applied to CBIR

    Directory of Open Access Journals (Sweden)

    ALMEIDA, J.

    2009-12-01

    Full Text Available Content-Based Image Retrieval (CBIR is a challenging task. Common approaches use only low-level features. Notwithstanding, such CBIR solutions fail on capturing some local features representing the details and nuances of scenes. Many techniques in image processing and computer vision can capture these scene semantics. Among them, the Scale Invariant Features Transform~(SIFT has been widely used in a lot of applications. This approach relies on the choice of several parameters which directly impact its effectiveness when applied to retrieve images. In this paper, we discuss the results obtained in several experiments proposed to evaluate the application of the SIFT in CBIR tasks.

  14. Applying Popper's Probability

    CERN Document Server

    Whiting, Alan B

    2014-01-01

    Professor Sir Karl Popper (1902-1994) was one of the most influential philosophers of science of the twentieth century, best known for his doctrine of falsifiability. His axiomatic formulation of probability, however, is unknown to current scientists, though it is championed by several current philosophers of science as superior to the familiar version. Applying his system to problems identified by himself and his supporters, it is shown that it does not have some features he intended and does not solve the problems they have identified.

  15. Applied energy an introduction

    CERN Document Server

    Abdullah, Mohammad Omar

    2012-01-01

    Introduction to Applied EnergyGeneral IntroductionEnergy and Power BasicsEnergy EquationEnergy Generation SystemsEnergy Storage and MethodsEnergy Efficiencies and LossesEnergy industry and Energy Applications in Small -Medium Enterprises (SME) industriesEnergy IndustryEnergy-Intensive industryEnergy Applications in SME Energy industriesEnergy Sources and SupplyEnergy SourcesEnergy Supply and Energy DemandEnergy Flow Visualization and Sankey DiagramEnergy Management and AnalysisEnergy AuditsEnergy Use and Fuel Consumption StudyEnergy Life-Cycle AnalysisEnergy and EnvironmentEnergy Pollutants, S

  16. Applied linear regression

    CERN Document Server

    Weisberg, Sanford

    2013-01-01

    Praise for the Third Edition ""...this is an excellent book which could easily be used as a course text...""-International Statistical Institute The Fourth Edition of Applied Linear Regression provides a thorough update of the basic theory and methodology of linear regression modeling. Demonstrating the practical applications of linear regression analysis techniques, the Fourth Edition uses interesting, real-world exercises and examples. Stressing central concepts such as model building, understanding parameters, assessing fit and reliability, and drawing conclusions, the new edition illus

  17. Applied impulsive mathematical models

    CERN Document Server

    Stamova, Ivanka

    2016-01-01

    Using the theory of impulsive differential equations, this book focuses on mathematical models which reflect current research in biology, population dynamics, neural networks and economics. The authors provide the basic background from the fundamental theory and give a systematic exposition of recent results related to the qualitative analysis of impulsive mathematical models. Consisting of six chapters, the book presents many applicable techniques, making them available in a single source easily accessible to researchers interested in mathematical models and their applications. Serving as a valuable reference, this text is addressed to a wide audience of professionals, including mathematicians, applied researchers and practitioners.

  18. Applied Semantic Web Technologies

    CERN Document Server

    Sugumaran, Vijayan

    2011-01-01

    The rapid advancement of semantic web technologies, along with the fact that they are at various levels of maturity, has left many practitioners confused about the current state of these technologies. Focusing on the most mature technologies, Applied Semantic Web Technologies integrates theory with case studies to illustrate the history, current state, and future direction of the semantic web. It maintains an emphasis on real-world applications and examines the technical and practical issues related to the use of semantic technologies in intelligent information management. The book starts with

  19. Applied Chaos Control

    Science.gov (United States)

    Spano, Mark

    1997-04-01

    The publication by Ott, Grebogi and Yorke(E. Ott, C. Grebogi and J. A. Yorke, Phys. Rev. Lett. 64, 1196 (1990).) of their theory of chaos control in 1990 led to an explosion of experimental work applying their theory to mechanical systems and electronic circuits, lasers and chemical reactors, and heart and brain tissue, to name only a few. In this talk the basics of chaos control as implemented in a simple mechanical system will be described, as well as extensions of the method to biological applications. Finally, current advances in the field, including the maintenance of chaos and the control of high dimensional chaos, will be discussed.

  20. Applied complex variables

    CERN Document Server

    Dettman, John W

    1965-01-01

    Analytic function theory is a traditional subject going back to Cauchy and Riemann in the 19th century. Once the exclusive province of advanced mathematics students, its applications have proven vital to today's physicists and engineers. In this highly regarded work, Professor John W. Dettman offers a clear, well-organized overview of the subject and various applications - making the often-perplexing study of analytic functions of complex variables more accessible to a wider audience. The first half of Applied Complex Variables, designed for sequential study, is a step-by-step treatment of fun