WorldWideScience

Sample records for applied key strategies

  1. Subsonic Transonic Applied Refinements By Using Key Strategies - STARBUKS In the NASA Langley Research Center National Transonic Facility

    Science.gov (United States)

    Paryz, Roman W.

    2014-01-01

    Several upgrade projects have been completed at the NASA Langley Research Center National Transonic Facility over the last 1.5 years in an effort defined as STARBUKS - Subsonic Transonic Applied Refinements By Using Key Strategies. This multi-year effort was undertaken to improve NTF's overall capabilities by addressing Accuracy and Validation, Productivity, and Reliability areas at the NTF. This presentation will give a brief synopsis of each of these efforts.

  2. APPLYING SUSTAINABLE MARKETING STRATEGIES – THE KEY TO OBTAINING COMPETITIVE ADVANTAGES ON THE INDUSTRIAL PRODUCTS MARKET

    OpenAIRE

    DURALIA Oana

    2014-01-01

    The crux of any marketing strategy is to give business an advantage in a competitive market. The success of implementing a strategy is measured in economic terms by: sales volume, market share, profits, listed stock prices etc. In general, managers attach too much importance to obtaining short-term profit and ignore or disregard the profit made by the company in the long run. If for a company the only objective is to achieve economic success in the short term, then the interest in the directi...

  3. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  4. Concurrent engineering applied to key industrial sectors

    OpenAIRE

    Juárez Varón, David; Segui Llinares, Vicente Jesús; MENGUAL RECUERDA, ANA; Ferrándiz Bou, Santiago

    2015-01-01

    The use of advanced techniques in work, such as concurrent engineering, on the development of projects implies that all areas involved participate from the start of the primary phases. Getting a correct product is the main target, with an estimated term and controlled and reduced costs. Working with a complex product within a context in design and manufacturing in a company in a highly competitive market, involves the problem domain as a key issue. In this paper, the development of concurren...

  5. Key Actor Perceptions of Athletics Strategy

    Science.gov (United States)

    Collins, William Thomas

    2012-01-01

    Athletics strategy refers to specific initiatives within the intercollegiate athletics program that are designed to meet the broader strategic goals of a post-secondary institution. This case focused on athletics strategy decisions that were enacted within the context of organizational change as Cartwright College, a pseudonym, transitioned from a…

  6. TPM- A KEY STRATEGY FOR PRODUCTIVITY IMPROVEMENT

    OpenAIRE

    J.S. DUREJA; ANISH SACHDEVA; VSIHAL S. SHARMA; MANU DOGRA

    2011-01-01

    During high growth era companies are making technical progress in automation and centralization of the plants, which needs large amount of manual work to maintain the automation systems. The strategy of maintaining the equipment of a plant is crucial for the effectiveness of manufacturing. Total productive maintenance (TPM) is a maintenance program, which involves concepts for maintaining plant and equipments effectively. In this paper detailed implementation of TPM in the cold rolling plant ...

  7. TPM- A KEY STRATEGY FOR PRODUCTIVITY IMPROVEMENT

    Directory of Open Access Journals (Sweden)

    J.S. DUREJA

    2011-02-01

    Full Text Available During high growth era companies are making technical progress in automation and centralization of the plants, which needs large amount of manual work to maintain the automation systems. The strategy of maintaining the equipment of a plant is crucial for the effectiveness of manufacturing. Total productive maintenance (TPM is a maintenance program, which involves concepts for maintaining plant and equipments effectively. In this paper detailed implementation of TPM in the cold rolling plant is discussed. Results achieved are quite encouraging in terms of motivated employees, improvement in overall equipment effectiveness (OEE and reduction in no. of accidents on shop floor.

  8. Key Vocabulary Learning Strategies in ESP And EGP Course Books

    Directory of Open Access Journals (Sweden)

    Zahra Akbari

    2015-01-01

    Full Text Available An increasing body of research evidence is showing the advantages of using certain skills and behaviours called language learning strategies in general and vocabulary learning strategies (VLSs in particular in the process of L2 acquisition. University students who require reading English texts in their fields of study have to expand their vocabulary knowledge in a much more efficient way than ordinary ESL/EFL learners.  And ELT course books are a good place to incorporate learner training in this regard. The purpose of this study is to see how vocabulary learning strategies are treated in both the book designer's claims section and the exercises of English for Specific Purposes (ESP course books for students of medicine and para-medicine on the one hand and English for General Purposes (EGP course book used commonly by these students in Isfahan University of Medical Sciences, Isfahan, Iran on the other. In other words, the specified course books were analyzed based on the insights gained from VLS research to gauge the extent to which they have incorporated VLSs and training in using them. These books were published under the supervision of the center for studying and compiling university books in humanities (SAMT. Based on the review of the relevant literature, three key strategies were identified and an analytic framework was devised. The framework was then applied to the course books. It was found that the treatments in the specified course books were deemed unlikely to improve students’ abilities with these important skills and strategies.Keywords: Vocabulary Learning Strategies (VLSs, English for General Purposes (EGP, English for Specific Purposes (ESP, medical course books, paramedical course books, University students

  9. Key strategies and criteria to redesigning the nuclear fuel cycle

    International Nuclear Information System (INIS)

    Design of the nuclear fuel cycle (NFC) impacts future development of the nuclear industry on the one hand and the scale of the technological and environmental risk for future generations on the other hand. Adequate protection for humans and the biosphere will depend upon careful and unbiased design of the NFC. This paper addresses the two following problems: 1. What are the key strategies in restructuring nuclear power production itself in terms of choosing the safest possible variant of the NFC and identifying reasonable approaches to redesigning decision-making procedures for design, siting and operation, and decommissioning of new facilities, which have to be based on a strong legally approved citizen involvement. 2. What criteria should be used to evaluate any strategic or mid-term decisions related to the NFC, how can these be made operational, and what procedures may we apply to evaluate alternatives and select the most preferable one mutually acceptable to both citizens and nuclear specialists?

  10. PROBABILISTIC CLONE-RESEND ATTACK STRATEGY IN QUANTUM KEY DISTRIBUTION

    Institute of Scientific and Technical Information of China (English)

    Zhao Shengmei; Li Fei; Zheng Baoyu

    2005-01-01

    A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.

  11. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  12. Key Drivers for a successful NPD launch strategy

    OpenAIRE

    Padwal, Smita

    2009-01-01

    The successful factors in new product strategy are identified. Product acceptance, the role of brand equity and pricing policy are particularly delved into. The importance of open innovation, outsourcing and networks in the new product development process is also discussed. Extensive literature around the new product development process and strategy is reviewed. Consumer research with regards to product acceptance, price and brand equity is also carried out. Thus finally the key drivers to a ...

  13. Key Reading Recovery Strategies to Support Classroom Guided Reading Instruction

    Science.gov (United States)

    Lipp, Jamie R.; Helfrich, Sara R.

    2016-01-01

    Effective teachers are continuously striving to improve their instruction. Reading Recovery teachers have detailed and specific literacy training and expertise that can be of great value to classroom teachers, especially in the area of guided reading instruction. This article explores the ways in which key Reading Recovery strategies can be…

  14. Key Elements of a Successful Drive toward Marketing Strategy Making

    Science.gov (United States)

    Cann, Cynthia W.; George, Marie A.

    2003-01-01

    A conceptual model is presented that depicts the relationship between an internal marketing function and an organization's readiness to learn. Learning and marketing orientations are identified as components to marketing strategy making. Key organizational functions, including communication and decision-making, are utilized in a framework for…

  15. Applying business strategy models in organizations

    OpenAIRE

    López Cuesta, Lidia; Franch Gutiérrez, Javier

    2014-01-01

    Increasing adoption of Open Source Software (OSS) in information system engineering has led to the emergence of different OSS business strate-gies that affect and shape organizations’ business models. In order to obtain the specific organizational model for a concrete organization that is adhering to a specific OSS business strategy, we need to instantiate the general knowledge included in this business strategy. This paper describe the process in which this general knowledge is instantiated ...

  16. Key factors in strategy choice for an enterprise recovery

    Directory of Open Access Journals (Sweden)

    Kontić Ljiljana

    2007-01-01

    Full Text Available The main purpose of our research is to construct and apply a framework for strategic choice, which is essential for successful recovery. Based on analysis of relevant literature and empirical studies of recovery, we proposed four different recovery strategies such as management changes, financial restructuring, internal or external strategies. We have identified and included the following seven factors in analytical framework: causes of crisis, the phase of crisis, available resources, organizational life cycle, competitive position, industrial level, and stakeholder influences in organizational survival, especially banks and other creditors. Furthermore, we examined the application of this framework to six case studies of enterprises in Serbia. .

  17. Applying a gaming approach to IP strategy.

    Science.gov (United States)

    Gasnier, Arnaud; Vandamme, Luc

    2010-02-01

    Adopting an appropriate IP strategy is an important but complex area, particularly in the pharmaceutical and biotechnology sectors, in which aspects such as regulatory submissions, high competitive activity, and public health and safety information requirements limit the amount of information that can be protected effectively through secrecy. As a result, and considering the existing time limits for patent protection, decisions on how to approach IP in these sectors must be made with knowledge of the options and consequences of IP positioning. Because of the specialized nature of IP, it is necessary to impart knowledge regarding the options and impact of IP to decision-makers, whether at the level of inventors, marketers or strategic business managers. This feature review provides some insight on IP strategy, with a focus on the use of a new 'gaming' approach for transferring the skills and understanding needed to make informed IP-related decisions; the game Patentopolis is discussed as an example of such an approach. Patentopolis involves interactive activities with IP-related business decisions, including the exploitation and enforcement of IP rights, and can be used to gain knowledge on the impact of adopting different IP strategies. PMID:20127561

  18. From Intervention to Innovation: Applying a Formal Implementation Strategy in Community Primary Care

    OpenAIRE

    Wallace, Andrea S.; Sussman, Andrew L.; Mark Anthoney; Edith A. Parker

    2013-01-01

    Objective. To describe a comprehensive strategy for implementing an effective diabetes self-management support intervention incorporating goal-setting and followup support in community health clinics (CHCs) serving vulnerable patients. Methods. The Replicating Effective Programs (REP) framework was applied to develop an intervention strategy. In order to create a strategy consistent with the REP framework, four CHCs engaged in an iterative process involving key-informant interviews with clini...

  19. Tales from the Field: Search Strategies Applied in Web Searching

    OpenAIRE

    Soohyung Joo; Iris Xie

    2010-01-01

    In their web search processes users apply multiple types of search strategies, which consist of different search tactics. This paper identifies eight types of information search strategies with associated cases based on sequences of search tactics during the information search process. Thirty-one participants representing the general public were recruited for this study. Search logs and verbal protocols offered rich data for the identification of different types of search strategies. Based on...

  20. A Study on the Key Management Strategy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon KO

    2015-05-01

    Full Text Available Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.

  1. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    International Nuclear Information System (INIS)

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  2. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Kern, Oliver

    2009-05-25

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  3. Rethinking health systems strengthening: key systems thinking tools and strategies for transformational change.

    Science.gov (United States)

    Swanson, R Chad; Cattaneo, Adriano; Bradley, Elizabeth; Chunharas, Somsak; Atun, Rifat; Abbas, Kaja M; Katsaliaki, Korina; Mustafee, Navonil; Mason Meier, Benjamin; Best, Allan

    2012-10-01

    While reaching consensus on future plans to address current global health challenges is far from easy, there is broad agreement that reductionist approaches that suggest a limited set of targeted interventions to improve health around the world are inadequate. We argue that a comprehensive systems perspective should guide health practice, education, research and policy. We propose key 'systems thinking' tools and strategies that have the potential for transformational change in health systems. Three overarching themes span these tools and strategies: collaboration across disciplines, sectors and organizations; ongoing, iterative learning; and transformational leadership. The proposed tools and strategies in this paper can be applied, in varying degrees, to every organization within health systems, from families and communities to national ministries of health. While our categorization is necessarily incomplete, this initial effort will provide a valuable contribution to the health systems strengthening debate, as the need for a more systemic, rigorous perspective in health has never been greater. PMID:23014154

  4. The Split-Apply-Combine Strategy for Data Analysis

    Directory of Open Access Journals (Sweden)

    Hadley Wickham

    2011-04-01

    Full Text Available Many data analysis problems involve the application of a split-apply-combine strategy, where you break up a big problem into manageable pieces, operate on each piece independently and then put all the pieces back together. This insight gives rise to a new R package that allows you to smoothly apply this strategy, without having to worry about the type of structure in which your data is stored.The paper includes two case studies showing how these insights make it easier to work with batting records for veteran baseball players and a large 3d array of spatio-temporal ozone measurements.

  5. The Strategy of Position as a Key to Success

    OpenAIRE

    Mirjana Prljevic

    2009-01-01

    In the beginning of the eighties when a kind of trade revolution began, there were first serious attempts to develop the strategy of positioning in trade. Practically, there were attempts to synthesize the differentiation strategy based on competition (the objective is to have more successful and profitable offer than the competitive one) and the segmentation strategy based on consumers (the objective is to create a unique package offer for a desired, target segment of consumers). The first a...

  6. Balancing Competition And Cooperation, The Key To Successful Marketing Strategy

    OpenAIRE

    Nyström, H

    1986-01-01

    Based on a theoretical framework of alternative marketing strategies, empirical data from a study of the major Swedish Paper Companies will be presented. The approach emphasises that it is the balance between competition and cooperation that is most important for market success. This is in contrast to most other approaches to marketing strategy that usually emphasize either competition or cooperation, rather than the combined effect of these two marketing factors, the relative importance of w...

  7. Development Strategies for Rural Key Circulation Service Network

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    The rural key circulation service network is an important channel for ensuring agricultural products’entry to market and urban industrial products’entry to rural areas.Through in-depth survey and research,we took a look at development changes and current situations of three circulation service networks,namely,circulation of nondurable consumer goods,circulation of agricultural means of production,and circulation of agricultural products.Based on several key problems in rural circulation service network,such as logistics problem,delivery problem,backward transaction mode,and the last kilometer information,we put forward corresponding development countermeasures.

  8. Characteristics of Key Update Strategies for Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Wireless sensor networks offer the advantages of simple and low-resource communication. Challenged by this simplicity and low-resources, security is of particular importance in many cases such as transmission of sensitive data or strict requirements of tamper-resistance. Updating the security key...

  9. Persuasive Strategies for School Administrators: A Key to School Effectiveness.

    Science.gov (United States)

    Rakes, Thomas A.; Cox, Glenda C.

    1994-01-01

    To gain others' consistent and active cooperation, administrators should convince faculty and staff that a task should be done. An administrator who uses persuasion communicates a degree of respect that strengthens the supervisor-subordinate relationship. Compliance-gaining strategies may be classified according to expectancies and consequences,…

  10. Two Key Strategies for Enhancing Community Service Learning

    Science.gov (United States)

    Seider, Scott

    2013-01-01

    A growing body of research has found community service learning to have a positive effect upon participating college students' civic development; however, far less scholarship has considered the impact of particular components of a community service learning program. This article presents two preliminary but promising strategies for enhancing the…

  11. Sustainability as a key factor in modern marketing strategies

    OpenAIRE

    Masyk, Thomas

    2012-01-01

    The goal of this thesis is to show that sustainability has become the guiding principle in politics and business and therefore needs to be integrated as important factor in all marketing strategies. The protection of the planet's scarce natural resources and the necessity to preserve an intact environment for future generations are vital challenges that have been internalized by big successful entrepreneurs like BMW, HOCHTEF and HIPP. These three companies have been selected as examples for t...

  12. Debenzylative Cycloetherification: An Overlooked Key Strategy for Complex Tetrahydrofuran Synthesis.

    Science.gov (United States)

    Tikad, Abdellatif; Delbrouck, Julien A; Vincent, Stéphane P

    2016-07-01

    Tetrahydrofuran (THF) is a major structural feature found in many synthetic and natural products displaying a variety of biological properties. This review summarizes the main synthetic approaches that have been developed to construct tetrahydrofuran moieties involving debenzylative cycloetherification reactions (DBCE). Interestingly, this reaction is regio- and stereoselective without the requirement of a selective protection/deprotection strategy. Many applications of this process have been reported, including carbafuranoside synthesis, regioselective deprotection of the benzyl group positioned γ to an alkene, and total synthesis of natural products. The stereochemical outcome and the mechanism of these interesting transformations are also discussed. PMID:27304427

  13. TEACHING ENGINEERING STUDENTS CREATIVITY: A REVIEW OF APPLIED STRATEGIES

    Directory of Open Access Journals (Sweden)

    Chunfang Zhou

    2012-06-01

    Full Text Available Recent studies have emphasized the necessity of educating creative engineers. This paper aims to provide a literature review by answering what strategies can be applied to develop creativity in engineering education. As the literature demonstrates, creativity has been studied by a diversity of perspectives such as psychology, social psychology and sociology. Studies on engineering creativity indicate the importance of problem-solving skills for engineers. For developing creativity, strategies such as using thinking tools, learning by solving problems and building learning environment conductive to creativity have been suggested in engineering education. Problem-Based Learning (PBL is a good example of fostering creative engineers, so characteristics of PBL, learning cycle in PBL and methods for enhancing group dynamics in PBL are discussed in this paper.

  14. Marketing strategy: a key leverage point for dietitians.

    Science.gov (United States)

    Jensen, T G; Brooks, B J

    1981-09-01

    The time is right for planned change in the profession of dietetics. The concept of the nutrition support team offers the clinical dietitian a means of increasing the visibility and effectiveness of dietetic services. Dietitians must take advantage of the renewed interest in nutrition and intervene assertively to improve nutritional care through role expansion. By focusing on a systematic marketing strategy to expand their current role, dietitians can become proactive participants in role change, rather than reactive victims to changes dictated by others. When goals, objectives, and plans are made explicit, definite progress toward desired role changes can be recognized. This case study demonstrates that this change in role is possible within the present state of health case systems and that physicians are willing and even eager to allow dietitians to assume a high degree of responsibility for nutritional care. PMID:7264112

  15. The VERB campaign: applying a branding strategy in public health.

    Science.gov (United States)

    Asbury, Lori D; Wong, Faye L; Price, Simani M; Nolin, Mary Jo

    2008-06-01

    A branding strategy was an integral component of the VERB Youth Media Campaign. Branding has a long history in commercial marketing, and recently it has also been applied to public health campaigns. This article describes the process that the CDC undertook to develop a physical activity brand that would resonate with children aged 9-13 years (tweens), to launch an unknown brand nationally, to build the brand's equity, and to protect and maintain the brand's integrity. Considerations for branding other public health campaigns are also discussed. PMID:18471598

  16. Applying real options analysis to assess cleaner energy development strategies

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Ching-Tsung [Graduate Institute of Environmental Engineering, National Taiwan University, 71, Chou-Shan Road, Taipei 106, Taiwan (China); Lo, Shang-Lien, E-mail: sllo@ntu.edu.tw [Graduate Institute of Environmental Engineering, National Taiwan University, 71, Chou-Shan Road, Taipei 106, Taiwan (China); Lin, Tyrone T. [Department of International Business, National Dong Hwa University, 1, Sec. 2, Da Hsueh Road, Shou-Feng, Hualien 974, Taiwan (China)

    2011-10-15

    The energy industry, accounts for the largest portion of CO{sub 2} emissions, is facing the issue of compliance with the national clean energy policy. The methodology for evaluating the energy mix policy is crucial because of the characteristics of lead time embedded with the power generation facilities investment and the uncertainty of future electricity demand. In this paper, a modified binomial model based on sequential compound options, which may account for the lead time and uncertainty as a whole is established, and a numerical example on evaluating the optional strategies and the strategic value of the cleaner energy policy is also presented. It is found that the optimal decision at some nodes in the binomial tree is path dependent, which is different from the standard sequential compound option model with lead time or time lag concept. The proposed modified binomial sequential compound real options model can be generalized and extensively applied to solve the general decision problems that deal with the long lead time of many government policies as well as capital intensive investments. - Highlights: > Introducing a flexible strategic management approach for government policy making. > Developing a modified binomial real options model based on sequential compound options. > Proposing an innovative model for managing the long term policy with lead time. > Applying to evaluate the options of various scenarios of cleaner energy strategies.

  17. Applying real options analysis to assess cleaner energy development strategies

    International Nuclear Information System (INIS)

    The energy industry, accounts for the largest portion of CO2 emissions, is facing the issue of compliance with the national clean energy policy. The methodology for evaluating the energy mix policy is crucial because of the characteristics of lead time embedded with the power generation facilities investment and the uncertainty of future electricity demand. In this paper, a modified binomial model based on sequential compound options, which may account for the lead time and uncertainty as a whole is established, and a numerical example on evaluating the optional strategies and the strategic value of the cleaner energy policy is also presented. It is found that the optimal decision at some nodes in the binomial tree is path dependent, which is different from the standard sequential compound option model with lead time or time lag concept. The proposed modified binomial sequential compound real options model can be generalized and extensively applied to solve the general decision problems that deal with the long lead time of many government policies as well as capital intensive investments. - Highlights: → Introducing a flexible strategic management approach for government policy making. → Developing a modified binomial real options model based on sequential compound options. → Proposing an innovative model for managing the long term policy with lead time. → Applying to evaluate the options of various scenarios of cleaner energy strategies.

  18. Bussines strategy or bussines policy management applied in modern firms

    OpenAIRE

    Enea, C.

    2010-01-01

    In literature, the term widely used for all action levels of strategic management is that of strategy. For this reason, it is necessary to achieve a differentiation between corporate strategies (typical strategies), business strategies (with policies), operational strategies (business plans) and operational strategies (programs and tactics).In the same context, strategies become the basis for the definition and implementation of policies, which differ by time horizon that is lower and their h...

  19. Resilience Analysis of Key Update Strategies for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    critical security issue. In this paper, we investigate the behaviour of different key update strategies under deviant network conditions. We consider resource-critical networks that employ symmetric cryptography and rely on (shared) network keys. We provide a methodology for quantitative security and...

  20. Key strategies for predictive exploration in mature environment: model innovation, exploration technology optimization and information integration

    Institute of Scientific and Technical Information of China (English)

    LIU Liang-ming; PENG Sheng-lin

    2005-01-01

    Prediction has become more and more difficult in mineral exploration, especially in the mature exploration environment such as Tongling copper district. For enhancing predictive discovery of hidden ore deposits in such mature environment, the key strategies which should be adopted include the innovation of the exploration models, application of the advanced exploration techniques and integration of multiple sets of information. The innovation of the exploration models should incorporate the new metallogenic concepts that are based on the geodynamic anatomization. The advanced techniques applied in the mature exploration environment should aim at the speciality and complexity of the geological setting and working environments. The information synthesis is to integrate multiple sets of data for giving a more credible and visual prospectivity map by using the geographic imformation system(GIS) and several mathematical methods, such as weight of evidence and fuzzy logic, which can extract useful information from every set of data as much as possible. Guided by these strategies, a predictive exploration in Fenghuangshan ore field of Tongling copper district was implemented, and a hidden ore deposit was discovered.

  1. Bussines strategy or bussines policy management applied in modern firms

    Directory of Open Access Journals (Sweden)

    Enea, C.

    2010-12-01

    Full Text Available In literature, the term widely used for all action levels of strategic management is that of strategy. For this reason, it is necessary to achieve a differentiation between corporate strategies (typical strategies, business strategies (with policies, operational strategies (business plans and operational strategies (programs and tactics.In the same context, strategies become the basis for the definition and implementation of policies, which differ by time horizon that is lower and their higher intake of detail. The latter are updated permanently, in order to remain set on, realistic, consistent with the changes that occur and detailing in concrete plans and programs as a logical scheme. So, strategic management is that management based on the application of strategies and policies with a view to setting and achieving goals.

  2. From intervention to innovation: applying a formal implementation strategy in community primary care.

    Science.gov (United States)

    Wallace, Andrea S; Sussman, Andrew L; Anthoney, Mark; Parker, Edith A

    2013-01-01

    Objective. To describe a comprehensive strategy for implementing an effective diabetes self-management support intervention incorporating goal-setting and followup support in community health clinics (CHCs) serving vulnerable patients. Methods. The Replicating Effective Programs (REP) framework was applied to develop an intervention strategy. In order to create a strategy consistent with the REP framework, four CHCs engaged in an iterative process involving key-informant interviews with clinic staff, ongoing involvement of clinic staff facilitating translational efforts, feedback from national experts, and an instructional designer. Results. Moving through the REP process resulted in an implementation strategy that aims to facilitate commitment, communication, and change at the clinic level, as well as means of providing interactive, time-limited education about patient behavior change and support to health care providers. Conclusion. The REP offered a useful framework for providing guidance toward the development of a strategy to implement a diabetes self-management intervention in CHCs serving medically underserved and underrepresented patient populations. PMID:23606957

  3. Active lubrication applied to internal combustion engines - evaluation of control strategies

    DEFF Research Database (Denmark)

    Estupinan, Edgar Alberto; Santos, Ilmar

    2009-01-01

    The performance of fluid film bearings in a combustion engine affects key functions such as durability, noise and vibration. Therefore, this work evaluates different control strategies for applying active radial oil injection in the main bearings of internal combustion engines with the aim of...... reducing friction losses and vibrations between the crankshaft and the bearings. The conventional hydrodynamic lubrication is combined with hydrostatic lubrication which is actively modified by radially injecting oil at controllable pressures, through orifices circumferentially located around the bearing...... surface. The behaviour of a main bearing of a medium size combustion engine, operating with radial oil injection and with four different control strategies is analyzed, giving some insights into the minimum fluid film thickness, maximum fluid film pressure, friction losses and maximum vibration levels...

  4. Assessing performance of orthology detection strategies applied to eukaryotic genomes.

    Directory of Open Access Journals (Sweden)

    Feng Chen

    Full Text Available Orthology detection is critically important for accurate functional annotation, and has been widely used to facilitate studies on comparative and evolutionary genomics. Although various methods are now available, there has been no comprehensive analysis of performance, due to the lack of a genomic-scale 'gold standard' orthology dataset. Even in the absence of such datasets, the comparison of results from alternative methodologies contains useful information, as agreement enhances confidence and disagreement indicates possible errors. Latent Class Analysis (LCA is a statistical technique that can exploit this information to reasonably infer sensitivities and specificities, and is applied here to evaluate the performance of various orthology detection methods on a eukaryotic dataset. Overall, we observe a trade-off between sensitivity and specificity in orthology detection, with BLAST-based methods characterized by high sensitivity, and tree-based methods by high specificity. Two algorithms exhibit the best overall balance, with both sensitivity and specificity>80%: INPARANOID identifies orthologs across two species while OrthoMCL clusters orthologs from multiple species. Among methods that permit clustering of ortholog groups spanning multiple genomes, the (automated OrthoMCL algorithm exhibits better within-group consistency with respect to protein function and domain architecture than the (manually curated KOG database, and the homolog clustering algorithm TribeMCL as well. By way of using LCA, we are also able to comprehensively assess similarities and statistical dependence between various strategies, and evaluate the effects of parameter settings on performance. In summary, we present a comprehensive evaluation of orthology detection on a divergent set of eukaryotic genomes, thus providing insights and guides for method selection, tuning and development for different applications. Many biological questions have been addressed by multiple

  5. Key Parameters Estimation and Adaptive Warning Strategy for Rear-End Collision of Vehicle

    OpenAIRE

    Xiang Song; Xu Li; Weigong Zhang

    2015-01-01

    The rear-end collision warning system requires reliable warning decision mechanism to adapt the actual driving situation. To overcome the shortcomings of existing warning methods, an adaptive strategy is proposed to address the practical aspects of the collision warning problem. The proposed strategy is based on the parameter-adaptive and variable-threshold approaches. First, several key parameter estimation algorithms are developed to provide more accurate and reliable information for subseq...

  6. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  7. International symposium on nuclear fuel cycle and reactor strategy: Adjusting to new realities. Key issue papers

    International Nuclear Information System (INIS)

    The key issue papers review the following issues: global energy outlook; present status and environmental implications of the different fuel cycles; future fuel cycle and reactor strategies; safety, health and environmental implications of the different fuel cycles; non-proliferation and safeguards aspects; international cooperation. Refs, figs, tabs

  8. APPLYING PQ4R STRATEGY FOR TEACHING READING

    OpenAIRE

    Moh Rodli

    2015-01-01

    Despite receiving more attention than other language skills in English classroom, the result of students’ reading comprehension achievement is still far from expectation. To help students comprehend English reading texts and have better achievement in reading skill, PQ4R strategy can be an alternative to offer. The PQ4R (also well known as SQ4R) strategy of comprehending reading material is an extension of SQ3R (Survey, Question, Read, Recite, and Review) This method involves previewing the r...

  9. Particle swarm optimization with random keys applied to the nuclear reactor reload problem

    International Nuclear Information System (INIS)

    In 1995, Kennedy and Eberhart presented the Particle Swarm Optimization (PSO), an Artificial Intelligence metaheuristic technique to optimize non-linear continuous functions. The concept of Swarm Intelligence is based on the socials aspects of intelligence, it means, the ability of individuals to learn with their own experience in a group as well as to take advantage of the performance of other individuals. Some PSO models for discrete search spaces have been developed for combinatorial optimization, although none of them presented satisfactory results to optimize a combinatorial problem as the nuclear reactor fuel reloading problem (NRFRP). In this sense, we developed the Particle Swarm Optimization with Random Keys (PSORK) in previous research to solve Combinatorial Problems. Experiences demonstrated that PSORK performed comparable to or better than other techniques. Thus, PSORK metaheuristic is being applied in optimization studies of the NRFRP for Angra 1 Nuclear Power Plant. Results will be compared with Genetic Algorithms and the manual method provided by a specialist. In this experience, the problem is being modeled for an eight-core symmetry and three-dimensional geometry, aiming at the minimization of the Nuclear Enthalpy Power Peaking Factor as well as the maximization of the cycle length. (author)

  10. Key Parameters Estimation and Adaptive Warning Strategy for Rear-End Collision of Vehicle

    Directory of Open Access Journals (Sweden)

    Xiang Song

    2015-01-01

    Full Text Available The rear-end collision warning system requires reliable warning decision mechanism to adapt the actual driving situation. To overcome the shortcomings of existing warning methods, an adaptive strategy is proposed to address the practical aspects of the collision warning problem. The proposed strategy is based on the parameter-adaptive and variable-threshold approaches. First, several key parameter estimation algorithms are developed to provide more accurate and reliable information for subsequent warning method. They include a two-stage algorithm which contains a Kalman filter and a Luenberger observer for relative acceleration estimation, a Bayesian theory-based algorithm of estimating the road friction coefficient, and an artificial neural network for estimating the driver’s reaction time. Further, the variable-threshold warning method is designed to achieve the global warning decision. In the method, the safety distance is employed to judge the dangerous state. The calculation method of the safety distance in this paper can be adaptively adjusted according to the different driving conditions of the leading vehicle. Due to the real-time estimation of the key parameters and the adaptive calculation of the warning threshold, the strategy can adapt to various road and driving conditions. Finally, the proposed strategy is evaluated through simulation and field tests. The experimental results validate the feasibility and effectiveness of the proposed strategy.

  11. Rethinking health systems strengthening: key systems thinking tools and strategies for transformational change

    OpenAIRE

    Swanson, R. Chad; Cattaneo, Adriano; Bradley, Elizabeth; Chunharas, Somsak; Atun, Rifat; Abbas, Kaja M.; Katsaliaki, Korina; Mustafee, Navonil; Mason Meier, Benjamin; Best, Allan

    2012-01-01

    While reaching consensus on future plans to address current global health challenges is far from easy, there is broad agreement that reductionist approaches that suggest a limited set of targeted interventions to improve health around the world are inadequate. We argue that a comprehensive systems perspective should guide health practice, education, research and policy. We propose key ‘systems thinking’ tools and strategies that have the potential for transformational change in health systems...

  12. Nuclear fuel cycle and reactor strategies: Adjusting to new realities. Key issue papers

    International Nuclear Information System (INIS)

    The international symposium ''Nuclear Fuel Cycle and Reactor Strategy: Adjusting to new Realities'' was organized to face the new realities in the nuclear fuel cycle and to consider options on how these new realities could be addressed. The Key Issue Papers treat the various subjects from both short and long term perspectives. In so doing, they address the likely development of all aspects concerning the nuclear fuel cycle up to the year 2050

  13. Development of a Nationally Coordinated Evaluation Plan for the Ghana National Strategy for Key Populations

    OpenAIRE

    Heidi W. Reynolds; Atuahene, Kyeremeh; Sutherland, Elizabeth; Amenyah, Richard; Kwao, Isaiah Doe; Larbi, Emmanuel Tettey

    2014-01-01

    Objective Just as HIV prevention programs need to be tailored to the local epidemic, so should evaluations be country-owned and country-led to ensure use of those results in decision making and policy. The objective of this paper is to describe the process undertaken in Ghana to develop a national evaluation plan for the Ghana national strategy for key populations. Methods This was a participatory process that involved meetings between the Ghana AIDS Commission (GAC), other partners in Ghana ...

  14. Applying medicinal chemistry strategies to understand odorant discrimination

    Science.gov (United States)

    Poivet, Erwan; Peterlin, Zita; Tahirova, Narmin; Xu, Lu; Altomare, Clara; Paria, Anne; Zou, Dong-Jing; Firestein, Stuart

    2016-01-01

    Associating an odorant's chemical structure with its percept is a long-standing challenge. One hindrance may come from the adoption of the organic chemistry scheme of molecular description and classification. Chemists classify molecules according to characteristics that are useful in synthesis or isolation, but which may be of little importance to a biological sensory system. Accordingly, we look to medicinal chemistry, which emphasizes biological function over chemical form, in an attempt to discern which among the many molecular features are most important for odour discrimination. Here we use medicinal chemistry concepts to assemble a panel of molecules to test how heteroaromatic ring substitution of the benzene ring will change the odour percept of acetophenone. This work allows us to describe an extensive rule in odorant detection by mammalian olfactory receptors. Whereas organic chemistry would have predicted the ring size and composition to be key features, our work reveals that the topological polar surface area is the key feature for the discrimination of these odorants. PMID:27040654

  15. Constructing a strategy map for banking institutions with key performance indicators of the balanced scorecard.

    Science.gov (United States)

    Wu, Hung-Yi

    2012-08-01

    This study presents a structural evaluation methodology to link key performance indicators (KPIs) into a strategy map of the balanced scorecard (BSC) for banking institutions. Corresponding with the four BSC perspectives (finance, customer, internal business process, and learning and growth), the most important evaluation indicators of banking performance are synthesized from the relevant literature and screened by a committee of experts. The Decision Making Trial and Evaluation Laboratory (DEMATEL) method, a multiple criteria analysis tool, is then employed to determine the causal relationships between the KPIs, to identify the critical central and influential factors, and to establish a visualized strategy map with logical links to improve banking performance. An empirical application is provided as an example. According to the expert evaluations, the three most essential KPIs for banking performance are customer satisfaction, sales performance, and customer retention rate. The DEMATEL results demonstrate a clear road map to assist management in prioritizing the performance indicators and in focusing attention on the strategy-related activities of the crucial indicators. According to the constructed strategy map, management could better invest limited resources in the areas that need improvement most. Although these strategy maps of the BSC are not universal, the research results show that the presented approach is an objective and feasible way to construct strategy maps more justifiably. The proposed framework can be applicable to institutions in other industries as well. PMID:22410163

  16. Effectiveness of Compensatory Strategies applied to Cognitive impairment in Schizophrenia

    DEFF Research Database (Denmark)

    Hansen, Jens Peter; Østergaard, Birte; Nordentoft, Merete;

    , studies using Cognitive Adaptation Training (CAT), including training of compensatory strategies to sequence patient's adaptive behaviours, have shown improvement in social functioning, decreased relapse, better compliance to medical treatment and increased quality of life. However, no studies, up to now......, have investigated the effect of CAT in younger patients with schizophrenia     Purpose The purpose of this study is to evaluate the effect of CAT in comparison with treatment as usual, focusing on social functions, symptoms, relapse, re-hospitalisation, and quality of life in younger outpatients...... to CAT treatment or conventional treatment. Inclusion criteria: Patients with a diagnosis of schizophrenia, more than one year from referral to the psychiatric clinic, receive mental medication and continual psychosocial treatment and patients who have signed informed consent. Exclusion criteria...

  17. Effectiveness of Compensatory Strategies applied to Cognitive impairment in Schizophrenia

    DEFF Research Database (Denmark)

    Hansen, Jens Peter; Østergaard, Birte; Nordentoft, Merete;

    , studies using Cognitive Adaptation Training (CAT), including training of compensatory strategies to sequence patient's adaptive behaviours, have shown improvement in social functioning, decreased relapse, better compliance to medical treatment and increased quality of life. However, no studies, up to now......, have investigated the effect of CAT in younger patients with schizophrenia   Purpose The purpose of this study is to evaluate the effect of CAT in comparison with treatment as usual, focusing on social functions, symptoms, relapse, re-hospitalisation, and quality of life in younger outpatients...... with schizophrenia. Methods The study is a randomised multicentre trial that takes place at the Schizophrenia Clinic in Esbjerg and the Early Intervention Team at Odense University Hospital. In the period from January 2009 to April 2010 a total of 164 consecutively enrolled patients will be randomly assigned to CAT...

  18. Applying science and strategy to operating room workforce management.

    Science.gov (United States)

    Butler, Victoria; Clinton, Christopher; Sagi, Harsha K; Kenney, Robert; Barsoum, Wael K

    2012-01-01

    The traditional means of planning nurse staffing for operating rooms are either poorly translated to the setting or do not provide decision makers with a platform to defend their needs, especially in an era of health care reform. The surgical operations department of the Cleveland Clinic initiated a quality improvement project aimed at applying a scientific method to operating room staffing. One goal was to provide a defensible plan for allocating direct caregiver positions. A second goal was to provide a quick and easy way for nurse managers and directors to track positions and graphically depict the effect of vacancies and orientation on their staffing budgets. Using an objective, scientific method allows position requests to be approved quickly and allows managers to feel much more comfortable functioning in a "lean" mode because they know needed positions will be approved quickly. Managers and directors also have found that graphically depicting numbers of vacant positions, as well as staff in orientation, could quickly relate a story visually rather than getting "bogged down" in narrative (often losing finance administrators along the way). PMID:23198610

  19. Aligning Key Success Factors to ERP Implementation Strategy: Learning from a Case Study

    OpenAIRE

    Zouaghi, I.; Laghouag, Abderrazak

    2012-01-01

    CAHIER DE RECHERCHE n°2012-08 E5 These last years, we can observe that most of companies implemented an ERP system but many of them fail. Much of research that has been conducted in this field, focus on KSFs. We have noticed that confronting those KSFs to ERP implementation strategies seems quiet fecund. So provide in this article a brief overview of the literature dealing with key success factors related to an ERP implementation project to better cope with the field, then come out with a ...

  20. Applied Physics Modules: Notes, Instructions, Data Sheets, Tests, and Test Answer Keys.

    Science.gov (United States)

    Southeast Community Coll., Lincoln, NE.

    These user instructions and related materials are designed to accompany a series of twenty-three applied physics modules which have been developed for postsecondary students in electrical, electronics, machine tool, metals, manufacturing, automotive, diesel, architecture, and civil drafting occupational programs. The instructions include an…

  1. Task shifting: A key strategy in the multipronged approach to reduce maternal mortality in India.

    Science.gov (United States)

    Bhushan, Himanshu; Bhardwaj, Ajey

    2015-10-01

    Task shifting from specialist to nonspecialist doctors (NSDs) is an important strategy that has been implemented in India to overcome the critical shortage of healthcare workers by using the human resources available to serve the vast population, particularly in rural areas. A competency-based training program in comprehensive emergency obstetric care was implemented to train and certify NSDs. Trained NSDs were able to provide key services in maternal health, which contribute toward reductions in maternal morbidity and mortality. The present article provides an overview of the maternal health challenges, shares important steps in program implementation, and shows how challenges can be overcome. The lessons learned from this experience contribute to understanding how task shifting can be used to address large-scale public health issues in low-resource countries and in particular solutions to address maternal health issues. PMID:26433512

  2. Research on Key Techniques for Video Surveillance System Applied to Shipping Channel Management

    Institute of Scientific and Technical Information of China (English)

    WANG Lin; ZHUANG Yan-bin; ZHENG Cheng-zeng

    2007-01-01

    A video patrol and inspection system is an important part of the government's shipping channel information management. This system is mainly applied to video information gathering and processing as a patrol is carried out. The system described in this paper can preview, edit, and add essential explanation messages to the collected video data. It then transfers these data and messages to a video server for the leaders and engineering and technical personnel to retrieve, play, chart, download or print. Each department of the government will use the system's functions according to that department's mission. The system can provide an effective means for managing the shipping enterprise. It also provides a valuable reference for the modernizing of waterborne shipping.

  3. Research on key techniques of virtual reality applied in mining industry

    Institute of Scientific and Technical Information of China (English)

    LIAO Jun; LU Guo-bin

    2009-01-01

    Based on the applications of virtual reality technology in many fields, introduced the virtual reality technical basic concept, structure type, related technique development, etc., tallied up applications of virtual reality technique in the present mining industry, inquired into core techniques related software and hardware, especially the optimization in the setup of various 3D models technique, and carried out a virtual scene to travel extensively in real-time by stereoscopic manifestation technique and so on. Then it brought forward the solution of virtual reality technique with software and hardware to the mining industry that can satisfy the demand of different aspects and levers. Finally, it show a fine prospect of virtual reality technique applied in the mining industry.

  4. Simultaneous effect of RCM key indicators, related to equipment lifecycle for maintenance strategies (in production systems

    Directory of Open Access Journals (Sweden)

    Mohammad Zadhoosh

    2015-07-01

    Full Text Available In the modern industrial world, effective role of maintenance activities in the survival of organizations and enhancing their productivity is undeniable. Variety of equipments in the industrial organizations and their exclusivities in terms of longevity and failures modes, clear the importance of choosing a strategy for the maintenance of any equipment. Thus, knowing the type of the failure is so important for maintenance manager and engineers. Important introduced indicators in this domain such as indicator of reliability, MTBF and MTTR can be used to predicting and detecting approximate failure time and analyzing life cycle status. On the other hand, due to fluctuating time of system availability because of work continuity and loss of a performance indicator, by combining RCM indicators and Overall Equipment Effectiveness (OEE indicator the most compatible strategy could be chosen. The aim of this article which differs from other studies in this field is to apply a composed indicator, including different parameters of RCM, which is obtained based on the equipment life status.

  5. Future scientific drilling in the Arctic Ocean: Key objectives, areas, and strategies

    Science.gov (United States)

    Stein, R.; Coakley, B.; Mikkelsen, N.; O'Regan, M.; Ruppel, C.

    2012-04-01

    Past, Present and Future Changes in Arctic Terrestrial and Marine Systems" (Kananaskis, Alberta/Canada, February 2012). During these workshops, key areas and key scientific themes as well as drilling and site-survey strategies were discussed. Major scientific themes for future Arctic drilling will include: - The Arctic Ocean during the transition from greenhouse to icehouse conditions and millennial scale climate changes; - Physical and chemical changes of the evolving Polar Ocean and Arctic gateways; - Impact of Pleistocene/Holocene warming and sea-level rise on upper continental slope and shelf gas hydrates and on shelf permafrost; - Land-ocean interactions; - Tectonic evolution and birth of the Arctic Ocean basin: Arctic ridges, sea floor spreading and global lithosphere processes. When thinking about future Arctic drilling, it should be clearly emphasized that for the precise planning of future Arctic Ocean drilling campaigns, including site selection, evaluation of proposed drill sites for safety and environmental protection, etc., comprehensive site survey data are needed first. This means that the development of a detailed site survey strategy is a major challenge for the coming years. Here, an overview of perspectives and plans for future Arctic Ocean drilling will be presented.

  6. Strategies and techniques of communication and public relations applied to non-profit sector

    Directory of Open Access Journals (Sweden)

    Ioana – Julieta Josan

    2010-05-01

    Full Text Available The aim of this paper is to summarize the strategies and techniques of communication and public relations applied to non-profit sector.The approach of the paper is to identify the most appropriate strategies and techniques that non-profit sector can use to accomplish its objectives, to highlight specific differences between the strategies and techniques of the profit and non-profit sectors and to identify potential communication and public relations actions in order to increase visibility among target audience, create brand awareness and to change into positive brand sentiment the target perception about the non-profit sector.

  7. Assessment of Instructional and Administrative Strategies Applied by Principals to Improve Academic Performance

    Science.gov (United States)

    Akiri, Agharuwhe A.

    2014-01-01

    The study is based on the assessment of instructional and administrative strategies applied by principals to improve academic performance of students in schools. This simply means that the individual talents of everyone in school needs to be maximized for the effective benefit of the school, students, parents, and the society at large. It is…

  8. A numerical comparison of control strategies applied to an existing ice storage system

    International Nuclear Information System (INIS)

    While ice storage systems are designed according to a defined strategy for warm day loads, it is interesting to consider other conventional control strategies for mid-season day loads. Three different charging-discharging control strategies are applied to an existing cooling plant and compared in terms of operating costs and energy consumption. A cooling plant model is built. A time stage equal to 15 min is considered to simulate numerically a whole charging-discharging process and compare the different control strategies. These simulations take into account existing technical constraints and set points. EES software is used. The operating costs of the cooling plant are evaluated by taking into account both the energy and the demand cost rate. It is shown that an ice storage system can allow savings of operating costs. However, they can increase energy consumption

  9. Modeling boolean decision rules applied to multiple-observer decision strategies.

    Science.gov (United States)

    Maguire, W

    1996-01-01

    A model that derives multiple-observer decision strategy ROC curves for boolean decision rules applied to binary decisions of two or three observers is presented. It is assumed that covert decision variables consistent with ROC models of observer performance underlie decisions and that readers' decision criteria are in a fixed relationship. The specific parameters of individual ROC curves and the correlational structure that describes interobserver agreement have dramatic effects upon the relative benefits to be derived from different boolean strategies. A common strategy employed in clinical practice, in which the overall decision is positive if any observer makes a positive decision, is most effective when the readers are of similar ability, when they adopt similar decision criteria, when interreader agreement is greater for negative than for positive cases, and when the individual ROC slope is observer decision strategies can be evaluated using the model equations. A bootstrap method for testing model-associated hypotheses is described. PMID:8717599

  10. Research strategy for developing key information on bromate's mode of action

    International Nuclear Information System (INIS)

    Bromate is produced when ozone is used to treat waters that contain trace amounts of bromide ion. It is also a contaminant of hypochlorite solutions produced by electrolysis of salt that contains bromide. Both ozone and hypochlorite are extensively used to disinfect drinking water, a process that is credited with reducing the incidence of waterborne infections diseases around the world. In studies on experimental animals, bromate has been consistently demonstrated to induce cancer, although there is evidence of substantial species differences in sensitivity (rat > mouse > hamster). There are no data to indicate bromate is carcinogenic in humans. An issue that is critical to the continued use of ozone as a disinfectant for drinking water in bromide-containing waters depends heavily on whether current predictions of carcinogenic risk based on carcinogenic responses in male rats treated with bromate are accurate at the much lower exposure levels of humans. Thiol-dependent oxidative damage to guanine in DNA is a plausible mode of action for bromate-induced cancer. However, other mechanisms may contribute to the response, including the accumulation of α2u-globulin in the kidney of the male rat. To provide direction to institutions that have an interest in clarifying the toxicological risks that bromate in drinking water might pose, a workshop funded by the Awwa Research Foundation was convened to lay out a research strategy that, if implemented, could clarify this important public health issue. The technical issues that underlie the deliberations of the workshop are provided in a series of technical papers. The present manuscript summarizes the conclusions of the workgroup with respect to the type and timing of research that should be conducted. The research approach is outlined in four distinct phases that lay out alternative directions as the research plan is implemented. Phase I is designed to quantify pre-systemic degradation, absorption, distribution, and

  11. How Do Deaf Children with and without Cochlear Implants Manage to Read Sentences: The Key Word Strategy

    Science.gov (United States)

    Domínguez, Ana-Belén; Carrillo, María-Soledad; González, Virginia; Alegria, Jesús

    2016-01-01

    The aim of this study is to examine the mechanisms used by deaf children with and without cochlear implants (CIs) to read sentences and the linguistic bases (vocabulary and syntax) underlying those reading mechanisms. Previous studies have shown that deaf persons read sentences using the key word strategy (KWS), which consists of identifying some…

  12. Key Strategies Used by Title I Elementary School Principals to Increase Student Achievement in Six San Bernardino County Schools

    Science.gov (United States)

    Brown, Marcie

    2011-01-01

    Purpose: The purpose of this case study was to determine key strategies in the areas of instructional leadership, communication, and empowerment used by the principals of selected high-poverty elementary schools in two high-poverty San Bernardino County school districts that exceeded their Academic Performance Index growth target score by forty or…

  13. IMPROVING STUDENTS’ SKIMMING AND SCANNING IN READING SKILL BY APPLYING METACOGNITIVE STRATEGY

    Directory of Open Access Journals (Sweden)

    Siti Mariam

    2016-07-01

    Full Text Available Reading is one of the main four language skills that a learner needs to master in order to ensure success in learning English. To facilitate students in comprehending a text, the effective strategies should be used. One of the strategies is Meta-cognitive strategies. The objectives of the research are to identify students’ responses during learned process by using Meta-cognitive strategies and to investigate how high students’ improvement of skimming and scanning reading skill after learned by using Meta-cognitive strategies in recount text. Meta-cognitive strategies improve students to reflect on thought processes and to plan, monitor, and evaluate aspects of their learning. The participants were third semester of English department students of Islamic Education and Teacher Training Faculty of Walisongo State Islamic University.The reserch design was Classroom Action Research with 1 preliminary cycle and 2 cycles. This research was conducted from March, 2th 2015 until March, 21th 2015. Data collection technique was tests. Observations were done in each cycle. Tests form was given the students, they should answer 20 questions of multiple choice test. Then, the data were analyzed using mean (descriptive statistics to find out the improvements. Meta-cognitive strategies were applied in the teaching learning process by giving plan (giving task for students, monitoring, evaluating, and problem solving to the students. After collecting the data, the result showed the improvements of the students. Students’ average score in pre cycle test was 60. In the first cycle, the average score increased became 70. This score hadn’t met the minimum standard score yet 75. Therefore, second cycle was conducted. Students’ average score increased became 82.16. Students’ engagements also increased since the first cycle. Consequently, the objectives were reached. Based on the result, it could be concluded that Meta-cognitive strategy can improve the

  14. Self-Regulated Learning Strategies Applied to Undergraduate, Graduate and Specialization Students from Civil Engineering

    Directory of Open Access Journals (Sweden)

    Jose Carlos Redaelli

    2013-03-01

    Full Text Available The current demand for civil engineering work requires new skills and knowledge and calls for new and effective learning methods. This paper shows self-regulated learning strategies applied to undergraduate, graduate and specialization students from Civil Engineering in a Brazilian University. A Scale of Evaluation of Learning Strategies was administered with a view to identifying students´ cognitive, metacognitive and dysfunctional learning strategies.

  15. Songbirds and humans apply different strategies in a sound sequence discrimination task

    Directory of Open Access Journals (Sweden)

    Yoshimasa eSeki

    2013-07-01

    Full Text Available The abilities of animals and humans to extract rules from sound sequences have previously been compared using observation of spontaneous responses and conditioning techniques. However, the results were inconsistently interpreted across studies possibly due to methodological and/or species differences. Therefore, we examined the strategies for discrimination of sound sequences in Bengalese finches and humans using the same protocol. Birds were trained on a GO/NOGO task to discriminate between two categories of sound stimulus generated based on an AAB or ABB rule. The sound elements used were taken from a variety of male (M and female (F calls, such that the sequences could be represented as MMF and MFF. In test sessions, FFM and FMM sequences, which were never presented in the training sessions but conformed to the rule, were presented as probe stimuli. The results suggested two discriminative strategies were being applied: 1 memorizing sound patterns of either GO or NOGO stimuli and generating the appropriate responses for only those sounds; and 2 using the repeated element as a cue. There was no evidence that the birds successfully extracted the abstract rule (i.e. AAB and ABB; MMF-GO subjects did not produce a GO response for FFM and vice versa. Next we examined whether those strategies were also applicable for human participants on the same task. The results and questionnaires revealed that participants extracted the abstract rule, and most of them employed it to discriminate the sequences. This strategy was never observed in bird subjects, although some participants used strategies similar to the birds when responding to the probe stimuli. Our results showed that the human participants applied the abstract rule in the task even without instruction but Bengalese finches did not, thereby reconfirming that humans have to extract abstract rules from sound sequences that is distinct from non-human animals.

  16. Implementing Key Strategies for Successful Network Integration in the Quebec Substance-Use Disorders Programme

    OpenAIRE

    Fleury, Marie-Josée; Perreault, Michel; Grenier, Guy; Imboua, Armelle; Brochu, Serge

    2016-01-01

    Background: Fragmentation and lack of coordination often occur among organisations offering treatment for individuals with substance-use disorders. Better integration from a system perspective within a network of organisations offering substance-use disorder services can be developed using various integration strategies at the administrative and clinical levels.This study aims to identify integration strategies implemented in Quebec substance-use disorder networks and to assess their strength...

  17. Key factors affecting strategy-minded decision makers in their innovations choices

    OpenAIRE

    Barbosa, Fernando; Romero, Fernando

    2013-01-01

    The rapid and continuous pace of technological change is a major challenge for all managers, who are often faced with innovations’ adoption decisions affecting the future of their companies. This is a fundamental issue on strategy, if we see strategy as a set of actions to make critical choices between two or more alternatives, in order to achieve competitive advantages or to respond to competitors. Strategy‐minded leaders try to predict the value that they will create with their choices i...

  18. Designing a knowledge transfer and exchange strategy for the Alberta Depression Initiative: contributions of qualitative research with key stakeholders

    Directory of Open Access Journals (Sweden)

    Mitton Craig

    2009-06-01

    Full Text Available Abstract Background Depressive disorders are highly prevalent and of significant societal burden. In fall 2004, the 'Alberta Depression Initiative' (ADI research program was formed with a mission to enhance the mental health of the Alberta population. A key expectation of the ADI is that research findings will be effectively translated to appropriate research users. To help ensure this, one of the initiatives funded through the ADI focused specifically on knowledge transfer and exchange (KTE. The objectives of this project were first to examine the state of the KTE literature, and then based on this review and a set of key informant interviews, design a KTE strategy for the ADI. Methods Face to face interviews were conducted with 15 key informants familiar with KTE and/or mental health policy and programs in Alberta. Interviews were transcribed and analyzed using the constant comparison method. Results This paper reports on findings from the qualitative interviews. Respondents were familiar with the barriers to and facilitators of KTE as identified in the existing literature. Four key themes related to the nature of effective KTE were identified in the data analysis: personal relationships, cultivating champions, supporting communities of practice, and building receptor capacity. These recommendations informed the design of a contextually appropriate KTE strategy for the ADI. The three-phased strategy involves preliminary research, public workshops, on-going networking and linkage activities and rigorous evaluation against pre-defined and mutually agreed outcome measures. Conclusion Interest in KTE on the part of ADI has led to the development of a strategy for engaging decision makers, researchers, and other mental health stakeholders in an on-going network related to depression programs and policy. A similarly engaged process might benefit other policy areas.

  19. Microorganisms in heavy metal bioremediation: strategies for applying microbial-community engineering to remediate soils

    Directory of Open Access Journals (Sweden)

    Jennifer L. Wood

    2016-06-01

    Full Text Available The remediation of heavy-metal-contaminated soils is essential as heavy metals persist and do not degrade in the environment. Remediating heavy-metal-contaminated soils requires metals to be mobilized for extraction whilst, at the same time, employing strategies to avoid mobilized metals leaching into ground-water or aquatic systems. Phytoextraction is a bioremediation strategy that extracts heavy metals from soils by sequestration in plant tissues and is currently the predominant bioremediation strategy investigated for remediating heavy-metal-contaminated soils. Although the efficiency of phytoextraction remains a limiting feature of the technology, there are numerous reports that soil microorganisms can improve rates of heavy metal extraction.This review highlights the unique challenges faced when remediating heavy-metal-contaminated soils as compared to static aquatic systems and suggests new strategies for using microorganisms to improve phytoextraction. We compare how microorganisms are used in soil bioremediation (i.e. phytoextraction and water bioremediation processes, discussing how the engineering of microbial communities, used in water remediation, could be applied to phytoextraction. We briefly outline possible approaches for the engineering of soil communities to improve phytoextraction either by mobilizing metals in the rhizosphere of the plant or by promoting plant growth to increase the root-surface area available for uptake of heavy metals. We highlight the technological advances that make this research direction possible and how these technologies could be employed in future research.

  20. How Key Account Management and Competitive Intelligence can Contribute to the Development of Corporate Strategy

    OpenAIRE

    Dean, Crispin

    2013-01-01

    One of the proxies for the success of a corporate strategy is firm performance. This is because “performance is a surrogate for the alignment between an organization’s internal processes (strategy, structure, etc) and the external environment.”1 Business excellence therefore hangs together with the attainment of such an alignment. It is two of the processes that support such an alignment between customer and supplier that are the subject of this paper. The processes in question are so called ...

  1. [Social marketing: applying commercial strategies to the prevention of nosocomial infections].

    Science.gov (United States)

    Sax, Hugo; Longtin, Yves; Alvarez-Ceyssat, Raymonde; Bonfillon, Chantal; Cavallero, Sabrina; Dayer, Pierre; Ginet, Claude; Herrault, Pascale

    2009-04-01

    Although a large proportion of healthcare-associated infections are avoidable, healthcare workers do not always practice evidence-based preventive strategies. Marketing technologies might help to improve patient safety. This article presents the basic principles of marketing and its potential use to promote good infection control practices. The marketing mix (Product, Price, Place, and Promotion) should be taken into account to induce behaviour change. By placing the emphasis on the perceived "profits" for healthcare workers the approach might lose its moral aspect and gain in effectiveness. VigiGerme, a non-commercial registered trademark, applies social marketing techniques to infection control and prevention. PMID:19492518

  2. RENEWABLE ENERGY, A KEY TO INTEGRATING COMPETITIVE POLICIES WITH ADVANCED ENVIRONMENT PROTECTION STRATEGIES

    OpenAIRE

    Cinade Lucian Ovidiu

    2011-01-01

    Development of competitive policies and improvement of environment protection strategies are two basic trends of the development of the European Unique Market. Energy, also known as "industry bread", is basic product and strategic resource, where energy industry plays an obvious role in the economic and social development of any community. Traditional energy production is marred by three major drawbacks: it generates negative externalities by polluting; it is totally in the hands of the produ...

  3. Global innovation strategies of German hidden champions in key emerging markets

    OpenAIRE

    Buse, Stephan; Tiwari, Rajnish

    2014-01-01

    Aim of this study is to analyse product-related innovation strategies of German Hidden Champions (globally leading, mid-sized companies) in the BRIC countries, especially in the fast growing and still unsaturated markets of China and India. With the help of an empirical survey we discover that the BRIC markets are perceived to be of high and growing strategic importance. An overwhelming majority of the surveyed firms market their global, adapted, or exclusively developed products in those cou...

  4. Contextualising change through a common strategy: Lecturers' perceptions and key role in supporting academic reform

    Science.gov (United States)

    Kindelan, Paz; Martin, Ana

    2014-05-01

    European universities are currently going through a process of change in order to meet the common goals set for higher education by the European Commission. They are revising their educational models to adjust them to the guidelines of the "Bologna Process" and are devising an institutional strategy for its implementation. In practical terms, this means aligning former national degrees and diplomas to standard European Bachelor and Masters degrees and PhD doctorates, by creating acknowledged professional qualification benchmarks that also include adjusted course lengths and contents. This process, in the end, mostly affects academic staff members who have a fundamental role to play in carrying out the pedagogical reforms on the teaching front. Besides presenting a commentary on the institutional approach of one particular technical university in Spain, the purpose of this paper is to propose, from the authors' point of view as lecturers, a strategy which has the potential to create a favourable atmosphere for carrying out such a reform. The article's main objective is to highlight a series of action points which may serve to reinforce and advance the main institutional strategy by relying on the powerful influence of its academic staff members.

  5. On the Data Mining Technology Applied to Active Marketing Model of International Luxury Marketing Strategy in China— An Empirical Analysis

    Directory of Open Access Journals (Sweden)

    Qishen Zhou

    2013-09-01

    Full Text Available  This paper emphasizes the importance of active marketing in the customer relationship management. Especially, the data mining technology is applied to establish an active marketing model to empirically analyze the condition of the AH Jewelry Company. Michael Porter's Five Forces Model is employed to assess and calculate the similarity in the active marketing model. Then, the questionnaire analysis on the customer relationship management model is carried out to explain the target market and target customer groups of AH Jewelry Company. The cluster analysis and principal component analysis (PCA are applied as data mining tool to investigate factors and problems that influence marketing effect of the AH Jewelry Company. The analysis results show that it becomes a key problem to enhance the customer loyalty and retain the customers under the changeable consumption environment. Data mining technology can help to analyze the historical data to produce the clients set which is most closed to the customer behaviors, and regards the most interesting information as the recommendation to the customers. Hence, marketing optimization strategy could be proposed as reference to manage the luxury marketing.

  6. Key issues in nuclear fuel cycle concerning high burn-up strategy

    International Nuclear Information System (INIS)

    In the present high burn-up strategy in Japan, the economic efficiency and reduction of the spent nuclear fuel have been in progress. On the other hand, in the further progress of the strategy, several issues may appear. The amount and activity of nuclides, heat generation, and radiation for a fuel pin in the typical 17x17 PWR assembly were calculated as functions of burn-up and cooling time, using the SWAT code system. Waste loading in glass waste forms from spent UO2 fuel and MOX fuel were discussed, assuming the number of glass canisters of 150 liter per THM is 1.25 at 45 GWd/THM. The number of glass canisters per GWd is almost constant in the range of burn-up up to 70 GWd/THM. The amount of molybdate from Pu-239 fissions linearly increases as a function of burn-up similarly like increase from U-235 fissions. The current vitrification technology may not face serious situation to be required substantial reduction in waste loading relating to molybdate up to 70 GWd/THM. The initial cooling period prior to vitrification, the waste loading and the interim storage period prior to final disposal are major factors which determine the way of storage and final disposal. The higher burn-up above 45 GWd/THM may require pretreatment of HLLW or substantial reduction in waste loading to retain the integrity of the ceramic melter for e.g. five years. Further promotion of high burn-up strategy should be consistent with nuclear fuel cycle including waste management. A potential approach, a conceptual new reprocessing system for thermal reactors is described. (author)

  7. Diversification of oil import sources and energy security. A key strategy or an elusive objective?

    International Nuclear Information System (INIS)

    This paper explores the relationship between the diversification of sources of imported oil and energy security of oil-importing countries. It examines the importance of diversification policy for oil importers, explains why oil importers implement oil diversification policy, and contextualizes the oil import diversification strategy in the overall energy security policy of oil importers. The paper analyzes the factors and the contexts that affect the level of importance assigned to oil import diversification policy in oil-importing countries, and the limitations that may affect the successful implication of oil import diversification policy. The examples are drawn from the world's top three oil importers, the United States, Japan, and China. The policymakers in these and other oil-importing countries place much importance on energy security. The diversification of oil import sources is used as one of the strategies to enhance energy security in oil-importing countries. This paper is important for policymakers in oil-importing countries as it provides them with a qualitative conceptual framework with which to evaluate the need to diversify their countries' sources of imported oil, and with which to identify the likely limitations to the successful implementation of oil import diversification policy. (author)

  8. Diversification of oil import sources and energy security: A key strategy or an elusive objective?

    International Nuclear Information System (INIS)

    This paper explores the relationship between the diversification of sources of imported oil and energy security of oil-importing countries. It examines the importance of diversification policy for oil importers, explains why oil importers implement oil diversification policy, and contextualizes the oil import diversification strategy in the overall energy security policy of oil importers. The paper analyzes the factors and the contexts that affect the level of importance assigned to oil import diversification policy in oil-importing countries, and the limitations that may affect the successful implication of oil import diversification policy. The examples are drawn from the world's top three oil importers, the United States, Japan, and China. The policymakers in these and other oil-importing countries place much importance on energy security. The diversification of oil import sources is used as one of the strategies to enhance energy security in oil-importing countries. This paper is important for policymakers in oil-importing countries as it provides them with a qualitative conceptual framework with which to evaluate the need to diversify their countries' sources of imported oil, and with which to identify the likely limitations to the successful implementation of oil import diversification policy.

  9. Post-translational modifications are key players of the Legionella pneumophila infection strategy

    Science.gov (United States)

    Michard, Céline; Doublet, Patricia

    2015-01-01

    Post-translational modifications (PTMs) are widely used by eukaryotes to control the enzymatic activity, localization or stability of their proteins. Traditionally, it was believed that the broad biochemical diversity of the PTMs is restricted to eukaryotic cells, which exploit it in extensive networks to fine-tune various and complex cellular functions. During the last decade, the advanced detection methods of PTMs and functional studies of the host–pathogen relationships highlight that bacteria have also developed a large arsenal of PTMs, particularly to subvert host cell pathways to their benefit. Legionella pneumophila, the etiological agent of the severe pneumonia legionellosis, is the paradigm of highly adapted intravacuolar pathogens that have set up sophisticated biochemical strategies. Among them, L. pneumophila has evolved eukaryotic-like and rare/novel PTMs to hijack host cell processes. Here, we review recent progress about the diversity of PTMs catalyzed by Legionella: ubiquitination, prenylation, phosphorylation, glycosylation, methylation, AMPylation, and de-AMPylation, phosphocholination, and de-phosphocholination. We focus on the host cell pathways targeted by the bacteria catalyzed PTMs and we stress the importance of the PTMs in the Legionella infection strategy. Finally, we highlight that the discovery of these PTMs undoubtedly made significant breakthroughs on the molecular basis of Legionella pathogenesis but also lead the way in improving our knowledge of the eukaryotic PTMs and complex cellular processes that are associated to. PMID:25713573

  10. DSC: software tool for simulation-based design of control strategies applied to wastewater treatment plants.

    Science.gov (United States)

    Ruano, M V; Ribes, J; Seco, A; Ferrer, J

    2011-01-01

    This paper presents a computer tool called DSC (Simulation based Controllers Design) that enables an easy design of control systems and strategies applied to wastewater treatment plants. Although the control systems are developed and evaluated by simulation, this tool aims to facilitate the direct implementation of the designed control system to the PC of the full-scale WWTP (wastewater treatment plants). The designed control system can be programmed in a dedicated control application and can be connected to either the simulation software or the SCADA of the plant. To this end, the developed DSC incorporates an OPC server (OLE for process control) which facilitates an open-standard communication protocol for different industrial process applications. The potential capabilities of the DSC tool are illustrated through the example of a full-scale application. An aeration control system applied to a nutrient removing WWTP was designed, tuned and evaluated with the DSC tool before its implementation in the full scale plant. The control parameters obtained by simulation were suitable for the full scale plant with only few modifications to improve the control performance. With the DSC tool, the control systems performance can be easily evaluated by simulation. Once developed and tuned by simulation, the control systems can be directly applied to the full-scale WWTP. PMID:21330730

  11. CO2 recycling: a key strategy to introduce green energy in the chemical production chain.

    Science.gov (United States)

    Perathoner, Siglinda; Centi, Gabriele

    2014-05-01

    The introduction of renewable energy in the chemical production chain is a key strategic factor both to realize a sustainable, resource-efficient, low-carbon economy and society and to drive innovation and competiveness in the chemical production. This Concept discusses this concept in terms of motivations, perspectives, and impact as well as technical barriers to achieve this goal. It is shown how an important element to realize this scenario is to foster the paths converting carbon dioxide (CO2) into feedstock for the chemical/process industry, which is one of the most efficient methods to rapidly introduce renewable energy into the chemical production chain. Some of the possible options to proceed in this direction are discussed, with focus on the technical barriers and enabling factors such as catalysis. The tight interconnection between CO2 management and the use of renewable energy is evidenced. PMID:24599714

  12. Launching forward: The integration of behavioral health in primary care as a key strategy for promoting young child wellness.

    Science.gov (United States)

    Oppenheim, Jennifer; Stewart, Whitney; Zoubak, Ekaterina; Donato, Ingrid; Huang, Larke; Hudock, William

    2016-03-01

    In 2008, the Substance Abuse and Mental Health Services Administration (SAMHSA) created a national grant program, Project LAUNCH (Linking Actions for Unmet Needs in Children's Health), to improve behavioral health and developmental outcomes for young children through the incorporation of prevention and wellness promotion practices in key early childhood settings. Project LAUNCH supports states, tribal nations, and territories to improve coordination across early childhood systems and implement 5 core strategies of prevention and promotion. This article focuses on the lessons learned from 1 of the 5 core strategies: integration of behavioral health into primary care for young children. This paper analyzes the experiences of a sample of Project LAUNCH grantees, describing 10 common elements of integration approaches and exploring some of the challenges of promoting health and preventing social, emotional, and behavioral problems at a population level. (PsycINFO Database Record PMID:26963182

  13. Consumer-perceived value: the key to a successful business strategy in the healthcare marketplace.

    Science.gov (United States)

    Ettinger, W H

    1998-01-01

    The Medicare market is becoming increasingly competitive and uncertain. To compete successfully for a share of the Medicare market, providers must: Have a cogent strategy that defines their customers and the value proposition for those customers Design their services to maximize the benefits of outcomes and service process that are important to consumers Determine the needed structure and infrastructure to put those services in place Marketing research is critical in this regard, as is effectiveness tracking. This approach is different from that usually taken by healthcare providers in the marketplace. It means being strategic rather than tactical and proactive rather than reactive. Most importantly, providers must shift their focus externally to the consumer's needs rather than their own. Finally, this approach requires working together in an integrated organization with common goals. PMID:9434675

  14. RENEWABLE ENERGY, A KEY TO INTEGRATING COMPETITIVE POLICIES WITH ADVANCED ENVIRONMENT PROTECTION STRATEGIES

    Directory of Open Access Journals (Sweden)

    Cinade Lucian Ovidiu

    2011-12-01

    Full Text Available Development of competitive policies and improvement of environment protection strategies are two basic trends of the development of the European Unique Market. Energy, also known as 'industry bread', is basic product and strategic resource, where energy industry plays an obvious role in the economic and social development of any community. Traditional energy production is marred by three major drawbacks: it generates negative externalities by polluting; it is totally in the hands of the producers; hence, prices rise at their will, of fossil fuels such as oil and gas. Present study focuses on electric energy industry, yet bearing over the whole length of the chain producer-to-end-consumer, thus revealed as particularly complex. The question is do alternative energy sources meet the prerequisite of market being competitive meanwhile environment protection being highly observed. We identify limits in point, of the energy market; effects of market liberalization; entry barriers; interchangeability level of energy sources; active forces on the energy market. Competitive rivalry has been expressed as per market micro-economic analysis, based on Michael Porter's 5-forces model. It will thus be noticed that, morphologically, competition evolution depends firstly on the market type. For the time being, the consumer on the energy market stays captive, for various reasons such as: legislation; limits of energy transfer infrastructure; scarcity of resources; resources availability imbalance; no integrative strategy available, of renewable energy resources usage. Energy availability is vital for human society to function. Comparative advantages of renewable energy resources are twofold, as manifested: in terms of economics, i.e. improving competition by substitute products entered at the same time as new producers enter market; and in terms of ecology, by reducing CO2 emissions. As to energy production technology and transfer, the complementary nature will

  15. Key Factors for the Linkage Strategy between R and D and Commercialization for Gen-ΙV

    International Nuclear Information System (INIS)

    The Fukushima nuclear disaster has leaded to enhance the safety and the cost-effectiveness of technology for the future so that advanced countries such as United Sates and France have concerned about a next generation nuclear power plant, Gen-IV(Generation-IV Reactor). Considering various characteristics of nuclear R and D, it is necessary to have more elaborated strategies for the effective development of the next generation of nuclear technology. In this study, we suggest 5 key factors for the successful commercialization of Gen-IV by analyzing the distinct characteristics of nuclear R and D with Gen-IV and CSF(Critical Success Factor)s of several cases in these field and conducting the FGI(Focus Group Interview). Considering these results, we could find and suggest some important points for further strategy for Gen-IV. That is, following five key factors for the linkage improvement between R and D and commercialization of Gen-IV should be considered: the participation of nuclear power plant operators from the beginning, the establishment of consistent and comprehensive plan/roadmap/detailed strategy, the technology development based on global energy issues and international cooperation, the stable and clear funding plans for long-term projects, the cooperation of relative ministries. Gen-IV system is getting a positive response in that it accompanies long-term R and D plans in Korea. We think that the standard of Gen-IV would lead the next generation of nuclear industry if the proper strategy for the cooperation between the private sector and the regulation from the beginning. Moreover, we expect that this study will facilitate its development process from R and D to commercialization

  16. The strategy of the key players in the African oil sector (the Gulf of Guinea)?

    International Nuclear Information System (INIS)

    The African oil industry, (particularly in the deep water offshore fields of the Gulf of Guinea), is symbolic of the new balance of power taking shape in the oil industry between the international companies and the host state on the one hand, and between the petrol companies themselves on the other. In an area rich in potential and which has become highly competitive, the traditional players in the region's oil development sector (Shell, Chevron and TotalFinaElf) which have for so long been sheltered from genuine competition in their respective areas of activity, must now face up to the renewed ambitions of new 'Super Majors' (in particular ExxonMobil), not to mention those of many independent companies seeking to internationalize their business. Several reasons explain this change. Firstly, the main developments are now taking place offshore with deep water drilling, and financial solidity and technological competence have replaced the closeness of political links as key factors of success. In these conditions, the risk of long term marginalization for the medium-sized companies is considerable. Secondly, the need to achieve profitability stressed by the major petrol groups is opening the door to the independents who are operating a niche policy (based on marginal or mature fields which no longer interest the majors). This type of competition tends to promote activity and to open up new countries to exploration and production (in particular Equatorial Guinea). (author)

  17. Key Principles of Peer Assessments: A Feedback Strategy to Engage the Postgraduate International Learner

    Directory of Open Access Journals (Sweden)

    Roopa Nagori

    2014-08-01

    Full Text Available The paper reports the findings of a project that assessed the benefits of peer feedback as a formative assessment intervention for postgraduate international learners in the United Kingdom. The aim was to improve participants’ understanding of quality in academic writing, and hence improve the summative assessment scores, by improving the quantity of feedback received in a collaborative learning environment. The project utilized the action research methodology and qualitative methods to recommend effective practices for peer assessment. Research findings highlight that although there was no substantial increase in the average score for the groups that received peer feedback, improvements in summative scores for the higher ability students were observed. All the learners agreed that the peer feedback should be made a permanent feature of the program; they also highlighted that the main barriers in giving feedback were lack of experience and hesitation in critiquing peer’s work. It is recommended that peer assessment is included as a regular feature of postgraduate programs but with adequate tutor planning and student preparation. Additional strategies to encourage engagement of postgraduate students with the ‘Peer Feedback’ are required to demonstrate improved results across all ability levels.

  18. Identifying key factors and strategies for reducing industrial CO2 emissions from a non-Kyoto protocol member's (Taiwan) perspective

    International Nuclear Information System (INIS)

    In this study we use Divisia index approach to identify key factors affecting CO2 emission changes of industrial sectors in Taiwan. The changes of CO2 emission are decomposed into emission coefficient, energy intensity, industrial structure and economic growth. Furthermore, comparisons with USA, Japan, Germany, the Netherlands and South Korea are made to have a better understanding of emission tendency in these countries and to help formulate our CO2 reduction strategies for responding to the international calls for CO2 cuts. The results show that economic growth and high energy intensity were two key factors for the rapid increase of industrial CO2 emission in Taiwan, while adjustment of industrial structure was the main component for the decrease. Although economic development is important, Taiwan must keep pace with the international trends for CO2 reduction. Among the most important strategies are continuous efforts to improve energy intensity, fuel mix toward lower carbon, setting targets for industrial CO2 cuts, and advancing green technology through technology transfer. Also, the clean development mechanism (CDM) is expected to play an important role in the future

  19. Multiple imputations applied to the DREAM3 phosphoproteomics challenge: a winning strategy.

    Directory of Open Access Journals (Sweden)

    Nicolas Guex

    Full Text Available DREAM is an initiative that allows researchers to assess how well their methods or approaches can describe and predict networks of interacting molecules [1]. Each year, recently acquired datasets are released to predictors ahead of publication. Researchers typically have about three months to predict the masked data or network of interactions, using any predictive method. Predictions are assessed prior to an annual conference where the best predictions are unveiled and discussed. Here we present the strategy we used to make a winning prediction for the DREAM3 phosphoproteomics challenge. We used Amelia II, a multiple imputation software method developed by Gary King, James Honaker and Matthew Blackwell[2] in the context of social sciences to predict the 476 out of 4624 measurements that had been masked for the challenge. To chose the best possible multiple imputation parameters to apply for the challenge, we evaluated how transforming the data and varying the imputation parameters affected the ability to predict additionally masked data. We discuss the accuracy of our findings and show that multiple imputations applied to this dataset is a powerful method to accurately estimate the missing data. We postulate that multiple imputations methods might become an integral part of experimental design as a mean to achieve cost savings in experimental design or to increase the quantity of samples that could be handled for a given cost.

  20. Applying strategies from libertarian paternalism to decision making for prostate specific antigen (PSA screening

    Directory of Open Access Journals (Sweden)

    Black Amanda

    2011-04-01

    Full Text Available Abstract Background Despite the recent publication of results from two randomized clinical trials, prostate specific antigen (PSA screening for prostate cancer remains a controversial issue. There is lack of agreement across studies that PSA screening significantly reduces prostate cancer mortality. In spite of these facts, the widespread use of PSA testing in the United States leads to overdetection and overtreatment of clinically indolent prostate cancer, and its associated harms of incontinence and impotence. Discussion Given the inconclusive results from clinical trials and incongruent PSA screening guidelines, the decision to screen for prostate cancer with PSA testing is an uncertain one for patients and health care providers. Screening guidelines from some health organizations recommend an informed decision making (IDM or shared decision making (SDM approach for deciding on PSA screening. These approaches aim to empower patients to choose among the available options by making them active participants in the decision making process. By increasing involvement of patients in the clinical decision-making process, IDM/SDM places more of the responsibility for a complex decision on the patient. Research suggests, however, that patients are not well-informed of the harms and benefits associated with prostate cancer screening and are also subject to an assortment of biases, emotion, fears, and irrational thought that interferes with making an informed decision. In response, the IDM/SDM approaches can be augmented with strategies from the philosophy of libertarian paternalism (LP to improve decision making. LP uses the insights of behavioural economics to help people better make better choices. Some of the main strategies of LP applicable to PSA decision making are a default decision rule, framing of decision aids, and timing of the decision. In this paper, we propose that applying strategies from libertarian paternalism can help with PSA

  1. Advanced Behavioral Applications in Schools: A Review of R. Douglas Greer's "Designing Teaching Strategies: An Applied Behavior Analysis Systems Approach"

    Science.gov (United States)

    Moxley, Roy A.

    2004-01-01

    R. Douglas Greer's "Designing Teaching Strategies" is an important book directed to advanced students in applied behavior analysis for classrooms. This review presents some of the striking features of the Comprehensive Applied Behavior Analysis to Schooling (CABAS[R]) program and the individualized instruction that the book advances. These include…

  2. Interpersonal Influence Strategies Applied to Sexual Decision-Making of Adolescents.

    Science.gov (United States)

    Falbo, Toni; Eisen, Marvin

    Little is known about the power strategies adolescents view as effective in influencing an intimate partner to have or avoid having sexual intercourse. These strategies were examined in a pretest survey of 203 adolescents who reported their agreement or disagreement with strategies used to have protected sex or to avoid having sex with a…

  3. Advanced behavioral applications in schools: A review of R. Douglas Greer's designing teaching strategies: An applied behavior analysis systems approach

    OpenAIRE

    Moxley, Roy A.

    2004-01-01

    R. Douglas Greer1s Designing Teaching Strategies is an important book directed to advanced students in applied behavior analysis for classrooms. This review presents some of the striking features of the Comprehensive Applied Behavior Analysis to Schooling (CABAS®) program and the individualized instruction that the book advances. These include its instruction in literacy, its use of graphing, and its flexibility in systematic organization. Although its readability could be improved, this book...

  4. Applying Foreign Entry Market Strategies to UK Higher Education Transnational Education Models

    Science.gov (United States)

    Lindsay, Victoria; Antoniou, Christos

    2016-01-01

    We take a multidisciplinary approach mapping the models used by UK higher education (HE) institutions against established international business foreign market entry strategies. We review the conditions in host markets that facilitate market entry and consider how these will determine foreign market entry strategy. We specifically consider four…

  5. Psychosocial problems in pre-school children : Recognition and strategy applied by doctors and nurses in child health care objective.

    NARCIS (Netherlands)

    Reijneveld, SA; Brugman, E; Verhulst, FC; Verloove-Vanhorick, SP

    2005-01-01

    Psychosocial problems in pre-school children: recognition and strategy applied by doctors and nurses in child health care Objective. To assess the degree to which preventive child health professionals (CHPs) identify and manage psychosocial problems among pre-school children in the general populatio

  6. Psychosocial problems in pre-school children: Recognition and strategy applied by doctors and nurses in child health care objective

    NARCIS (Netherlands)

    Reijneveld, S.A.; Brugman, E.; Verhulst, F.C.; Verloove-Vanhorick, S.P.

    2005-01-01

    Psychosocial problems in pre-school children: recognition and strategy applied by doctors and nurses in child health care Objective. To assess the degree to which preventive child health professionals (CHPs) identify and manage psychosocial problems among pre-school children in the general populatio

  7. Applied Strategies for Improving Patient Safety: A Comprehensive Process To Improve Care in Rural and Frontier Communities

    Science.gov (United States)

    Westfall, John M.; Fernald, Douglas H.; Staton, Elizabeth W.; VanVorst, Rebecca; West, David; Pace, Wilson D.

    2004-01-01

    Medical errors and patient safety have gained increasing attention throughout all areas of medical care. Understanding patient safety in rural settings is crucial for improving care in rural communities. To describe a system to decrease medical errors and improve care in rural and frontier primary care offices. Applied Strategies for Improving…

  8. Effects of Applied Land Use Strategies on Farmland Soils in the Southwestern Siberian Kulunda-Steppe

    Science.gov (United States)

    Grunwald, Lars-Christian; Illiger, Patrick; Stephan, Eckart; Frühauf, Manfred

    2014-05-01

    The Kulunda steppe in southwestern Siberia is one of the most intensely used agricultural regions in the world. The study area of the KULUNDA project is the Kulunda steppe, which is a part of the conversion region created during the so called "virgin land campaign" in the soviet era. Nowadays it is characterized by widespread soil degradation. Despite the fact that agriculture is the basis of existence, land use practice is maladjusted to the local conditions. The widespread soil degradation and accordingly the decreased soil humus content have negative effects on crop yields in this region. With respect to climate change, the current study analyses the cause effect relationship between land use practice and soil properties. In particular, different methods of soil cultivation will be tested and for each of the cases the soil humus content, soil water, soil solute balance will be measured and compared. In addition, the possibilities of soil carbon sequestration capacity will be analyzed. Furthermore, the study aims to achieve properly adapted sustainable cropping systems to stabilize the yields and to increase the productivity of plant production per spatial unit in this high vulnerable dry farming region. In 2012 the long term field trials started at three test farms in different steppe biomes, containing different soil types from chernozems to kastanozems. Each of them is characterized by a negative water balance. Successfully running cropping models, such as crop rotation, tilling intensity, plant protection and nutrition strategies from south Canadian steppe regions were adapted to regional agronomic needs. The traditional Russian cultivation system will be compared with two modern systems, including no-tillage methods on specially randomized test plots. Additionally, these plots are equipped with soil moisture monitoring systems to analyze the soil water content in different depths under the different cropping methods. The expected results will not only deepen

  9. Dyna-H: a heuristic planning reinforcement learning algorithm applied to role-playing-game strategy decision systems

    OpenAIRE

    Santos, Matilde; H, Jose Antonio Martin; Lopez, Victoria; Botella, Guillermo

    2011-01-01

    In a Role-Playing Game, finding optimal trajectories is one of the most important tasks. In fact, the strategy decision system becomes a key component of a game engine. Determining the way in which decisions are taken (online, batch or simulated) and the consumed resources in decision making (e.g. execution time, memory) will influence, in mayor degree, the game performance. When classical search algorithms such as A* can be used, they are the very first option. Nevertheless, such methods rel...

  10. Diversity-Oriented Synthetic Strategies Applied to Cancer Chemical Biology and Drug Discovery

    OpenAIRE

    Ian Collins; Jones, Alan M.

    2014-01-01

    How can diversity-oriented strategies for chemical synthesis provide chemical tools to help shape our understanding of complex cancer pathways and progress anti-cancer drug discovery efforts? This review (surveying the literature from 2003 to the present) considers the applications of diversity-oriented synthesis (DOS), biology-oriented synthesis (BIOS) and associated strategies to cancer biology and drug discovery, summarising the syntheses of novel and often highly complex scaffolds from p...

  11. Benefits and opportunities for applying Integrated Management Systems (IMS) strategies in the nuclear industry

    International Nuclear Information System (INIS)

    Full text: The safe, reliable, and cost-effective operation of Nuclear Power Facilities require a vast accumulation of information - volumes of scientific research, engineering analysis, operational data, regulatory reviews and many other types of technical information - combined with a complex assortment of people with the requisite educational background, expertise and acquired insight to apply that body of knowledge safely and effectively. This paper is intended to address the changing strategies and deployment techniques of IMS by identifying and examining initiatives that have been instigated in other regulated (and non-regulated industries), analyzing the opportunities, challenges and success criteria. 'Virtually everything in business today is an undifferentiated commodity except how a company manages its information. How you manage information determines whether you win or lose.' - Bill Gates, Microsoft A number of independent studies have drawn similar conclusions as to the benefits of managing plant information: The National Institute of Standards and Technology (NIST) estimates that $15.8 billion in profits is lost in U.S. capital facilities every year. Most of these losses ($9.1 billion or 2.8% of total installed cost), are realized in the operations and maintenance phase of the asset life cycle, while $2.7 billion and $4.1 billion are realized in engineering, procurement, and construction (EPC) phases respectively. It is clear from the report that again the O/Os bear the brunt of the costs ($10.6 billion or 3.3% total installed cost) associated with poor information management (in this case interoperability) due to supply chain dynamics and duration, and that with proper incentives for their information supply chains, O/Os have the most to gain. - 45% of costs are associated with operations and maintenance information verification; - 15% of costs are associated with unnecessary operations and maintenance idle employee time; - 40%, the balance, is an

  12. Using a problem-solving strategy to train students to apply general principles and to improve students' epistemology

    Science.gov (United States)

    McCoy, B.

    2011-12-01

    General studies science classes at many universities, such as physical science, Earth science, or astronomy, stress memorization and repetition of concepts. This approach leaves students with little appreciation for how science is used to explain phenomena from general principles. We present a novel instructional technique for an Earth science class in which the students are instructed in the use of a general problem solving strategy, adapted from a quantitative problem solving strategy developed by physics education research, in order to train the students in how to apply general principles. Using the Epistemological Beliefs Assessment for Physical Science, we have found that explicit training in problem solving significantly improves students' epistemology.

  13. Gender-linked Choice of Politeness Strategies Applied to Translation of Persian Face-threatening Acts into English

    Directory of Open Access Journals (Sweden)

    Mojde Yaqubi

    2012-11-01

    Full Text Available In this article, we will concentrate on translation of Persian face-threatening acts (FTAs into English. The present paper possesses both social and pragmatic objectives. These objectives are: 1 to identify the politeness strategies (PSs applied for rendering FTAs in Persian and English languages, 2 compare and contrast the frequencies and kinds of these strategies between two source and target languages (SL and TL to examine the discrepancies in the presentation of the PSs in two cultures and 3 to focus on the renderings of two gender groups of translators in order to establish a comparison of male and female’s translations of FTAs based on their choice and number of PSs. To gather the data, the following steps were taken: first, twenty FTAs done with different PSs (Brown and Levinson. 1987 were extracted from five Persian movies. The collected data were given to twenty male and female Persian-speaking post- graduate students of translation studies to render them into English. Then, PSs used for translating these FTAs were found in target texts and their types of strategies and frequencies were compared and contrasted with the original. As the final stage, the same comparison and contrast were done in case of the renderings of two gender groups of translators. The findings of the study indicated that from among 14 PSs applied in Persian and English, 12 PSs were commonly used in both SL and TL. Further, analysis of the data showed that although male and female translators applied the same PSs, male translators applied more PSs than females. Finally results revealed that ‘give deference’ was the most frequent PS applied by male translators while female translators used ‘give hint’ more than other PSs.Keywords: Sociolinguists, Face-threatening acts (FTAs, Politeness Strategy (PS, Gender

  14. Connectivity strategies for higher-order neural networks applied to pattern recognition

    Science.gov (United States)

    Spirkovska, Lilly; Reid, Max B.

    1990-01-01

    Different strategies for non-fully connected HONNs (higher-order neural networks) are discussed, showing that by using such strategies an input field of 128 x 128 pixels can be attained while still achieving in-plane rotation and translation-invariant recognition. These techniques allow HONNs to be used with the larger input scenes required for practical pattern-recognition applications. The number of interconnections that must be stored has been reduced by a factor of approximately 200,000 in a T/C case and about 2000 in a Space Shuttle/F-18 case by using regional connectivity. Third-order networks have been simulated using several connection strategies. The method found to work best is regional connectivity. The main advantages of this strategy are the following: (1) it considers features of various scales within the image and thus gets a better sample of what the image looks like; (2) it is invariant to shape-preserving geometric transformations, such as translation and rotation; (3) the connections are predetermined so that no extra computations are necessary during run time; and (4) it does not require any extra storage for recording which connections were formed.

  15. Applying an Experiential Learning Model to the Teaching of Gateway Strategy Board Games

    Science.gov (United States)

    Sato, Aiko; de Haan, Jonathan

    2016-01-01

    The board game hobby has rapidly grown and evolved in recent years, but most of the non-digital games lack tips and tutorials and remain difficult to learn and teach effectively. In this project, we integrated a popular hobbyist approach to teaching modern strategy games with classical experiential learning elements (i.e., demonstration,…

  16. Applying open innovation in business strategies : Evidence from Finnish software firms

    NARCIS (Netherlands)

    Harison, Elad; Koski, Heli

    2010-01-01

    Our study aims at shedding light on the innovative business strategies in the software sector and understanding better the economics that underlies the supply of Open Source Software (OSS). We use survey data collected from 170 Finnish software companies to investigate how different properties of so

  17. The Effects of Applying Authentic Learning Strategies to Develop Computational Thinking Skills in Computer Literacy Students

    Science.gov (United States)

    Mingo, Wendye Dianne

    2013-01-01

    This study attempts to determine if authentic learning strategies can be used to acquire knowledge of and increase motivation for computational thinking. Over 600 students enrolled in a computer literacy course participated in this study which involved completing a pretest, posttest and motivation survey. The students were divided into an…

  18. Diversity-Oriented Synthetic Strategies Applied to Cancer Chemical Biology and Drug Discovery

    Directory of Open Access Journals (Sweden)

    Ian Collins

    2014-10-01

    Full Text Available How can diversity-oriented strategies for chemical synthesis provide chemical tools to help shape our understanding of complex cancer pathways and progress anti-cancer drug discovery efforts? This review (surveying the literature from 2003 to the present considers the applications of diversity-oriented synthesis (DOS, biology-oriented synthesis (BIOS and associated strategies to cancer biology and drug discovery, summarising the syntheses of novel and often highly complex scaffolds from pluripotent or synthetically versatile building blocks. We highlight the role of diversity-oriented synthetic strategies in producing new chemical tools to interrogate cancer biology pathways through the assembly of relevant libraries and their application to phenotypic and biochemical screens. The use of diversity-oriented strategies to explore structure-activity relationships in more advanced drug discovery projects is discussed. We show how considering appropriate and variable focus in library design has provided a spectrum of DOS approaches relevant at all stages in anti-cancer drug discovery.

  19. Comparison of Current Control Strategies Applied to a Boost-Rectifier Connected to a Direct Drive Wave Energy Converter

    OpenAIRE

    Rocha Mendonca, Hugo; Martínez González, Sergio; Ramírez Prieto, Dionisio

    2015-01-01

    Direct drive wave energy converters are characterized by a direct conversion of the wave energy into electricity with no intermediate mechanical conversion system. For this reason, optimization methods for maximizing the absorbed power have to be designed for acting on the electrical generator. Besides, this type of system requires power electronics to be connected to the grid. This paper evaluates three different current control strategies applied to a boost-rectifier in the ac-dc stage as p...

  20. Applying an Experiential Learning Model to the Teaching of Gateway Strategy Board Games

    Directory of Open Access Journals (Sweden)

    Aiko Sato

    2016-01-01

    Full Text Available The board game hobby has rapidly grown and evolved in recent years, but most of the non-digital games lack tips and tutorials and remain difficult to learn and teach effectively. In this project, we integrated a popular hobbyist approach to teaching modern strategy games with classical experiential learning elements (i.e., demonstration, observation, reflection, discussion and repeated experiences. We tested our model by teaching two modern board games to Japanese high school and university students. Questionnaires, gameplay data, self-ratings and discussions showed improved understanding and enjoyment, more strategic play and more interest in modern board games over the course of the instructional sequence. The model's repetition (the participants played each game three times was rated the most useful in terms of learning the games. Overall, the integrated model was largely successful in teaching strategy board games to new players, and we offer several recommendations for teachers, designers and researchers of board games.

  1. A price-responsive dispatching strategy for Vehicle-to-Grid: An economic evaluation applied to the case of Singapore

    Science.gov (United States)

    Pelzer, Dominik; Ciechanowicz, David; Aydt, Heiko; Knoll, Alois

    2014-06-01

    Employing electric vehicles as short-term energy storage could improve power system stability and at the same time create a new income source for vehicle owners. In this paper, the economic viability of this concept referred to as Vehicle-to-Grid is investigated. For this purpose, a price-responsive charging and dispatching strategy built upon temporally resolved electricity market data is presented. This concept allows vehicle owners to maximize returns by restricting market participation to profitable time periods. As a case study, this strategy is then applied using the example of Singapore. It is shown that an annual loss of S 1000 resulting from a non-price-responsive strategy as employed in previous works can be turned into a S 130 profit by applying the price-responsive approach. In addition to this scenario, realistic mobility patterns which restrict the temporal availability of vehicles are considered. In this case, profits in the range of S 21-S 121 are achievable. Returns in this order of magnitude are not expected to make Vehicle-to-Grid a viable business case, sensitivity analyses, however, show that improved technical parameters could increase profitability. It is further assumed that employing the price-responsive strategy to other national markets may yield significantly greater returns.

  2. Applying Construal Level Theory to Communication Strategies for Participatory Sustainable Development

    OpenAIRE

    Strongheart, D.H.; Obison, Florence; Bordoni, Fabio

    2010-01-01

    To the vast majority of people, the terms “sustainability” and “sustainable development” are unfamiliar, and, when they are recognized, there is still a great deal of interpretability as to their significance. Since no consensus exists regarding these terms, communication efforts to promote action and awareness among citizens must invariably “frame” the issue of sustainable development in one way or another. By and large, most communication strategies promote small private-sphere actions rele...

  3. A research about thr sources of professional stress of accountancy and applied individual strategies

    OpenAIRE

    DEMİR, Mehmet; ANASIZ, İsmail

    2008-01-01

    The technological developments bring various problems while facilitating human life. Stress can easily be seen in today's life however the spiritual dimension of the phenomenon has been neglected. In our age stress is one of the most important troubles that might come into sight in every profession. Moreover it causes to many serious illness. As many professions, accounThe aim of the study is to find out the sources of stress in accountancy and the individual strategies of the accountants to ...

  4. An adaptive p-refinement strategy applied to nodal expansion method in 3D Cartesian geometry

    International Nuclear Information System (INIS)

    Highlights: • An adaptive p-refinement approach is developed and implemented successfully in ACNEM. • The proposed strategy enhances the accuracy with regard to the uniform zeroth order solution. • Improvement of results is gained by less computation time relative to uniform high order solution. - Abstract: The aim of this work is to develop a coarse mesh treatment strategy using adaptive polynomial, p, refinement approach for average current nodal expansion method in order to solve the neutron diffusion equation. For performing the adaptive solution process, a posteriori error estimation scheme, i.e. flux gradient has been utilized for finding the probable numerical errors. The high net leakage in a node represents flux gradient existence between neighbor nodes and it may indicate the source of errors for the coarse mesh calculation. Therefore, the relative Cartesian directional net leakage of nodes is considered as an assessment criterion for mesh refinement in a sub-domain. In our proposed approach, the zeroth order nodal expansion solution is used along coarse meshes as large as fuel assemblies to treat neutron populations. Coarse nodes with high directional net leakage may be chosen for implementing higher order polynomial expansion in the corresponding direction, i.e. X and/or Y and/or Z Cartesian directions. Using this strategy, the computational cost and time are reduced relative to uniform high order polynomial solution. In order to demonstrate the efficiency of this approach, a computer program, APNEC, Adaptive P-refinement Nodal Expansion Code, has been developed for solving the neutron diffusion equation using various orders of average current nodal expansion method in 3D rectangular geometry. Some well-known benchmarks are investigated to compare the uniform and adaptive solutions. Results demonstrate the superiority of our proposed strategy in enhancing the accuracy of solution without using uniform high order solution throughout the domain and

  5. Teaching Strategies to Apply in the Use of Technological Tools in Technical Education

    OpenAIRE

    Olga Arranz García; Vidal Alonso Secades

    2014-01-01

    The emergence of new technologies in education area is changing the way of organizing the educational processes. Teachers are not unrelated to these changes and must employ new strategies to adapt their teaching methods to the new circumstances. One of these adaptations is framed in the virtual learning, where the learning management systems have been revealed as a very effective means within the learning process. In this paper we try to provide teachers in engineering schools how to use in a...

  6. Applying the TQM (total quality management) strategy of Macedonian higher education institutions

    OpenAIRE

    Mitreva, Elizabeta; Prodanovska, Vesna

    2011-01-01

    In spite of the fact that the TQM (Total Quality Management) has profoundly entered many higher education institutions and business spheres within Europe and abroad, there is still not enough presence of it in Macedonia and other developing countries. Especially critical moment is the durability of this philosophy, as though the results do not come “over night”. This new TQM strategy regarding quality requires new activities in the area of education of the academic staff, implementing a st...

  7. PCARRD's strategies for technology transfer: The agriculture and resources regional technology information system and the regional applied communication program

    International Nuclear Information System (INIS)

    This paper describes the Agriculture and Resources Regional Technology Information System (ARRTIS) and the Regional Applied Communication Outreach Program (RAC) of PCARRD. The ARRTIS and the RACO are the strategies in communicating scientific and technology-based information. The ARRTIS is an information system that provides an information base on the status of technologies at various levels of maturity (generation, adaptation, verification, piloting, dissemination and utilization) and offers technology alternatives based on environmental requirements, costs and returns analysis or feasibility of the technologies. This information base provides the repository of technology information from which the Applied Communication Program draws its information for packaging into various formats, using various strategies/media to cater to various users in the regions most especially the farmers. Meanwhile, as PCARRD executes its mission of developing the national research system, it incorporates a development support communication program through the RACO. The RACO is essentially a working component of a regional research center/consortium in each region coordinated by the Applied Communication Division of PCARRD. It aims at reaching farmers and their families, extensionists, administrators, policy makers and entrepreneurs with research information and technology which use a variety of appropriate communication channels, modern communication technology and strategies so that they may actively participate in research diffusion and utilization. (author). 7 refs

  8. A long-term evaluation of applied nucleation as a strategy to facilitate forest restoration.

    Science.gov (United States)

    Corbin, Jeffrey D; Robinson, George R; Hafkemeyer, Lauren M; Handel, Steven N

    2016-01-01

    Applied nucleation is a restoration technique that seeks to facilitate woody-plant establishment by attracting birds or other animals that may introduce seeds of dispersal-limited species. In 1991, an experimental test of applied nucleation was initiated in an abandoned landfill in New Jersey, USA. Trees and shrubs were planted into 16 10 x 10 m plots, covering reforestation following disturbances or land-use changes in the region. Despite the relatively low species richness of the community, this experiment demonstrated that reforestation of even severely degraded habitat can be achieved with minimal management after site preparation and cluster plantings. PMID:27039513

  9. Applying Coaching Strategies to Support Youth- and Family-Focused Extension Programming

    Science.gov (United States)

    Olson, Jonathan R.; Hawkey, Kyle R.; Smith, Burgess; Perkins, Daniel F.; Borden, Lynne M.

    2016-01-01

    In this article, we describe how a peer-coaching model has been applied to support community-based Extension programming through the Children, Youth, and Families at Risk (CYFAR) initiative. We describe the general approaches to coaching that have been used to help with CYFAR program implementation, evaluation, and sustainability efforts; we…

  10. Water withdrawal in deep soil layers: a key strategy to cope with drought in tropical eucalypt plantations

    Science.gov (United States)

    Christina, M.; Laclau, J.; Nouvellon, Y.; Duursma, R. A.; Stape, J. L.; Lambais, G. R.; Le Maire, G.

    2013-12-01

    planting and deep drainage was negligible after 2 years. As a consequence, during the third year after planting only 4% of water was taken up below 6m. However, during the dry season, this deep water still supplied 50% of water requirements. Our results show that deep fine roots of E. grandis play a major role in supplying tree water requirements during extended dry periods. Large amounts of water are stored in the whole soil profile after clear cutting and the fast exploration of deep soil layers by roots make it available for tree growth. After canopy closure, precipitation becomes the key limitation for the productivity of these plantations grown in deep sandy soils. Our results suggest that a territorial strategy leading to a fast exploration of very deep soil layers might provide a strong competitive advantage in regions prone to drought.

  11. Business-oriented modeling and Simulation: Dynamic Scorecard method Applied the Formularization of Strategies

    Directory of Open Access Journals (Sweden)

    Josué Vitor

    2007-12-01

    Full Text Available The main goal of this research was to application the “Scorecard Dinâmico” method onstrategic formulation process in a small business. This method incorporate qualitative andsimulation tools from System Dynamics in the strategic map provided by Balanced Scorecardmaking the strategic management flexible in accordance with the organizational realitycomplexity. The research method adopted was the “research-action” and it was possible,with participating observation, the construction of strategic models on interaction with thecompany directors. During this process, it could be assessed organizing points thatinterfering in formulation of strategy of a small business during the research. Through thisprocess, company members mental models were explained in strategic map and qualitativemodels resulting on a simulation tool for control the results and alternative prospection offuture strategies and a higher level of learning organizational. As a result, it could be pointedthe method difficult implantation in virtue of the absence quantitative data and a higherunderstanding by the research participants of the problem resulting from the systemicstructural behavior in the small business.

  12. Green design "bioinspired disassembly-reassembly strategy" applied for improved tumor-targeted anticancer drug delivery.

    Science.gov (United States)

    Wang, Ruoning; Gu, Xiaochen; Zhou, Jianping; Shen, Lingjia; Yin, Lifang; Hua, Peiying; Ding, Yang

    2016-08-10

    In this study, a simple and green approach 'bioinspired disassembly-reassembly strategy' was employed to reconstitute lipoprotein nanoparticles (RLNs) using whole-components of endogenous ones (contained dehydrated human lipids and native apolipoproteins). These RLNs were engineered to mimic the configuration and properties of natural lipoproteins for efficient drug delivery. In testing therapeutic targeting to microtubules, paclitaxel (PTX) was reassembled into RLNs to achieve improved targeted anti-carcinoma treatment and minimize adverse effects, demonstrating ultimately more applicable than HDL-like particles which are based on exogenous lipid sources. We have characterized that apolipoprotein-decoration of PTX-loaded RLNs (RLNs-PTX) led to favoring uniformly dispersed distribution, increasing PTX-encapsulation with a sustained-release pattern, while enhancing biostability during blood circulation. The innate biological RLNs induced efficient intracellular trafficking of cargos in situ via multi-targeting mechanisms, including scavenger receptor class B type I (SR-BI)-mediated direct transmembrane delivery, as well as other lipoprotein-receptors associated endocytic pathways. The resulting anticancer treatment from RLNs-PTX was demonstrated a half-maximal inhibitory concentration of 0.20μg/mL, cell apoptosis of 18.04% 24h post-incubation mainly arresting G2/M cell cycle in vitro, and tumor weight inhibition of 70.51% in vivo. Collectively, green-step assembly-based RLNs provided an efficient strategy for mediating tumor-targeted accumulation of PTX and enhanced anticancer efficacy. PMID:27238442

  13. An Implementation Mechanisms of SVM Control Strategies Applied to Five Levels Cascaded Multi-Level Inverters

    Directory of Open Access Journals (Sweden)

    Mohammed Yaichi

    2014-03-01

    Full Text Available In the area of the energy control with high voltage and power, the multilevel inverters constitute a relatively recent research orientation. The current applications of this technology are in the domains of the high voltage (over hundred kV, variable speed drives, transport and distribution of a good quality of electrical energy (HVDC, FACTS system, ..... To improve the output voltage for such inverters, many different modulation strategies have been developed. Among these strategies, the SVM (Space Vector Modulation. The technique provide the nearest switching vectors sequence to the reference vector without involving trigonometric functions and provide the additional advantages of superior harmonic quality. In this paper, we analyze different mechanisms of the output voltage synthesis and the problem of even order harmonic production. With the proposed a new trajectory SVM, which can eliminate all the even order harmonics for five levels inverter. Show clearly how to deduce the trajectories from the sequences allowing to have better performances among several possible trajectories. It is dedicated to the application of two particular trajectories.

  14. SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD

    OpenAIRE

    Jaya Srivastaval; Twinkle Dwivedi

    2015-01-01

    Software testing is an important activity of the software development process. Software testing is most efforts consuming phase in software development. One would like to minimize the effort and maximize the number of faults detected and automated test case generation contributes to reduce cost and time effort.Hence test case generation may be treated as an optimization problem In this paper we have used genetic algorithm to optimize the test case that are generated applying conditional cover...

  15. SDRE control strategy applied to a nonlinear robotic including drive motor

    International Nuclear Information System (INIS)

    A robotic control design considering all the inherent nonlinearities of the robot-engine configuration is developed. The interactions between the robot and joint motor drive mechanism are considered. The proposed control combines two strategies, one feedforward control in order to maintain the system in the desired coordinate, and feedback control system to take the system into a desired coordinate. The feedback control is obtained using State-Dependent Riccati Equation (SDRE). For link positioning two cases are considered. Case I: For control positioning, it is only used motor voltage; Case II: For control positioning, it is used both motor voltage and torque between the links. Simulation results, including parametric uncertainties in control shows the feasibility of the proposed control for the considered system

  16. SDRE control strategy applied to a nonlinear robotic including drive motor

    Energy Technology Data Exchange (ETDEWEB)

    Lima, Jeferson J. de, E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Tusset, Angelo M., E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Janzen, Frederic C., E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Piccirillo, Vinicius, E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br; Nascimento, Claudinor B., E-mail: jefersonjl82@gmail.com, E-mail: tusset@utfpr.edu.br, E-mail: fcjanzen@utfpr.edu.br, E-mail: piccirillo@utfpr.edu.br, E-mail: claudinor@utfpr.edu.br [UTFPR-PONTA GROSSA, PR (Brazil); Balthazar, José M., E-mail: jmbaltha@rc.unesp.br [UNESP-BAURU, SP (Brazil); Brasil, Reyolando M. L. R. da Fonseca, E-mail: reyolando.brasil@ufabc.edu.br [UFABC-SANTO ANDRE, SP (Brazil)

    2014-12-10

    A robotic control design considering all the inherent nonlinearities of the robot-engine configuration is developed. The interactions between the robot and joint motor drive mechanism are considered. The proposed control combines two strategies, one feedforward control in order to maintain the system in the desired coordinate, and feedback control system to take the system into a desired coordinate. The feedback control is obtained using State-Dependent Riccati Equation (SDRE). For link positioning two cases are considered. Case I: For control positioning, it is only used motor voltage; Case II: For control positioning, it is used both motor voltage and torque between the links. Simulation results, including parametric uncertainties in control shows the feasibility of the proposed control for the considered system.

  17. Optimality, Rational Expectations and Time Inconsistency Applied to Inflation Targeting Strategy

    Directory of Open Access Journals (Sweden)

    Marius-Corneliu Marinas

    2008-10-01

    Full Text Available The purpose of this paper is to analyse the characteristics of an inflation targeting strategy, using the Barro-Gordon model specific tools. This paper uses the initial Barro-Gordon concepts of inflationary social costs and benefits, adding a new dimension generated by the cost of output deviating from the potential level. The main contribution of this paper is the exhaustive study of the time inconsistency problem generated by the very existence of a policymaker-established inflation rate. The mathematic simulation of a model allowed a complete analysis of several parameters’ influence (parameters such as the optimal rate of inflation, the discount rate, the importance structure of inflationary social cost on the applicable range of the target inflation rate, range that guarantees that the policymakers have no incentive to break their own rules, or at least this incentive is somewhat inferior to the future cost of doing so.

  18. Potentials and Strategies for applying Structural Health Monitoring within the Wind turbine industry

    DEFF Research Database (Denmark)

    Damkilde, Lars; Ulriksen, Martin Dalgaard; Tcherniak, Dmitri;

    2016-01-01

    The wind turbine industry has expanded significantly during the last decade, and the large offshore wind turbine parks represent large investments. The maintenance has attracted much attention, as both the cost of replacement and/or repair plus the production losses are large. The wind turbines are......, complicated load response from the dynamics, influence from noise, and interpretation of signals. In this paper, the focus is on the wind turbine blades, and recently we have established and proved methods which enable detection during turbine operation. Localization of the damage can be performed in a parked...... strategy for detection and localization will be treated in detail, especially the possibilities of inducing mechanical impulse via the control system. This would enable a far more advanced detection/localization. Finally, the use of Delores in the development of new wind turbine blade designs is discussed...

  19. Teaching Strategies to Apply in the Use of Technological Tools in Technical Education

    Directory of Open Access Journals (Sweden)

    Olga Arranz García

    2014-09-01

    Full Text Available The emergence of new technologies in education area is changing the way of organizing the educational processes. Teachers are not unrelated to these changes and must employ new strategies to adapt their teaching methods to the new circumstances. One of these adaptations is framed in the virtual learning, where the learning management systems have been revealed as a very effective means within the learning process. In this paper we try to provide teachers in engineering schools how to use in an appropriate way the different technological tools that are present in a virtual platform. Thus, in the experimental framework we show the results outcomes in the analysis of two data samples obtained before and after the implementation of the European Higher Education Area, that would be extrapolated for its innovative application to the learning techniques.

  20. INDIAN COMMUNITIES IN LISBON: CREATIVITY APPLIED TO BUSINESS AND SOCIAL STRATEGIES?

    Directory of Open Access Journals (Sweden)

    Jorge Macaísta Malheiros

    2010-12-01

    Full Text Available Rather than interpreting the initial motivation behind the emergence of the business initiatives of Indian citizens resident in Lisbon, or identifying their sectors of activity, this work attempts to verify in what way their activities bring innovative elements into the city. To that end, the author considers three domains: 1 the invigoration and animation of degraded areas in economic terms, as well as the creation of a new spatial symbology; 2 the supply of new products and services associated with the implementation of new market practices, and 3 the opening-up of new long-distance trading links interpreted as a component of the secondary internationalisation of the city. The entrepreneurial activities of these citizens help, furthermore (albeit indirectly, to introduce new cultural practices and also to revise certain mechanisms for regulating economic activities, in terms of timetables, urban planning and commercial regulation, and others. In response to the question of what Indian immigrants are contributing to Lisbon’s urban dynamics, and in relation to the introduction of social changes, the author attempts to interpret the initiatives using the criterion of whether or not they represent creative social strategies. After an exhaustive analysis, the author concludes that, in fact, most of the commercial initiatives of immigrants with this origin incorporate innovative and creative features, and have clear, diverse impacts on the dynamic of the transformation of certain spaces in the metropolitan area of Lisbon; having said that, it would not seem justifiable to claim that they constitute, in themselves, Creative Social Strategies, in the fullest sense.

  1. SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD

    Directory of Open Access Journals (Sweden)

    Jaya Srivastaval

    2015-06-01

    Full Text Available Software testing is an important activity of the software development process. Software testing is most efforts consuming phase in software development. One would like to minimize the effort and maximize the number of faults detected and automated test case generation contributes to reduce cost and time effort.Hence test case generation may be treated as an optimization problem In this paper we have used genetic algorithm to optimize the test case that are generated applying conditional coverage on source code. Test case data is generated automatically using genetic algorithm are optimized and outperforms the test cases generated by random testing.

  2. Proceedings of PEIA Forum 2007 : adapting and applying California's greenhouse gas strategies in Canada

    International Nuclear Information System (INIS)

    The key challenge in addressing climate change lies in identifying and implementing cost-effective measures to reduce greenhouse gas (GHG) emissions. The purpose of this forum was to stimulate action for reducing GHGs in British Columbia, the western provinces and Canada. The successes realized in California which are adaptable in BC and Canada were highlighted. In September 2006, California demonstrated leadership in taking determined action on climate change, with its signing of the California Global Warming Solutions Act. This landmark legislation calls for GHG reductions to 1990 levels by 2020, and 80 per cent below 1990 levels by 2050. The BC Energy plan calls for an aggressive target to reduce GHG emissions to 33 per cent below current levels by 2020, which will place emissions 10 per cent below 1990 levels; net zero GHG emissions from all electric power plants by 2016; acquiring 50 per cent of BC Hydro's new resource needs through conservation by 2020; ensuring electricity self-sufficiency by 2016; and, establishing a standing offer for clean electricity projects up to 10 megawatts. In May 2007, the province of British Columbia demonstrated a commitment to follow California's lead in GHG control, and to collaborate on projects such as the Hydrogen Highway. The actions are intended to make a significant contribution to the control of energy and greenhouse gas emissions in British Columbia and Canada. The conference featured 6 presentations, of which 2 have been catalogued separately for inclusion in this database. tabs., figs

  3. Applying the Taguchi Method to River Water Pollution Remediation Strategy Optimization

    Directory of Open Access Journals (Sweden)

    Tsung-Ming Yang

    2014-04-01

    Full Text Available Optimization methods usually obtain the travel direction of the solution by substituting the solutions into the objective function. However, if the solution space is too large, this search method may be time consuming. In order to address this problem, this study incorporated the Taguchi method into the solution space search process of the optimization method, and used the characteristics of the Taguchi method to sequence the effects of the variation of decision variables on the system. Based on the level of effect, this study determined the impact factor of decision variables and the optimal solution for the model. The integration of the Taguchi method and the solution optimization method successfully obtained the optimal solution of the optimization problem, while significantly reducing the solution computing time and enhancing the river water quality. The results suggested that the basin with the greatest water quality improvement effectiveness is the Dahan River. Under the optimal strategy of this study, the severe pollution length was reduced from 18 km to 5 km.

  4. Applying the Taguchi method to river water pollution remediation strategy optimization.

    Science.gov (United States)

    Yang, Tsung-Ming; Hsu, Nien-Sheng; Chiu, Chih-Chiang; Wang, Hsin-Ju

    2014-04-01

    Optimization methods usually obtain the travel direction of the solution by substituting the solutions into the objective function. However, if the solution space is too large, this search method may be time consuming. In order to address this problem, this study incorporated the Taguchi method into the solution space search process of the optimization method, and used the characteristics of the Taguchi method to sequence the effects of the variation of decision variables on the system. Based on the level of effect, this study determined the impact factor of decision variables and the optimal solution for the model. The integration of the Taguchi method and the solution optimization method successfully obtained the optimal solution of the optimization problem, while significantly reducing the solution computing time and enhancing the river water quality. The results suggested that the basin with the greatest water quality improvement effectiveness is the Dahan River. Under the optimal strategy of this study, the severe pollution length was reduced from 18 km to 5 km. PMID:24739765

  5. Terrorist profiling as a Counterinsurgency Strategy: Applying the Concept to Law Enforcement

    Directory of Open Access Journals (Sweden)

    Farhan Hyder Sahito

    2013-10-01

    Full Text Available The nature of terrorism is fundamentally psychological. Similarly, psychological profiling is widely accepted in detecting crimes in both law enforcement operations and the study of criminology. However, there is a need to transfer its appearance from old traditional criminal environment to the context of counterterrorism. This research argues that most prevalent method of interrogating suspects to achieve distinction between guilty and innocent is to establish a set of psychological attributes and factors. This paper proposes that terrorist's profiling is value-added intelligence that may add a new dimension in counterterrorism to identify the individual behind a terrorist act. It is important to constructs a terrorist profile before designing a paradigm that should determine the probability of terroristic trends within the individual as well as certain perceptible qualities with which an observed suspect can be likened to. This article proposes a personality-guided model of interrogation with different categories to steer clear of oversimplified thinking about individual terrorist or groups. The objective is to adapt the style and content of questioning to obtain a clear overall picture of the suspect's knowledge with appropriate interviewing and interrogation methods. This profiling will provide thorough understanding of the ideology that drives terrorism and more awareness of the likely means and likely targets used by terrorists. This paper is a shift in direction – focusing rather on the development of evidence-based methods that could lead to an effective counterinsurgency strategy and the extraction of innocent's involvement in the terrorism.

  6. Implementation Strategies for a Universal Acquisition and Tracking Channel Applied to Real GNSS Signals.

    Science.gov (United States)

    Fortin, Marc-Antoine; Landry, René

    2016-01-01

    This paper presents a universal GNSS receiver channel capable of tracking any civil GNSS signal. This fundamentally differs from dedicated channels, each customized for a given signal. A mobile device could integrate fewer universal channels to harvest all available signals. This would allow securing signal availability, while minimizing power consumption and chip size, thus maximizing battery lifetime. In fact, the universal channel allows sequential acquisition and tracking of any chipping rate, carrier frequency, FDMA channel, modulation, or constellation, and is totally configurable (any integration time, any discriminator, etc.). It can switch from one signal to another in 1.07 ms, making it possible for the receiver to rapidly adapt to its sensed environment. All this would consume 3.5 mW/channel in an ASIC implementation, i.e., with a slight overhead compared to the original GPS L1 C/A dedicated channel from which it was derived. After extensive surveys on GNSS signals and tracking channels, this paper details the implementation strategies that led to the proposed universal channel architecture. Validation is achieved using GNSS signals issued from different constellations, frequency bands, modulations and spreading code schemes. A discussion on acquisition approaches and conclusive remarks follow, which open up a new signal selection challenge, rather than satellite selection. PMID:27144569

  7. Carbohydrate metabolism teaching strategy for the Pharmacy course, applying active teaching methodology

    Directory of Open Access Journals (Sweden)

    Uderlei Donizete Silveira Covizzi

    2012-12-01

    Full Text Available The traditional teaching method has been widely questioned on the development of skills and abilities in training healthcare professionals. In the traditional methodology the main transmitter of knowledge is the teacher while students assume passive spectator role. Some Brazilian institutions broke with this model, structuring the curriculum to student-centered learning. Some medical schools have adopted the Problem Based Learning (PBL, a methodology that presents problem questions, to be encountered by future physicians, for resolution in small tutorial groups. Our work proposes to apply an active teaching-learning methodology addressing carbohydrate metabolism during the discipline of biochemistry for under graduation students from pharmacy course. Thus, the academic content was presented through brief and objective talks. Later, learners were split into tutorial groups for the resolution of issues in context. During the activities, the teacher drove the discussion to the issues elucidation. At the end of the module learners evaluated the teaching methodology by means of an applied questionnaire and the developed content was evaluated by an usual individual test. The questionnaire analysis indicates that students believe they have actively participated in the teaching-learning process, being encouraged to discuss and understand the theme. The answers highlight closer ties between students and tutor. According to the professor, there is a greater student engagement with learning. It is concluded that an innovative methodology, where the primary responsibility for learning is centered in the student himself, besides to increase the interest in learning, facilitates learning by cases discussion in groups. The issues contextualization establishes a narrowing between theory and practice.

  8. Expectations as a key to understanding actor strategies in the field of fuel cell and hydrogen vehicles.

    Science.gov (United States)

    Budde, Björn; Alkemade, Floortje; Weber, K Matthias

    2012-07-01

    Due to its environmental impact, the mobility system is increasingly under pressure. The challenges to cope with climate change, air quality, depleting fossil resources imply the need for a transition of the current mobility system towards a more sustainable one. Expectations and visions have been identified as crucial in the guidance of such transitions, and more specifically of actor strategies. Still, it remained unclear why the actors involved in transition activities appear to change their strategies frequently and suddenly. The empirical analysis of the expectations and strategies of three actors in the field of hydrogen and fuel cell technology indicates that changing actor strategies can be explained by rather volatile expectations related to different levels. Our case studies of the strategies of two large car manufacturers and the German government demonstrate that the car manufacturers refer strongly to expectations about the future regime, while expectations related to the socio-technical landscape level appear to be crucial for the strategy of the German government. PMID:24850974

  9. Applying Business Process Re-Engineering to Public Sector as A New Public Management Strategy

    Directory of Open Access Journals (Sweden)

    Ropinder Oberoi

    2013-08-01

    Full Text Available The introduction of Business Process Reengineering (BPR to the public sector follows the much broader trend of New Public Management. BPR in the public sector mostly means amalgamation of business processes, computerization of various activities and removal of some unnecessary ones. BPR assimilates a radical premeditated scheme of business pro-cess reengineering and an additional progressive technique of uninterrupted process improvement with adequate information technology (IT and e-business infrastructure strategies. Public organizations have specific and exclusive features that differentiae-ate them from private sector organizations. Based on the literature review and examining of study find-ings, it is argued that a public sector organization can employ BPR to get better its process and overall organizational performance, if it (1 has accrues a collection of BPR-relevant resources and capabilities; (2 has embarked on BPR with adequate depth and breadth; (3 is developing a post-BPR complementary set of skills, systems and technologies, which are essential to further develop the organizational impact of the BPR; and (4 has successfully mitigated the effects of BPR implementation problems. In addition to its effect on administration and ser-vice delivery processes through reduction of the processing time, work steps and cost of government processes, BPR also contributes to enhancing citizen/customer and employee satisfaction, increasing organizational transparency and responsiveness which have also become an essential objective of New Public Management. Therefore, public sector BPR is emerging as an indispensable to performance of organizations in the developing economy. The essential questions addressed in this paper are: What are the scenario and impending problems of reengineering applications in the public sector? Can it be functional for the public sector in attending to frequent problems blockading bureaucracies of developed and

  10. Strategy for applying scaling technique to water retention curves of forest soils

    Science.gov (United States)

    Hayashi, Y.; Kosugi, K.; Mizuyama, T.

    2009-12-01

    Describing the infiltration of water in soils on a forested hillslope requires the information of spatial variability of water retention curve (WRC). By using a scaling technique, Hayashi et al. (2009), found that the porosity mostly characterizes the spatial variability of the WRCs on a forested hillslope. This scaling technique was based on a model, which assumes a lognormal pore size distribution and contains three parameters: the median of log-transformed pore radius, ψm, the variance of log-transformed pore radius, σ, and the effective porosity, θe. Thus, in the scaling method proposed by Hayashi et al. (2009), θe is a scaling factor, which should be determined for each individual soil, and that ψm and σ are reference parameter common for the whole data set. They examined this scaling method using θe calculated as a difference between the observed saturated water content and water content observed at ψ = -1000 cm for each sample and, ψm and σ derived from the whole data set of WRCs on the slope. Then it was showed that this scaling method could explain almost 90 % of the spatial variability in WRCs on the forested hillslope. However, this method requires the whole data set of WRCs for deriving the reference parameters (ψm and σ). For applying the scaling technique more practically, in this study, we tested a scaling method using the reference parameter derived from the WRCs at a small part of the slope. In order to examine the proposed scaling method, the WRCs for the 246 undisturbed forest soil samples, collected at 15 points distributed from downslope to upslope segments, were observed. In the proposed scaling method, we optimized the common ψm and σ to the WRCs for six soil samples, collected at one point on the middle-slope, and applied these parameters to a reference parameter for the whole data sets. The scaling method proposed by this study exhibited an increase of only 6 % in the residual sum of squares as compared with that of the method

  11. An empirical study on key factors for purchasing strategy on project based organizations: A case study of gas field development projects

    Directory of Open Access Journals (Sweden)

    Aboulfazl Kazazi

    2012-08-01

    Full Text Available One of the primary concerns in development of oil and gas resources is to find the critical success factors associated with different important projects. Purchasing and procurement plays a key role in these projects. There is no doubt that in history of similar studies, there are not much studies to determine key factors. The proposed study of this paper presents an empirical study to find these factors in one of the most important gas filed in Iran is now South Pars Gas Field. The study distributes a questionnaire consists of various questions associated with purchasing activities. We investigate the feedbacks gathered from decision makers using factor analysis. The results of our survey reveal that there are three categories of organizational strategy, the relative importance of strategy and risk according to factor analysis. Each factor consists of many other factors and the relative importance of all factors are investigated.

  12. Management Strategy Evaluation Applied to Coral Reef Ecosystems in Support of Ecosystem-Based Management

    Science.gov (United States)

    Weijerman, Mariska; Fulton, Elizabeth A.; Brainard, Russell E.

    2016-01-01

    Ecosystem modelling is increasingly used to explore ecosystem-level effects of changing environmental conditions and management actions. For coral reefs there has been increasing interest in recent decades in the use of ecosystem models for evaluating the effects of fishing and the efficacy of marine protected areas. However, ecosystem models that integrate physical forcings, biogeochemical and ecological dynamics, and human induced perturbations are still underdeveloped. We applied an ecosystem model (Atlantis) to the coral reef ecosystem of Guam using a suite of management scenarios prioritized in consultation with local resource managers to review the effects of each scenario on performance measures related to the ecosystem, the reef-fish fishery (e.g., fish landings) and coral habitat. Comparing tradeoffs across the selected scenarios showed that each scenario performed best for at least one of the selected performance indicators. The integrated ‘full regulation’ scenario outperformed other scenarios with four out of the six performance metrics at the cost of reef-fish landings. This model application quantifies the socio-ecological costs and benefits of alternative management scenarios. When the effects of climate change were taken into account, several scenarios performed equally well, but none prevented a collapse in coral biomass over the next few decades assuming a business-as-usual greenhouse gas emissions scenario. PMID:27023183

  13. Management Strategy Evaluation Applied to Coral Reef Ecosystems in Support of Ecosystem-Based Management.

    Science.gov (United States)

    Weijerman, Mariska; Fulton, Elizabeth A; Brainard, Russell E

    2016-01-01

    Ecosystem modelling is increasingly used to explore ecosystem-level effects of changing environmental conditions and management actions. For coral reefs there has been increasing interest in recent decades in the use of ecosystem models for evaluating the effects of fishing and the efficacy of marine protected areas. However, ecosystem models that integrate physical forcings, biogeochemical and ecological dynamics, and human induced perturbations are still underdeveloped. We applied an ecosystem model (Atlantis) to the coral reef ecosystem of Guam using a suite of management scenarios prioritized in consultation with local resource managers to review the effects of each scenario on performance measures related to the ecosystem, the reef-fish fishery (e.g., fish landings) and coral habitat. Comparing tradeoffs across the selected scenarios showed that each scenario performed best for at least one of the selected performance indicators. The integrated 'full regulation' scenario outperformed other scenarios with four out of the six performance metrics at the cost of reef-fish landings. This model application quantifies the socio-ecological costs and benefits of alternative management scenarios. When the effects of climate change were taken into account, several scenarios performed equally well, but none prevented a collapse in coral biomass over the next few decades assuming a business-as-usual greenhouse gas emissions scenario. PMID:27023183

  14. The implementation of the import substitution strategy as the key to the development of export potential of industrial enterprises

    Directory of Open Access Journals (Sweden)

    T.V. Vashchenko

    2015-09-01

    Full Text Available The aim of the article. The article examines the preconditions and prospects of import substitution implementation by native producers of machine-building industry. It is based on the analysis of the different countries experiences in import substitution implementation for their economic growth and renovation. The rational explanation of the import substitution strategy formation and implementation at the management level of enterprise development is given. It allows to form more clearly the mission and objectives of enterprise’s effective management in an unstable external environment. The results of the analysis. The definition of the concept «industrial enterprise import substitution strategy» was formulated. The scientific and methodical aspects to the definition of the perspective directions for the import substitution strategy were developed. It allows to choose the best solution while considering the set of criteria. The matrix «the group's share in the product portfolio of an enterprise – the priority directions of the import substitution strategy realization» was developed using the method of hierarchies analysis. It helps to choose direction of the import substitution strategy implementation. According to the matrix it is possible to distinguish five zones in which it is ossible to choose the direction of the import substitution strategy implementation at industrial enterprises. Conclusions and directions of further researches. It is proved that for the purpose of determining of strategically effective directions of industrial enterprise development it is advisable to use principle of «sales funnel» phased selection of promising groups of product portfolio according to the criteria «degree of market risk and the additional ratio of return per unit of risk investment». The analysis of these indicators provides an opportunity to identify risk of attractive investment project and growth of the commodity portfolio groups

  15. Four Perspectives of Sustainability Applied to the Local Food Strategy of Ghent (Belgium: Need for a Cycle of Democratic Participation?

    Directory of Open Access Journals (Sweden)

    Maarten Crivits

    2016-01-01

    Full Text Available As part of cities’ increasing commitment to sustainable development, local food systems are becoming a policy priority. In this article we focus on the case of a local food system in Ghent, Belgium. We adopt the notion of Hajer et al. (2015 that top-down steering of environmental issues (so-called “cockpit-ism” is insufficient, incomplete and in need of revision. Using their four perspectives on sustainable development (Hajer et al., 2015, we explore, analyze and valorize the potential of the actors, motives and logics for change within the agriculture and food system in the Ghent region. Applying these four perspectives, we have mapped the current positive developments as well as identified the weaknesses, pitfalls and opportunities of a local food strategy. The discussion section contains two important strategies for good governance of sustainable urban development: first, a governance approach to stimulate participation and representation in a complex, unequal and rapidly changing context; and second, a reflection on how local food strategies can drive global sustainability. In conclusion, we argue for the integration of a global sustainability approach within sustainable urban development.

  16. Applying the Creativity in Oder to Generate Innovation Projects: the Practical Case Study of a Didactic Strategy

    Directory of Open Access Journals (Sweden)

    Eliana Maria dos Santos Pereira Alves

    2015-08-01

    Full Text Available A current challenge in teaching practice is to transform classrooms into laboratories to exchange experiences in courses whose goal is to enhance the professional skills in a practical and meaningful way. The search for improvement demonstrates that, increasingly, professionals become aware that organizations coexist in highly competitive environments, seeking to conquer more markets based on sustainable competitive advantages demanding fast responses of its employees. Considering that the process of creativity can be stimulated through the establishment of a suitable environment, this study aims to discuss the application of a didactic strategy developed for this purpose. Using the single case study methodology, it was used the technique of unstructured observation (informal or single to carry out the collection and the recording of events that occurred during the strategy application. It discusses elements such as identifying opportunities, creativity, innovation and entrepreneurship, seeking their relationships to understand how it is possible to motivate the generation of proposals for innovative projects in educational environments. As a result, it is presented the perceptions of teachers on the didactic strategy applied, emphasizing that a suitable environment for the development of ideas encourages the student to propose solutions for the improbabilities, creating innovative alternatives to the identified needs.

  17. Key; key ring

    International Nuclear Information System (INIS)

    Key and/or key ring is provided with illuminating means which do not require a source of electrical power. The key shown comprises a shank and a head, the head being moulded from a luminous plastic material which glows in the dark. To improve keying together of shank and head there is a pair of holes in the head of the shank. Alternatively the key may be coated in illuminating material or provided with sheath or cover of illuminating material. The key may be provided with company logo. The key ring has attached thereto a hollow plastics container whose interior is coated with a phosphor and which is filled with tritium gas. (author)

  18. Dyna-H: a heuristic planning reinforcement learning algorithm applied to role-playing-game strategy decision systems

    CERN Document Server

    Santos, Matilde; Lopez, Victoria

    2011-01-01

    In a Role-Playing Game, finding optimal trajectories is one of the most important tasks. In fact, the strategy decision system becomes a key component of a game engine. Determining the way in which decisions are taken (e.g. online, batch or simulated) and the consumed resources in decision making (e.g. execution time, memory) will influence, in mayor degree, the game performance. When classical search algorithms such as A* can be used, they are the very first option. Nevertheless, such methods rely on precise and complete models of the search space, and so there are many interesting scenarios where its application is not possible, hence model free methods for sequential decision making under uncertainty are the best choice. In this paper, we propose a heuristic planning strategy to incorporate, into a Dyna agent, the ability of heuristic-search in path-finding. The proposed Dyna-H algorithm, as A* does, selects branches more likely to produce outcomes than other branches. However, it has the advantages, A* ha...

  19. Impact of metal ions in porphyrin-based applied materials for visible-light photocatalysis: key information from ultrafast electronic spectroscopy.

    Science.gov (United States)

    Kar, Prasenjit; Sardar, Samim; Alarousu, Erkki; Sun, Jingya; Seddigi, Zaki S; Ahmed, Saleh A; Danish, Ekram Y; Mohammed, Omar F; Pal, Samir Kumar

    2014-08-11

    Protoporphyrin IX-zinc oxide (PP-ZnO) nanohybrids have been synthesized for applications in photocatalytic devices. High-resolution transmission electron microscopy (HRTEM), X-ray diffraction (XRD), and steady-state infrared, absorption, and emission spectroscopies have been used to analyze the structural details and optical properties of these nanohybrids. Time-resolved fluorescence and transient absorption techniques have been applied to study the ultrafast dynamic events that are key to photocatalytic activities. The photocatalytic efficiency under visible-light irradiation in the presence of naturally abundant iron(III) and copper(II) ions has been found to be significantly retarded in the former case, but enhanced in the latter case. More importantly, femtosecond (fs) transient absorption data have clearly demonstrated that the residence of photoexcited electrons from the sensitizer PP in the centrally located iron moiety hinders ground-state bleach recovery of the sensitizer, affecting the overall photocatalytic rate of the nanohybrid. The presence of copper(II) ions, on the other hand, offers additional stability against photobleaching and eventually enhances the efficiency of photocatalysis. In addition, we have also explored the role of UV light in the efficiency of photocatalysis and have rationalized our observations from femtosecond- to picosecond-resolved studies. PMID:25044047

  20. Impact of metal ions in porphyrin-based applied materials for visible-light photocatalysis: Key information from ultrafast electronic spectroscopy

    KAUST Repository

    Kar, Prasenjit

    2014-07-10

    ProtoporphyrinIX-zinc oxide (PP-ZnO) nanohybrids have been synthesized for applications in photocatalytic devices. High-resolution transmission electron microscopy (HRTEM), X-ray diffraction (XRD), and steady-state infrared, absorption, and emission spectroscopies have been used to analyze the structural details and optical properties of these nanohybrids. Time-resolved fluorescence and transient absorption techniques have been applied to study the ultrafast dynamic events that are key to photocatalytic activities. The photocatalytic efficiency under visible-light irradiation in the presence of naturally abundant iron(III) and copper(II) ions has been found to be significantly retarded in the former case, but enhanced in the latter case. More importantly, femtosecond (fs) transient absorption data have clearly demonstrated that the residence of photoexcited electrons from the sensitizer PP in the centrally located iron moiety hinders ground-state bleach recovery of the sensitizer, affecting the overall photocatalytic rate of the nanohybrid. The presence of copper(II) ions, on the other hand, offers additional stability against photobleaching and eventually enhances the efficiency of photocatalysis. In addition, we have also explored the role of UV light in the efficiency of photocatalysis and have rationalized our observations from femtosecond- to picosecond-resolved studies. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  1. Analysis of market & business strategies of key players in UK professional services sector For Tata Consultancy Services MBA 2012

    OpenAIRE

    Pinto, Ajay Don; Sridhar, Geetha

    2012-01-01

    This project is part of the Nottingham University Business School Management Project and TCS’s Global Internship Program which provides an opportunity to work on challenging projects on information technology. The key areas include: improving operational efficiency and productivity; promoting business agility; simplification and transformation; managing enterprise risk and compliance; and enabling the understanding of markets and customers. The project from Tata Consultancy Services (TCS)...

  2. Managing the duality of IHRM: unravelling the strategy and perceptions of key actors in South Korean MNCs

    OpenAIRE

    Chung, C.; Bozkurt, O.; Sparrow, P R

    2012-01-01

    This research aims to extend our understanding of the duality between global integration and local responsiveness in multinational corporations (MNCs) by exploring the perceptions of corporate HR actors regarding the intra-organisational factors that alter the balance between these pressures. It examines the perceptions and actions of key actors in the context of two Korean MNCs. The study shows the importance attributed to a range of socio-procedural factors by corporate actors and which, th...

  3. The implementation of the import substitution strategy as the key to the development of export potential of industrial enterprises

    OpenAIRE

    T.V. Vashchenko

    2015-01-01

    The aim of the article. The article examines the preconditions and prospects of import substitution implementation by native producers of machine-building industry. It is based on the analysis of the different countries experiences in import substitution implementation for their economic growth and renovation. The rational explanation of the import substitution strategy formation and implementation at the management level of enterprise development is given. It allows to form more clearly the ...

  4. Bacterial Biofilms and Catheters: A Key to Understanding Bacterial Strategies in Catheter-Associated Urinary Tract Infection

    OpenAIRE

    Nickel, J. Curtis; Costerton, J. William

    1992-01-01

    Despite major technological improvements in catheter drainage systems, the indwelling Foley catheter remains the most common cause of nosocomial infection in medical practice. By approaching this common complicated urinary tract infection from the perspective of the biofilm strategy bacteria appear to use to overcome obstacles to produce bacteriuria, one appreciates a new understanding of these infections. An adherent biofilm of bacteria in their secretory products ascends the luminal and ext...

  5. Towards a European Strategy in Support of Innovation in Services A review of key evidence and policy issues

    OpenAIRE

    Rubalcaba, Luis; Hipp, Christiane; Gallouj, Faïz; Fornhal, Dirk

    2008-01-01

    This report focuses on service innovation and the conditions in which service innovation can be promoted in European policies. The authors want to reinforce the current plans towards a European strategy in Support of Innovation in Services -SEC(2007) 1059 - within the preparatory works for the forthcoming communication in services innovation (expected for fall 2008). This work has been prepared under the framework contract between the European Commission – DG Enterprise and Industry - and TNO...

  6. Marketing 'less harmful, low-tar' cigarettes is a key strategy of the industry to counter tobacco control in China.

    Science.gov (United States)

    Yang, Gonghuan

    2014-03-01

    While the 'low-tar' scheme has been widely recognised as a misleading tactic used by the tobacco industry to deceive the public about the true risks of cigarette smoking, a similar campaign using the slogan of 'less harmful, low tar' was launched by the Chinese tobacco industry, that is, State Tobacco Monopoly Administration/China National Tobacco Corporation and began to gain traction during the last decade. Despite the fact that no sufficient research evidence supports the claims made by the industry that these cigarettes are safer, the Chinese tobacco industry has continued to promote them using various health claims. As a result, the production and sales of 'less harmful, low-tar' cigarettes have increased dramatically since 2000. Recently, a tobacco industry senior researcher, whose main research area is 'less harmful, low-tar' cigarettes, was elected as an Academician to the prestigious Chinese Academy of Engineering for his contribution to developing 'less harmful, low-tar' cigarettes. The tobacco researcher's election caused an outcry from the tobacco control community and the general public in China. This paper discusses the Chinese tobacco industry's 'less harmful, low-tar' initiatives and calls for the Chinese government to stop the execution of this deceptive strategy for tobacco marketing. PMID:23349230

  7. Applying maintenance strategies from the space and satellite sector to the upstream oil and gas industry: A research agenda

    International Nuclear Information System (INIS)

    Practitioners from both the upstream oil and gas industry and the space and satellite sector have repeatedly noted several striking similarities between the two industries over the years, which have in turn resulted in many direct comparisons in the media and industry press. The two sectors have previously worked together and shared ideas in ways that have yielded some important breakthroughs, but relatively little sharing or cross-pollination has occurred in the area of asset maintenance. This is somewhat surprising in light of the fact that here, too, the sectors have much in common. This paper accordingly puts forward the viewpoint that the upstream oil and gas industry could potentially make significant improvements in asset maintenance—specifically, with regard to offshore platforms and remote pipelines—by selectively applying some aspects of the maintenance strategies and philosophies that have been learned in the space and satellite sector. The paper then offers a research agenda toward accelerating the rate of learning and sharing between the two industries in this domain, and concludes with policy recommendations that could facilitate this kind of cross-industry learning. - Highlights: • Oil and gas industry and space and satellite sector are very similar in several important ways. • Paper suggests that oil and gas industry should adopt best maintenance practices from satellite sector. • Research agenda outlined to accelerate the rate of learning and sharing between the two industries

  8. A novel fermentation strategy for removing the key inhibitor acetic acid and efficiently utilizing the mixed sugars from lignocellulosic hydrolysates

    Energy Technology Data Exchange (ETDEWEB)

    Mark A. Eiteman PHD; Elliot Altman Phd

    2009-02-11

    As part of preliminary research efforts, we have completed several experiments which demonstrate 'proof of concept.' These experiments addressed the following three questions: (1) Can a synthetic mixed sugar solution of glucose and xylose be efficiently consumed using the multi-organism approach? (2) Can this approach be used to accumulate a model product? (3) Can this approach be applied to the removal of an inhibitor, acetate, selectively from mixtures of xylose and glucose? To answer the question of whether this multi-organism approach can effectively consume synthetic mixed sugar solutions, we first tested substrate-selective uptake using two strains, one unable to consume glucose and one unable to consume xylose. The xylose-selective strain ALS998 has mutations in the three genes involved in glucose uptake, rendering it unable to consume glucose: ptsG codes for the Enzyme IICB{sup Glc} of the phosphotransferase system (PTS) for carbohydrate transport (Postma et al., 1993), manZ codes for the IID{sup Man} domain of the mannose PTS permease (Huber, 1996), glk codes for glucokinase (Curtis and Epstein 1975) We also constructed strain ALS1008 which has a knockout in the xylA gene encoding for xylose isomerase, rendering ALS1008 unable to consume xylose. Two batch experiments and one continuous bioprocess were completed. In the first experiment, each strain was grown separately in a defined medium of 8 g/L xylose and 15 g/L glucose which represented xylose and glucose concentrations that can be generated by actual biomass. In the second experiment, the two strains were grown together in batch in the same defined, mixed-sugar medium. In a third experiment, we grew the strains continuously in a 'chemostat', except that we shifted the concentrations of glucose and xylose periodically to observe how the system would respond. (For example, we shifted the glucose concentration suddenly from 15 g/L to 30 g/L in the feed).

  9. Comparative Advantages and Limitations of Qualitative Strategy of Comparison as Applied to Russian Cases of Perestroika Period’s Representation in History Textbooks

    Directory of Open Access Journals (Sweden)

    Alexander Ivanovich Gorylev

    2014-12-01

    Full Text Available The paper is devoted to the analyses of the results of the comparative research of perestroika periodrepresentations in Russian textbooks on history. Research design and research results are discussed in aframework of distinction between qualitative and quantitative strategies of comparison. The basic features ofqualitative strategy, its strong and weak points are outlined based on the materials of the research. Threediscourses of representation of perestroika period in Russian textbooks are identified. The aim of this paper is todiscuss comparative advantages and limitations of qualitative strategy of comparison as applied to our study ofperestroika period representations in Russian textbooks on history.

  10. Applying Future Studies Methods to Understanding the Impact of University Information and Communication Technology Strategies on Learning

    Science.gov (United States)

    Aczel, J. C.; Hardy, P.

    2007-01-01

    This article aims to explore the potential of certain future studies techniques to provide insight into the question of the impact of higher education information and communication technology (ICT) strategies on student learning. The approach is to consider three case studies of new universities in different countries, and to identify the main…

  11. A spatial model with pulsed releases to compare strategies for the sterile insect technique applied to the mosquito Aedes aegypti

    OpenAIRE

    Evans, T. P. O.; Bishop, S.R.

    2014-01-01

    We present a simple mathematical model to replicate the key features of the sterile insect technique (SIT) for controlling pest species, with particular reference to the mosquito Aedes aegypti, the main vector of dengue fever. The model differs from the majority of those studied previously in that it is simultaneously spatially explicit and involves pulsed, rather than continuous, sterile insect releases. The spatially uniform equilibria of the model are identified and analysed. Simulations a...

  12. The relations with destination stakeholders and applying strategies: A research on provincial directorates of culture and tourism and their stakeholders in Turkey

    OpenAIRE

    Fatih SEMERCİÖZ; DURSUN, Meral; DÖNMEZ, Dilek

    2011-01-01

    The study emphases on relationships between Directors of Provincial Directorates of Culture and Tourism (PDCT)'s and their stakeholders. Accordingly, PDCT's perceptions which are related to destination stakeholders' potential to threaten and cooperate with the PDCT's, the problems which are composed by destination stakeholders and applied strategies toward to destination stakeholders by PDCT's are tried to determined in this study. As a result of performed analyses related to data gained by q...

  13. Applying appropriate risk management strategies to improve the Superfund process: Creating mutual gains for PRPs and regulators

    International Nuclear Information System (INIS)

    A new mechanism to develop an appropriate risk management strategy is the ''Presumptive Remedy''. This allows the Superfund process to be streamlined for certain kinds of sites, e.g. municipal landfill sites. Total Quality Management concepts are also being used to improve risk management decisions and the remediation process. This presentation will describe site-specific case studies and include a panel discussion covering how incorporation of these risk management elements into selection of the site remediation strategy leads to decisions that are acceptable to all stakeholders. The presentation will discuss lessons learned from the following perspectives: Private Industry; Department of Defense (DOD); Department of Energy (DOE); (US EPA); and A-E Firms

  14. A narrative review of psychological and educational strategies applied to young children's eating behaviours aimed at reducing obesity risk

    OpenAIRE

    Gibson, E. Leigh; Wildgruber, Andreas; Kreichauf, Susanne; Vögele, Claus; Nixon, Catherine A.; Douthwaite, Wayne; Moore, Helen J; Manios, Yannis; Summerbell, Carolyn D; on behalf of the Toybox-study group

    2012-01-01

    Strategies to reduce risk of obesity by influencing preschool children’s eating behaviour are reviewed. The studies are placed in the context of relevant psychological processes, including inherited and acquired preferences, and behavioural traits, such as food neophobia, ‘enjoyment of food’ and ‘satiety responsiveness’. These are important influences on how children respond to feeding practices, as well as predictors of obesity risk. Nevertheless, in young children, food environment and expe...

  15. Exploring the Relationship between E-Commerce Adoption and Business Strategy: An Applied Study on the Jordanian Telecommunication Companies

    OpenAIRE

    Moayyad Al-FAWAEER

    2013-01-01

    This study aims to shed the light on the relation between E-commerce adoption  in terms of (website for corporate, website for product / services, customer support via web contact details, online order processing online business, Web Access to order, web-based marketplaces) and business strategy (internal factors, market factors, competitive factors) at the Jordanian telecommunication companies.The population of the study consisted of mobile communication companies  operating in Jordan (Zian,...

  16. The effectiveness of applying conceptual development teaching strategies to Newton's second law of motion / Carel Hendrik Meyer

    OpenAIRE

    Meyer, Carel Hendrik

    2014-01-01

    School science education prepares learners to study science at a higher level, prepares them to follow a career in science and to become scientific literate citizens. It is the responsibility of the educator to ensure the learners’ conceptual framework is developed to the extent that secures success at higher level studies. The purpose of this study was to test the effectiveness of conceptual change teaching strategies on the conceptual development of grade 11 learners on Newton’s second law ...

  17. Understanding NTNU's students' and employees' recycling behaviour based on intervention strategies by applying a comprehensive psychological model

    OpenAIRE

    Tobolova, Monika

    2015-01-01

    One of the solutions for the environmental problem of waste is proper waste separation by individuals. This Master’s Thesis discusses the psychological variables of individuals’ waste separation behaviour. Building on the Theory of Planned Behaviour, Norm-activation Model, Habits and the Comprehensive Action Determination Model, a questionnaire was created paying close attention to the intervention strategies implemented by the project group ‘Klimafot Avfall’ at The Norwegian University of Sc...

  18. Applying learning theories to develop teaching strategies for the critical care nurse. Don't limit yourself to the formal classroom lecture.

    Science.gov (United States)

    Dobbin, K R

    2001-03-01

    Learning, as defined by Alspach, is "a change in cognitive, psychomotor, and/or affective behaviors." The teaching strategies reviewed in this article have focused on ones that can affect all three learner behaviors if carefully planned and executed by the instructor. It is also key to provide the content in a manner that will appeal to the autonomy and self-direction of the adult learner, keeping in mind the importance of relating new information to previously learned material. Realizing that learners have different learning styles, the instructor also should assess learning styles and vary teaching methods accordingly. Incorporating some of the learner assessments and teaching strategies discussed here can be a change for both the learner and instructor, but it is consistent with modern learning theory where the focus is on the learner. PMID:11863132

  19. LCA of local strategies for energy recovery from waste in England, applied to a large municipal flow.

    Science.gov (United States)

    Tunesi, Simonetta

    2011-03-01

    An intense waste management (WM) planning activity is currently undergoing in England to build the infrastructure necessary to treat residual wastes, increase recycling levels and the recovery of energy from waste. From the analyses of local WM strategic and planning documents we have identified the emerging of three different energy recovery strategies: established combustion of residual waste; pre-treatment of residual waste and energy recovery from Solid Recovered Fuel in a dedicated plant, usually assumed to be a gasifier; pre-treatment of residual waste and reliance on the market to accept the 'fuel from waste' so produced. Each energy recovery strategy will result in a different solution in terms of the technology selected; moreover, on the basis of the favoured solution, the total number, scale and location of thermal treatment plants built in England will dramatically change. To support the evaluation and comparison of these three WM strategy in terms of global environmental impacts, energy recovery possibilities and performance with respect to changing 'fuel from waste' market conditions, the LCA comparison of eight alternative WM scenarios for a real case study dealing with a large flow of municipal wastes was performed with the modelling tool WRATE. The large flow of waste modelled allowed to formulate and assess realistic alternative WM scenarios and to design infrastructural systems which are likely to correspond to those submitted for approval to the local authorities. The results show that all alternative scenarios contribute to saving abiotic resources and reducing global warming potential. Particularly relevant to the current English debate, the performance of a scenario was shown to depend not from the thermal treatment technology but from a combination of parameters, among which most relevant are the efficiency of energy recovery processes (both electricity and heat) and the calorific value of residual waste and pre-treated material. The

  20. LCA of local strategies for energy recovery from waste in England, applied to a large municipal flow

    International Nuclear Information System (INIS)

    An intense waste management (WM) planning activity is currently undergoing in England to build the infrastructure necessary to treat residual wastes, increase recycling levels and the recovery of energy from waste. From the analyses of local WM strategic and planning documents we have identified the emerging of three different energy recovery strategies: established combustion of residual waste; pre-treatment of residual waste and energy recovery from Solid Recovered Fuel in a dedicated plant, usually assumed to be a gasifier; pre-treatment of residual waste and reliance on the market to accept the 'fuel from waste' so produced. Each energy recovery strategy will result in a different solution in terms of the technology selected; moreover, on the basis of the favoured solution, the total number, scale and location of thermal treatment plants built in England will dramatically change. To support the evaluation and comparison of these three WM strategy in terms of global environmental impacts, energy recovery possibilities and performance with respect to changing 'fuel from waste' market conditions, the LCA comparison of eight alternative WM scenarios for a real case study dealing with a large flow of municipal wastes was performed with the modelling tool WRATE. The large flow of waste modelled allowed to formulate and assess realistic alternative WM scenarios and to design infrastructural systems which are likely to correspond to those submitted for approval to the local authorities. The results show that all alternative scenarios contribute to saving abiotic resources and reducing global warming potential. Particularly relevant to the current English debate, the performance of a scenario was shown to depend not from the thermal treatment technology but from a combination of parameters, among which most relevant are the efficiency of energy recovery processes (both electricity and heat) and the calorific value of residual waste and pre-treated material. The

  1. A narrative review of psychological and educational strategies applied to young children's eating behaviours aimed at reducing obesity risk.

    Science.gov (United States)

    Gibson, E L; Kreichauf, S; Wildgruber, A; Vögele, C; Summerbell, C D; Nixon, C; Moore, H; Douthwaite, W; Manios, Y

    2012-03-01

    Strategies to reduce risk of obesity by influencing preschool children's eating behaviour are reviewed. The studies are placed in the context of relevant psychological processes, including inherited and acquired preferences, and behavioural traits, such as food neophobia, 'enjoyment of food' and 'satiety responsiveness'. These are important influences on how children respond to feeding practices, as well as predictors of obesity risk. Nevertheless, in young children, food environment and experience are especially important for establishing eating habits and food preferences. Providing information to parents, or to children, on healthy feeding is insufficient. Acceptance of healthy foods can be encouraged by five to ten repeated tastes. Recent evidence suggests rewarding healthy eating can be successful, even for verbal praise alone, but that palatable foods should not be used as rewards for eating. Intake of healthier foods can be promoted by increasing portion size, especially in the beginning of the meal. Parental strategies of pressuring to eat and restriction do not appear to be causally linked to obesity, but are instead primarily responses to children's eating tendencies and weight. Moderate rather than frequent restriction may improve healthy eating in children. Actively positive social modelling by adults and peers can be effective in encouraging healthier eating. PMID:22309067

  2. New cleaning strategies based on carbon nanomaterials applied to the deteriorated marble surfaces: A comparative study with enzyme based treatments

    Energy Technology Data Exchange (ETDEWEB)

    Valentini, Federica, E-mail: federica.valentini@uniroma2.it [Dipartimento di Scienze e Tecnologie Chimiche, Universita degli Studi di Roma Tor Vergata, Via della Ricerca Scientifica 1, 00133 Rome (Italy); Diamanti, Alessia; Carbone, M. [Dipartimento di Scienze e Tecnologie Chimiche, Universita degli Studi di Roma Tor Vergata, Via della Ricerca Scientifica 1, 00133 Rome (Italy); Bauer, E.M. [Istituto di Struttura della Materia del Consiglio Nazionale delle Ricerche (ISM-CNR), RM 1, Via Salaria km 29.3, 00015 Monterotondo (Italy); Palleschi, Giuseppe [Dipartimento di Scienze e Tecnologie Chimiche, Universita degli Studi di Roma Tor Vergata, Via della Ricerca Scientifica 1, 00133 Rome (Italy)

    2012-06-01

    Pentelic marbles from Basilica Neptuni in Rome-Italy (27-25 B.C.) show the signs of deterioration phenomena, which can be identified as black crust as well as black and grey patina. The present study has the twofold objective of assessing the entity of the deterioration and proposing new cleaning strategies based on nanotechnologies. The former is achieved by performing optical microscopy, differential interference contrast (DIC), stereomicroscopy, scanning electron microscopy/energy dispersive X-ray analysis (SEM/EDX) and infrared Fourier transform spectroscopy (FT-IR) analysis. The second objective of this study, involves different treatments based on a new cleaning strategy with carbon nanomaterials and bio-cleaning (used here for comparison) performed with enzymes, as glucose oxidase (GOD) and lipase. Nanomicelles assembled with functionalised carbon nano-fibres (CNF-COOH) and dispersed in Tween 20 medium show the highest cleaning performances in terms of removal of the black crust, compared with the pristine single-wall carbon nanotubes (SWCNTs) and the enzyme-based cleaning treatments. In particular, in these last two cases, the GOD-based biocleaning is efficient in removing the grey and dark patina, but works slow on the black crust. Finally, the lipase based cleaning approach is efficient in the black patina removal, though at the working temperature of 38 Degree-Sign C.

  3. Joint enhancement strategy applied in ECL biosensor based on closed bipolar electrodes for the detection of PSA.

    Science.gov (United States)

    Shi, Hai-Wei; Zhao, Wei; Liu, Zhen; Liu, Xi-Cheng; Wu, Mei-Sheng; Xu, Jing-Juan; Chen, Hong-Yuan

    2016-07-01

    A highly sensitive electrogenerated chemiluminescence (ECL) biosensor was developed on the basis of a closed bipolar electrode (BPE) apparatus for the analysis of prostate specific antigen (PSA). Bipolar modifications bring up two different stages of enhancement on the same electrode. Anodic enhancement was conducted by modifying gold nanoparticles (Au NPs) to catalyze the anodic ECL reaction between luminol and hydrogen peroxide. Cathodic introduction of thionine tagged PSA antibody led to a further pertinently enhancement synchronized with the PSA amount variation, because the existence of thionine greatly increased the rate of electron gains on cathode, leading to the corresponding acceleration of anodic ECL reaction. The more thionine modified target molecules were introduced, the faster luminol was oxidized, the higher faraday current approached, and sensitive quantification was realized in correlation with the responsive ECL intensity differences. The quantification resulted in a good determination range between 0.1pg/mL and 0.1µg/mL. This strategy mainly took advantage of the special structure of closed BPE to realize a simultaneous amplification on both ends of BPE. Moreover, the platform had a potential of providing a multi-functional strategy for the realization of other bio-detections by simply substituting the PSA sandwich structure with other bio-structures. PMID:27154662

  4. Active Vibration Isolation Control: Comparison of Feedback and Feedforward Control Strategies Applied to Coriolis Mass-Flow Meters (I)

    OpenAIRE

    Ridder, de, J.; Hakvoort, W.B.J.; van Dijk

    2015-01-01

    In this paper we describe the design, implementation and results of multi degree of freedom (DOF) active vibration control for a Coriolis mass-flow meter (CMFM). Without vibration control, environmental vibrational disturbances results in nanometre movement of the fluid-conveying tube which causes erroneous mass-flow measurements. In order to reduce the transmissibility from external vibrations to the internal tube displacement active vibration control is applied. A comparison of a feedback c...

  5. On the Data Mining Technology Applied to Active Marketing Model of International Luxury Marketing Strategy in China— An Empirical Analysis

    OpenAIRE

    Qishen Zhou; Shanhui Wang; Zuowei Yin

    2013-01-01

     This paper emphasizes the importance of active marketing in the customer relationship management. Especially, the data mining technology is applied to establish an active marketing model to empirically analyze the condition of the AH Jewelry Company. Michael Porter's Five Forces Model is employed to assess and calculate the similarity in the active marketing model. Then, the questionnaire analysis on the customer relationship management model is carried out to explain the target market and t...

  6. Proton-detected scalar coupling based assignment strategies in MAS solid-state NMR spectroscopy applied to perdeuterated proteins

    Science.gov (United States)

    Linser, Rasmus; Fink, Uwe; Reif, Bernd

    2008-07-01

    Assignment of proteins in MAS (magic angle spinning) solid-state NMR relies so far on correlations among heteronuclei. This strategy is based on well dispersed resonances in the 15N dimension. In many complex cases like membrane proteins or amyloid fibrils, an additional frequency dimension is desirable in order to spread the amide resonances. We show here that proton detected HNCO, HNCA, and HNCACB type experiments can successfully be implemented in the solid-state. Coherences are sufficiently long lived to allow pulse schemes of a duration greater than 70 ms before incrementation of the first indirect dimension. The achieved resolution is comparable to the resolution obtained in solution-state NMR experiments. We demonstrate the experiments using a triply labeled sample of the SH3 domain of chicken α-spectrin, which was re-crystallized in H 2O/D 2O using a ratio of 1/9. We employ paramagnetic relaxation enhancement (PRE) using EDTA chelated Cu II to enable rapid data acquisition.

  7. Multidimensional Strategy for Sensitive Phosphoproteomics Incorporating Protein Prefractionation Combined with SIMAC, HILIC, and TiO(2) Chromatography Applied to Proximal EGF Signaling

    DEFF Research Database (Denmark)

    Engholm-Keller, Kasper; Hansen, Thomas Aarup; Palmisano, Giuseppe; Larsen, Martin R

    2011-01-01

    applied to 400 µg of protein from EGF stimulated HeLa cells. The proteins are separated into membrane and cytoplasmic fractions using sodium carbonate combined with ultracentrifugation. The phosphopeptides were separated into mono-phosphorylated and multi-phosphorylated pools using Sequential elution from...... IMAC (SIMAC) followed by hydrophilic interaction liquid chromatography of the mono- and non-phosphorylated peptides and subsequent titanium dioxide chromatography of the HILIC fractions. This strategy facilitated the identification of >4,700 unique phosphopeptides, while 636 phosphosites were changing...

  8. Sustained reduction of the dengue vector population resulting from an integrated control strategy applied in two Brazilian cities.

    Directory of Open Access Journals (Sweden)

    Lêda N Regis

    Full Text Available Aedes aegypti has developed evolution-driven adaptations for surviving in the domestic human habitat. Several trap models have been designed considering these strategies and tested for monitoring this efficient vector of Dengue. Here, we report a real-scale evaluation of a system for monitoring and controlling mosquito populations based on egg sampling coupled with geographic information systems technology. The SMCP-Aedes, a system based on open technology and open data standards, was set up from March/2008 to October/2011 as a pilot trial in two sites of Pernambuco -Brazil: Ipojuca (10,000 residents and Santa Cruz (83,000, in a joint effort of health authorities and staff, and a network of scientists providing scientific support. A widespread infestation by Aedes was found in both sites in 2008-2009, with 96.8%-100% trap positivity. Egg densities were markedly higher in SCC than in Ipojuca. A 90% decrease in egg density was recorded in SCC after two years of sustained control pressure imposed by suppression of >7,500,000 eggs and >3,200 adults, plus larval control by adding fishes to cisterns. In Ipojuca, 1.1 million mosquito eggs were suppressed and a 77% reduction in egg density was achieved. This study aimed at assessing the applicability of a system using GIS and spatial statistic analysis tools for quantitative assessment of mosquito populations. It also provided useful information on the requirements for reducing well-established mosquito populations. Results from two cities led us to conclude that the success in markedly reducing an Aedes population required the appropriate choice of control measures for sustained mass elimination guided by a user-friendly mosquito surveillance system. The system was able to support interventional decisions and to assess the program's success. Additionally, it created a stimulating environment for health staff and residents, which had a positive impact on their commitment to the dengue control program.

  9. 3D-QSPR Method of Computational Technique Applied on Red Reactive Dyes by Using CoMFA Strategy

    Directory of Open Access Journals (Sweden)

    Shahnaz Perveen

    2011-12-01

    Full Text Available Cellulose fiber is a tremendous natural resource that has broad application in various productions including the textile industry. The dyes, which are commonly used for cellulose printing, are “reactive dyes” because of their high wet fastness and brilliant colors. The interaction of various dyes with the cellulose fiber depends upon the physiochemical properties that are governed by specific features of the dye molecule. The binding pattern of the reactive dye with cellulose fiber is called the ligand-receptor concept. In the current study, the three dimensional quantitative structure property relationship (3D-QSPR technique was applied to understand the red reactive dyes interactions with the cellulose by the Comparative Molecular Field Analysis (CoMFA method. This method was successfully utilized to predict a reliable model. The predicted model gives satisfactory statistical results and in the light of these, it was further analyzed. Additionally, the graphical outcomes (contour maps help us to understand the modification pattern and to correlate the structural changes with respect to the absorptivity. Furthermore, the final selected model has potential to assist in understanding the charachteristics of the external test set. The study could be helpful to design new reactive dyes with better affinity and selectivity for the cellulose fiber.

  10. Multiple Δt strategy for particle image velocimetry (PIV) error correction, applied to a hot propulsive jet

    International Nuclear Information System (INIS)

    PIV (particle image velocimetry) is a measurement technique with growing application to the study of complex flows with relevance to industry. This work is focused on the assessment of some significant PIV measurement errors. In particular, procedures are proposed for estimating, and sometimes correcting, errors coming from the sensor geometry and performance, namely peak-locking and contemporary CCD camera read-out errors. Although the procedures are of general application to PIV, they are applied to a particular real case, giving an example of the methodology steps and the improvement in results that can be obtained. This real case corresponds to an ensemble of hot high-speed coaxial jets, representative of the civil transport aircraft propulsion system using turbofan engines. Errors of ∼0.1 pixels displacements have been assessed. This means 10% of the measured magnitude at many points. These results allow the uncertainty interval associated with the measurement to be provided and, under some circumstances, the correction of some of the bias components of the errors. The detection of conditions where the peak-locking error has a period of 2 pixels instead of the classical 1 pixel has been made possible using these procedures. In addition to the increased worth of the measurement, the uncertainty assessment is of interest for the validation of CFD codes

  11. Crossover versus Mutation: A Comparative Analysis of the Evolutionary Strategy of Genetic Algorithms Applied to Combinatorial Optimization Problems

    Directory of Open Access Journals (Sweden)

    E. Osaba

    2014-01-01

    Full Text Available Since their first formulation, genetic algorithms (GAs have been one of the most widely used techniques to solve combinatorial optimization problems. The basic structure of the GAs is known by the scientific community, and thanks to their easy application and good performance, GAs are the focus of a lot of research works annually. Although throughout history there have been many studies analyzing various concepts of GAs, in the literature there are few studies that analyze objectively the influence of using blind crossover operators for combinatorial optimization problems. For this reason, in this paper a deep study on the influence of using them is conducted. The study is based on a comparison of nine techniques applied to four well-known combinatorial optimization problems. Six of the techniques are GAs with different configurations, and the remaining three are evolutionary algorithms that focus exclusively on the mutation process. Finally, to perform a reliable comparison of these results, a statistical study of them is made, performing the normal distribution z-test.

  12. An up-close look at Urban Regeneration. Cultural approaches and applied strategies for the rebirth of cities

    Directory of Open Access Journals (Sweden)

    Eliana Cangelli

    2015-11-01

    Full Text Available The term Regeneration defines new approaches to the transformation of cities, designed in such a way to move beyond traditional urban-restoration efforts centred around large-scale plans by proposing minimal, non-invasive initiatives that stress listening to the citizenry while bringing to bear creative capabilities and a knowledge of the new-generation technology that has taken on strategic importance when it comes to the development of urban areas. Emphasising an ethical awareness that the city constitutes a shared resource, and that any transformations it undergoes must meet the needs of the public as a whole, endowing the local territory with a strong core structure but a light architecture, is one promising approach to actual renewal efforts. In examining the characteristics of Italian cities, the author focuses on the potential for establishing an environmental balance of the urban metabolism through work on outlying areas, describing the technical and scientific contribution made to date by Technological and Environmental Planning and Design while identifying project design and planning as the path to be taken to arrive at applied assessment and confirmation of the hypothetical approaches explored.

  13. University Promotion-Key Factor of the Use of Marketing Strategies, in the Context of Improving the Romanian Higher Education. Case Study

    OpenAIRE

    Cristina NICOLESCU

    2011-01-01

    The paper at hand is a continuation of the work in progress presented at 9th International Congress of the International Association on Public and Nonprofit Marketing 2010, whose scientific approach is aimed at the use of promotion, as instrument of the marketing mix, triggered by the interest to analyze the ability of Romanian higher education to use the marketing strategies, as strategies of boosting their competitive advantage. The research final conclusions highlight, however, an incipien...

  14. Enterprise IT governance key decision-making based on strategy alignment and analytic hierarchy process%基于战略匹配和层次分析的企业IT治理关键问题决策

    Institute of Scientific and Technical Information of China (English)

    计春阳; 唐志豪

    2012-01-01

    The alignment between business strategy and IT strategy is the bases for good IT governance performance. And enterprises have to do five key decisions for their IT governance. To convert the alignment ideal into quantitative model so as to support enterprise IT governance decision, the Analytic Network Process (ANP) algorithm was introduced , and collaboration between business and IT strategy was simulated. Business strategy management of Porter, and strategy alignment management of Henderson were borrowed to represent business strategy and IT strategy. An IT governance key decision-making model based on the quantitative results of strategic alignment was put forward and validated through computation and analysis of real cases.%企业战略与IT战略之间的匹配是确保IT治理取得良好绩效的重要前提.企业的IT治理必须完成五个关键问题的决策.为有效地将战略对应的思想转化为量化模型,支持企业决策,本文引入网络层次分析法模拟企业战略与IT战略之间的匹配关系,分别借用Porter的战略管理理论和Henderson的战略匹配模型代表企业战略和IT战略,提出了基于战略匹配的企业IT治理五个关键问题决策模型,并通过实例分析与运算验证了该模型的有效性.

  15. Applied mathematics

    CERN Document Server

    Logan, J David

    2013-01-01

    Praise for the Third Edition"Future mathematicians, scientists, and engineers should find the book to be an excellent introductory text for coursework or self-study as well as worth its shelf space for reference." -MAA Reviews Applied Mathematics, Fourth Edition is a thoroughly updated and revised edition on the applications of modeling and analyzing natural, social, and technological processes. The book covers a wide range of key topics in mathematical methods and modeling and highlights the connections between mathematics and the applied and nat

  16. Example of exercise programs in Portugal applied for different kinds of populations and their benefits. How to develop a study to characterize the population, and possible implications for policy strategies

    OpenAIRE

    Raimundo, Armando

    2011-01-01

    Example of exercise programs in Portugal applied for different kinds of populations and their benefits. How to develop a study to characterize the population, and possible implications for policy strategies.

  17. A normalization strategy applied to HiCEP (an AFLP-based expression profiling) analysis: Toward the strict alignment of valid fragments across electrophoretic patterns

    Science.gov (United States)

    Kadota, Koji; Fukumura, Ryutaro; Rodrigue, Joseph J; Araki, Ryoko; Abe, Masumi

    2005-01-01

    Background Gene expression analysis based on comparison of electrophoretic patterns is strongly dependent on the accuracy of DNA fragment sizing. The current normalization strategy based on molecular weight markers has limited accuracy because marker peaks are often masked by intense peaks nearby. Cumulative errors in fragment lengths cause problems in the alignment of same-length fragments across different electropherograms, especially for small fragments (< 100 bp). For accurate comparison of electrophoretic patterns, further inspection and normalization of electrophoretic data after fragment sizing by conventional strategies is needed. Results Here we describe a method for the normalization of a set of time-course electrophoretic data to be compared. The method uses Gaussian curves fitted to the complex peak mixtures in each electropherogram. It searches for target ranges for which patterns are dissimilar to the other patterns (called "dissimilar ranges") and for references (a kind of mean or typical pattern) in the set of resultant approximate patterns. It then constructs the optimal normalized pattern whose correlation coefficient against the reference in the range achieves the highest value among various combinations of candidates. We applied the procedure to time-course electrophoretic data produced by HiCEP, an AFLP-based expression profiling method which can detect a slight expression change in DNA fragments. We obtained dissimilar ranges whose electrophoretic patterns were obviously different from the reference and as expected, most of the fragments in the detected ranges were short (< 100 bp). The normalized electrophoretic patterns also agreed well with reference patterns. Conclusion The normalization strategy presented here demonstrates the importance of pre-processing before electrophoretic signal comparison, and we anticipate its usefulness especially for temporal expression analysis by the electrophoretic method. PMID:15748295

  18. STUDY REGARDING THE IMPORTANCE OF APPLYING THE DIDACTIC STRATEGIES IN LEARNING AND PERFECTING PROCESS OF WOMEN VAULT YURCHENKO - ROUND OFF FLIC FLAC 1 ½ SALTO BACKWARD STRETCHED OFF

    Directory of Open Access Journals (Sweden)

    Gina Gogean

    2009-03-01

    Full Text Available The artistic gymnastic registers significant process at the international level, the contest exigency for the jump test rising to a very high achievement level so as it needs a special training methodology. I broach this study from the point of view of the importance of instructional strategies applied in the learning and perfecting process of the jump through Yurchenko, this providing the quality of the instruction process and the competitive behavior.The instructional strategies aim at solving the operational objectives through a coherent methodological system, well defined, by using efficiently the best combination of the 3M ( methods, materials, means , chosen and adapted to the learning and perfecting process of jumps through Yurchenko, after choosing and obeyingcertain rules, principles and organization methods in order to provide a high level of quality and efficiency in whatconcerns the training process for achieving the proposed objectives and which to allow the junior gymnasts, at thesenior level, the approaching of certain jumps of a higher difficulty.

  19. A normalization strategy applied to HiCEP (an AFLP-based expression profiling analysis: Toward the strict alignment of valid fragments across electrophoretic patterns

    Directory of Open Access Journals (Sweden)

    Araki Ryoko

    2005-03-01

    Full Text Available Abstract Background Gene expression analysis based on comparison of electrophoretic patterns is strongly dependent on the accuracy of DNA fragment sizing. The current normalization strategy based on molecular weight markers has limited accuracy because marker peaks are often masked by intense peaks nearby. Cumulative errors in fragment lengths cause problems in the alignment of same-length fragments across different electropherograms, especially for small fragments ( Results Here we describe a method for the normalization of a set of time-course electrophoretic data to be compared. The method uses Gaussian curves fitted to the complex peak mixtures in each electropherogram. It searches for target ranges for which patterns are dissimilar to the other patterns (called "dissimilar ranges" and for references (a kind of mean or typical pattern in the set of resultant approximate patterns. It then constructs the optimal normalized pattern whose correlation coefficient against the reference in the range achieves the highest value among various combinations of candidates. We applied the procedure to time-course electrophoretic data produced by HiCEP, an AFLP-based expression profiling method which can detect a slight expression change in DNA fragments. We obtained dissimilar ranges whose electrophoretic patterns were obviously different from the reference and as expected, most of the fragments in the detected ranges were short ( Conclusion The normalization strategy presented here demonstrates the importance of pre-processing before electrophoretic signal comparison, and we anticipate its usefulness especially for temporal expression analysis by the electrophoretic method.

  20. System for studies of control strategies applied in the refrigerated chambers Sistema para estudos de estratégias de controle aplicadas em câmaras frias

    Directory of Open Access Journals (Sweden)

    Alexandre Tizzei

    2011-10-01

    Full Text Available The process of cold storage chambers contributes largely to the quality and longevity of stored products. In recent years, it has been intensified the study of control strategies in order to decrease the temperature change inside the storage chamber and to reduce the electric power consumption. This study has developed a system for data acquisition and process control, in LabVIEW language, to be applied in the cooling system of a refrigerating chamber of 30m³. The use of instrumentation and the application developed fostered the development of scientific experiments, which aimed to study the dynamic behavior of the refrigeration system, compare the performance of control strategies and the heat engine, even due to the controlled temperature, or to the electricity consumption. This system tested the strategies for on-off control, PID and fuzzy. Regarding power consumption, the fuzzy controller showed the best result, saving 10% when compared with other tested strategies.O processo de armazenamento refrigerado em câmaras contribui, em grande parte, para a qualidade e a longevidade dos produtos. Nos últimos anos, têm-se intensificado os estudos de estratégias de controle com a finalidade de diminuir a variação da temperatura dentro da câmara de armazenamento e de reduzir o consumo de energia elétrica. Neste trabalho, foi desenvolvido um sistema para aquisição de dados e controle do processo, em linguagem LabVIEW, para ser aplicado no sistema de refrigeração de uma câmara frigorífica de 30m³. A utilização da instrumentação e do aplicativo desenvolvido possibilitou a realização de experimentos científicos, com o objetivo de estudar o comportamento dinâmico do sistema de refrigeração, comparar o desempenho das estratégias de controle da máquina térmica, tanto em função da temperatura controlada, quanto ao consumo de energia elétrica. Neste sistema, foram testadas as estratégias de controle liga-desliga, PID e fuzzy. Em

  1. Global Strategy

    DEFF Research Database (Denmark)

    Li, Peter Ping

    2013-01-01

    Global strategy differs from domestic strategy in terms of content and process as well as context and structure. The content of global strategy can contain five key elements, while the process of global strategy can have six major stages. These are expounded below. Global strategy is influenced by...... rich and complementary local contexts with diverse resource pools and game rules at the national level to form a broad ecosystem at the global level. Further, global strategy dictates the interaction or balance between different entry strategies at the levels of internal and external networks....

  2. Applying process mapping and analysis as a quality improvement strategy to increase the adoption of fruit, vegetable, and water breaks in Australian primary schools.

    Science.gov (United States)

    Biggs, Janice S; Farrell, Louise; Lawrence, Glenda; Johnson, Julie K

    2014-03-01

    Over the past decade, public health policy in Australia has prioritized the prevention and control of obesity and invested in programs that promote healthy eating-related behaviors, which includes increasing fruit and vegetable consumption in children. This article reports on a study that used process mapping and analysis as a quality improvement strategy to improve the delivery of a nutrition primary prevention program delivered in primary schools in New South Wales, Australia. Crunch&Sip® has been delivered since 2008. To date, adoption is low with only 25% of schools implementing the program. We investigated the cause of low adoption and propose actions to increase school participation. We conducted semistructured interviews with key stakeholders and analyzed the process of delivering Crunch&Sip to schools. Interviews and process mapping and analysis identified a number of barriers to schools adopting the program. The analyses identified the need to simplify and streamline the process of delivering the program to schools and introduce monitoring and feedback loops to track ongoing participation. The combination of stakeholder interviews and process mapping and analysis provided important practical solutions to improving program delivery and also contributed to building an understanding of factors that help and hinder program adoption. The insight provided by this analysis helped identify usable routine measures of adoption, which were an improvement over those used in the existing program plan. This study contributed toward improving the quality and efficiency of delivering a health promoting program to work toward achieving healthy eating behaviors in children. PMID:24163325

  3. Applied Stratigraphy

    Science.gov (United States)

    Lucas, Spencer G.

    Stratigraphy is a cornerstone of the Earth sciences. The study of layered rocks, especially their age determination and correlation, which are integral parts of stratigraphy, are key to fields as diverse as geoarchaeology and tectonics. In the Anglophile history of geology, in the early 1800s, the untutored English surveyor William Smith was the first practical stratigrapher, constructing a geological map of England based on his own applied stratigraphy. Smith has, thus, been seen as the first “industrial stratigrapher,” and practical applications of stratigraphy have since been essential to most of the extractive industries from mining to petroleum. Indeed, gasoline is in your automobile because of a tremendous use of applied stratigraphy in oil exploration, especially during the latter half of the twentieth century. Applied stratigraphy, thus, is a subject of broad interest to Earth scientists.

  4. Leadership the Key Ingredient: an Overview of an Exploration Study of the Issues Surrounding Implementation of Culinary Tourism Strategy on the Dingle Peninsula

    OpenAIRE

    Murphy, Mark

    2012-01-01

    This paper presents an overview of the author’s research thesis which was part of a M.Sc. in Culinary Innovation and New Food Product Development in D.I.T. The research paper explored the issues surrounding implementing a culinary tourism strategy on the Dingle Peninsula in County Kerry. The Dingle Peninsula has been selected by Ireland’s national tourism development agency (Fáilte Ireland) as a region with potential to become a leading food destination. The research methods consisted of a wi...

  5. Relationship Between Competitive Strategies and the Success Perception of Polish Born Globals

    Directory of Open Access Journals (Sweden)

    Baranowska-Prokop Ewa

    2014-09-01

    Full Text Available The key objective of this paper is to describe and evaluate the competitive strategies applied by Polish born global enterprises. To reveal these strategies, two competitive models developed by M.E. Porter are applied to an original data set obtained from 256 small and medium Polish enterprises through a survey employing the CATI technique. The outcomes of these strategies, as perceived by the companies applying them, are also evaluated against two hypotheses. We conclude that Polish firms apply both basic strategies of competition, i.e. cost leadership strategies and differentiation strategies and that a substantial majority of companies perceive themselves to have succeeded on the market.

  6. Real Time Strategy Language

    OpenAIRE

    Hayes, Roy; Beling, Peter; Scherer, William

    2014-01-01

    Real Time Strategy (RTS) games provide complex domain to test the latest artificial intelligence (AI) research. In much of the literature, AI systems have been limited to playing one game. Although, this specialization has resulted in stronger AI gaming systems it does not address the key concerns of AI researcher. AI researchers seek the development of AI agents that can autonomously interpret learn, and apply new knowledge. To achieve human level performance, current AI systems rely on game...

  7. Strategy for biotechnological process design applied to the enzymatic hydrolysis of agave fructo-oligosaccharides to obtain fructose-rich syrups.

    Science.gov (United States)

    García-Aguirre, Mauricio; Sáenz-Alvaro, Victor A; Rodríguez-Soto, Mayra A; Vicente-Magueyal, Francisco J; Botello-Alvarez, Enrique; Jimenez-Islas, Hugo; Cárdenas-Manríquez, Marcela; Rico-Martínez, Ramiro; Navarrete-Bolaños, Jose L

    2009-11-11

    A strategy to optimize biotechnological process design is illustrated for the production of fructose-rich syrups via enzymatic hydrolysis of agave fructo-oligosaccharides. The optimization process includes ecological studies from natural fermentations leading to the selection of a strain with capacity for inulinase synthesis, and variable optimization for the synthesis, and enzymatic hydrolysis using the response surface methodology. The results lead to the selection of Kluyveromyces marxianus , endogenous strains isolated from aguamiel (natural fermented sugary sap from agave plants), as the main strain with high capacity for enzyme synthesis with inulinase activity. Production optimization at bioreactor level revealed that operation at 30.6 degrees C, 152 rpm, 1.3 VVM of aeration, and pH 6.3 leads to maximum inulinase synthesis, whereas 31 degrees C, 50 rpm, and pH 6.2 leads to maximum hydrolysis of agave fructo-oligosaccharides. HPLC analysis of the fructose-rich syrups obtained at these optimal conditions showed an average composition of 95% of fructose and 5% of glucose and the absence of sucrose. The analysis also revealed that the syrups are free of residues and toxic compounds, an undesirable occurrence often present when traditional methods based on thermal or acid hydrolysis are applied for their obtainment. Therefore, the product may be suitable for use as additive in many applications in the food and beverage industries. PMID:19827764

  8. Applying algebraic specification and data mutation strategy to test class%应用代数规约和数据变异策略测试类

    Institute of Scientific and Technical Information of China (English)

    余波; 王昆

    2011-01-01

    The method for testing class based on algebraic specification can overcome the difficulties for generating test cases and evaluating test outputs automatically.There is a defect for this method that it would obtain different effects for detecting faults for the same class under testing as the test data are usually generated randomly. This approach is proposed that the new test cases are added by applying data mutation strategy to the original test cases generated from algebraic specification to solve it.The experiments show that this method is feasible for improving the test effects of algebraic testing method.%在应用基于代数规约测试类时,虽然可以有效解决测试数据生成和测试结果判断这两个测试难题,但是,因为该方法常常随机生成测试数据,会导致对于同一待测试类两次测试会得到不同的测试效果.为克服这个缺陷,提出应用数据变异方法,对已生成的测试用例进行变异.变异测试实验表明:该方法能够有效地改善代数测试方法的测试效果.

  9. Study on concept, architecture and key technology of IoT applied in medical industry%面向医疗行业物联网:概念、架构及关键技术研究

    Institute of Scientific and Technical Information of China (English)

    邢丹; 姚俊明

    2014-01-01

    从物联网在医疗行业中的应用现状着手,分析了现有的面向医疗行业物联网的概念,并从狭义和广义角度对其进行剖析。借鉴物联网的现有体系架构,针对面向医疗行业物联网的特点,分析了医疗物联网体系架构设计时应考虑的领域业务范畴和体系架构模型标准,并对面向医疗行业物联网的关键技术进行归纳,分析其在医疗领域应用的场合,最后指出未来智慧医疗的发展方向。%The concept of IoT applied to medical industry is analyzed proceeding from its application status and is dissected in both broad sense and narrow sense. Using the existing architecture of IoT, it is pointed out that the business scope and standard architecture model should be considered in design of the medical IoT architecture according to its characteristics. The key technologies of IoT in medical industry are summarized and its application in the medical ifeld is analyzed. Its development direction of smart medical treatment is pointed out.

  10. 基于大客户营销的工业品营销策略研究%A Study on Industrial Product Marketing Strategies Targeting on Key Accounts

    Institute of Scientific and Technical Information of China (English)

    穆小红

    2012-01-01

    Managing key accounts means managing a company's future. In industrial product industry, key account management greatly influences the market position and future of an industrial product business. By means of marketing strategies, to set up good coordination with key accounts demands marketing ideas focusing on the key accounts and targeted marketing activities, which could help an enterprise obtain the maximum value from the whole value chain and sustained and steady development in a market of fierce competition. The mar- keting strategies may go through four stages: to position, defend, attack and find. In detail, we need to draw a PDAF circle diagram based on a thorough analysis on the key account marketing process to lead a company into a virtuous cycle, so as to promote the core competitive- ness and the market occupation rate.%管理大客户就是管理企业的未来。工业品行业中大客户管理工作的好坏将严重制约着工业品企业的市场地位和未来发展。工业品营销中通过大客户营销战略的实施,与大客户形成良好的协作关系,必须树立以大客户为中心的营销理念,有针对性地开展系列营销活动,从整个价值链条上获取最大价值,从而使企业在竞争激烈的市场环境中获得持续稳定的发展。对大客户的营销策略,可以通过四个阶段来实现,即通过详细划分定位、防守、进攻和寻找阶段,对大客户营销过程展开深入细致的分析,并在此基础上构建PDAF循环图,引导企业进入一个良性循环轨道,提升企业核心竞争力,从而实现较高的市场占有空间。

  11. CREATING AN INTRANET PORTAL FOR THE STRATEGY OF HALTON GROUP

    OpenAIRE

    Vainio, Taina

    2009-01-01

    This applied thesis deals with Halton Group’s new strategy and its communication to the company’s employees. In this study organisational communication and internal marketing are seen as the key elements behind successful implementation of a company strategy, and therefore discussed mainly from the point of view of communicating the strategy. The purpose of this thesis was to facilitate Halton Group’s internal communication of the strategy. Creating an intranet portal that would act as a...

  12. Relationship Between Competitive Strategies and the Success Perception of Polish Born Globals

    OpenAIRE

    Baranowska-Prokop Ewa; Sikora Tomasz

    2014-01-01

    The key objective of this paper is to describe and evaluate the competitive strategies applied by Polish born global enterprises. To reveal these strategies, two competitive models developed by M.E. Porter are applied to an original data set obtained from 256 small and medium Polish enterprises through a survey employing the CATI technique. The outcomes of these strategies, as perceived by the companies applying them, are also evaluated against two hypotheses. We conclude that Polish firms ap...

  13. NATO strategy

    International Nuclear Information System (INIS)

    Nuclear weapons are for NATO both the primary instrument for deterring a nuclear attack and the fall-back option if, in the event of a conventional assault, NATO's non-nuclear defence forces cannot hold. The dilemma of depending upon potentially self-destructive nuclear responses if deterrence fails and defence falters has always haunted NATO strategy, but after the Soviets achieved nuclear parity with the United States, this dilemma became more intensely perceived. Now the credibility, viability, acceptability, sensibility and morality of nuclear weapons for deterrence and defence are increasingly at issue. As a result, an increasing variety of non-nuclear (conventional) alternatives are being advanced to replace or supplement nuclear deterrence for the Alliance. The thrust of the author of this paper remarks is to attempt to apply the definitions, requirements, and other key conceptual distinctions of nuclear deterrence found in the body of western strategic literature to three categories of non-nuclear alternatives currently in vogue: strengthened conventional forces; deployment of new, high-technology non-nuclear weapons; and adoption of an offensive manoeuvre strategy. Let me, therefore, begin by listing the basic definitions, concepts and apparent requirements of deterrence which the deterrence theory literature offers

  14. Bauru School of Dentistry Tele-Health League: an educational strategy applied to research, teaching and extension among applications in tele-health

    Directory of Open Access Journals (Sweden)

    Andressa Sharllene Carneiro da Silva

    2011-12-01

    Full Text Available Tele-health is more than an innovative alternative; it is an excellent tool that enables access to health and education in health, making it possible to minimize distances, optimize time and reduce costs. Based on these advantages, some Brazilian Universities have used these actions in strategies of education, research and extension, aiming at the application of Tele-health in Brazil. In that way, the Bauru School of Dentistry - University of São Paulo (FOB-USP has applied the use of information and communication technologies in health by means of a "Tele-Health League" (TL, in order to diagnose, prevent and treat diseases, in addition to educate the population and health services. Objective: The present study aims to introduce the characteristics of the Tele-Health League of FOB-USP, as well as the development of its projects. Material and Methods: The Tele-Health League consisted as a Diffusion Course approved by the Provost of Culture and Academic Extension of the University of São Paulo. It is composed as a large group enclosing professoriate coordinator, academician principal, contributing professors and league members, those, diversified between undergraduates students, graduated, health employees, technology and information areas. The participant members are evaluated by the presence frequency (minimum of 85%, and by the performance of tests and paperwork about the theoretical content provided. Results: In four years of activities, the TLFOB-USP obtained a high satisfaction index (90%, an increased number of vacancies due to the interest to become a member, more commitment of the professors of the University and the accomplishment of association with other Brazilian leagues. It is emphasized that the approval percentage of the course results in approval from approximately half of its members. Also, it is important to identify and repair the causes related to the quitting of some members. Conclusions: The results showed that the TLFOB

  15. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  16. Communitywide strategies key to preventing childhood obesity

    OpenAIRE

    Crawford, Patricia B B; Schneider, Constance; Anna C Martin; Spezzano, Theresa; Algert, Susan; Ganthavorn, Chutima; Nicholson, Yvonne; Neelon, Marisa; Wooten Swanson, Patti C; Donohue, Susan S.

    2013-01-01

    Approximately 25 million children in the United States are obese or at risk of becoming obese, with anticipated negative consequences for individual health as well as the nation's future health-care costs. Effective interventions to prevent obesity require more than educating individuals. To bring about change, we must deploy tactics at multiple levels, from community facilities like parks and bike paths to foods offered in schools. The Spectrum of Prevention proposed in 1999 by L. Coh...

  17. Comparative Advantages and Limitations of Qualitative Strategy of Comparison as Applied to Russian Cases of Perestroika Period’s Representation in History Textbooks

    OpenAIRE

    Alexander Ivanovich Gorylev; Natalia Damirovna Tregubova; Sergiy Vladimirovich Kurbatov

    2014-01-01

    The paper is devoted to the analyses of the results of the comparative research of perestroika periodrepresentations in Russian textbooks on history. Research design and research results are discussed in aframework of distinction between qualitative and quantitative strategies of comparison. The basic features ofqualitative strategy, its strong and weak points are outlined based on the materials of the research. Threediscourses of representation of perestroika period in Russian textbooks are ...

  18. Device-independent quantum key distribution

    CERN Document Server

    Hänggi, Esther

    2010-01-01

    In this thesis, we study two approaches to achieve device-independent quantum key distribution: in the first approach, the adversary can distribute any system to the honest parties that cannot be used to communicate between the three of them, i.e., it must be non-signalling. In the second approach, we limit the adversary to strategies which can be implemented using quantum physics. For both approaches, we show how device-independent quantum key distribution can be achieved when imposing an additional condition. In the non-signalling case this additional requirement is that communication is impossible between all pairwise subsystems of the honest parties, while, in the quantum case, we demand that measurements on different subsystems must commute. We give a generic security proof for device-independent quantum key distribution in these cases and apply it to an existing quantum key distribution protocol, thus proving its security even in this setting. We also show that, without any additional such restriction t...

  19. Applied Behavior Analysis

    Science.gov (United States)

    Szapacs, Cindy

    2006-01-01

    Teaching strategies that work for typically developing children often do not work for those diagnosed with an autism spectrum disorder. However, teaching strategies that work for children with autism do work for typically developing children. In this article, the author explains how the principles and concepts of Applied Behavior Analysis can be…

  20. Key factors of Increasing the Economic Value of the Clothing Industry Enterprises

    OpenAIRE

    Sławomir Juszczyk; Michał Tymiński

    2013-01-01

    The aim of this paper is to identify the key factors which are affecting the economic value of clothing companies. The study determines the relationship between the applied strategy of financing assets and financial situation of enterprises. Used in the participation rate of net working capital to total assets, also includes ROA, ROE, liquidity and equity multiplier. Assessment was measured using the Value at Risk. In the researched process the following key explanatory variables were selecte...

  1. Security of quantum key distribution using two-mode squeezed states against optimal beam splitter attack

    International Nuclear Information System (INIS)

    For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack

  2. A critical assessment of hidden markov model sub-optimal sampling strategies applied to the generation of peptide 3D models.

    Science.gov (United States)

    Lamiable, A; Thevenet, P; Tufféry, P

    2016-08-01

    Hidden Markov Model derived structural alphabets are a probabilistic framework in which the complete conformational space of a peptidic chain is described in terms of probability distributions that can be sampled to identify conformations of largest probabilities. Here, we assess how three strategies to sample sub-optimal conformations-Viterbi k-best, forward backtrack and a taboo sampling approach-can lead to the efficient generation of peptide conformations. We show that the diversity of sampling is essential to compensate biases introduced in the estimates of the probabilities, and we find that only the forward backtrack and a taboo sampling strategies can efficiently generate native or near-native models. Finally, we also find such approaches are as efficient as former protocols, while being one order of magnitude faster, opening the door to the large scale de novo modeling of peptides and mini-proteins. © 2016 Wiley Periodicals, Inc. PMID:27317417

  3. Applying self-regulated strategy development model of instruction to teach writing skill: Effects on writing performance and writing motivation of EFL learners

    Directory of Open Access Journals (Sweden)

    Mansoor Fahim

    2015-01-01

    Full Text Available The present study examined the effect of self-regulated strategy development (SRSD, an instructional model to teach writing, on writing performance and writing motivation of EFL learners. To this end, 30 pre-intermediate EFL writers received a ten-session self-regulatory strategy development instruction on persuasive writing with specific focus on planning, goal-setting, monitoring, and evaluating. Several instruments including persuasive probes together with a validated Writing Motivation Questionnaire were utilized to collect data. The comparison of pretest and posttest scores on different measures revealed that SRSD instructional model resulted in improved writing performance of EFL learners. Moreover, the results of data analysis indicated an increase in the motivation of participants as regards foreign language writing.

  4. Comparative Analysis of Strategies Applied in Persian and English Translations of Quranic-Arabic Culture Bound Term “Jilbab” (33:59

    Directory of Open Access Journals (Sweden)

    Fatemeh Zahra Nazari Robati

    2016-03-01

    Full Text Available Today TS focus has altered from linguistics to cultural studies. Culture is the way of life; as such every text is culture-bound and includes items that are culture-specific. Translating these cultural-specific items (henceforth CSI has made translation a complicated task. Hijab, one of the controversial issues of the present day of Islam in the world is defined in one way through presenting terms for women clothing such as “Jilbab” in Quran. Using Davies' (2003 strategies of translating CSIs, as the theoretical framework, taking the Quranic-Arabic culture bound term “Jilbab” (33:59 as the object of the study, this corpus-based comparative descriptive research was an attempt to compare totally 64 Persian and English (54 in Persian and 12 in English translations of this term with two concerns regarding the adopted translation strategies: a linguistic (Persian and English concern, and b translators' gender concern (male and female. The analysis of data showed that the most adopted strategy in both Persian and English corpus was localization (in Persian 35.71%, and in English 46.66%. Male translators in Persian had more tendency to use localization (36.53% and female translators to addition and globalization (each 50%. Male translators in English were more inclined to localization (45.83%, and the female have used preservation, addition, globalization and localization with the same frequency (25%. Totally male translators were inclined to localization (39.47%, while the female to globalization and addition (33.33%.Keywords: CSI, Translation strategies, Comparative analysis, Quran, “Jilbab”

  5. 调适性销售战略的影响因素及其成功关键%INFLUENCING FACTORS AND KEYS TO SUCCESS FOR THE ADAPTIVE MARKETING STRATEGY

    Institute of Scientific and Technical Information of China (English)

    郭国庆; 李屹松; 汪晓凡

    2009-01-01

    As an innovation of marketing strategy, adaptive selling plays a significant role in improving enterprise performance. The motivation and ability of sales personnel as well as constrains in the environment are the key factors for successful implementation of adaptive selling. Therefore, from a strategic perspective, it is necessary for enterprises to foster information utilization ability of sales personnel and train them to improve their marketing knowledge.%调适性销售作为创新的营销战略,对提升企业绩效意义重大.销售人员的动机、能力和环境制约对调适性销售战略的成功实施具有明显的影响.从战略高度看待调适性销售,着力提高销售人员的信息利用能力,强化销售人员的知识技能培训,是成功调适性销售战略的

  6. Applying Novel Genome-Wide Linkage Strategies to Search for Loci Influencing Type 2 Diabetes and Adult Height in American Samoa

    OpenAIRE

    Åberg, Karolina; Sun, Guangyun; Smelser, Diane; Indugula, Subba Rao; Tsai, Hui-Ju; Steele, Matthew S.; TUITELE, JOHN; Deka, Ranjan; McGarvey, Stephen T.; Weeks, Daniel E.

    2008-01-01

    Type 2 diabetes mellitus (T2DM) is a common complex phenotype that by the year 2010 is predicted to affect 221 million people globally. In the present study we performed a genome-wide linkage scan using the allele-sharing statistic Sall implemented in Allegro and a novel two-dimensional genome-wide strategy implemented in Merloc that searches for pairwise interaction between genetic markers located on different chromosomes linked to T2DM. In addition, we used a robust score statistic from the...

  7. A non-target chemometric strategy applied to UPLC-MS sphingolipid analysis of a cell line exposed to chlorpyrifos pesticide: a feasibility study

    OpenAIRE

    Kássio M. G. Lima; Bedia, Carmen; Tauler, Romá

    2014-01-01

    A non-target chemometrics study based on the application of Multivariate Curve Resolution Alternating Least Squares (MCR-ALS) method to a data set obtained by ultra-performance liquid chromatographic coupled to mass spectrometry (UPLC-MS) has been applied to the study of human prostate cancer (DU145) cell line samples treated with the organophosphate pesticide chlorpyrifos (CPF). Full scan UPLC-MS data sets were segmented in 17 different chromatographic windows and submitted to a non-target d...

  8. In vitro-in vivo correlation strategy applied to an immediate-release solid oral dosage form with a biopharmaceutical classification system IV compound case study.

    Science.gov (United States)

    Bredael, Gerard M; Bowers, Niya; Boulineau, Fabien; Hahn, David

    2014-07-01

    The ability to predict in vivo response of an oral dosage form based on an in vitro technique has been a sought after goal of the pharmaceutical scientist. Dissolution testing that demonstrates discrimination to various critical formulations or process attributes provides a sensitive quality check that may be representative or may be overpredictive of potential in vivo changes. Dissolution methodology with an established in vitro-in vivo relationship or correlation may provide the desired in vivo predictability. To establish this in vitro-in vivo link, a clinical study must be performed. In this article, recommendations are given in the selection of batches for the clinical study followed by potential outcome scenarios. The investigation of a Level C in vitro-in vivo correlation (IVIVC), which is the most common correlation for immediate-release oral dosage forms, is presented. Lastly, an IVIVC case study involving a biopharmaceutical classification system class IV compound is presented encompassing this strategy and techniques. PMID:24890761

  9. [An experience applying the teaching strategies of cooperative learning and creative thinking in a mental-health nursing practicum for undergraduates at a technical college].

    Science.gov (United States)

    Huang, Yu-Hsien; Lin, Mei-Feng; Ho, Hsueh-Jen; Chang, Lu-Na; Chen, Shiue

    2015-04-01

    Lack of knowledge and experience is prevalent in undergraduate students who are taking their clinical practicum for mental-health nursing. This issue negatively affects the learning process. This article shares an experience of implementing a practicum-teaching program. This program was developed by the authors to facilitate the cooperative learning and clinical care competence of students. A series of multidimensional teaching activities was designed by integrating the strategies of peer cooperation and creative thinking to promote group and individual learning. Results indicate that the program successfully encouraged the students to participate more actively in the learning process. Additionally, the students demonstrated increased competence in empathetic caring toward patients, stronger friendship relationships with peers, and improved self-growth. The authors hope this teaching program provides a framework to increase the benefits for students of participating in clinical practicums and provides a teaching reference for clinical instructors. PMID:25854950

  10. Conceptuals Mentefactos as a Didactic-Pedagogical Strategy of the Basic Concepts in the Sampling Theory Applyed to the Health Research

    Directory of Open Access Journals (Sweden)

    Milcíades Ibáñez Pinilla

    2006-10-01

    Full Text Available In populational sampling it is vitally importantto clarify and discern: first, the design orsampling method used to solve the researchproblem; second, the sampling size, taking intoaccount different components (precision, relia-Recibido: Marzo 22 de 2006.Aceptado: Abril 18 de 2006.*Docente Investigador, Investigación Universidad delRosario.bility, variance; third, random selection andfourth, the precision estimate (sampling errors,so as to determine if it is possible to infer theobtained estimates from the target population.The existing difficulty to use concepts fromthe sampling theory is to understand them withabsolute clarity and, to achieve it, the help fromdidactic-pedagogical strategies arranged as conceptual“mentefactos” (simple hierarchic diagramsorganized from propositions may proveuseful. This paper presents the conceptual definition,through conceptual “mentefactos”, of themost important populational probabilistic samplingconcepts, in order to obtain representativesamples from populations in health research.

  11. What Is Green Growth Strategy for Government Link Company?

    Science.gov (United States)

    Jamilah Asha’ari, Maryam; Daud, Salina; Hassan, Hasmaizan

    2016-03-01

    Disasters around the world are very extreme because of the global warming and climate change. Malaysia firms have to play their role in handling the challenging of environmental problems in order to sustain. The feature of the new strategy which is green growth strategy has been identified. The study focuses on the features of the green growth strategy which discuss on the keys to sustaining the strategy, marketing emphasis, production emphasis, product line, basis of competitive advantage and strategic target. Business had contributed to the industrialisation era positively or negatively and therefore there is a must for business people to use the best strategy in reducing the environmental risks. By 2020, Malaysia will achieve the target in becoming an advanced economy by applying the right strategy. The objective of this paper is to propose a feature for new strategy known as green growth strategy. Future study is to propose to conduct an empirical analysis to confirm the green growth strategy features.

  12. Key Based Random Permutation (KBRP)

    OpenAIRE

    Shakir M. Hussain; Naim M. Ajlouni

    2006-01-01

    This study introduces a method for generating a particular permutation P of a given size N out of N! permutations from a given key. This method computes a unique permutation for a specific size since it takes the same key; therefore, the same permutation can be computed each time the same key and size are applied. The name of random permutation comes from the fact that the probability of getting this permutation is 1 out of N! possible permutations. Beside that, the permutation can not be gue...

  13. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  14. Multi-matrix, dual polarity, tandem mass spectrometry imaging strategy applied to a germinated maize seed: toward mass spectrometry imaging of an untargeted metabolome.

    Science.gov (United States)

    Feenstra, Adam D; Hansen, Rebecca L; Lee, Young Jin

    2015-11-01

    Mass spectrometry imaging (MSI) provides high spatial resolution information that is unprecedented in traditional metabolomics analyses; however, the molecular coverage is often limited to a handful of compounds and is insufficient to understand overall metabolomic changes of a biological system. Here, we propose an MSI methodology to increase the diversity of chemical compounds that can be imaged and identified, in order to eventually perform untargeted metabolomic analysis using MSI. In this approach, we use the desorption/ionization bias of various matrixes for different metabolite classes along with dual polarities and a tandem MSI strategy. The use of multiple matrixes and dual polarities allows us to visualize various classes of compounds, while data-dependent MS/MS spectra acquired in the same MSI scans allow us to identify the compounds directly on the tissue. In a proof of concept application to a germinated corn seed, a total of 166 unique ions were determined to have high-quality MS/MS spectra, without counting structural isomers, of which 52 were identified as unique compounds. According to an estimation based on precursor MSI datasets, we expect over five hundred metabolites could be potentially identified and visualized once all experimental conditions are optimized and an MS/MS library is available. Lastly, metabolites involved in the glycolysis pathway and tricarboxylic acid cycle were imaged to demonstrate the potential of this technology to better understand metabolic biology. PMID:26339687

  15. Key Issues in Business English Curriculum Design

    Institute of Scientific and Technical Information of China (English)

    计越波

    2009-01-01

    This article aims to explore the key factors involved in business English curriculum design and the ways of analyzing the needs of teachers and students,course design as well as the teaching strategies.

  16. Precision agriculture for sugarcane management: a strategy applied for brazilian conditions doi: 10.4025/actasciagron.v36i1.17664

    Directory of Open Access Journals (Sweden)

    José Alexandre Melo Demattê

    2014-01-01

    Full Text Available The region of Areiópolis in São Paulo State is one of the major sugarcane producers in the world, and chemical management is the basis of the system making its production viable. Thus, the proposed methods for precision agriculture can be evaluated as an alternative for environment protection and can aid the search for greater productivity at the same time. The main objective of the present work was to compare the precision agriculture (PA and traditional agriculture (TA management systems and to highlight their distinctions, such as differences in grid sampling, production variation, plant failure and costs. Two experiments were set up, and the soil fertilizers were applied by corrective application methods to 16-ha lots using the average general fertility rate (GFR. The PA method had the highest productivity volume for conversion of green matter to sugar in the 4.0-ha plots. As the size of the PA plots decreased, the costs of soil analyses increased with potassium and lime analyses being the most expensive. The PA plots had more suitable grid sampling in terms of productivity, and the cost/benefit ratio was 4.0-ha. In general, the final cost was higher in the PA system compared to the TA system. The present results provide information to help select the better system between these techniques to manage tropical soils.

  17. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  18. Human Resources Key Performance Indicators

    OpenAIRE

    Gabčanová Iveta

    2012-01-01

    The article brings out a proposed strategy map and respective key performance indicators (KPIs) in human resources (HR). The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  19. Continuous Activity with Immediate Feedback: A Good Strategy to Guarantee Student Engagement with the Course

    Science.gov (United States)

    Sancho-Vinuesa, Teresa; Escudero-Viladoms, Nuria; Masia, Ramon

    2013-01-01

    This paper describes the experience of applying a new teaching strategy to a basic mathematics course at the Open University of Catalonia. This strategy requires students to engage with practice and assessment tests with automatic feedback. The main aim of this research is to look into the extent to which the key elements of this teaching strategy…

  20. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  1. Mixed Strategy May Outperform Pure Strategy: An Initial Study

    OpenAIRE

    He, Jun; Hou, Wei; Dong, Hongbin; He, Feidun

    2013-01-01

    In pure strategy meta-heuristics, only one search strategy is applied for all time. In mixed strategy meta-heuristics, each time one search strategy is chosen from a strategy pool with a probability and then is applied. An example is classical genetic algorithms, where either a mutation or crossover operator is chosen with a probability each time. The aim of this paper is to compare the performance between mixed strategy and pure strategy meta-heuristic algorithms. First an experimental study...

  2. Applying Mathematical Processes (AMP)

    Science.gov (United States)

    Kathotia, Vinay

    2011-01-01

    This article provides insights into the "Applying Mathematical Processes" resources, developed by the Nuffield Foundation. It features Nuffield AMP activities--and related ones from Bowland Maths--that were designed to support the teaching and assessment of key processes in mathematics--representing a situation mathematically, analysing,…

  3. Applied Electromagnetics

    International Nuclear Information System (INIS)

    These proceedings contain papers relating to the 3rd Japanese-Bulgarian-Macedonian Joint Seminar on Applied Electromagnetics. Included are the following groups: Numerical Methods I; Electrical and Mechanical System Analysis and Simulations; Inverse Problems and Optimizations; Software Methodology; Numerical Methods II; Applied Electromagnetics

  4. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  5. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  6. Key Account Management Practices in Home Appliance Industry of Pakistan

    OpenAIRE

    Razzaq, Abdul

    2007-01-01

    Abstract Key account management (KAM) is considered as an important marketing trend since last few years. The purpose of this thesis orients to the discussion about key account management practices from selling company’s perspectives in home appliance market of Pakistan. The study is carried through with four steps: elements of key accounts management, identification and analysis of key accounts, strategies for key accounts, and operational level capabilities used in key account management fo...

  7. An Investigation Into College English Vocabulary Learning Strategies

    Institute of Scientific and Technical Information of China (English)

    马慧

    2008-01-01

    This article focuses on the investigation into college English vocabulary learning strategies.The non-English major students should be instructed and encouraged by the teachers to apply various kinds of VLS that can facilitate their learning achievement because the versatile strategy use is not only a way to meet the increasing demand for vocabulary learning,but also a key to success in the learning of the English language.

  8. Biometry, the safe key

    OpenAIRE

    María Fraile-Hurtado; Miguel Herrero-Langreo; Pilar Menéndez-Miguel; Valerio Delgado-Villanueva

    2010-01-01

    Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  9. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  10. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  11. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  12. Applied Technology: Targets for Learning. Preparing Successful Problem Solvers in the Workplace.

    Science.gov (United States)

    Ohio State Univ., Columbus. Vocational Instructional Materials Lab.

    This curriculum guide provides resources that teachers and trainers can use to help learners improve their ability to apply technology problem-solving skills in the workplace. The instructional strategies and practice problems in the guide are patterned after those of the American College Testing (ACT) Work Keys System. Gains in skill levels can…

  13. Megabits secure key rate quantum key distribution

    International Nuclear Information System (INIS)

    Quantum cryptography can provide unconditional secure communication between two authorized parties based on the basic principles of quantum mechanics. However, imperfect practical conditions limit its transmission distance and communication speed. Here, we implemented the differential phase shift (DPS) quantum key distribution (QKD) with an up-conversion-assisted hybrid photon detector (HPD) and achieved a 1.3 Mbits per second secure key rate over a 10 km fiber, which is tolerant against photon number splitting (PNS) attack, general collective attacks on individual photons and any other known sequential unambiguous state discrimination (USD) attacks.

  14. PEM public key certificate cache server

    Science.gov (United States)

    Cheung, T.

    1993-12-01

    Privacy Enhanced Mail (PEM) provides privacy enhancement services to users of Internet electronic mail. Confidentiality, authentication, message integrity, and non-repudiation of origin are provided by applying cryptographic measures to messages transferred between end systems by the Message Transfer System. PEM supports both symmetric and asymmetric key distribution. However, the prevalent implementation uses a public key certificate-based strategy, modeled after the X.509 directory authentication framework. This scheme provides an infrastructure compatible with X.509. According to RFC 1422, public key certificates can be stored in directory servers, transmitted via non-secure message exchanges, or distributed via other means. Directory services provide a specialized distributed database for OSI applications. The directory contains information about objects and then provides structured mechanisms for accessing that information. Since directory services are not widely available now, a good approach is to manage certificates in a centralized certificate server. This document describes the detailed design of a centralized certificate cache serve. This server manages a cache of certificates and a cache of Certificate Revocation Lists (CRL's) for PEM applications. PEMapplications contact the server to obtain/store certificates and CRL's. The server software is programmed in C and ELROS. To use this server, ISODE has to be configured and installed properly. The ISODE library 'libisode.a' has to be linked together with this library because ELROS uses the transport layer functions provided by 'libisode.a.' The X.500 DAP library that is included with the ELROS distribution has to be linked in also, since the server uses the DAP library functions to communicate with directory servers.

  15. Applied superconductivity

    CERN Document Server

    Newhouse, Vernon L

    1975-01-01

    Applied Superconductivity, Volume II, is part of a two-volume series on applied superconductivity. The first volume dealt with electronic applications and radiation detection, and contains a chapter on liquid helium refrigeration. The present volume discusses magnets, electromechanical applications, accelerators, and microwave and rf devices. The book opens with a chapter on high-field superconducting magnets, covering applications and magnet design. Subsequent chapters discuss superconductive machinery such as superconductive bearings and motors; rf superconducting devices; and future prospec

  16. The Key Lake project

    International Nuclear Information System (INIS)

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  17. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  18. The NIHR collaboration for leadership in applied health research and care (CLAHRC for greater manchester: combining empirical, theoretical and experiential evidence to design and evaluate a large-scale implementation strategy

    Directory of Open Access Journals (Sweden)

    Bamford David

    2011-08-01

    Full Text Available Abstract Background In response to policy recommendations, nine National Institute for Health Research (NIHR Collaborations for Leadership in Applied Health Research and Care (CLAHRCs were established in England in 2008, aiming to create closer working between the health service and higher education and narrow the gap between research and its implementation in practice. The Greater Manchester (GM CLAHRC is a partnership between the University of Manchester and twenty National Health Service (NHS trusts, with a five-year mission to improve healthcare and reduce health inequalities for people with cardiovascular conditions. This paper outlines the GM CLAHRC approach to designing and evaluating a large-scale, evidence- and theory-informed, context-sensitive implementation programme. Discussion The paper makes a case for embedding evaluation within the design of the implementation strategy. Empirical, theoretical, and experiential evidence relating to implementation science and methods has been synthesised to formulate eight core principles of the GM CLAHRC implementation strategy, recognising the multi-faceted nature of evidence, the complexity of the implementation process, and the corresponding need to apply approaches that are situationally relevant, responsive, flexible, and collaborative. In turn, these core principles inform the selection of four interrelated building blocks upon which the GM CLAHRC approach to implementation is founded. These determine the organizational processes, structures, and roles utilised by specific GM CLAHRC implementation projects, as well as the approach to researching implementation, and comprise: the Promoting Action on Research Implementation in Health Services (PARIHS framework; a modified version of the Model for Improvement; multiprofessional teams with designated roles to lead, facilitate, and support the implementation process; and embedded evaluation and learning. Summary Designing and evaluating a large

  19. Cluster Policies in Energy Efficiency Management in Regional Innovative Strategy of Sustainable Development

    OpenAIRE

    Volkov, Alexander N.

    2012-01-01

    The article introduces modern approaches to catalyze energy efficiency efforts in Russia and Krasnodar region in particular – clean energy cluster concept and low-emission and climate-resilient development strategies (green LECRDS). The potential of Krasnodar region for developing clean energy and low-carbon sustainable development strategies were analyzed briefly. The key role of academic and research facilities in developing and applying of such innovative strategies was highlighted. Basic ...

  20. Communication Strategy of Market Entry in Eastern Europe in the Area of International Tolling

    OpenAIRE

    Záklasníková, Alena

    2008-01-01

    This thesis concerns development of a communication strategy in Eastern Europe, particularly Bulgaria, as a model country, in the area of international tolling, more precisely road user charging system offered by Satellic. In this strategy the promotion mix tools such as advertising, personal selling, PR, public affairs, events and conferences are applied. A concrete target group, the key message, the goal, the message strategy and the budget are created in each of the above noted promotion m...

  1. INNOVATION STRATEGIES AS A TOOL TO GAIN COMPETITIVE ADVANTAGE: A RESEARCH ON THE HOTELS IN KOCAELI

    OpenAIRE

    COŞKUN, Seval; MESCİ, Muammer; KILINÇ, İzzet

    2013-01-01

    The main objective of the research is to determine whether innovation strategies implemented by hotels are effective in providing strategic competitive advantage. It also aims to reveal if innovation strategies have a key role during the process innovation strategies are applied by hotels. The qualitative research method is used in the research. The research population is the Three, four and five star hotels with tourism establishment certificates, located in Kocaeli. Interview technique was ...

  2. Empirical Studies on Legitimation Strategies: A Case for International Business Research Extension

    DEFF Research Database (Denmark)

    Turcan, Romeo V.; Marinova, Svetla Trifonova; Rana, Mohammad Bakhtiar

    2012-01-01

    The paper focuses on legitimation and legitimation strategies applied by companies. Following the process of systematic review, we analyze empirical studies exploring legitimation and legitimation strategies from different theoretical perspectives. Using the key findings by reconnoitering and com...... comparing the theoretical background, approaches, methodologies, and findings of these empirical studies, we outline potential directions for research in the legitimation strategies of firms engaged in international business operations....

  3. 企业识别系统在科技期刊发展中的作用与应用策略分析%Contribution and applied strategies of corporate identity system in development of sci-tech journals

    Institute of Scientific and Technical Information of China (English)

    周志新

    2011-01-01

    With the continuous intensive competition of journal publishing market and gradual deepening of publication reform, introducing and applying the corporate identity system ( CIS ) has become the inexorable tendency in the administration and development of modern sci-tech journals. This paper briefly discusses the contribution of CIS in the development of modern sci- tech journals, such as improving the competitive strength and corporate image, increasing the cohesiveness. At the same time, the applied strategies of CIS are also analyzed through the mind identity, behavior identity and visual identity.%简要论述企业识别系统(CIS)在科技期刊发展中的作用,如有利于提升竞争力和形象、增强凝聚力等,同时从理念识别、行为识别和视觉识别3个方面分析CIS在科技期刊中的应用策略。

  4. Intelligent card access keys

    International Nuclear Information System (INIS)

    A newly developed access control technology allows information about users to be stored on key-like EEPROM devices. The keys store encrypted information about the user and his or her authorized access activity. Specially developed key readers scan, decrypt, and process the key data, and make the decision whether entry should be granted or denied. The key readers can function as complete, stand-alone facility management systems, incorporating access control, security monitoring, and remote control. In this configuration, the key readers provide anti-passback protection and other special features without requiring any data lines between readers. The key readers also feature sophisticated algorithmic processing for performing complex operations such as two-man control or cross zoned security annunciation. Key readers can also be interconnected with an MCM-1000 Multiples Monitoring System to form a distributed processing local area network. In such a configuration, changes in key reader status can be uploaded to the MCM-1000, and programming changes and operator commands can be downloaded to the key readers

  5. Raising Standards in English Teaching at Key Stage 2--Teachers' Perceptions of the English National Curriculum (1990-1995) and the Relevance of This to the National Literacy Strategy (1998).

    Science.gov (United States)

    Williams, Mary

    1999-01-01

    Explores impact of the English National Curriculum on work of teachers at Key Stage 2, focusing on how English should be taught and what constitutes primary English subject knowledge. Notes issues that emerged related to each of four language modes of English and the role of metacognition in learning English. Reviews findings in light of National…

  6. Applied mineralogy

    Energy Technology Data Exchange (ETDEWEB)

    Park, W.C.; Hausen, D.M.; Hagni, R.D. (eds.)

    1985-01-01

    A conference on applied mineralogy was held and figures were presented under the following headings: methodology (including image analysis); ore genesis; exploration; beneficiations (including precious metals); process mineralogy - low and high temperatures; and medical science applications. Two papers have been abstracted separately.

  7. Key point selection and clustering of swimmer coordination through Sparse Fisher-EM

    CERN Document Server

    Komar, John; Seifert, Ludovic

    2014-01-01

    To answer the existence of optimal swimmer learning/teaching strategies, this work introduces a two-level clustering in order to analyze temporal dynamics of motor learning in breaststroke swimming. Each level have been performed through Sparse Fisher-EM, a unsupervised framework which can be applied efficiently on large and correlated datasets. The induced sparsity selects key points of the coordination phase without any prior knowledge.

  8. Talent Management: Working lines and key processes

    Directory of Open Access Journals (Sweden)

    Alvaro Alonso

    2014-12-01

    Full Text Available Purpose: Talent management represents today a challenge for companies, since the contribution of value comes increasingly from the area of intangible capital. The current paradigm of expanding technology and competitive dynamics, makes talent management that companies realize a critical success factor in today's markets. However, there is no generally accepted theoretical framework and empirical studies sufficient to demonstrate the role of talent management in creating competitive advantage. Therefore, the first objective of this paper is to analyze the evolution of talent management, to understand more deeply their fundamental dimensions: people and key positions in the organization. From these dimensions, as a second objective of the research is proposed to classify and characterize the literature about four alternative ways of study, according to the treatment they receive such dimensions and thus improve understanding of the role of talent management in business strategyDesign/methodology: To develop this paper we have selected the major contributions to the field of talent management, with particular emphasis on certain meta-analysis very quoted by the scientific community (Lewis and Heckman, 2006; Mellahi and Collings, 2009; Tarique and Schuler, 2010. In addition we have select additional papers published in high impact journals seen in ABI/Inform, Science Direct, SCOPUS, and EBSCO (Business Source Complete, through the keywords "Gestion del talento", "Plan de Gestion del Talento" and "Modelo de Gestion de Talento" and its English equivalent "Talent Management ", "Talent Management Plans/Systems" and "Talent Management Framework/Model ".Findings: From this review, we extracted the existence of different ways of understanding and talent management apply in organizations and even different understandings of what is talent itself. For this, we describe the basic dimensions of talent management (people and key positions and four alternative

  9. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  10. The Homomorphic Key Agreement

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a process of computing a shared secret contributed by two or more entities such that no single node can predetermine the resulting value. An authenticated key agreement is attained by combining the key agreement protocol with digital signatures. After a brief introduction to existing key agreement in group communication, Making use of the additive-multiplicative homomorphism in the integer ring defined by Sander and Tschudin: A new protocols, called the homomorphism key agreement, was designed, which can be self-contributory, robust, scalable and applicable in group communication.

  11. Mega Key Authentication Mechanism

    OpenAIRE

    Kloss, Guy

    2016-01-01

    For secure communication it is not just sufficient to use strong cryptography with good and strong keys, but to actually have the assurance, that the keys in use for it are authentic and from the contact one is expecting to communicate with. Without that, it is possible to be subject to impersonation or man-in-the-middle (MitM) attacks. Mega meets this problem by providing a hierarchical authentication mechanism for contacts and their keys. To avoid any hassle when using multiple types of key...

  12. Applied dynamics

    CERN Document Server

    Schiehlen, Werner

    2014-01-01

    Applied Dynamics is an important branch of engineering mechanics widely applied to mechanical and automotive engineering, aerospace and biomechanics as well as control engineering and mechatronics. The computational methods presented are based on common fundamentals. For this purpose analytical mechanics turns out to be very useful where D’Alembert’s principle in the Lagrangian formulation proves to be most efficient. The method of multibody systems, finite element systems and continuous systems are treated consistently. Thus, students get a much better understanding of dynamical phenomena, and engineers in design and development departments using computer codes may check the results more easily by choosing models of different complexity for vibration and stress analysis.

  13. Applied optics

    International Nuclear Information System (INIS)

    The 1988 progress report, of the Applied Optics laboratory, of the (Polytechnic School, France), is presented. The optical fiber activities are focused on the development of an optical gyrometer, containing a resonance cavity. The following domains are included, in the research program: the infrared laser physics, the laser sources, the semiconductor physics, the multiple-photon ionization and the nonlinear optics. Investigations on the biomedical, the biological and biophysical domains are carried out. The published papers and the congress communications are listed

  14. Essays on Applied Microeconomics

    OpenAIRE

    Lee, Hoan Soo

    2013-01-01

    Empirical and theoretical topics in applied microeconomics are discussed in this dissertation. The first essay identifies and measures managerial advantages from access to high-quality deals in venture capital investments. The underlying social network of Harvard Business School MBA venture capitalists and entrepreneurs is used to proxy availability of deal access. Random section assignment of HBS MBA graduates provides a key exogenous variation for identification. Being socially connected to...

  15. Creating a Vision for the Future: Key Competencies and Strategies for Culturally Competent Practice With Lesbian, Gay, Bisexual, and Transgender (LGBT) Older Adults in the Health and Human Services

    OpenAIRE

    Fredriksen-Goldsen, Karen I.; Hoy-Ellis, Charles P.; GOLDSEN, JAYN; Emlet, Charles A.; HOOYMAN, NANCY R.

    2014-01-01

    Sexual orientation and gender identity are not commonly addressed in health and human service delivery, or in educational degree programs. Based on findings from Caring and Aging with Pride: The National Health, Aging and Sexuality Study (CAP), the first national federally-funded research project on LGBT health and aging, this article outlines 10 core competencies and aligns them with specific strategies to improve professional practice and service development to promote the well-being of LGB...

  16. Issues in Learner Strategy

    Institute of Scientific and Technical Information of China (English)

    刘剑英

    2004-01-01

    There is an urgent need in China that learning strategy and strategy training be given the attenion and status that it deserves.Strategy training can help students make effcetive use of multiple strategies.Studying good language learners has proved a useful way of investigating how strategies affect language learning.The first approach to strategy training suggested by Cohen is targets isolated strategies by including explicit modeling and explanation of the benefits of applying a specific strategy,extensive functional practice with the strategy.The second approach outlined by Oxford is to raise students' awareness as to the purpose and rationale of strategy use.The third approach by Cohen is to help students to complete language learning tasks through planning,monitoring,problem solving and evaluation.Teachers play an important part in strategy training.

  17. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  18. Putting leadership back into strategy.

    Science.gov (United States)

    Montgomery, Cynthia A

    2008-01-01

    In recent decades an infusion of economics has lent the study of strategy much needed theory and empirical evidence. Strategy consultants, armed with frameworks and techniques, have stepped forward to help managers analyze their industries and position their companies for strategic advantage. Strategy has come to be seen as an analytical problem to be solved. But, says Montgomery, the Timken Professor of Business Administration at Harvard Business School, the benefits of this rigorous approach have attendant costs: Strategy has become a competitive game plan, separate from the company's larger sense of purpose. The CEO's unique role as arbiter and steward of strategy has been eclipsed. And an overemphasis on sustainable competitive advantage has obscured the importance of making strategy a dynamic tool for guiding the company's development over time. For any company, intelligent guidance requires a clear sense of purpose, of what makes the organization truly distinctive. Purpose, Montgomery says, serves as both a constraint on activity and a guide to behavior. Creativity and insight are key to forging a compelling organizational purpose; analysis alone will never suffice. As the CEO--properly a company's chief strategist--translates purpose into practice, he or she must remain open to the possibility that the purpose itself may need to change. Lou Gerstner did this in the 1990s, when he decided that IBM would evolve to focus on applying technology rather than on inventing it. So did Steve Jobs, when he rescued Apple from a poorly performing strategy and expanded the company into attractive new businesses. Watching over strategy day in and day out is the CEO's greatest opportunity to shape the firm as well as outwit the competition. PMID:18271318

  19. Key success factors of tourist market segmentation. / Elmarie Slabbert

    OpenAIRE

    Slabbert, Elmarie

    2002-01-01

    Descriptors: Marketing; market; market segmentation; tourist; tourism; promotion; promotional strategy; communication mix; promotional mix; destination marketing; competitiveness; competitive strategy; key success factors. The primary goal of this study was to determine the key success factors of tourist market segmentation, especially for South Africa as a tourism destination. Four objectives were derived from the primary research goal. The first objective was to analyse...

  20. Perceptions of food risk management among key stakeholders

    DEFF Research Database (Denmark)

    van Kleef, Ellen; Frewer, Lynn J.; Chryssochoidis, George M.;

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management.......In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management....

  1. Strategie podniku

    OpenAIRE

    Hes, Ondřej

    2014-01-01

    The goal of this paper is to establish a suitable strategy for Centropen company. The master's thesis is divided into theoretical and practical part. The theoretical part deals with analyses of the internal and external environment, which is based on literature. The practical part then applies the said analyses to the company. The internal analysis is carried out based on source and financial analysis. The external environment is studied through the PEST analysis and the Porter's Five Forces ...

  2. E-commerce strategy

    CERN Document Server

    Qin, Zheng; Li, Shundong; Li, Fengxiang

    2014-01-01

    This book helps deepen understanding of key e-commerce strategies. It brings together theoretical perspectives based on academic research, integrated use of technologies and a large amount of cases, especially those of China.

  3. Decommissioning - The keys to success

    International Nuclear Information System (INIS)

    The United Kingdom Atomic Energy Authority (UKAEA) owns and operates five sites across the United Kingdom. The Winfrith site in Dorset was established in the late 1950's as a centre for development of prototype reactors. During its history, nine research reactors have operated on the site together with: a fuel fabrication facility; a post irradiation examination facility; radiochemistry laboratories, etc. The largest reactor, a 100MWe Steam Generating Heavy Water Reactor, was closed down in 1990 and the last research reactor was closed in 1995. Since the early 1990's the site has been undergoing a programme of progressive decommissioning with a view to releasing the site for alternative use unrestricted by the site's nuclear history. Key drivers for the design of the programme were safety, minimising adverse environmental effects, minimising costs and ensuring stakeholder support. One requirement of the stakeholders was to ensure that the site continued to provide high quality employment. This was successfully achieved by developing a Science and Technology Park on the nuclear site. Over 40 companies are now located on the Park providing over 1000 jobs. This paper will focus on the lessons learnt from over a decade of experience of decommissioning at Winfrith and will attempt to identify the 'keys to successful decommissioning'. These 'keys' will include: defining the site end-point; planning the programme; defining the commercial strategy; cost estimation; evaluation and management of risks; safety and environmental management; and stakeholder engagement. In particular, the paper will explore the very close relationship between: funding profiles; cost estimation; risk management and commercial strategy. It will show that these aspects of the programme cannot be considered separately. The paper will attempt to show that, with careful planning; decommissioning can be achieved safety and give good value for money to the funding authority. (author)

  4. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria;

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... can recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All...

  5. Introduction: Experimental Green Strategies

    DEFF Research Database (Denmark)

    Peters, Terri

    2011-01-01

    Defining new ways in which archietcts are responding to the challenge of creating sustainable architecture , Experimental Green Strategies present a state of the art in applied ecological architectural research.......Defining new ways in which archietcts are responding to the challenge of creating sustainable architecture , Experimental Green Strategies present a state of the art in applied ecological architectural research....

  6. Implementing acquisition strategies

    International Nuclear Information System (INIS)

    The objective of this paper is to address some of the strategies necessary to effect a successful asset or corporate acquisition. Understanding the corporate objective, the full potential of the asset, the specific strategies to be employed, the value of time, and most importantly the interaction of all these are crucial, for missed steps are likely to result in missed opportunities. The amount of factual information that can be obtained and utilized in a timely fashion is the largest single hurdle to the capture of value in the asset or corporate acquisition. Fact, familiarity and experience are key in this context. The importance of the due diligence process prior to title or data transfer cannot be overemphasized. Some of the most important assets acquired in a merger may be the people. To maximize effectiveness, it is essential to merge both existing staff and those that came with the new acquisition as soon as possible. By thinking together as a unit, knowledge and experience can be applied to realize the potential of the asset. Hence team building is one of the challenges, doing it quickly is usually the most effective. Developing new directions for the new enlarged company by combining the strengths of the old and the new creates more value, as well as a more efficient operation. Equally important to maximizing the potential of the new acquisition is the maintenance of the momentum generated by the need to grow that gave the impetus to acquiring new assets in the first place. In brief, the right mix of vision, facts and perceptions, quick enactment of the post-close strategies and keeping the momentum alive, are the principal ingredients of a focused strategy

  7. Applied Literature for Healing,

    Directory of Open Access Journals (Sweden)

    Susanna Marie Anderson

    2014-11-01

    Full Text Available In this qualitative research study interviews conducted with elite participants serve to reveal the underlying elements that unite the richly diverse emerging field of Applied Literature. The basic interpretative qualitative method included a thematic analysis of data from the interviews yielding numerous common elements that were then distilled into key themes that elucidated the beneficial effects of engaging consciously with literature. These themes included developing a stronger sense of self in balance with an increasing connection with community; providing a safe container to engage challenging and potentially overwhelming issues from a stance of empowered action; and fostering a healing space for creativity. The findings provide grounds for uniting the work being done in a range of helping professions into a cohesive field of Applied Literature, which offers effective tools for healing, transformation and empowerment.Keywords: Applied Literature, Bibliotherapy, Poetry Therapy, Arts in Corrections, Arts in Medicine

  8. Applied geodesy

    International Nuclear Information System (INIS)

    This volume is based on the proceedings of the CERN Accelerator School's course on Applied Geodesy for Particle Accelerators held in April 1986. The purpose was to record and disseminate the knowledge gained in recent years on the geodesy of accelerators and other large systems. The latest methods for positioning equipment to sub-millimetric accuracy in deep underground tunnels several tens of kilometers long are described, as well as such sophisticated techniques as the Navstar Global Positioning System and the Terrameter. Automation of better known instruments such as the gyroscope and Distinvar is also treated along with the highly evolved treatment of components in a modern accelerator. Use of the methods described can be of great benefit in many areas of research and industrial geodesy such as surveying, nautical and aeronautical engineering, astronomical radio-interferometry, metrology of large components, deformation studies, etc

  9. Applied mathematics

    International Nuclear Information System (INIS)

    The 1988 progress report of the Applied Mathematics center (Polytechnic School, France), is presented. The research fields of the Center are the scientific calculus, the probabilities and statistics and the video image synthesis. The research topics developed are: the analysis of numerical methods, the mathematical analysis of the physics and mechanics fundamental models, the numerical solution of complex models related to the industrial problems, the stochastic calculus and the brownian movement, the stochastic partial differential equations, the identification of the adaptive filtering parameters, the discrete element systems, statistics, the stochastic control and the development, the image synthesis techniques for education and research programs. The published papers, the congress communications and the thesis are listed

  10. Proceedings of the Canadian Institute's conference on fundamentals of coalbed methane and shale gas : comprehensive overviews of leading project management strategies, effective techniques, new regulations, and key measurements for success

    International Nuclear Information System (INIS)

    Forecasts have indicated that despite some uncertainties in Coalbed methane (CBM) technology and concerns over the environmental effects of CBM production, the CBM industry is expected to grow rapidly over the next decade. This conference reviewed a variety of CBM project management strategies adopted by Canadian companies, ranging from initial site assessment through to commercial production. Pipeline and infrastructure requirements for the CBM industry were reviewed, and an overview of CBM regulations was provided. Exploration techniques and recommended practices for CBM hydraulic fracturing were presented. It was noted that in addition to environmental concerns over surface water discharge of CBM produced water, subsurface management issues are being increasingly scrutinized by environmentalists. Various commercialization strategies for CBM production were also reviewed, including well spacing management techniques; infrastructure demands and capitalized costs. Factors to ensure cost-effective high volume production in the shale gas industry were also reviewed. Of the 23 presentations given at this conference, 8 were catalogued separately for inclusion in this database. refs., tabs., figs

  11. Key concepts in energy

    CERN Document Server

    Madureira, Nuno Luis

    2014-01-01

    Highlights how key energy concepts surfaced, tracing their evolution throughout history to encompasses four economic concepts and four technological-engineering concepts developed through their history to conclude with current economic and environmental sciences Considers the process of energy-substitutions through complementary usages, hybridization and technological mixes Combines a conceptual approach with key theoretical concepts from engineering, geological and economic sciences providing cross disciplinary overview of energy fundamentals in a short and focused reading

  12. Secret Key Crypto Implementations

    Science.gov (United States)

    Bertoni, Guido Marco; Melzani, Filippo

    This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.

  13. Applying radiation

    International Nuclear Information System (INIS)

    The invention discloses a method and apparatus for applying radiation by producing X-rays of a selected spectrum and intensity and directing them to a desired location. Radiant energy is directed from a laser onto a target to produce such X-rays at the target, which is so positioned adjacent to the desired location as to emit the X-rays toward the desired location; or such X-rays are produced in a region away from the desired location, and are channeled to the desired location. The radiant energy directing means may be shaped (as with bends; adjustable, if desired) to circumvent any obstruction between the laser and the target. Similarly, the X-ray channeling means may be shaped (as with fixed or adjustable bends) to circumvent any obstruction between the region where the X-rays are produced and the desired location. For producing a radiograph in a living organism the X-rays are provided in a short pulse to avoid any blurring of the radiograph from movement of or in the organism. For altering tissue in a living organism the selected spectrum and intensity are such as to affect substantially the tissue in a preselected volume without injuring nearby tissue. Typically, the selected spectrum comprises the range of about 0.1 to 100 keV, and the intensity is selected to provide about 100 to 1000 rads at the desired location. The X-rays may be produced by stimulated emission thereof, typically in a single direction

  14. Infinite Portfolio Strategies

    OpenAIRE

    LeRoy, Stephen F.

    2012-01-01

    In continuous-time stochastic calculus a limit in probability is used to extend the definition of the stochastic integral to the case where the integrand is not square-integrable at the endpoint of the time interval under consideration. When the extension is applied to portfolio strategies, absence of arbitrage in finite portfolio strategies is consistent with existence of arbitrage in infinite portfolio strategies. The doubling strategy is the most common example. We argue that this extensio...

  15. Lock and key colloids.

    Science.gov (United States)

    Sacanna, S; Irvine, W T M; Chaikin, P M; Pine, D J

    2010-03-25

    New functional materials can in principle be created using colloids that self-assemble into a desired structure by means of a programmable recognition and binding scheme. This idea has been explored by attaching 'programmed' DNA strands to nanometre- and micrometre- sized particles and then using DNA hybridization to direct the placement of the particles in the final assembly. Here we demonstrate an alternative recognition mechanism for directing the assembly of composite structures, based on particles with complementary shapes. Our system, which uses Fischer's lock-and-key principle, employs colloidal spheres as keys and monodisperse colloidal particles with a spherical cavity as locks that bind spontaneously and reversibly via the depletion interaction. The lock-and-key binding is specific because it is controlled by how closely the size of a spherical colloidal key particle matches the radius of the spherical cavity of the lock particle. The strength of the binding can be further tuned by adjusting the solution composition or temperature. The composite assemblies have the unique feature of having flexible bonds, allowing us to produce flexible dimeric, trimeric and tetrameric colloidal molecules as well as more complex colloidal polymers. We expect that this lock-and-key recognition mechanism will find wider use as a means of programming and directing colloidal self-assembly. PMID:20336142

  16. Research into the construction and management strategies for teaching staff of universities of applied sciences%应用型本科高校师资队伍组构与管理策略研究

    Institute of Scientific and Technical Information of China (English)

    李丽娜

    2015-01-01

    The knowledge and quality requirements of teaching staff employed in universities of ap-plied sciences is different from those research universities,the composition and management of which needs to be different from that of the research universities.No mature /relevant experiences can be drawn owing to the differences in discipline power among applied universities.Issues con-cerning the school positioning,teaching staff-influencing disciplines planning,team composition, disciplines power and evaluation /assessment,qualities/specialties and evaluation /assessment and employment in the construction and management of the teaching staff are discussed.Based on the principle that the strategies should be in line with the actualities,proposals are proposed.The pro-posals include rationally arranging the disciplines and recruiting the associated teaching staff in a de-signed manner,evaluating academic platforms in a objective way to properly adjust the asessment of the staff’s performances,monitoring dynamically the tendency of the staff’s capabilities/competence and setting competence-based staff position requirements.%应用型本科高校师资的知识结构和能力特质要求有别于研究型本科高校,队伍组构与管理策略应适于需要自成体系,然而由于各校学科实力差距过大,致使迄今尚无成型借鉴经验。针对师资队伍组构与管理过程中直接影响办学定位实现和教师队伍沉淀的学科规划与队伍组构、学科实力与业绩考核、专长特质与岗位聘任等关键问题,遵照策略对策与客观实际对等适用的原则,提出应用型本科高校应理智决断学科布局并按需量化组构师资队伍、客观评价学术平台支撑能力并以此调整教师业绩考核力度、动态监控各学科师资队伍能力结构发展趋势、岗位聘任考察项目中应包括专长特质因素等对策建议。

  17. DEDD Symmetric-Key Cryptosystem

    Directory of Open Access Journals (Sweden)

    Praloy Shankar De, Prasenjit Maiti

    2013-03-01

    Full Text Available Now a days the greatest challenge to the cyber worldis security. We need more and more security for ourunsecured systems because technology is not aconstant factor. There are lots of catalysts, canbreak the securitysystem. Day by day number ofhackers is being increased.Existing old methods ofsecurity often fails to overcome it. But as an ancientquote says it’s true that “Old is Gold”, thosemethods help us to develop a new idea to sort outour problem in situ thus leads us to discover a newhorizon.In this paper an attempt has been made tofocus on an algorithmof cryptography that wasmadebyusingold methodologies.DEDDsymmetric-key cryptosystem is the new approach tosymmetric keyalgorithm. By this method we candoubly encrypt and doubly decrypt the message.Itmeans thesender will generate the cipher text fromthe plain texttwice.Thereceiverwillalsohavetodecrypt theciphers for two times and thenthecommunicationbetween themwill be completed.For generating the key,we willtake the messagelengthin first encryptionand insecond encryptionwe will apply shifting techniqueon a methodintegrate_expo which calculates the value ofe^integration (m^k dm from limit m=0 to limitm=m1(message length where e=exponential,m=variable.Double de-cryption will be done by thereverse process ofencryption techniques. There arelots of algorithms for symmetric key cryptographylike DES, AES,BLOWFISH, andHMAC-MD5etc.

  18. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  19. Key strategies for enhancing the cycling stability and rate capacity of LiNi0.5Mn1.5O4 as high-voltage cathode materials for high power lithium-ion batteries

    Science.gov (United States)

    Yi, Ting-Feng; Mei, Jie; Zhu, Yan-Rong

    2016-06-01

    Spinel LiNi0.5Mn1.5O4 (LNMO) is one of the most promising high voltage cathode materials for future application due to its advantages of large reversible capacity, high thermal stability, low cost, environmental friendliness, and high energy density. LNMO can provide 20% and 30% higher energy density than traditional cathode materials LiCoO2 and LiFePO4, respectively. Unfortunately, LNMO-based batteries with LiPF6-based carbonate electrolytes always suffer from severe capacity deterioration and poor thermostability because of the oxidization of organic carbonate solvents and decomposition of LiPF6, especially at elevated temperatures and water-containing environment. Hence, it is necessary to systematically and comprehensively summarize the progress in understanding and modifying LNMO cathode from various aspects. In this review, the structure, transport properties and different reported possible fading mechanisms of LNMO cathode are first discussed detailedly. And then, the major goal of this review is to highlight new progress in using proposed strategies to improve the cycling stability and rate capacity of LNMO-based batteries, including synthesis, control of special morphologies, element doping and surface coating etc., especially at elevated temperatures. Finally, an insight into the future research and further development of LNMO cathode is discussed.

  20. The empirical determination of key skills from an economic perspective

    OpenAIRE

    Loo, J.B. van; Toolsema, B.

    2004-01-01

    Notwithstanding an impressive research tradition on key skills, no clear statistical criterion exists that is suitable to determine which skills may be considered key skills. This contribution proposes one possible methodology that can be used to identify key skills. Proposing an economic definition of the key skill concept and by disentangling the direct and indirect effects of skills on productivity, we develop an empirical criterion for the identification of key skills. We apply this metho...

  1. The Empirical Determination of Key Skills from an Economic Perspective

    OpenAIRE

    Loo Jasper B. van; Toolsema Bert

    2004-01-01

    Notwithstanding an impressive research tradition on key skills, no clear statistical criterion exists that is suitable to determine which skills may be considered key skills. This contribution proposes one possible methodology that can be used to identify key skills. Proposing an economic definition of the key skill concept and by disentangling the direct and indirect effects of skills on productivity, we develop an empirical criterion for the identification of key skills. We apply this metho...

  2. Analysis and discussion of key technical strategies for measles prevention and control%现阶段消除麻疹关键防控技术策略分析与探讨

    Institute of Scientific and Technical Information of China (English)

    刘爱国; 杨会利

    2011-01-01

    Based on data on measles surveillance in the Taian area from the past 12 years, this study analyzed the major characteristics of measles outbreaks and incidence, including the month or date that the initial case of measles appeared each year, dips in seasonal incidence, nosocomial infection, and the high proportion of patients with measles among infants <8 months of age and adults. Such characteristics are crucial to predicting measles incidence and measles control efforts. Key technical measures are discussed and the importance of standardized emergency responses and administrative intervention in the event of a measles outbreak are emphasized.%基于对泰安市1999~2010年麻疹监测与防控工作,分析了当前麻疹发生与流行的主要特征,提出了麻疹首例病例、疫情季节性流行低谷、医院感染、小于8月龄及成人病例为主的两极年龄分布等特征对于疫情预测与防控工作的重要意义,重点探讨消除麻疹关键防控技术措施,强调规范疫情应急处置及强化行政干预的重要性,并力求纠正当前消除麻疹工作中存在的一些问题.

  3. Five Keys to Success

    Science.gov (United States)

    Peddy, Walter J.

    2009-01-01

    The first year as a principal is filled with self-doubt. As one already knows, there is no book or guide that can fully prepare someone for what the principal's position entails. All first-year principals have to learn by doing. In this article, the author discusses five keys to success that will guide and help first-year principals with the…

  4. Key Competencies. Second Edition.

    Science.gov (United States)

    Haworth, David; Browne, Geoff

    Key competencies (or generic skills) have been specified in four sources: Further Education Unit (FEU), United Kingdom (1987); Finn Report (1991) and Mayer Committee (1992), Australia; U.S. Labor Secretary's Commission on Achieving Necessary Skills (SCANS) (June 1991); and Butterworth and Lovell (1983), New South Wales. A comparison of the four…

  5. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  6. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  7. Turn key contracts

    International Nuclear Information System (INIS)

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW)

  8. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  9. Vulnerabilities in Quantum Key Distribution Protocols

    OpenAIRE

    Kuhn, D. Richard

    2003-01-01

    Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather, they suggest th...

  10. THE MANAGEMENT OF KNOWLEDGE WORKERS – KEY FACTOR OF SUCCES

    Directory of Open Access Journals (Sweden)

    Claudia-Elena ŢUCLEA

    2007-01-01

    Full Text Available The traditional companies are built on familiar bedrock of buildings, plants, and inventories. Competitive advantage is viewed in terms of scale and volume stemming from high-capacity use of machine-based factories. Such an approach fails to recognize how the leverage of knowledge is becoming a key to long-term success. Nowadays, organizations must recognize that power resides in the minds of their best people, who are diffused throughout the business and the organizations are becoming more dependent on people than ever before. The recruitment and the employment of knowledge workers are becoming very important issues from Romanian managers. The competitiveness is the only chance to deal with a very challenging market, especially after European integration. In this paper we present the results of a survey of the opinions of Romanian managers about the most effective strategies for recruitment, motivation and retention the knowledge workers. The study investigated two groups of managers: the first group included the managers who never were involved in activities related to human resources, and the second, the managers who have been involved. The managers from the first group chose theoretical the strategies they considered most effective; the managers for the second group indicated the strategies they applied.

  11. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Influence of Fermented Product from Beneficial Microorganism on the Cultivation of Larvae Apostichopus japonicus Li Shuang et al(1) Abstract The fermented product from beneficial microorganism was applied in the seed rearing of sea cucumber.The result

  12. Complexity of Stakeholder Interaction in Applied Research

    OpenAIRE

    Caroline Pade-Khene; Rebecca Luton; Tarina Jordaan; Sandra Hildbrand; Cecile Gerwel Proches; Andile Sitshaluza; James Dominy; Wonga Ntshinga; Nosipho Moloto

    2013-01-01

    Applied research in complex integrated settings should be recognized as an endeavor that requires transdisciplinary and multisectoral stakeholder interactions. The problems faced in society are quite complex, requiring participation and knowledge from diverse aspects of society, including different disciplines (academia), communities, civil society, and government. Successful applied research relies on nurturing these key stakeholder relationships and interactions. This paper explores the key...

  13. Using image key as cipher key in AES

    OpenAIRE

    Razi Hosseinkhani; Hamid Haj Seyyed Javadi

    2012-01-01

    This paper describes how cipher key can be generated from image. We use image to generate cipher key for AES algorithm. After this step , cipher key watermarked in image. S-Box generated by this key which it called Key-dependant S-box. These steps make AES algorithm more robust and more reliable.

  14. An Efficient Key Agreement Framework to MANET

    Institute of Scientific and Technical Information of China (English)

    WANG Shun-man; TAO Ran; WANG Yue

    2006-01-01

    Protocols for key management are compared and evaluated from the point of view on mobile ad hoc networks (MANET). The issues of fault-tolerance and efficiency of key distribution protocols for group communications in MANET are addressed. Most key distribution protocols existing today are primarily designed for wire-line networks. These protocols either fail to work as intended or cannot work at all when they are applied to the demanding environment of MANET. Parameters and performance of different protocols are analyzed, and then a flat is given out, on which new protocols or existing ones are designed and modified, so that they can be robust, scalable and efficient in MANET.

  15. Key Distribution based on Three Player Quantum Games

    CERN Document Server

    Toyota, Norihito

    2010-01-01

    We study a new QKD that is different from the scheme proposed by \\cite{Ramz2}, though it essentially takes our ground on three-player quantum games and Greenberg-Horne-Zeilinger triplet entangled state (GHZ state) \\cite{Gree} is used. In our scheme proposed in this article, Bob and Charlie (and Alice also) that they are players in a game get some common key or information (applied strategies and their payoffs in the game) by knowing some results of the measurement made by Alice. There is not any arbiter in our scheme, since existence of an arbiter increase the risk of wiretapping. For it is difficult to detect wiretapping, when an arbiter repeatedly sends classical information. Lastly we discuss robustness for eavesdrop. We show that though maximally entangled case and non-entangled case provided essentially equivalent way in QKD, the latter is not available in the case there are some eavesdroppers.

  16. Key Changes [Book Review

    OpenAIRE

    Kousser, J. Morgan

    1981-01-01

    The notion that electoral history may be divided into long periods of stability broken periodically by major shocks has been the central organizing motif of American political history for a generation. Drawing on the simple empirical observation that the balance of electoral support for the major American political parties across geographic units remained roughly the same for a sequence of contests, and then shifted rather suddenly into a new and lasting pattern, V. 0. Key, Jr., Lee Benson, W...

  17. Developing Key Account Managers

    OpenAIRE

    Millman, T; Wilson, K

    1995-01-01

    Key account management (KAM) in industrial and business-to-business markets has its roots in sales management where it has long been recognised that customers of strategic importance require special treatment. More recently, growing interest among academics and practitioners in relationship marketing has forced KAM centre stage as one of the few seemingly tried/tested approaches to customer retention and development. This trend, however, has exposed three inter-related problems for the adopti...

  18. Public-Key Cryptography

    OpenAIRE

    Lint, van, JH

    2003-01-01

    Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For most security properties, it is computational security that has to be considered: an attack scenario describes how adversaries interact with the cryptosystem, trying to attack it; the system can be called secure if adversaries with reasonably bounded computational means have negligible prospects of success. The lack of computational problems that are guaranteed to be hard in an appropriate sen...

  19. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  20. Creativity Management Key Elements

    OpenAIRE

    Fuchs Ángeles, Rosa María; Franceso Tonetti, Federico Carlo

    2015-01-01

    Organizations are constantly looking towards innovation. In order to reach it they must foment creativity. This paper analyzes a series of elements considered in the organizational creativity management and proposes a model with the indispensable factors that organizations should consider to reach it. These elements are: culture and organizational environment, strategy, structure, communication, relation with customers, human resources (recruiting, training, job design, compensation, promotio...

  1. Empowerment and performance in local government : the impact of empowerment strategies on service improvement

    OpenAIRE

    Tickner, Leslie

    2010-01-01

    This study examines the impact an empowerment strategy may have when applied to public sector employees delivering Environmental Services. The study employs a case study method as its central research strategy with ten sample local authorities chosen as strategic informants. The key issues considered were the relevance of the appropriate structure within the organisation, the importance of employee engagement, the impact of the management or leadership style, and the opportunity for implement...

  2. Study on the Strategies of Developing the Key Ability of Higher Vocational Accounting Majors Based on Market Demand%基于市场需求导向的高职会计学生关键能力培养策略

    Institute of Scientific and Technical Information of China (English)

    宋建军

    2014-01-01

    会计是与社会经济发展密不可分的职业,如何提供适应社会经济发展需求的会计人才是会计教育面临的重要课题。高职会计教育为社会培养大量专业知识扎实,操作能力强的会计人员,但面对不断变化的环境和要求,其关键能力欠缺,职业生涯发展受到较大制约。高职会计教育必须寻求基于市场需求的学生关键能力培养策略,采取“整体策略”、“渗透策略”和“体验策略”,在教学与非教学活动中通过“多维度、立体化”的途径培养学生关键能力。%Accounting is a profession closely connected with social and economic development. It is an important task for accounting education how to provide accounting talents to meet the demands of social and economic development. Higher vocational accounting education cultivates a large number of accounting personnel with solid professional knowledge and strong practical operative abilities for the society. However, in the face of changing conditions and requirements, they lack key abilities and the career development is thus severely constrained. Higher vocational accounting education need explore the strategies of developing students' critical abilities based on market demand. The"overall strategy","penetrating strategy"and"experience strategy"should be adopted to train students' critical abilities through multidimensional and three-dimen-sional ways in the teaching and non-teaching activities.

  3. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  4. k-Connectivity of Random Key Graphs

    CERN Document Server

    Zhao, Jun; Gligor, Virgil

    2015-01-01

    Random key graphs represent topologies of secure wireless sensor networks that apply the seminal Eschenauer-Gligor random key predistribution scheme to secure communication between sensors. These graphs have received much attention and also been used in diverse application areas beyond secure sensor networks; e.g., cryptanalysis, social networks, and recommender systems. Formally, a random key graph with $n$ nodes is constructed by assigning each node $X_n$ keys selected uniformly at random from a pool of $Y_n$ keys and then putting an undirected edge between any two nodes sharing at least one key. Considerable progress has been made in the literature to analyze connectivity and $k$-connectivity of random key graphs, where $k$-connectivity of a graph ensures connectivity even after the removal of $k$ nodes or $k$ edges. Yet, it still remains an open question for $k$-connectivity in random key graphs under $X_n \\geq 2$ and $X_n = o(\\sqrt{\\ln n})$ (the case of $X_n=1$ is trivial). In this paper, we answer the a...

  5. [Key regulators of skeletal myogenesis].

    Science.gov (United States)

    Kopantseva, E E; Belyavsky, A V

    2016-01-01

    Skeletal myogenesis has been extensively studied at both morphological and molecular levels. This review considers the main stages of embryonic skeletal myogenesis and myogenic factors that trigger their initiation, focusing on specific protein interactions involved in somitic myogenesis, head myogenesis, and limb myogenesis. The second part of the review describes the role of noncoding RNAs (microRNAs and long noncoding RNAs) in myogenesis. This information is of particular interest, because regulation of cell processes by noncoding RNAs is an actively developing field of molecular biology. Knowledge of mechanisms of skeletal myogenesis is of applied significance. Various transcription factors, noncoding RNAs, and other myogenic regulators can be employed in the induction of myogenic reprogramming in stem cells and differentiated somatic cells. Current trends and strategies in the field of skeletal myogenic reprogramming are discussed in the last part of the review. PMID:27239841

  6. Identification key to Quivira milkweeds

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document is a key to milkweed identification at Quivira National Wildlife Refuge. It contains a dichotomous key as well as a picture key. Milkweeds found on...

  7. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  8. WEALTH MANAGEMENT STRATEGIES IN THE ERA OF E-COMMERCE

    OpenAIRE

    Mohammed Shahedul QUADER; Mohammad SHAMSUDDOHA; Jahan, Akhter; Alexandru NEDELEA

    2011-01-01

    This paper looks at the key strategies being applied by wealth management and their competitive position. Each approach has merits, although the multi-channel ‘single brand’ approach seems to be gathering momentum. E-commerce facilitates differentiation and requires focus, whilst making cost leadership more difficult Choices between being a traditional or extended wealth manager, or simply a wealth product provider, are increasingly being made. Moreover need for strategic choice in the wealth...

  9. Quantum Key Distribution Protocol with Private-Public Key

    OpenAIRE

    Serna, Eduin H.

    2009-01-01

    A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol [1] and its many variants [2,3] two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key. A three related system of key distribution are described.

  10. Identification of Key Barriers in Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  11. Interactive simulations for quantum key distribution

    CERN Document Server

    Kohnle, Antje

    2016-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualization Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different quantum key distribution protocols. The simulations use either...

  12. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Determination of the Estrogen Alkylphenols and Bisphenol A in Marine Sediments by Gas Chromatography-Mass Spectrometry Deng Xu-xiu et al. (1) Abstract Octylphenol, nonylphenol and bisphenol A are recognized environmental endocrine disruptors. A quantitative method was established for the simultaneous determination of octylphenol, nonylphenol and bisphenol A in marine sediments by gas chromatography-mass spectrometry. The test sample was extracted by methanol with ultrasonic technique, purified with copper powder and carbon solid phase extraction column, and derived with heptafluorobutyric anhydride. Then the analytes were separated on HP-5ms column and determined by gas chromatography-mass. The recovery of the method was between 84.3% and 94.5%, and the LOQ of 4-N- octylphenol, nonylphenol and bisphenol A was 0.25 g/kg, 0.15 g/kg and 0.15 g/kg. Key words octylphenol; nonylphenol; bisphenol A; gas chromatography-mass spectrometry

  13. Key figures. Year 2005

    International Nuclear Information System (INIS)

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  14. Key figures. Year 2006

    International Nuclear Information System (INIS)

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  15. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Comparative Study on Adhesion Effect Among Different Materials of Sepia esculenta Wang Xue-mei et al. (1) Abstract PE Harness, mesh, sea cucumber seedling box attached, sorghum bar, tamarix (fresh, and old), artemisia annua (fresh, and old) and artificial egg-based subsidiary were used as spawning substrates of Sepia esculenta for comparative study on adhesion effect during artificial breeding. The results showed that the best was artificial egg-based subsidiary produced by the process of invention in this study. The second was old artemisia annua and tamarix. PE Harness, mesh, sea cucumber seedling box attached, sorghum bar were unsatisfactory for using as spawning substrates of Sepia esculenta. Key words Sepia esculenta; adhesion effect; different materials

  16. Synenco Energy's Northern Lights Project : update and key strategies

    International Nuclear Information System (INIS)

    This presentation described the Northern Lights Project and addressed the unique characteristics of oil sands which have led to innovative mine and extraction techniques. A table indicating the mining projects in development was presented with reference to recoverable bitumen and ore grade. The marketing aspects of synthetic crude that influence the choice of bitumen upgrader design and economics were discussed. It was noted that new pipeline developments should open up new market opportunities. The expected market for Synenco crude is the northern portion of the United States Midwest. There may also be a possibility to sell the product as diluent because Synenco crude has a lower vacuum gas oil (VGO) content and more naphtha than other synthetic crude. The properties of Synenco crude components were listed with reference to gravity, density, sulfur content, cetane number, smoke point, and feed quality. The trade-off between capital costs, operating cost and risk mitigation was also examined. tabs., figs

  17. Key Strategies for Safety-of-Life Receiver Development

    OpenAIRE

    Cuntz, Manuel; Buchner, Georg; Denks, Holmer; Greda, Lukasz; Heckler, Marcos; Hornbostel, Achim; Konovaltsev, Andriy; Dreher, Achim; Meurer, Michael

    2009-01-01

    It is well known from the open literature that interference is a serious threat for the new Galileo services especially in the E5 and E6 bands. In particular for the Safety-of–Life (SoL) applications like aviation high power pulsed radars and DMEs are a major concern. To cope with such interference it is essential for the development of a SoL receiver to consider the impact of interference on each part of the receiving chain. For this reason a new project was launch...

  18. ACHIEVING VALUE FROM ICT IN SMES: KEY MANAGEMENT STRATEGIES

    Directory of Open Access Journals (Sweden)

    K. Johnston

    2009-01-01

    Full Text Available ICT covers a broad range of fields in business and therefore makes ICT value difficult to simply define. The main factors that influence the use of ICT are therefore important to look at, as they give a good understanding of the how much influence the organisation has, on achieving value in its given context. The transformational model of ICT use was analysed to establish how SMEs in South Africa achieve business value from ICT and what management practices are most effective. Implications of the research are that management practices are an important factor that influences the value from ICT, and that the more management practices organisations implement, the greater the business value from ICT. Further findings of this study deduced that organisations that are more ICT aware, gain greater business value from ICT, with value achievement from ICT largely within the organisation’s control. This paper concludes with recommendations for future research.

  19. ACHIEVING VALUE FROM ICT IN SMES: KEY MANAGEMENT STRATEGIES

    OpenAIRE

    Johnston, K; Parker, S; K.D. Tu; F. Mosoval

    2009-01-01

    ICT covers a broad range of fields in business and therefore makes ICT value difficult to simply define. The main factors that influence the use of ICT are therefore important to look at, as they give a good understanding of the how much influence the organisation has, on achieving value in its given context. The transformational model of ICT use was analysed to establish how SMEs in South Africa achieve business value from ICT and what management practices are most effective. Implications of...

  20. Internal Employability as a Strategy for Key Employee Retention

    Directory of Open Access Journals (Sweden)

    Ángela Sánchez-Manjavacas

    2014-05-01

    Full Text Available Economies the world over and particularly those in southern Europe, are suffering the crippling effects of the extremely complex economic and financial crisis. This study looks at the impact of certain human resource policies geared towards increasing internal employability as a means of retaining valued employees and promoting job flexibility within the firm, as well as increasing positive attitudes towards organizational citizenship. Satisfaction and commitment are proposed as intermediating variables of the relationship between perceived internal employability and ITQ/OCB. The proposed research model is contrasted using structural equation modeling (LISREL. The results obtained from the empirical study indicate that employability should be considered an essential factor in achieving the desired commitment, loyalty, adaptability and productivity from employees by strengthening the psychological contract between firm and worker through professional recognition.

  1. Company Training. A Key Strategy for Success. Workforce Brief #2.

    Science.gov (United States)

    Bergman, Terri

    General research and anecdotal reports have confirmed that both technical and basic skills training offer many benefits to companies of all sizes. Company training can improve employee performance, firm productivity, product quality, and company profitability. Training supports "high-performance" work practices such as the following: total quality…

  2. Internal employability as a strategy for key employee retention

    OpenAIRE

    Ángela Sánchez-Manjavacas; M. Carmen Saorín-Iborra; Michael Willoughby

    2014-01-01

    Las economías alrededor del mundo, en especial en países delsur de Europa, están sufriendo los paralizantes efectos de la extremadamentecompleja crisis económica y financiera. Este estudio examina el impactode ciertas políticas de recursos humanos enfocadas a incrementarla empleabilidad interna como un medio para retener a los empleados valiososy para promover la flexibilidad laboral dentro de la empresa, asícomo para incrementar las actitudes positivas hacia la ciudadanía organizacional.Se p...

  3. Advanced Algorithms for Local Routing Strategy on Complex Networks

    Science.gov (United States)

    Lin, Benchuan; Chen, Bokui; Gao, Yachun; Tse, Chi K.; Dong, Chuanfei; Miao, Lixin; Wang, Binghong

    2016-01-01

    Despite the significant improvement on network performance provided by global routing strategies, their applications are still limited to small-scale networks, due to the need for acquiring global information of the network which grows and changes rapidly with time. Local routing strategies, however, need much less local information, though their transmission efficiency and network capacity are much lower than that of global routing strategies. In view of this, three algorithms are proposed and a thorough investigation is conducted in this paper. These algorithms include a node duplication avoidance algorithm, a next-nearest-neighbor algorithm and a restrictive queue length algorithm. After applying them to typical local routing strategies, the critical generation rate of information packets Rc increases by over ten-fold and the average transmission time 〈T〉 decreases by 70–90 percent, both of which are key physical quantities to assess the efficiency of routing strategies on complex networks. More importantly, in comparison with global routing strategies, the improved local routing strategies can yield better network performance under certain circumstances. This is a revolutionary leap for communication networks, because local routing strategy enjoys great superiority over global routing strategy not only in terms of the reduction of computational expense, but also in terms of the flexibility of implementation, especially for large-scale networks. PMID:27434502

  4. Chaos control applied to heart rhythm dynamics

    International Nuclear Information System (INIS)

    Highlights: → A natural cardiac pacemaker is modeled by a modified Van der Pol oscillator. → Responses related to normal and chaotic, pathological functioning of the heart are investigated. → Chaos control methods are applied to avoid pathological behaviors of heart dynamics. → Different approaches are treated: stabilization of unstable periodic orbits and chaos suppression. - Abstract: The dynamics of cardiovascular rhythms have been widely studied due to the key aspects of the heart in the physiology of living beings. Cardiac rhythms can be either periodic or chaotic, being respectively related to normal and pathological physiological functioning. In this regard, chaos control methods may be useful to promote the stabilization of unstable periodic orbits using small perturbations. In this article, the extended time-delayed feedback control method is applied to a natural cardiac pacemaker described by a mathematical model. The model consists of a modified Van der Pol equation that reproduces the behavior of this pacemaker. Results show the ability of the chaos control strategy to control the system response performing either the stabilization of unstable periodic orbits or the suppression of chaotic response, avoiding behaviors associated with critical cardiac pathologies.

  5. Chaos control applied to heart rhythm dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Borem Ferreira, Bianca, E-mail: biaborem@gmail.com [Universidade Federal do Rio de Janeiro, COPPE, Department of Mechanical Engineering, P.O. Box 68.503, 21.941.972 Rio de Janeiro, RJ (Brazil); Souza de Paula, Aline, E-mail: alinedepaula@unb.br [Universidade de Brasi' lia, Department of Mechanical Engineering, 70.910.900 Brasilia, DF (Brazil); Amorim Savi, Marcelo, E-mail: savi@mecanica.ufrj.br [Universidade Federal do Rio de Janeiro, COPPE, Department of Mechanical Engineering, P.O. Box 68.503, 21.941.972 Rio de Janeiro, RJ (Brazil)

    2011-08-15

    Highlights: > A natural cardiac pacemaker is modeled by a modified Van der Pol oscillator. > Responses related to normal and chaotic, pathological functioning of the heart are investigated. > Chaos control methods are applied to avoid pathological behaviors of heart dynamics. > Different approaches are treated: stabilization of unstable periodic orbits and chaos suppression. - Abstract: The dynamics of cardiovascular rhythms have been widely studied due to the key aspects of the heart in the physiology of living beings. Cardiac rhythms can be either periodic or chaotic, being respectively related to normal and pathological physiological functioning. In this regard, chaos control methods may be useful to promote the stabilization of unstable periodic orbits using small perturbations. In this article, the extended time-delayed feedback control method is applied to a natural cardiac pacemaker described by a mathematical model. The model consists of a modified Van der Pol equation that reproduces the behavior of this pacemaker. Results show the ability of the chaos control strategy to control the system response performing either the stabilization of unstable periodic orbits or the suppression of chaotic response, avoiding behaviors associated with critical cardiac pathologies.

  6. Key data. Energy

    International Nuclear Information System (INIS)

    Energy actors and economical energy context are changing: the world extension and the opening of markets calls for reliable and convenient indicators to understand the energy choices and stakes of France with respect to European and world data. The examination of this 2001 issue of the key energy data will help the reader in his understanding of the French energy policy which is mainly based on: the imperative security of energy supplies, the limitation of CO2 emissions and the respect of the environment, the growth of economic competitiveness, the keeping of public utilities, and the employment. The energy data are presented in tables, graphs, curves and charts. The production, consumption, and foreign market data of France and of the rest of the world are presented successively for: the overall energy sources, petroleum, natural gas, coal and electricity. Renewable energy data are presented for Europe and France (consumption, production, wind energy, solar energy, heat distribution networks, bio-fuels, biogas, biomass). A chapter concerns the rational use of energy in the industry, in transports and in the residential and tertiary sectors. The emissions of pollutants (CH4, CO, CO2, VOCs, N2O, NOx, SO2) are given for France and compared to the worldwide CO2 emissions. (J.S.)

  7. Change Management Competence - Key Contributor to Project Success : Case: Nokia Solutions Networks / key project managers

    OpenAIRE

    Pokela, Anu

    2013-01-01

    ABSTRACT Oulu university of applied sciences Master degree in entrepreneurship and business competence Author: Anu Pokela Title of thesis: Change management competence – key contributor to project success Supervisor: Tiina Gallén Term and year when the thesis was submitted: Autumn 2013 Number of pages: 63 Nowadays majority of the work in telecommunications industry is done in projects, work has become projectified. Project managers are the key contributors to making...

  8. Key rate for calibration robust entanglement based BB84 quantum key distribution protocol

    Energy Technology Data Exchange (ETDEWEB)

    Gittsovich, O. [Institute for Quantum Computing, University of Waterloo, Waterloo, Ontario, N2L 3G1 (Canada); Moroder, T. [Naturwissenschaftlich-Technische Fakultät, Universität Siegen, Walter-Flex-Str. 3, D-57068 Siegen (Germany)

    2014-12-04

    We apply the approach of verifying entanglement, which is based on the sole knowledge of the dimension of the underlying physical system to the entanglement based version of the BB84 quantum key distribution protocol. We show that the familiar one-way key rate formula holds already if one assumes the assumption that one of the parties is measuring a qubit and no further assumptions about the measurement are needed.

  9. Key rate for calibration robust entanglement based BB84 quantum key distribution protocol

    International Nuclear Information System (INIS)

    We apply the approach of verifying entanglement, which is based on the sole knowledge of the dimension of the underlying physical system to the entanglement based version of the BB84 quantum key distribution protocol. We show that the familiar one-way key rate formula holds already if one assumes the assumption that one of the parties is measuring a qubit and no further assumptions about the measurement are needed

  10. Reading comprehension metacognitive strategies as a means for controlling behavior

    Directory of Open Access Journals (Sweden)

    Dinorah Aladina Caballero López

    2014-07-01

    Full Text Available Textual comprehension implies the use of various metacognitive strategies by the students when they have to face a text to be competent readers. That is why the objective of this article is to illustrate the application of metacognitive strategies in order to achieve an efficient textual comprehension, taking into account the self – regulation the student exerts over his own learning process. It is applied as the main method historical-logical studies based on a professional-researching systematic practice; at the same time observation is largely used. The main result is the introduction of metacognitive strategies in reading comprehension, which subsequently favor the self-control of personal behavior. The article is the result of a research project sponsored by the department of Special Education. Key words: reading comprehension, metacognitive strategies, behavior self-control.

  11. The advertising strategies

    Institute of Scientific and Technical Information of China (English)

    YAKOUBI Mohamed Lamine

    2013-01-01

    We will try to demonstrate, through the display of the various advertising creation strategies and their evolution, how the advertising communication passed from of a vision or a strategy focused on the product, to a vision focused on the brand. The first advertising strategy that was applied by advertising agencies is the"Unique Selling Proposition";it focused only on the product advantages and its philosophy dominated the advertising world, throughout its various evolutions, till the nineties but this is without counting the introduction of the new advertising strategies that brought a more brand oriented philosophy to the ground.

  12. 应用于Bottom-up蛋白质鉴定的质谱数据采集策略研究进展%Data Acquisition Strategy for Mass Spectrometers Applied to Bottom-up-based Protein Identification

    Institute of Scientific and Technical Information of China (English)

    徐长明; 张纪阳; 张伟; 谢红卫

    2013-01-01

    The high complexity of the proteome has brought great challenges to mass spectrometry-based protein identification.The technical requirements continuously forward the development of mass spectrometry.The advances in hardware and software of instrument platform provide more choices and supports for protein identification.However,it is necessary to design high-quality data acquisition strategy,which is heavyly dependent on the specific biological problem and the sample,to make the best use of the performance of the instrument.Here,the data acquisition strategy that has been developed for mass spectrometers in high throughput protein identification was reviewed.The simple repetitions,ion exclusion,ion inclusion,online intelligent data acquisition and segmented scanning technology for Bottom-up strategy were highlighted,and the impact of these strategies on the protein identification was concerned.Finally,the advantages and disadvantages of various strategies were summarized,and the future directions of developing the data acquisition strategy for mass spectrometers were discussed.%蛋白质组的高度复杂性给基于质谱的蛋白质鉴定提出了很大的挑战.技术需求促进质谱技术不断向前发展.仪器平台在软硬件方面的进步,为高通量蛋白质鉴定提供了更多选择和支撑.但是,仪器性能的充分发挥,还需要根据生物学问题的需求和分析样本的特性,设计高质量的数据采集策略.本文对目前高通量蛋白质鉴定中已开发的质谱数据采集策略进行了综述,重点介绍了Bottom-up策略中使用的简单重复、离子排除和监测、在线智能化扫描和分段扫描等技术,并关注了这些策略对高通量蛋白质鉴定的影响,总结了各种策略的优缺点并展望了其未来发展方向.

  13. A threshold key escrow scheme based on public key cryptosystem

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.

  14. Vulnerabilities in Quantum Key Distribution Protocols

    CERN Document Server

    Kuhn, D R

    2003-01-01

    Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather, they suggest that quantum cryptographic protocols, like conventional protocols, may be vulnerable to methods of attack that were not envisaged by their designers.

  15. A belief-based evolutionarily stable strategy

    OpenAIRE

    Deng, Xinyang; Wang, Zhen; Liu, Qi; Deng, Yong; Mahadevan, Sankaran

    2014-01-01

    As an equilibrium refinement of the Nash equilibrium, evolutionarily stable strategy (ESS) is a key concept in evolutionary game theory and has attracted growing interest. An ESS can be either a pure strategy or a mixed strategy. Even though the randomness is allowed in mixed strategy, the selection probability of pure strategy in a mixed strategy may fluctuate due to the impact of many factors. The fluctuation can lead to more uncertainty. In this paper, such uncertainty involved in mixed st...

  16. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  17. ICT for AQA applied as single award

    CERN Document Server

    Wilson, Barbara

    2007-01-01

    This book has been written specifically for teachers and students following AQA's Applied AS ICT specification and covers the key elements of the units of the course, including the coursework requirements.

  18. Hybrid Strategy: A New Strategy for Competitive Advantage

    OpenAIRE

    Mas Bambang Baroto; Muhammad Madi Bin Abdullah (Corresponding Author); Hooi Lai Wan

    2012-01-01

    Both strategic management researchers and practitioners have realized the importance of cost and differentiationstrategies for effective organizational performance and excellence. Recently many large enterprises/corporationshave been applying both strategies simultaneously, rather than applying a single strategy at one period of time.The implementations of the three strategies are commonly used by the big corporations involved in domestic,regional, international and global business. This arti...

  19. Infinite Portfolio Strategies

    Directory of Open Access Journals (Sweden)

    Stephen F. LeRoy

    2012-12-01

    Full Text Available In continuous-time stochastic calculus a limit in probability is used to extend the definition of the stochastic integral to the case where the integrand is not square-integrable at the endpoint of the time interval under consideration. When the extension is applied to portfolio strategies, absence of arbitrage in finite portfolio strategies is consistent with existence of arbitrage in infinite portfolio strategies. The doubling strategy is the most common example. We argue that this extension may or may not make economic sense, depending on whether or not one thinks that valuation should be continuous. We propose an alternative extension of the definition of the stochastic integral under which valuation is continuous and absence of arbitrage is preserved. The extension involves appending a date and state called to the payoff index set and altering the definition of convergence under which gains on infinite portfolio strategies are defined as limits of gains on finite portfolio strategies.

  20. Key Concepts in Informatics: Algorithm

    Science.gov (United States)

    Szlávi, Péter; Zsakó, László

    2014-01-01

    "The system of key concepts contains the most important key concepts related to the development tasks of knowledge areas and their vertical hierarchy as well as the links of basic key concepts of different knowledge areas." (Vass 2011) One of the most important of these concepts is the algorithm. In everyday life, when learning or…

  1. MOBILE PAYMENTMETHODBASED ON PUBLIC-KEY CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Adnan A. Hnaif

    2015-03-01

    Full Text Available Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash, cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is summarized in three processes: firstly, the authentication process, which involves the authentication phases for the applied customers. Secondly, the member recognition process which tests and ensures the customer membership by the market server. Finally, payment processwhich will be done by ciphering the customer information using public-key encryption cryptosystem (RSA, to be submitted over an insecure network to the market server. Actually, this mobile payment methodis more efficient than otherpayment methods since the customer can pay from his/her own mobilephone without any extra cost and effort. The RSA public-key encryption system ensures the security of the proposed method. However, to prevent a brute force attack, the choice of the key size becomes crucial.

  2. Model outputs for each hotspot site to identify the likely environmental, economic and social effects of proposed remediation strategies

    DEFF Research Database (Denmark)

    Fleskens, Luuk; Irvine, Brian; Kirkby, Mike;

    2012-01-01

    This report presents the PESERA-DESMICE model results for the study sites where it has been applied. Modelling has been the key strategy adopted in the DESIRE project to scale up results from the field to the regional level. The PESERA model, extended with several process descriptions to account ...

  3. Conversation Analysis in Applied Linguistics

    DEFF Research Database (Denmark)

    Kasper, Gabriele; Wagner, Johannes

    2014-01-01

    For the last decade, conversation analysis (CA) has increasingly contributed to several established fields in applied linguistics. In this article, we will discuss its methodological contributions. The article distinguishes between basic and applied CA. Basic CA is a sociological endeavor concerned...... been driven by applied work. After laying out CA's standard practices of data treatment and analysis, this article takes up the role of comparison as a fundamental analytical strategy and reviews recent developments into cross-linguistic and cross-cultural directions. The remaining article focuses...... on learning and development. In conclusion, we address some emerging themes in the relationship of CA and applied linguistics, including the role of multilingualism, standard social science methods as research objects, CA's potential for direct social intervention, and increasing efforts to complement CA...

  4. Fuzzy MADM Approach for Identification of Key Sectors of Tajikistan Economy

    Institute of Scientific and Technical Information of China (English)

    ASADULLO Abdulhamidov; TANG Bing-yong; LI Dan

    2006-01-01

    The development strategy, focused on the promotion of the efficient and prospective production sectors required for effectively solving social, economic and other problems becomes very important in resource allocation decision making process of developing countries. The structural hierarchy, comprising social, economic, technological and environmental aspects, which is involved in the selection of sectors constructed according to the hierarchical system of objectives. The Fuzzy Multi-attribute Decision Making method is used to rank the sectors by indicating the degree to which an alternative satisfies the global objectives of criteria obtained by aggregation operations in fuzzy environment. By applying the developed approach to defming and identifying the key sectors of an economy, we can rank the aggregated 17 sectors of the Tajikistan economy according to their degree of achievement in satisfying key criteria.

  5. Some Key Principles for Developing Grammar Skills

    Institute of Scientific and Technical Information of China (English)

    张威

    2008-01-01

    Grammar is sometimes defined aft"the way words are put together to make correct sentences"(Ur,2004,P.75).The aim of teaching grammar is to raise the rates of the correctness of language use and help the students transfer the isolated language points to apply language.In this essay,the author introduces two kinds of Conlnlon methods in English grammar class. And there are some key principles in grammar teaching.

  6. Multiple hashes of single key with passcode for multiple accounts

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However, human memorability constrains the number of keys. Single sign-on server, key hashing, key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name, but numeric 4-digit passcode, key hashing, key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts.

  7. On Compression of Cryptographic Keys

    CERN Document Server

    Chan, Aldar C-F

    2007-01-01

    Any secured system can be modeled as a capability-based access control system in which each user is given a set of secret keys of the resources he is granted access to. In some large systems with resource-constrained devices, such as sensor networks and RFID systems, the design is sensitive to memory or key storage cost. With a goal to minimize the maximum users' key storage, key compression based on key linking, that is, deriving one key from another without compromising security, is studied. A lower bound on key storage needed for a general access structure with key derivation is derived. This bound demonstrates the theoretic limit of any systems which do not trade off security and can be treated as a negative result to provide ground for designs with security tradeoff. A concrete, provably secure key linking scheme based on pseudorandom functions is given. Using the key linking framework, a number of key pre-distribution schemes in the literature are analyzed.

  8. Secure key storage and distribution

    Science.gov (United States)

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  9. Limitations on quantum key repeaters.

    Science.gov (United States)

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-01-01

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol. PMID:25903096

  10. Mental Strategies for Peak Performance

    Science.gov (United States)

    Wang, Jin

    2006-01-01

    A key to controlling competitive anxiety under pressure is to develop an effective attentional strategy to use before competition. This article: (1) examines the causes and psychological mechanics of pre-competitive anxiety; (2) provides athletes with an easily understandable mental strategy for practical use; and (3) provides coaches with…

  11. Quantum Key Distribution Using Decoy State Protocol

    Directory of Open Access Journals (Sweden)

    Sellami Ali

    2009-01-01

    Full Text Available Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible for sophisticated eavesdroppers to launch various subtle eavesdropping attacks including the Photon Number Splitting (PNS attack. The decoy state protocols recently proposed to beat PNS attack and to improve dramatically distance and secure key generation rate of Quantum Key Distribution (QKD. Approach: Objective of this study was experimental implementation of weak decoy + vacuum states QKD for increasing the performance of QKD system. To show conceptually how simple it was to apply the weak decoy + vacuum state idea to a commercial QKD system, we chosen ID-3000 commercial quantum key distribution system manufactured by id quantique. To implement the weak decoy + vacuum state protocol, we had to add some new optical and electronics components to id quantique and to attenuate each signal to the intensity of either signal state or weak decoy or vacuum state randomly. Results: In our implementation, the attenuation will be done by placing a VOA (variable optical attenuator in Alice’s side. Specifically, our QKD system required the polarizations of 2 pulses from the same signal to be orthogonal. Therefore the VOA must be polarization independent so as to attenuate the two pulses equally. The VOA utilized in experiment to attenuate signals dynamically was Intensity Modulator (IM. We had implemented weak + vacuum protocol on a modified commercial QKD system over a 25 km of telecom fibers with an unconditionally secure key rate of 6.2931x10-4 per pulse. Conclusion: By making simple modifications to a commercial quantum key distribution system, we could achieve much better performance with substantially higher key generation rate and longer distance than

  12. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  13. Cloud computing strategies

    CERN Document Server

    Chorafas, Dimitris N

    2011-01-01

    A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy. Based on extensive research, it examines the opportunities and challenges that loom in the cloud. It explains exactly what cloud computing is, what it has to offer, and calls attention to the important issues management needs to consider before passing the point of no return regarding financial commitments.

  14. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base. PMID:23615061

  15. Public Key Infrastructure: A Survey

    OpenAIRE

    Aysha Albarqi; Ethar Alzaid; Fatimah Al Ghamdi; Somaya Asiri; Jayaprakash Kar

    2014-01-01

    As security is essential in communications through electronic networks, development of structures providing high levels of security is needed. Public Key Infrastructure (PKI) is a way of providing security measures by implementing the means of key pairs among users. In this paper, an overview of the public key infrastructure is discussed that includes various components and operation, some well known PKIs and their comparisons. Also we discuss current implementations, risk and challenges of P...

  16. Compositional Advantage and Strategy

    DEFF Research Database (Denmark)

    Li, Xin

    all of the five basic compositional strategies. I argue there are three indispensable key success factors for a composition-based competition, i.e., aspiration (ambition-position asymmetry), attitude (being ALERT), and action (turning asymmetry into advantage). I also discuss the particular relevance......In this paper, I first critique the composition-based view of Yadong Luo and John Child for understanding how resource-poor firms survive and thrive. To remedy the deficiencies in their perspective, I then propose a dynamic theory of compositional advantage and strategy. Here, the compositional...... advantage is redefined as the attractiveness of the composition of the producer’s offering in terms of scope and perceived value/price ratio. I identify five ways or basic compositional strategies to improve the value/price ratio. A firm may have an overall compositional strategy that is composed of some or...

  17. Compositional Advantage and Strategy

    DEFF Research Database (Denmark)

    Li, Xin

    In this paper, I first critique the composition-based view of Yadong Luo and John Child for understanding how resource-poor firms survive and thrive. To remedy the deficiencies in their perspective, I then propose a dynamic theory of compositional advantage and strategy. Here, the compositional...... advantage is redefined as the attractiveness of the composition of the producer’s offering in terms of scope and perceived value/price ratio. I identify five ways or basic compositional strategies to improve the value/price ratio. A firm may have an overall compositional strategy that is composed of some or...... all of the five basic compositional strategies. I argue there are three indispensable key success factors for a composition-based competition, i.e., aspiration (ambition-position asymmetry), attitude (being ALERT), and action (turning asymmetry into advantage). I also discuss the particular relevance...

  18. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  19. Impact of Future Trends on Marketing Strategy

    OpenAIRE

    Dr R. K. Srivastava; S.T. Sakunke

    2011-01-01

    This paper describes how impact of product range, price level, product positioning and technological change can help in formulating optimal business strategy for automotive manufacturers. A key aspect of identifying future trend of market is the key gradient to formulate proper marketing strategy - Mr. Andrew Young (2008).

  20. Suggestions for Customer Strategy Updates : Finnish Customs

    OpenAIRE

    Kaisto, Raisa

    2014-01-01

    The case organization Finnish Customs wanted to be provided with new suggestions for their customer strategy updates. The first objective of this study was to study how the needs of the partnership and key customers are met in the customer strategy and provide suggestions for improvements. Another objective was to research the legislation influencing the customer strategy development. The customer strategy was created in 2004 and it was combined with other strategies in 2013. The customer...

  1. Cell-Based Strategies for Meniscus Tissue Engineering

    Science.gov (United States)

    Niu, Wei; Guo, Weimin; Han, Shufeng; Zhu, Yun; Liu, Shuyun; Guo, Quanyi

    2016-01-01

    Meniscus injuries remain a significant challenge due to the poor healing potential of the inner avascular zone. Following a series of studies and clinical trials, tissue engineering is considered a promising prospect for meniscus repair and regeneration. As one of the key factors in tissue engineering, cells are believed to be highly beneficial in generating bionic meniscus structures to replace injured ones in patients. Therefore, cell-based strategies for meniscus tissue engineering play a fundamental role in meniscal regeneration. According to current studies, the main cell-based strategies for meniscus tissue engineering are single cell type strategies; cell coculture strategies also were applied to meniscus tissue engineering. Likewise, on the one side, the zonal recapitulation strategies based on mimicking meniscal differing cells and internal architectures have received wide attentions. On the other side, cell self-assembling strategies without any scaffolds may be a better way to build a bionic meniscus. In this review, we primarily discuss cell seeds for meniscus tissue engineering and their application strategies. We also discuss recent advances and achievements in meniscus repair experiments that further improve our understanding of meniscus tissue engineering. PMID:27274735

  2. Cell-Based Strategies for Meniscus Tissue Engineering

    Directory of Open Access Journals (Sweden)

    Wei Niu

    2016-01-01

    Full Text Available Meniscus injuries remain a significant challenge due to the poor healing potential of the inner avascular zone. Following a series of studies and clinical trials, tissue engineering is considered a promising prospect for meniscus repair and regeneration. As one of the key factors in tissue engineering, cells are believed to be highly beneficial in generating bionic meniscus structures to replace injured ones in patients. Therefore, cell-based strategies for meniscus tissue engineering play a fundamental role in meniscal regeneration. According to current studies, the main cell-based strategies for meniscus tissue engineering are single cell type strategies; cell coculture strategies also were applied to meniscus tissue engineering. Likewise, on the one side, the zonal recapitulation strategies based on mimicking meniscal differing cells and internal architectures have received wide attentions. On the other side, cell self-assembling strategies without any scaffolds may be a better way to build a bionic meniscus. In this review, we primarily discuss cell seeds for meniscus tissue engineering and their application strategies. We also discuss recent advances and achievements in meniscus repair experiments that further improve our understanding of meniscus tissue engineering.

  3. Applying Strategies of Cooperative Learning Model to Hotel English Teaching in Higher Vocational Colleges%合作学习在高职酒店英语教学中的应用策略

    Institute of Scientific and Technical Information of China (English)

    周东妮; 陈遇春

    2016-01-01

    Cooperative Learning is regarded as one of the most effective and practical teaching model in 21st century ,which aims to improve the scores of the comprehensive group members .The paper begins with a brief study on Cooperative Learning teach‐ing model ,followed by analysis on English teaching status in higher vocational colleges and hotel staff's English abilities required in hotels .In the paper ,the author analyzes the suitability of applying Cooperative Learning teaching model in hotel English teaching ,and puts forward proposals of applying rules and steps of Cooperative Learning model in Hotel English teaching .%合作学习被认为是21世纪最有效、最实用的教学模式之一。在促进学习小组内个人学习的前提下,合作学习力求达到学习小组整体成绩的提高。文章对合作学习教学模式进行了描述性研究,并结合当前高职英语教与学的现状以及酒店对该行业从业人员英语能力要求等方面的探讨,对合作学习教学模式应用到实际英语教学活动中的可行性进行了分析,提出了合作学习在酒店英语课堂上实施的具体原则和步骤。

  4. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  5. 少儿志愿者激励策略初探--基于应用行为分析之强化原理%Probe into the Motivation Strategy for Children ’s Volunteers---Based on the Reinforcement Principal of Applied Behavior Analysis

    Institute of Scientific and Technical Information of China (English)

    袁嘉芮

    2015-01-01

    阐述了少儿志愿者活动中存在的问题,基于应用行为分析之强化原理,探讨了针对少儿心理行为特点建立激励策略的措施。%ABSTRACT:This paper expounds some problems existing in children’s volunteer activities, and based on the reinforcement principal of applied behavior analysis, probes into the measures for establishing the motivation strategies in the light of children’s psychological behavior characteristics.

  6. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  7. Classroom Questioning Strategies

    Institute of Scientific and Technical Information of China (English)

    陈小林

    2013-01-01

      Interaction has been playing a more and more important role in language research since the early 1970s,when the communicative teaching method was widely applied in language teaching. Questioning is the most common classroom interaction. This thesis analyzed the influence on students' immediate oral production by applying different teacher questioning strategies including teacher's question types,teacher question modification and teacher feedback.

  8. Strategy as simple rules.

    Science.gov (United States)

    Eisenhardt, K M; Sull, D N

    2001-01-01

    The success of Yahoo!, eBay, Enron, and other companies that have become adept at morphing to meet the demands of changing markets can't be explained using traditional thinking about competitive strategy. These companies have succeeded by pursuing constantly evolving strategies in market spaces that were considered unattractive according to traditional measures. In this article--the third in an HBR series by Kathleen Eisenhardt and Donald Sull on strategy in the new economy--the authors ask, what are the sources of competitive advantage in high-velocity markets? The secret, they say, is strategy as simple rules. The companies know that the greatest opportunities for competitive advantage lie in market confusion, but they recognize the need for a few crucial strategic processes and a few simple rules. In traditional strategy, advantage comes from exploiting resources or stable market positions. In strategy as simple rules, advantage comes from successfully seizing fleeting opportunities. Key strategic processes, such as product innovation, partnering, or spinout creation, place the company where the flow of opportunities is greatest. Simple rules then provide the guidelines within which managers can pursue such opportunities. Simple rules, which grow out of experience, fall into five broad categories: how- to rules, boundary conditions, priority rules, timing rules, and exit rules. Companies with simple-rules strategies must follow the rules religiously and avoid the temptation to change them too frequently. A consistent strategy helps managers sort through opportunities and gain short-term advantage by exploiting the attractive ones. In stable markets, managers rely on complicated strategies built on detailed predictions of the future. But when business is complicated, strategy should be simple. PMID:11189455

  9. Applied behavior analysis and statistical process control?

    OpenAIRE

    Hopkins, B. L.

    1995-01-01

    This paper examines Pfadt and Wheeler's (1995) suggestions that the methods of statistical process control (SPC) be incorporated into applied behavior analysis. The research strategies of SPC are examined and compared to those of applied behavior analysis. I argue that the statistical methods that are a part of SPC would likely reduce applied behavior analysts' intimate contacts with the problems with which they deal and would, therefore, likely yield poor treatment and research decisions. Ex...

  10. Quality-aware scheduling for key-value data stores

    CERN Document Server

    Xu, Chen

    2015-01-01

    This book comprehensively illustrates quality-ware scheduling in key-value stores. In addition, it provides scheduling strategies and a prototype framework of quality-aware scheduler as well as a demonstration of online applications. The book offers a rich blend of theory and practice which is suitable for students, researchers and practitioners interested in distributed systems, NoSQL key-value stores and scheduling.

  11. Finite key analysis for symmetric attacks in quantum key distribution

    International Nuclear Information System (INIS)

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n∼104, the finite key rate differs significantly from the asymptotic value for n→∞. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems

  12. Cedar Keys Wilderness study area : Cedar Keys National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document is a brief report on a wilderness study area located in the Cedar Keys National Wildlife Refuge. It discusses the history of the study area, its...

  13. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Harinarayan Tiwari; Nayan Sharma

    2015-10-01

    This paper presents fundamental outcomes from an experimental study on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). Hydrodynamic performance was tested in a circulated open channel that comprised of PKW and sand bed (d50 = 0.25 mm). Instantaneous velocities were measured at 20 cross sections using Laser Doppler Velocimeter (LDV) with constant discharge and depth. Average velocity and turbulence intensities in both directions were investigated. Average longitudinal velocities are found very much consistent at every point and maximum around the midway of inlet key. In transverse direction, flow is bifurcating in two directions which are also confirmed by average transverse velocity estimation. Variation of turbulence intensity presents average 10 times higher transverse turbulence than longitudinal turbulence near inlet key of PKW.

  14. Validação de limpeza de zidovudina: estratégia aplicada ao processo de fabricação de medicamentos anti-retrovirais Cleaning validation of zidovudine: strategy applied to the process manufacture of antiretroviral medicines

    Directory of Open Access Journals (Sweden)

    João Rui Barbosa de Alencar

    2004-03-01

    Full Text Available A validação de limpeza é parte integrante do conjunto de normas que compõem as boas práticas de fabricação de medicamentos. Trata-se de sistemática utilizada para assegurar que os procedimentos de limpeza de equipamentos, efetivamente, removam os resíduos existentes até um nível de aceitação pré-determinado. Poucos trabalhos abordando a validação de limpeza estão disponíveis na literatura concernente à área. Neste, apresenta-se estratégia para validação do processo de limpeza utilizado na fabricação do medicamento zidovudina, produzido pelo LAFEPE® (Recife - PE, Brasil largamente prescrito no tratamento da AIDS. Utilizou-se um método analítico por via espectrofotométrica e técnica de amostragem de superfícies por swab. O critério de aceitação da limpeza utilizado foi de 10 ppm de zidovudina no produto subseqüente (estavudina. Os resíduos de zidovudina encontrados nos equipamentos após a limpeza foram inferiores aos critérios de aceitação da limpeza, bem como do menor nível de concentração capaz de provocar ação farmacológica.The cleaning validation is integrant part of the laws of good manufacturing practices of medicines. Cleaning validation procedures are carried out in order to assure that residues are within acceptable limits after the cleaning process. Very little has been published regarding practices within the pharmaceutical industry. This work presents a strategy for cleaning validation of the process equipments of the medicine zidovudine produced by LAFEPE (Recife - PE, Brazil utilized in AIDS treatment. An analytical method by spectrofotometry and samples surfaces by swab was utilized. The acceptance criteria from the cleaning utilized was 10 ppm of zidovudine in the subsequent product (stavudine. The residues of zidovudine found in the equipment after cleaning were lower that limits established as well as to the smaller level of concentration capable of producing pharmacological effects.

  15. Applied large eddy simulation.

    Science.gov (United States)

    Tucker, Paul G; Lardeau, Sylvain

    2009-07-28

    Large eddy simulation (LES) is now seen more and more as a viable alternative to current industrial practice, usually based on problem-specific Reynolds-averaged Navier-Stokes (RANS) methods. Access to detailed flow physics is attractive to industry, especially in an environment in which computer modelling is bound to play an ever increasing role. However, the improvement in accuracy and flow detail has substantial cost. This has so far prevented wider industrial use of LES. The purpose of the applied LES discussion meeting was to address questions regarding what is achievable and what is not, given the current technology and knowledge, for an industrial practitioner who is interested in using LES. The use of LES was explored in an application-centred context between diverse fields. The general flow-governing equation form was explored along with various LES models. The errors occurring in LES were analysed. Also, the hybridization of RANS and LES was considered. The importance of modelling relative to boundary conditions, problem definition and other more mundane aspects were examined. It was to an extent concluded that for LES to make most rapid industrial impact, pragmatic hybrid use of LES, implicit LES and RANS elements will probably be needed. Added to this further, highly industrial sector model parametrizations will be required with clear thought on the key target design parameter(s). The combination of good numerical modelling expertise, a sound understanding of turbulence, along with artistry, pragmatism and the use of recent developments in computer science should dramatically add impetus to the industrial uptake of LES. In the light of the numerous technical challenges that remain it appears that for some time to come LES will have echoes of the high levels of technical knowledge required for safe use of RANS but with much greater fidelity. PMID:19531503

  16. Introducing an Evidential Reasoning Approach for Selecting Knowledge Management Strategies

    Directory of Open Access Journals (Sweden)

    Mohammad Shariatmadari

    2013-04-01

    Full Text Available In a knowledge economy, a key source of sustainable competitive advantage relies on the way to create, share, and utilize knowledge. In order to react to an increasingly competitive business environment, many companies emphasize the importance of Knowledge Management (KM, and base their KM strategy on their unique resources and capabilities. Although numerous works discuss the issues of how to perform a KM strategy and implement it successfully, few have provided methods that can systematically evaluate and model the KM strategy involving several complex factors. In this paper, the evidential reasoning (ER approach is applied as a method for KM strategy selection. The process of building a multiple criteria decision model of a hierarchical structure is presented, in which both quantitative and qualitative information is represented in a unified manner. The KM strategy selection is then fully investigated using the ER approach in a real case study in Academic Center for Education, Culture and Research (ACECR. Both the advantages of applying this model in practice and the analysis process itself are discussed.

  17. Biometrics based novel key distribution solution for body sensor networks.

    Science.gov (United States)

    Miao, Fen; Jiang, Lei; Li, Ye; Zhang, Yuan-Ting

    2009-01-01

    The security of wireless body sensor network (BSN) is very important to telemedicine and m-healthcare, and it still remains a critical challenge. This paper presents a novel key distribution solution which allows two sensors in one BSN to agree on a changeable cryptographic key. A previously published scheme, fuzzy vault, is firstly applied to secure the random cryptographic key generated from electrocardiographic (ECG) signals. Simulations based on ECG data from MIT PhysioBank database, produce a minimum half total error rate (HTER) of 0.65%, which demonstrates our key distribution solution is promising compared with previous method, with HTER of 4.26%. PMID:19964960

  18. Essays in applied microeconomics

    Science.gov (United States)

    Wang, Xiaoting

    In this dissertation I use Microeconomic theory to study firms' behavior. Chapter One introduces the motivations and main findings of this dissertation. Chapter Two studies the issue of information provision through advertisement when markets are segmented and consumers' price information is incomplete. Firms compete in prices and advertising strategies for consumers with transportation costs. High advertising costs contribute to market segmentation. Low advertising costs promote price competition among firms and improves consumer welfare. Chapter Three also investigates market power as a result of consumers' switching costs. A potential entrant can offer a new product bundled with an existing product to compensate consumers for their switching cost. If the primary market is competitive, bundling simply plays the role of price discrimination, and it does not dominate unbundled sales in the process of entry. If the entrant has market power in the primary market, then bundling also plays the role of leveraging market power and it dominates unbundled sales. The market for electric power generation has been opened to competition in recent years. Chapter Four looks at issues involved in the deregulated electricity market. By comparing the performance of the competitive market with the social optimum, we identify the conditions under which market equilibrium generates socially efficient levels of electric power. Chapter Two to Four investigate the strategic behavior among firms. Chapter Five studies the interaction between firms and unemployed workers in a frictional labor market. We set up an asymmetric job auction model, where two types of workers apply for two types of job openings by bidding in auctions and firms hire the applicant offering them the most profits. The job auction model internalizes the determination of the share of surplus from a match, therefore endogenously generates incentives for an efficient division of the matching surplus. Microeconomic

  19. Smartphones Could Make Keys Obsolete

    Institute of Scientific and Technical Information of China (English)

    Matt Richtel

    2011-01-01

    @@ Front pockets and purses are slowly being emptied of one of civilization's most basic and enduring tools: the key.It's being swallowed by the cellphone.New technology lets smartphones unlock hotel, office and house doors and open garages and even car doors. It's a not-too-distant cousin of the technology that allows key fobs to remotely unlock automobiles or key cards to be waved beside electronic pads at office entrances.What's new is that it is on the device more people are using as the Swiss Army knife of electronics, in equal parts phone, memo pad, stereo, map, GPS unit, and camera and game machine.

  20. Estrategias de Enseñanza a Distancia sobre Control No-Lineal Aplicada al Péndulo Invertido Strategies for Distance Learning Courses on Nonlinear Control Applied to the Inverted Pendulum

    Directory of Open Access Journals (Sweden)

    Sergio García-Nieto

    2007-01-01

    Full Text Available Este artículo describe el desarrollo de una herramienta software/hardware destinada al estudio, en el ámbito de la enseñanza universitaria, de sistemas de control distribuidos en tiempo real. El sistema se empleará en el control de procesos no lineales. Esta herramienta presenta tres partes claramente diferenciadas, las cuales pueden ser analizadas y modificadas por los estudiantes: i se introduce el modelo físico del péndulo invertido; ii el controlador es implementado en un sistema distribuido de tiempo real; y iii todo el sistema es manejado mediante una aplicación desarrollada en JAVA. Por lo tanto, los estudiantes tienen todos los elementos necesarios para trabajar con sistemas complejos no lineales, como el problema del péndulo invertido que se discute en este trabajo. Las pruebas realizadas muestran que la plataforma proporciona un método rápido y seguro de experimentación para los estudiantes.This paper presents a software/hardware tool to study, at university level, distributed control systems in real time. This platform is applied to control nonlinear processes. The system has three different parts which students can evaluate and modify; i a virtual model represents the physic model of the inverted pendulum; the controller is implemented by a real time distributed control system; and iii the whole system is managed with a JAVA application. Therefore, students have all the necessary elements to practice with complex nonlinear systems, such as the inverted pendulum discussed in this work. The tests done show that the plattform represents a fast and reliable method for experimentation by the students.

  1. 3 keys to defeating unconscious bias watch, think, act

    CERN Document Server

    Thiederman, Sondra

    2015-01-01

    Have you ever had a biased thought? If the answer is “yes,” join the club. Everybody has biases and, although that doesn’t make us bad people, it does mean we compromise our ability to get along with people who are different from us. The good news is, there’s a lot we can do to defeat bias. Calling on Dr. Sondra Thiederman’s twenty-five years of experience in the diversity/inclusion field, the book lays out an innovative WATCH, THINK, ACT strategy that each of us can immediately apply to the task. Easy-to-read and filled with anecdotes and activities, 3 Keys shows the reader: • How to WATCH their thoughts, experiences, and actions to identify unconscious biases and target them for extinction. • How to THINK in such a way as to weaken and control our biases. • How to ACT to defeat our biases and cultivate the kind of common ground that we know to be inhospitable to the survival of bias. Designed to motivate real change, the answer to defeating our biases is in these pages. The rest is up to you...

  2. Sensemaking and strategy

    DEFF Research Database (Denmark)

    Nielsen, Renate

    these processes my focus will be on how sensemaking processes are transformed into strategy and policies to be applied in daily routines. This way, I believe, we can learn more about how organisations develop and use this knowledge to gain further competitiveness. I will look at these processes on...

  3. Marketingová strategie u vybraného produktu na příkladu společnosti DuPont

    OpenAIRE

    Wojnar, Michal

    2009-01-01

    The bachelor thesis "Marketing Strategy of a Chosen Product on The Example of DuPont" is aimed at analyzing the marketing strategy and marketing mix of the Elvaloy material which is used in paving segment. The main applied methodology is called situation analysis through which the author compares individual key markets, reviews internal and external conditions of the company and studies the competition. The main objective of the thesis is also to present diminishing differences between indust...

  4. Secret Key Generation From Mobility

    CERN Document Server

    Gungor, Onur; Koksal, C Emre

    2011-01-01

    We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.

  5. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  6. Frame Based Symmetric Key Cryptography

    Directory of Open Access Journals (Sweden)

    Uttam Kr. Mondal

    2011-01-01

    Full Text Available There are huge numbers of algorithms available in symmetry key block cipher. All these algorithms have been used either complicated keys to produce cipher text from plain text or a complicated algorithms for it. The level of security of all algorithms is dependent on either number of iterations or length of keys. In this paper, a symmetry key block cipher algorithm has been proposed to encrypt plain text into cipher text or vice versa using a frame set. A comparative study have been made with RSA, DES, IDEA, BAM and other algorithms with Chi-square value, frequency distribution, bit ratio to check the security level of proposed algorithm. Finally, a comparison has been made for time complexity for encryption of plain text and decryption from cipher text with the well-known existing algorithms.

  7. Key Statistics for Thyroid Cancer

    Science.gov (United States)

    ... cancer? Next Topic Thyroid cancer risk factors Key statistics for thyroid cancer How common is thyroid cancer? ... remains very low compared with most other cancers. Statistics on survival rates for thyroid cancer are discussed ...

  8. A New Distribution Strategy : The Omnichannel Strategy

    Directory of Open Access Journals (Sweden)

    Mihaela Gabriela Belu

    2014-06-01

    Full Text Available In an increasingly globalized world, dependent on information technology, distribution companies are searching for new marketing models meant to enrich the consumer’s experience. Therefore, the evolution of new technologies, the changes in the consumer’s behaviour are the main factors that determine changes in the business model in the distribution field. The following article presents different forms of distribution, focusing on the omnichannel strategy. In the last part of the paper, the authors analyse the Romanian retail market, namely, the evolution of the market, its key competitors and the new distribution models adopted by retaileres in our country.

  9. Finite-key security analysis for multilevel quantum key distribution

    Science.gov (United States)

    Brádler, Kamil; Mirhosseini, Mohammad; Fickler, Robert; Broadbent, Anne; Boyd, Robert

    2016-07-01

    We present a detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite-key-length scenario. The finite secret key rates (in bits per detected photon) are calculated as a function of the length of the sifted key by (i) generalizing the uncertainly relation-based insight from BB84 to any d-level 2-MUB QKD protocol and (ii) by adopting recent advances in the second-order asymptotics for finite block length quantum coding (for both d-level 2- and 3-MUB QKD protocols). Since the finite and asymptotic secret key rates increase with d and the number of MUBs (together with the tolerable threshold) such QKD schemes could in principle offer an important advantage over BB84. We discuss the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons.

  10. Block Based Symmetry Key Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Satyendra Nath Mandal

    2012-08-01

    Full Text Available Visual cryptography is a method for protecting image-based secrets that has a computation-free decoding process. In this technique, numbers of shares have been generated from one image. The shares are sent through any channel to the receiver and the receiver can again produce original image by stacking all the shares in proper order. But, this method wastes a lot of bandwidth of the network. The techniques of generating shares have been used in several existing methods which are not unique. The different methods have been used in different types of images like binary, gray and color images. In this paper, a block based symmetry key visual cryptography algorithm has been proposed to convert image in encrypted form and decrypt the encrypted image into original form. The symmetric key has been generated from a real number. The encryption and decryption algorithm have been designed based on symmetry key. The algorithm with key has been used to encrypt image into single share and decrypt the single share into original image. The real number has been used to form the key may be predefined or may be sent by secure channel to the receiver. The proposed algorithm can be applied to any type images i.e. binary, gray scale and color images. A comparison has been made of the proposed algorithm with different existing algorithms like Ceaser cipher, transpose of matrix, bit comp, and transposition cipher based on the performance. The pixels distributed in original and share images have also been tested. Finally, it has shown that breaking of security level of proposed algorithm i.e. to guess the real number is huge time consuming.

  11. Evaluation Strategy

    DEFF Research Database (Denmark)

    Coto Chotto, Mayela; Wentzer, Helle; Dirckinck-Holmfeld, Lone

    2009-01-01

    The paper presents an evaluation strategy based on deliberate ideals and principles of dialogue design. The evaluation strategy is based on experiential phenomenology taking the point of departure for design and evaluation processes in the experienced practitioners themselves. The article presents...... the evaluation strategy and methodology of a research project Making Online Path to Enter new Markets, MOPEM. It is an EU-research project with partners from different Educational Institutions of Technology and Business in five European Countries....

  12. Marketing Strategy

    OpenAIRE

    Pokorná, Martina

    2012-01-01

    This diploma thesis deals with issues of marketing strategy of a company in chosen retail business. Its main aim is to suggest new advertising strategy of a company for the purpose of increasing awareness customers and marketability of products. On the grounds of consultations with the management of the company, analysis of current marketing strategy and results of market research I have fulfiled this task. In the theoretical part of this diploma thesis I deal with introduction to strat...

  13. Modern applied U-statistics

    CERN Document Server

    Kowalski, Jeanne

    2008-01-01

    A timely and applied approach to the newly discovered methods and applications of U-statisticsBuilt on years of collaborative research and academic experience, Modern Applied U-Statistics successfully presents a thorough introduction to the theory of U-statistics using in-depth examples and applications that address contemporary areas of study including biomedical and psychosocial research. Utilizing a "learn by example" approach, this book provides an accessible, yet in-depth, treatment of U-statistics, as well as addresses key concepts in asymptotic theory by integrating translational and cross-disciplinary research.The authors begin with an introduction of the essential and theoretical foundations of U-statistics such as the notion of convergence in probability and distribution, basic convergence results, stochastic Os, inference theory, generalized estimating equations, as well as the definition and asymptotic properties of U-statistics. With an emphasis on nonparametric applications when and where applic...

  14. DOE groundwater protection strategy

    International Nuclear Information System (INIS)

    EH is developing a DOE-wide Groundwater Quality Protection Strategy to express DOE's commitment to the protection of groundwater quality at or near its facilities. This strategy responds to a September 1986 recommendation of the General Accounting Office. It builds on EPA's August 1984 Ground-Water Protection Strategy, which establishes a classification system designed to protect groundwater according to its value and vulnerability. The purposes of DOE's strategy are to highlight groundwater protection as part of current DOE programs and future Departmental planning, to guide DOE managers in developing site-specific groundwater protection practices where DOE has discretion, and to guide DOE's approach to negotiations with EPA/states where regulatory processes apply to groundwater protection at Departmental facilities. The strategy calls for the prevention of groundwater contamination and the cleanup of groundwater commensurate with its usefulness. It would require long-term groundwater protection with reliance on physical rather than institutional control methods. The strategy provides guidance on providing long-term protection of groundwater resources; standards for new remedial actions;guidance on establishing points of compliance; requirements for establishing classification review area; and general guidance on obtaining variances, where applicable, from regulatory requirements. It also outlines management tools to implement this strategy

  15. Supporting culturally and linguistically diverse students during clinical placement: strategies from both sides of the table

    OpenAIRE

    O’Reilly, Sharleen L.; Milner, Julia

    2015-01-01

    Background Increasing proportions of Culturally and Linguistically Diverse (CALD) students within health professional courses at universities creates challenges in delivering inclusive training and education. Clinical placements are a core component of most health care degrees as they allow for applied learning opportunities. A research gap has been identified in regard to understanding challenges and strategies for CALD students in health professional placements. Methods A key stakeholder ap...

  16. Predicting Strategy and Listening Comprehension

    OpenAIRE

    Yongmei Jiang

    2009-01-01

    The author found certain potential obstacles that students encounter in their listening class, which she believes should be removed by a good class teaching method. However, traditional listening class fails. She goes on to explore integrating strategies into listening class, among the many strategies she choose the prediction strategy and describes it in three stages: Pre-listening, while-listening, and post-listening. Then a real model of applying prediction in listening class is given, who...

  17. Assessing self-regulation strategies

    DEFF Research Database (Denmark)

    de Vet, Emely; de Ridder, Denise T. D.; Stok, Marijn;

    2014-01-01

    Background: Applying self-regulation strategies have proven important in eating behaviors, but it remains subject to investigation what strategies adolescents report to use to ensure healthy eating, and adequate measures are lacking. Therefore, we developed and validated a self-regulation questio...

  18. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin;

    2016-01-01

    We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression, for...... instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  19. Symmetric-key cryptosystem with DNA technology

    Institute of Scientific and Technical Information of China (English)

    LU MingXin; LAI XueJia; XIAO GuoZhen; QIN Lei

    2007-01-01

    DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred to as DNA symmetric-key cryptosystem (DNASC). In DNASC,both encryption and decryption keys are formed by DNA probes, while its ciphertext is embedded in a specially designed DNA chip (microarray). The security of this system is mainly rooted in difficult biology processes and problems, rather than conventional computing technology, thus it is unaffected by changes from the attack of the coming quantum computer. The encryption process is a fabrication of a specially designed DNA chip and the decryption process is the DNA hybridization.In DNASC, billions of DNA probes are hybridized and identified at the same time,thus the decryption process is conducted in a massive, parallel way. The great potential in vast parallelism computation and the extraordinary information density of DNA are displayed in DNASC to some degree.

  20. Quantum key distribution with untrusted detectors

    Science.gov (United States)

    González, P.; Rebón, L.; Ferreira da Silva, T.; Figueroa, M.; Saavedra, C.; Curty, M.; Lima, G.; Xavier, G. B.; Nogueira, W. A. T.

    2015-08-01

    Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solution that might exceed the performance and practicality of the previous two in circumventing detector side-channel attacks, which arguably is the most hazardous part of QKD implementations. Our proposal has, however, one main requirement: the legitimate users of the system need to ensure that their labs do not leak any unwanted information to the outside. The security in the low-loss regime is guaranteed, while in the high-loss regime we already prove its robustness against some eavesdropping strategies.

  1. Key Value Considerations for Consultant Pharmacists.

    Science.gov (United States)

    Meyer, Lee; Perry, Ronald G; Rhodus, Susan M; Stearns, Wendy

    2016-07-01

    Managing the efficiency and costs of residents' drug regimens outside the acute-care hospital and through transitions of care requires a toolbox filled with cost-control tools and careful collaboration among the pharmacy provider(s), facility staff, and the consultant/senior care pharmacist. This article will provide the reader with key long-term care business strategies that affect the profitability of the pharmacy provider in various care settings while, at the same time, ensuring optimal therapy for residents as they transition across levels of care. Readers can take away ideas on how to access critical information, what they can do with this information, and how they can improve the overall care process. Four experts in various aspects of pharmacy management share their insights on pharmacy practice issues including formulary management, performance metrics, short-cycle dispensing challenges/solutions, cost-control measures, facility surveys, billing practices, medication reconciliation, prospective medication reviews, and transitions of care. PMID:27412312

  2. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  3. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  4. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  5. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  6. Key Revocation System for DNSSEC

    Directory of Open Access Journals (Sweden)

    Gilles Guette

    2008-06-01

    Full Text Available The Doma in Name System (DNS is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions (DNSSEC has been designed to protect the DNS protocol using public key cryptography and digital signatures. In this paper, we show how DNSSEC can be attacked using compromised keys and the consequences of such attacks. Then, we propose a new revocation scheme for DNSSEC based on two new resource records. There is currently no revocation system defined in the DNSSEC standard.

  7. Where is the engineering I applied for?

    DEFF Research Database (Denmark)

    Holmegaard, Henriette Tolstrup; Madsen, Lene Møller; Ulriksen, Lars

    2016-01-01

    explores how this encounter provides a platform for students to become integrated during first year. We find that students' expectations are poorly met by their first-year study programme. In their attempt to bridge the gap between their expectations and their experiences, the students apply three...... strategies: some endure the gap, some constantly try out different study strategies and some compromised their expectations and identities to become more aligned with the study programme. The findings show that even when students successfully manage to bridge the gap, their strategy may turn out to be...

  8. MARKETING STRATEGIES BASED ON THE BUYING PROCESS

    OpenAIRE

    LIVIU NEAMŢU; ADINA CLAUDIA NEAMŢU

    2016-01-01

    In marketing, due to dynamic, rapid and permanent changes known on the market, we will talk more about politics than about strategy, the time horizon covered is much lower than that contained in a classic strategy, with a risk that elements and criteria to which we refer are no longer current. Sales growth strategies are, in fact, combination strategies and consist in the company applying, in its different units, different strategies, according to the requirement of appropriate st...

  9. Typhoid fever vaccination strategies.

    Science.gov (United States)

    Date, Kashmira A; Bentsi-Enchill, Adwoa; Marks, Florian; Fox, Kimberley

    2015-06-19

    Typhoid vaccination is an important component of typhoid fever prevention and control, and is recommended for public health programmatic use in both endemic and outbreak settings. We reviewed experiences with various vaccination strategies using the currently available typhoid vaccines (injectable Vi polysaccharide vaccine [ViPS], oral Ty21a vaccine, and injectable typhoid conjugate vaccine [TCV]). We assessed the rationale, acceptability, effectiveness, impact and implementation lessons of these strategies to inform effective typhoid vaccination strategies for the future. Vaccination strategies were categorized by vaccine disease control strategy (preemptive use for endemic disease or to prevent an outbreak, and reactive use for outbreak control) and vaccine delivery strategy (community-based routine, community-based campaign and school-based). Almost all public health typhoid vaccination programs used ViPS vaccine and have been in countries of Asia, with one example in the Pacific and one experience using the Ty21a vaccine in South America. All vaccination strategies were found to be acceptable, feasible and effective in the settings evaluated; evidence of impact, where available, was strongest in endemic settings and in the short- to medium-term. Vaccination was cost-effective in high-incidence but not low-incidence settings. Experience in disaster and outbreak settings remains limited. TCVs have recently become available and none are WHO-prequalified yet; no program experience with TCVs was found in published literature. Despite the demonstrated success of several typhoid vaccination strategies, typhoid vaccines remain underused. Implementation lessons should be applied to design optimal vaccination strategies using TCVs which have several anticipated advantages, such as potential for use in infant immunization programs and longer duration of protection, over the ViPS and Ty21a vaccines for typhoid prevention and control. PMID:25902360

  10. Applying Pesticides Safely

    OpenAIRE

    Latimer, Joyce G.

    2009-01-01

    Proper use of pesticides is essential for your safety and for that of the environment. Pesticides must be used correctly to be effective. This publication reviews the key factors in the proper use of pesticides.

  11. ANALYSIS OF PETROBRAS? CORPORATE STRATEGY

    OpenAIRE

    Devine, Jeff

    2009-01-01

    This document presents an analysis of Petrobras? corporate strategy to enhance the firm?s competitiveness in the industry. The document provides an industry analysis that identifies the company?s current position and a strategic alternative that will improve the company?s performance. The industy analysis determines the structure of the industry and the competitive forces identify the key success factors. The key success factors pinpoint the opportunities and threats to form the strategic alt...

  12. Fatores críticos para o sucesso no desempenho de novos produtos: um estudo aplicado ao setor moveleiro da Serra Gaúcha Key factors for success in the new product development: an applied study in the furniture industry of Serra Gaúcha

    Directory of Open Access Journals (Sweden)

    Deonir De Toni

    2011-01-01

    Full Text Available Uma melhor performance de um novo produto no mercado pode ser alcançada pela adoção de um conjunto de estratégia e ações que sirvam de suporte para a gestão de novos projetos. A questão central deste estudo é: por que alguns novos produtos são bem-sucedidos enquanto muitos outros fracassam? A partir disso, o estudo teve por objetivo testar um modelo visando dar respostas a esta questão de pesquisa. Para tanto, foi implementada uma pesquisa do tipo survey em empresas do setor moveleiro da Serra Gaúcha utilizando um instrumento de pesquisa que integra fatores mercadológicos, organizacionais, operacionais e o desempenho do processo de desenvolvimento de novos produtos (PDNP. Com isso, foi possível fazer um comparativo entre esta pesquisa e dois estudos anteriores realizados com o mesmo enfoque (BOEHE; MILAN; DE TONI, 2009; DE TONI; BOEHE, 2006. Os resultados são semelhantes e contribuem com a literatura existente, pois têm a preocupação de integrar essas três dimensões, analisando como elas estão relacionadas e qual o seu impacto no PDNP. Com a finalidade de testar as hipóteses do modelo proposto, foram utilizados três modelos de regressão múltipla hierárquica. Os resultados sugerem que, para a amostra analisada, a estratégia de inovação e a reação dos concorrentes são os dois fatores que mais impactam no desempenho do PDNP. Dessa forma, observou-se que o desempenho no PDNP não depende apenas de uma única dimensão ou fator. Mais do que isso, os resultados da regressão múltipla indicam que a combinação entre as três dimensões, organizacional, mercadológica e operacional, explica de maneira mais significativa o desempenho do PDNP.A better performance of a product in the market may be achieved by adopting a new set of strategies and actions that support the management of new products. The central issue of this study is: why do some products succeed while others fail? Starting from this point, this study aims

  13. Niger; Poverty Reduction Strategy Paper

    OpenAIRE

    International Monetary Fund

    2013-01-01

    The Government of the Republic of Niger has implemented the Poverty Reduction Strategy (PRS), which describes the country's macroeconomic, structural, and social policies in support of growth and poverty reduction. This strategy is based on the conviction that poverty can be reduced through strong and sustained economic growth that creates wealth and jobs. The study is the outcome of a concerted analysis. The first part outlines the diagnosis and key factors of poverty and the second part pre...

  14. Analysis of Muji's Business Strategy

    Institute of Scientific and Technical Information of China (English)

    范晶

    2011-01-01

    This article is a report of analysis of Muji's business strategy.First,the vision and mission are introduced.Second,the current strategy is identified.Then the industry analysis,industry driving forces,key success factors,value chain analysis,competitive advantage,competitive power of the competitive advantage were analyzed.At last,on the basis of the former analysis the SWOT analysis was worked out.

  15. Formulation of price strategies in the software sector: outsourcing of development and maintenance software product case

    Directory of Open Access Journals (Sweden)

    Antonio Cezar Bornia

    2008-07-01

    Full Text Available The main goal of this article is to discuss the formulation of price strategies in the software sector. In the intention of reaching the proposed goal, strategies models of prices are introduced along with the procedure to the formulation of price strategies, composed by five stages: external and internal analyses, consolidation, positioning, price strategy formalization and market attendance. As for the methodology, the study is classified as qualitative, exploratory, descriptive, documental, of field and case study, according to the approach of Vergara (1998. In the case study, the model to the formulation of price strategies is applied in a company’s software sector, being analyzed the outsourcing of development and maintenance software product. As main contributions, it is highlighted the price procedure application that emphasizes strategic price logic and prices strategies formulations, with base in the analysis of five main factors: quality, comparison with the competition, company life cycle, product life cycle and characteristics of the segment-objective. Based on the analyzed factors, a possible strategy to be adopted considering the characteristics of the product and the company is the price strategy and superior value. Key-words: Pricing Strategies. Price Formulation. Software Enterprises.

  16. Overview, conclusions, and key recommendations

    NARCIS (Netherlands)

    R. Loeber; D.P. Farrington; J.C. Howell; M. Hoeve

    2012-01-01

    Section I of this chapter summarizes the most important points of Chapters 2 to 5 and relevant portions of Chapter 10 (which concerns European issues) by addressing key findings that are relevant for juveniles’ transition of offending from adolescence (up to age 18) into adulthood. Section I focuses

  17. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars;

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that...... different structural problems can be reproduced successfully....

  18. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  19. Key Elements of Social Innovation

    OpenAIRE

    Allyson Hewitt

    2008-01-01

    This article describes four key elements of social innovation: i) social technology; ii) innovation intermediaries; iii) people who drive innovation; and iv) openness. By taking experiences from social technology and examining the impact of "open everything", this article posits the value of innovation intermediaries as critical enablers of success in the emergent field of social innovation.

  20. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  1. Export strategy

    DEFF Research Database (Denmark)

    Knudsen, Thorbjørn; Koed Madsen, Tage

    2002-01-01

    on insights from DCP in order to devise a theoretical basis that could enrich export strategy research. Although our development of DCP insights builds on previous work, it also adds a crucial distinction between knowledge stocks and informational architecture. Changes in architecture are of greater......It is argued here that traditional export strategy research (encompassing the study of internationalization processes and export performance) is characterized by weak theoretical foundations and could benefit from a reorientation towards a dynamic capabilities perspective (DCP). We seek to draw...... importance. Following this elaboration of the dynamic capabilities perspective, we outline some implications and guidelines for future export strategy research....

  2. Safety strategy

    International Nuclear Information System (INIS)

    The basis for safety strategy in nuclear industry and especially nuclear power plants is the prevention of radioactivity release inside or outside of the technical installation. Therefore either technical or administrative measures are combined to a general strategy concept. This introduction will explain in more detail the following topics: - basic principles of safety - lines of assurance (LOA) - defense in depth - deterministic and probabilistic methods. This presentation is seen as an introduction to the more detailed discussion following in this course, nevertheless some selected examples will be used to illustrate the aspects of safety strategy development although they might be repeated later on. (orig.)

  3. Determination of key enzymes for threonine synthesis through in vitro metabolic pathway analysis

    OpenAIRE

    Zhang, Yanfei; Meng, Qinglong; Ma, Hongwu; Liu, Yongfei; Cao, Guoqiang; Zhang, Xiaoran; Zheng, Ping; Sun, Jibin; Zhang, Dawei; Jiang, Wenxia; Ma, Yanhe

    2015-01-01

    Background The overexpression of key enzymes in a metabolic pathway is a frequently used genetic engineering strategy for strain improvement. Metabolic control analysis has been proposed to quantitatively determine key enzymes. However, the lack of quality data often makes it difficult to correctly identify key enzymes through control analysis. Here, we proposed a method combining in vitro metabolic pathway analysis and proteomics measurement to find the key enzymes in threonine synthesis pat...

  4. Group secret key generation in wireless networks:algorithms and rate optimization

    OpenAIRE

    Xu, Peng; Cumanan, Kanapathippillai; Ding, Zhiguo; Dai, Xuchu

    2016-01-01

    This paper investigates group secret key generation problems for different types of wireless networks, by exploiting physical layer characteristics of wireless channels. A new group key generation strategy with low complexity is proposed, which combines the well-established point-to-point pairwise key generation technique, the multisegment scheme, and the one-time pad. In particular, this group key generation process is studied for three types of communication networks: 1) the three-node netw...

  5. A dyadic trust perspective of key account relationship development in the UK mortgage industry

    OpenAIRE

    Murray, Sharon Lee

    2007-01-01

    The main purpose of this study is to examine how a dyadic trust perspective can support effective development of key account relationships. The need for Key Account Management in the UK Mortgage Industry is investigated, factors for effective key account relationship management are identified and a trust/Mortgage Lender and Intermediary perspective of Key Account relationship effectiveness is analysed. The results of this study have been achieved through a mixed methods research strategy and ...

  6. Ant Colony Optimization for Inferring Key Gene Interactions

    OpenAIRE

    Raza, Khalid; Kohli, Mahish

    2014-01-01

    Inferring gene interaction network from gene expression data is an important task in systems biology research. The gene interaction network, especially key interactions, plays an important role in identifying biomarkers for disease that further helps in drug design. Ant colony optimization is an optimization algorithm based on natural evolution and has been used in many optimization problems. In this paper, we applied ant colony optimization algorithm for inferring the key gene interactions f...

  7. Strategies and methodologies for applied marine radioactivity studies

    International Nuclear Information System (INIS)

    The main objective of this document is to provide basic training in the theoretical background and practical applications of the methodologies for the measurement, monitoring and assessment of radioactivity in marine environment. This manual is a compilation of lectures and notes that have been presented at previous training courses. The document contains 16 individual papers, each of them was indexed separately

  8. The Risk Management Strategy of Applying Cloud Computing

    Directory of Open Access Journals (Sweden)

    Tien-Chun Chen

    2012-09-01

    Full Text Available It is inevitable that Cloud Computing will trigger off some loss exposures. Unfortunately, not much of scientific and objective researches had been focused on the identification and evaluation of loss exposures stemming from applications of Cloud Computing. In order to fill this research gap, this study attempts to identify and analyze loss exposures of Cloud Computing by scientific and objective methods which provide the necessary information to administrators in support of decisions of risk management. In conclusion, this study has identified “Social Engineering”, “Cross-Cloud Compatibility” and “Mistakes are made by employees intentionally or accidentally” are high priority risks to be treated. The findings also revealed that people who work in the field of information or Cloud Computing are somehow ignorant of where the risks in Cloud Computing lie due to its novelty and complication.

  9. Interdisciplinary Instructional Reading Strategies: An Applied Application for Business Education

    Science.gov (United States)

    Polkinghorne, Frederick W.; Bland, Zinna L.

    2011-01-01

    The contemporary workforce requires technical and reading skills (Shanahan & Shanahan, 2008; The Conference Board, Corporate Voices for Working Families, Partnership for 21st Century Skills, Society of Human Resource Management, 2006). Technical skills allow workers to perform specific workforce tasks, while reading skills are generally needed by…

  10. Image remapping strategies applied as protheses for the visually impaired

    Science.gov (United States)

    Johnson, Curtis D.

    1993-01-01

    Maculopathy and retinitis pigmentosa (rp) are two vision defects which render the afflicted person with impaired ability to read and recognize visual patterns. For some time there has been interest and work on the use of image remapping techniques to provide a visual aid for individuals with these impairments. The basic concept is to remap an image according to some mathematical transformation such that the image is warped around a maculopathic defect (scotoma) or within the rp foveal region of retinal sensitivity. NASA/JSC has been pursuing this research using angle invariant transformations with testing of the resulting remapping using subjects and facilities of the University of Houston, College of Optometry. Testing is facilitated by use of a hardware device, the Programmable Remapper, to provide the remapping of video images. This report presents the results of studies of alternative remapping transformations with the objective of improving subject reading rates and pattern recognition. In particular a form of conformal transformation was developed which provides for a smooth warping of an image around a scotoma. In such a case it is shown that distortion of characters and lines of characters is minimized which should lead to enhanced character recognition. In addition studies were made of alternative transformations which, although not conformal, provide for similar low character distortion remapping. A second, non-conformal transformation was studied for remapping of images to aid rp impairments. In this case a transformation was investigated which allows remapping of a vision field into a circular area representing the foveal retina region. The size and spatial representation of the image are selectable. It is shown that parametric adjustments allow for a wide variation of how a visual field is presented to the sensitive retina. This study also presents some preliminary considerations of how a prosthetic device could be implemented in a practical sense, vis-a-vis, size, weight and portability.

  11. Applying medicinal chemistry strategies to understand odorant discrimination

    OpenAIRE

    Poivet, Erwan; Peterlin, Zita; Tahirova, Narmin; Xu, Lu; Altomare, Clara; Paria, Anne; Zou, Dong-Jing; Firestein, Stuart

    2016-01-01

    Associating an odorant's chemical structure with its percept is a long-standing challenge. One hindrance may come from the adoption of the organic chemistry scheme of molecular description and classification. Chemists classify molecules according to characteristics that are useful in synthesis or isolation, but which may be of little importance to a biological sensory system. Accordingly, we look to medicinal chemistry, which emphasizes biological function over chemical form, in an attempt to...

  12. Weighted gene coexpression network analysis strategies applied to mouse weight

    OpenAIRE

    Fuller, Tova F; Ghazalpour, Anatole; Aten, Jason E.; Drake, Thomas A; Lusis, Aldons J.; Horvath, Steve

    2007-01-01

    Systems-oriented genetic approaches that incorporate gene expression and genotype data are valuable in the quest for genetic regulatory loci underlying complex traits. Gene coexpression network analysis lends itself to identification of entire groups of differentially regulated genes—a highly relevant endeavor in finding the underpinnings of complex traits that are, by definition, polygenic in nature. Here we describe one such approach based on liver gene expression and genotype data from an ...

  13. COMMAND AND CONTROL STRATEGIES APPLIED TO HIGHPOWER STEAM GENERATORS

    OpenAIRE

    DUINEA. A.M.; MIRCEA P.M.

    2015-01-01

    The paper presents the analysis of the actual operation scheme existing for steam generator drum. Following the trend valid for forced circulation steam generator, it is proposed to replace the classical adjustment loops with new regulation scheme highlighting its advantages in steam generation operation.

  14. COMMAND AND CONTROL STRATEGIES APPLIED TO HIGHPOWER STEAM GENERATORS

    Directory of Open Access Journals (Sweden)

    DUINEA. A.M.

    2015-06-01

    Full Text Available The paper presents the analysis of the actual operation scheme existing for steam generator drum. Following the trend valid for forced circulation steam generator, it is proposed to replace the classical adjustment loops with new regulation scheme highlighting its advantages in steam generation operation.

  15. The Risk Management Strategy of Applying Cloud Computing

    OpenAIRE

    Tien-Chun Chen; Chiang Ku Fan

    2012-01-01

    It is inevitable that Cloud Computing will trigger off some loss exposures. Unfortunately, not much of scientific and objective researches had been focused on the identification and evaluation of loss exposures stemming from applications of Cloud Computing. In order to fill this research gap, this study attempts to identify and analyze loss exposures of Cloud Computing by scientific and objective methods which provide the necessary information to administrators in support of decisions of risk...

  16. Mask strategy at International SEMATECH

    Science.gov (United States)

    Kimmel, Kurt R.

    2002-08-01

    International SEMATECH (ISMT) is a consortium consisting of 13 leading semiconductor manufacturers from around the globe. Its objective is to develop the infrastructure necessary for its member companies to realize the International Technology Roadmap for Semiconductors (ITRS) through efficiencies of shared development resources and knowledge. The largest area of effort is lithography, recognized as a crucial enabler for microelectronics technology progress. Within the Lithography Division, most of the efforts center on mask-related issues. The development strategy at International SEMATCH will be presented and the interlock of lithography projects clarified. Because of the limited size of the mask production equipment market, the business case is weak for aggressive investment commensurate with the pace of the International Technology Roadmap for Semiconductors. With masks becoming the overwhelming component of lithography cost, new ways of reducing or eliminating mask costs are being explored. Will mask technology survive without a strong business case? Will the mask industry limit the growth of the semiconductor industry? Are advanced masks worth their escalating cost? An analysis of mask cost from the perspective of mask value imparted to the user is presented with examples and generic formulas for the reader to apply independently. A key part to the success for both International SEMATECH and the industry globally will be partnerships on both the local level between mask-maker and mask-user, and the macro level where global collaborations will be necessary to resolve technology development cost challenges.

  17. Environmental strategy

    DEFF Research Database (Denmark)

    Zabkar, Vesna; Cater, Tomaz; Bajde, Domen;

    2013-01-01

    Environmental issues and the inclusion of environmental strategies in strategic thinking is an interesting subject of investigation. In general, managerial practices organized along ecologically sound principles contribute to a more environmentally sustainable global economy. From the managerial ...

  18. Advances in Applied Mechanics

    OpenAIRE

    2014-01-01

    Advances in Applied Mechanics draws together recent significant advances in various topics in applied mechanics. Published since 1948, Advances in Applied Mechanics aims to provide authoritative review articles on topics in the mechanical sciences, primarily of interest to scientists and engineers working in the various branches of mechanics, but also of interest to the many who use the results of investigations in mechanics in various application areas, such as aerospace, chemical, civil, en...

  19. Perspectives on Applied Ethics

    OpenAIRE

    2007-01-01

    Applied ethics is a growing, interdisciplinary field dealing with ethical problems in different areas of society. It includes for instance social and political ethics, computer ethics, medical ethics, bioethics, envi-ronmental ethics, business ethics, and it also relates to different forms of professional ethics. From the perspective of ethics, applied ethics is a specialisation in one area of ethics. From the perspective of social practice applying eth-ics is to focus on ethical aspects and ...

  20. Strategie podniku

    OpenAIRE

    BLÁHOVÁ, Iveta

    2008-01-01

    The subject of this bachelor paper was elaboration of a business strategy for selected company. The main purpose was to evaluate the business of the company in order to prepare or change its strategy. Methods used for evalution of the position of the company: financial analysis, analysis of external environment, STEP analysis, SWOT analysis, operating model. All processed information related to periods 2006 and 2007.

  1. Globalization strategy

    OpenAIRE

    SHIMIZU, RYUEI

    1992-01-01

    History of overseas strategies of Japanese firms can be divided into three periods; until 1960's, when import and export were the main focus; from 1970's to the first half of 1980's, when establishing overseas bases was a major interest for clear purposes of reducing labor cost, averting trade conflicts, or securing natural resources; and after 1985, when strategy started to be formulated from more global viewpoint in order to cope with new situation arising from stronger yen and Japan having...

  2. Strategie podniku

    OpenAIRE

    Brabcová, Sanda

    2009-01-01

    The aim of this thesis is to conduct strategic analysis and create a strategy for travel agency Autoturist a.s. Part of the analysis is research on external environment that includes PEST analysis, 4C method and Porter's five forces analysis. Internal environment is explored especilly with financial analysis, analysis of resources and SWOT analysis. Outcome is to propose concrete strategy for selected company.

  3. Applied Neuroscience Laboratory Complex

    Data.gov (United States)

    Federal Laboratory Consortium — Located at WPAFB, Ohio, the Applied Neuroscience lab researches and develops technologies to optimize Airmen individual and team performance across all AF domains....

  4. E-Voting Protocol Based On Public-Key Cryptography

    Directory of Open Access Journals (Sweden)

    Hayam K. Al-Anie

    2011-08-01

    Full Text Available In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem. This protocol is summarized in three processes: firstly, access control process which involves the identification and authentication phases for the applied citizens. Secondly, the voting process which will be done byciphering the voter information using public-key encryption cryptosystem (RSA, to be submitted over an insecure network to the specified government election server. Finally, the election server administrator will sort the final result by deciphering the received encrypted information using RSA private key. Actually, this E-Voting protocol is more efficient than others E-Voting protocols since the voter can vote from his/her own personal computer (PC without any extra cost and effort. The RSA public-key encryption system ensures the security of the proposed protocol. However, to prevent a brute force attack, the choice of the key size becomes crucial.

  5. Information Systems Management: an Australian view of the key issues

    OpenAIRE

    Graham Pervan

    1994-01-01

    Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The re...

  6. Key Lake human resources and northern business initiative

    International Nuclear Information System (INIS)

    The Key Lake Operation is committed to a policy of maximizing Saskatchewan, and particularly northern Saskatchewan, employment and business opportunities. The participation rate of northern people in the Key Lake operation's workforce has risen from 23.8% in 1983, to 42% today. Cameco's objective is to achieve 50% representation of residents of Saskatchewan's north in the Key Lake workforce by 1995. The company also extends this strategic objective to contractors. All contractors are required to maximize employment opportunities for residents of Saskatchewan's north, and report employment levels to the company as a condition of the contract. Today, contractors at the Key Lake site have achieved a northern participation rate of 47%. This paper highlights strategies for increasing northern/aboriginal participation and provides several examples of successes from these initiatives. (author)

  7. Identification Schemes from Key Encapsulation Mechanisms

    Science.gov (United States)

    Anada, Hiroaki; Arita, Seiko

    We propose a generic conversion from a key encapsulation mechanism (KEM) to an identification (ID) scheme. The conversion derives the security for ID schemes against concurrent man-in-the-middle (cMiM) attacks from the security for KEMs against adaptive chosen ciphertext attacks on one-wayness (one-way-CCA2). Then, regarding the derivation as a design principle of ID schemes, we develop a series of concrete one-way-CCA2 secure KEMs. We start with El Gamal KEM and prove it secure against non-adaptive chosen ciphertext attacks on one-wayness (one-way-CCA1) in the standard model. Then, we apply a tag framework with the algebraic trick of Boneh and Boyen to make it one-way-CCA2 secure based on the Gap-CDH assumption. Next, we apply the CHK transformation or a target collision resistant hash function to exit the tag framework. And finally, as it is better to rely on the CDH assumption rather than the Gap-CDH assumption, we apply the Twin DH technique of Cash, Kiltz and Shoup. The application is not “black box” and we do it by making the Twin DH technique compatible with the algebraic trick. The ID schemes obtained from our KEMs show the highest performance in both computational amount and message length compared with previously known ID schemes secure against concurrent man-in-the-middle attacks.

  8. The Body: The Key Concepts

    OpenAIRE

    Blackman, Lisa

    2008-01-01

    Questions around 'the body' are central to social theory. Our changing understanding of the body now challenges the ways we conceive power, ideology, subjectivity and social and cultural process. The Body: the key concepts highlights and analyses the debates which make the body central to current sociological, psychological, cultural and feminist thinking. Today, questions around the body are intrinsic to a wide range of debates - from technological developments in media and communications, t...

  9. Keys for rural territorial development

    OpenAIRE

    Juan Patricio Molina

    2010-01-01

    This article presents the introductory discourse of the Symposium on Rural Development with Territorial Approach organized by the Research Group on Rural Management and Development at Universidad Nacional de Colombia, held in Bogotá on march 4 and 5 2010. As the framework of the sixty papers presented at the symposium, the concepts of territory and rural development with territorial approach are introduced. Five key elements of rural territorial development are examined.

  10. Key Topics in Sports Medicine

    OpenAIRE

    Amir Ali Narvani; Panagiotis Thomas; Burce Lynn

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  11. Key issues in managed competition.

    OpenAIRE

    Shapiro, D W

    1994-01-01

    All managed competition proposals for health system reform must confront several key issues. The premiums paid to health care purchasing cooperatives will need to be subsidized for those who cannot pay full fare; the amount and sources of the subsidies are controversial political issues. The payments passed on by purchasing cooperatives to health plans must be risk adjusted to account for differences in the health care needs of their enrolled populations. This is essential to create a level p...

  12. OCDMA Network and Key Technology

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    OCDMA's network application on LAN, metro-ring and backbone networks are discussed. Its simple tell-go protocol makes it a powerful competitor with CSMA/CD in optical LANs. Its large soft capacity could erase the wavelength routing algorithm of WDM based metro-ring. And its content susceptibility could be largely used in label switching backbone network. And why should be 2D CODEC as well as interference cancellation is although mentioned as OCDMA key technology.

  13. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  14. Detector decoy quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Moroder, Tobias; Luetkenhaus, Norbert [Quantum Information Theory Group, Institute of Theoretical Physics I, University Erlangen-Nuremberg, Staudtstrasse 7/B2, 91058 Erlangen (Germany); Curty, Marcos [ETSI Telecomunicacion, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, E-36310 Vigo (Spain)], E-mail: tmoroder@iqc.ca

    2009-04-15

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  15. KeySpan Energy Canada

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-09-01

    Operating in Alberta, KeySpan is a gas processing company with 14 gas plant facilities and pipelines in the province. Since its employees are sometimes working at remote locations, it has been difficult to use conventional classroom and seminar learning techniques to meet training needs. Cost-effective and innovative learning delivery solutions are now available from sophisticated information and communication technologies such as the Internet. In 1998, the Capability Development System (CDS) was developed by KeySpan as an on-line training system. It comprised a software assessment tool, a number of skills profiles for different occupations, and a curriculum registry providing technical information on the gas processing industry. E-learning initiatives are focused on specific projects or business units in order to better manage the training outcomes. The e-learning experience of KeySpan has resulted in benefits such as: better support to its customers and clients' needs through focused training on company-critical processes, services, products, and functions; more efficient employees; and, employees that feel part of the team.

  16. Applied Linguistics: Brazilian Perspectives

    Science.gov (United States)

    Cavalcanti, Marilda C.

    2004-01-01

    The aim of this paper is to present perspectives in Applied Linguistics (AL) against the background of a historical overview of the field in Brazil. I take the stance of looking at AL as a field of knowledge and as a professional area of research. This point of view directs my reflections towards research-based Applied Linguistics carried out from…

  17. Teaching International Nursing Students: Challenges and Strategies.

    Science.gov (United States)

    Carty, Rita M.; Hale, Janet F.; Carty, Gina; Williams, Joyce; Rigney, Dawn; Principato, Jerold J.

    1998-01-01

    George Mason University conducted a nursing education program for Saudi students. Cultural differences necessitated creative strategies to accommodate learning. Didactic and clinical methods of knowledge acquisition were used. Communication and flexibility were key elements. (SK)

  18. The EURATOM Programme - a strategy for the future

    International Nuclear Information System (INIS)

    The EURATOM Framework Programme, implementing R and D actions in the general field of applied nuclear science and technology, is now in its 7th edition. It seeks to maximise Community added value in a key area of research with a long tradition of European excellence. The objectives of the programmes have changed over the years, responding to many trends and developments. In particular, the strategy for the future being laid out now is paving the way for a truly integrative and coordinated programme of R and D in Europe in the areas of nuclear fission and related technologies. The EURATOM programme is instrumental in this drive to establish a widespread and effective European Research Area in this field, and is providing a focal point for many of the initiatives that are currently being witnessed. However, success can only be achieved with the full involvement and support of the key European R and D stakeholder organisations. (author)

  19. Applying Product Configuration Systems in Engineering Companies

    DEFF Research Database (Denmark)

    Ladeby, Klaes Rohde

    engineering companies?” Product configuration systems are a fairly young field of research, and the literature used in this project is presented in chapter 2. Chapter 3 begins with a discussion of the scientific point of view, and develops the research questions are by an investigation into shortcomings and......This Ph.D. thesis looks into the application of configuration systems in engineering companies, and how configuration systems can be used to support business processes in engineering companies. Often the motivation stated by researchers and practitioners is, that a configuration project is a......,133 books apply. Type it in on Google scholar and 8,580,000 homepages apply3. Obviously, strategy is an important subject. However, the subject also seems to be difficult to perceive. Although this thesis is not about strategy, or strategizing, I would like to pursue the definition of strategy one step...

  20. Influence of the Personalization and Codification Strategies on Successful Knowledge Management Case Study: National Iranian Oil Company

    Directory of Open Access Journals (Sweden)

    Roghyeh Nouri

    2013-06-01

    Full Text Available Successful implementation of Knowledge Management (KM involves on identification the most effective associated factors. Hence well-thought-out of organization strategy often is absent in implementing KM. Moreover resource restrictions lead us to prioritize them. Consequently, organizations are looking to prioritize the projects for deploying KM in order to invest on the infrastructural projects based on that. The purpose of this study is on identifying, classifying and ranking the enablers related to four key factors of people, process, leadership and information technology based on two given KM strategies. The quantitative approach was utilized in collecting data through questionnaire. In order to approve and classify the identified enablers in each key factor, a quantitative approach was utilized in collecting data through a few justifiable reliable questionnaires. We designed them using Delphi method and distributed among organization experts. Significant factors extracted from applying an exploratory factor analysis using the SPSS package. In order to prioritize the extracted enabler’s a fuzzy multi-criteria decision making technique is then applied. The results shows that among thirty identified enablers in personalization strategy, twenty seven ones and among the nineteen identified enablers in codification strategy, sixteen of are significant. Accordingly by ranking the factors and enablers in nine management organizations of the National Iranian Oil Company (NIOC, the leadership factor in personalization strategy and also information technology in codification strategy have higher ranks by weighing 0.259 and 0.267respectively.

  1. Zambia : Smallholder Agricultural Commercialization Strategy

    OpenAIRE

    World Bank

    2007-01-01

    This report focuses on the potential and opportunities for smallholder commercialization in Zambia. The paper discusses the framework for Zambia's smallholder commercialization strategy, the current state of smallholder agriculture in Zambia, key issues, support from agribusiness to smallholders, and development of potential and opportunities for smallholder commercialization. The paper co...

  2. 24 CFR 954.103 - Housing strategy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Housing strategy. 954.103 Section... INDIAN HOME PROGRAM Applying for Assistance § 954.103 Housing strategy. Grantees are not required to submit a housing strategy to receive HOME funds. However, the application must demonstrate how...

  3. Motivational Strategies in Medical English Classroom

    Institute of Scientific and Technical Information of China (English)

    TIAN Jun-ying

    2014-01-01

    Objective:To explore strategies to motivate students in the classroom of Medical English. Methods:The motivational strategies applied in medical English classroom including defining course goals early in the semester, appropriate teacher behavior, creating real context and giving helpful and frequent Feedback were recommended. Results & Conclusion: The motivational strategies make a positive impact on students’motivation in medical English classroom.

  4. Applied parallel computing

    CERN Document Server

    Deng, Yuefan

    2012-01-01

    The book provides a practical guide to computational scientists and engineers to help advance their research by exploiting the superpower of supercomputers with many processors and complex networks. This book focuses on the design and analysis of basic parallel algorithms, the key components for composing larger packages for a wide range of applications.

  5. Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States

    CERN Document Server

    He, G; Zhu, J; He, Guangqiang; Zeng, Guihua; Zhu, Jun

    2006-01-01

    A continuous variable ping-pong scheme, which is utilized to generate deterministically private key, is proposed. The proposed scheme is implemented physically by using Gaussian-modulated squeezed states. The deterministic way, i.e., no basis reconciliation between two parties, leads a two-times efficiency comparing to the standard quantum key distribution schemes. Especially, the separate control mode does not need in the proposed scheme so that it is simpler and more available than previous ping-pong schemes. The attacker may be detected easily through the fidelity of the transmitted signal, and may not be successful in the beam splitter attack strategy.

  6. Applied quantum cryptography

    International Nuclear Information System (INIS)

    Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel technology. Only a few years ago quantum cryptography - or better: quantum key distribution - was the domain of basic research laboratories at universities. But during the last few years things changed. QKD left the laboratories and was picked up by more practical oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major milestone towards a QKD technology was a large research and development project funded by the European Commission that aimed at combining quantum physics with complementary technologies that are necessary to create a technical solution: electronics, software, and network components were added within the project SECOQC (Development of a Global Network for Secure Communication based on Quantum Cryptography) that teamed up all expertise on European level to get a technology for future encryption. The practical application of QKD in a standard optical fibre network was demonstrated October 2008 in Vienna, giving a glimpse of the future of secure communication. Although many steps have still to be done in order to achieve a real mature technology, the corner stone for future secure communication is already laid. QKD will not be the Holy Grail of security, it will not be able to solve all problems for evermore. But QKD has the potential to replace one of the weakest parts of symmetric encryption: the exchange of the key. It can be proven that the key exchange process cannot be corrupted and that keys that are generated and exchanged quantum cryptographically will be secure for ever (as long as some additional conditions are kept). This book will show the state of the art of Quantum Cryptography and it will sketch how it can be implemented in standard communication infrastructure. The growing vulnerability of sensitive

  7. Experiments with the hot list strategy

    Energy Technology Data Exchange (ETDEWEB)

    Wos, L.

    1997-10-01

    Experimentation strongly suggests that, for attacking deep questions and hard problems with the assistance of an automated reasoning program, the more effective paradigms rely on the retention of deduced information. A significant obstacle ordinarily presented by such a paradigm is the deduction and retention of one or more needed conclusions whose complexity sharply delays their consideration. To mitigate the severity of the cited obstacle, the author formulates and features in this report the hot list strategy. The hot list strategy asks the researcher to choose, usually from among the input statements, one or more clauses that are conjectured to play a key role for assignment completion. The chosen clauses - conjectured to merit revisiting, again and again - are placed in an input list of clauses, called the hot list. When an automated reasoning program has decided to retain a new conclusion C - before any other clause is chosen to initiate conclusion drawing - the presence of a nonempty hot list (with an appropriate assignment of the input parameter known as heat) causes each inference rule in use to be applied to C together with the appropriate number of members of the hot list. Members of the hot list are used to complete applications of inference rules and not to initiate applications. The use of the hot list strategy thus enables an automated reasoning program to briefly consider a newly retained conclusion whose complexity would otherwise prevent its use for perhaps many CPU-hours. To give evidence of the value of the strategy, the author focuses on four contexts: (1) dramatically reducing the CPU time required to reach a desired goal; (2) finding a proof of a theorem that had previously resisted all but the more inventive automated attempts; (3) discovering a proof that is more elegant than previously known; and (4) answering a question that had steadfastly eluded researchers relying on an automated reasoning program.

  8. Strategie podniku

    OpenAIRE

    Vrabec, Tomáš

    2014-01-01

    The goal of this diploma thesis is the execution of strategic analysis of the company Plzeňský Prazdroj, a. s. based on external and internal analysis. Next step is the elaboration of strategy for future company development. The outcome of this thesis is a comprehensive view of the external and internal environment of Plzeňský Prazdroj providing good basis for strategic management. Author of this thesis recommends suitable strategies for the future business development based on these outputs ...

  9. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  10. 77 FR 5492 - Availability of Seat for the Florida Keys National Marine Sanctuary Advisory Council

    Science.gov (United States)

    2012-02-03

    ... Florida Keys National Marine Sanctuary Advisory Council: Tourism--Lower Keys (member), and Tourism--Lower Keys (alternate). Applicants are chosen based upon their particular expertise and experience in relation to the seat for which they are applying; community and professional affiliations;...

  11. Mesothelioma Applied Research Foundation

    Science.gov (United States)

    ... Percentage Donations Tribute Wall Other Giving/Fundraising Opportunities Bitcoin Donation Form FAQs Help us raise awareness and ... Percentage Donations Tribute Wall Other Giving/Fundraising Opportunities Bitcoin Donation Form FAQs © 2013 Mesothelioma Applied Research Foundation, ...

  12. Applied Mathematics Seminar 1982

    International Nuclear Information System (INIS)

    This report contains the abstracts of the lectures delivered at 1982 Applied Mathematics Seminar of the DPD/LCC/CNPq and Colloquy on Applied Mathematics of LCC/CNPq. The Seminar comprised 36 conferences. Among these, 30 were presented by researchers associated to brazilian institutions, 9 of them to the LCC/CNPq, and the other 6 were given by visiting lecturers according to the following distribution: 4 from the USA, 1 from England and 1 from Venezuela. The 1981 Applied Mathematics Seminar was organized by Leon R. Sinay and Nelson do Valle Silva. The Colloquy on Applied Mathematics was held from october 1982 on, being organized by Ricardo S. Kubrusly and Leon R. Sinay. (Author)

  13. Handbook of Applied Analysis

    CERN Document Server

    Papageorgiou, Nikolaos S

    2009-01-01

    Offers an examination of important theoretical methods and procedures in applied analysis. This book details the important theoretical trends in nonlinear analysis and applications to different fields. It is suitable for those working on nonlinear analysis.

  14. A framework for assessing severe accident management strategies

    International Nuclear Information System (INIS)

    Accident management can be defined as the innovative use of existing and or alternative resources, systems and actions to prevent or mitigate a severe accident. Together with risk management (changes in plant operation and/or addition of equipment) and emergency planning (off-site actions), accident management provides an extension of the defense-in-depth safety philosophy for severe accidents. A significant number of probabilistic safety assessments (PSA) have been completed which yield the principal plant vulnerabilities. For each sequence/threat and each combination of strategy there may be several options available to the operator. Each strategy/option involves phenomenological and operational considerations regarding uncertainty. These considerations include uncertainty in key phenomena, uncertainty in operator behavior, uncertainty in system availability and behavior, and uncertainty in available information (i.e., instrumentation). The objective of this project is to develop a methodology for assessing severe accident management strategies given the key uncertainties mentioned above. Based on Decision Trees and Influence Diagrams, the methodology is currently being applied to two case studies: cavity flooding in a PWR to prevent vessel penetration or failure, and drywell flooding in a BWR to prevent containment failure

  15. Applying contemporary statistical techniques

    CERN Document Server

    Wilcox, Rand R

    2003-01-01

    Applying Contemporary Statistical Techniques explains why traditional statistical methods are often inadequate or outdated when applied to modern problems. Wilcox demonstrates how new and more powerful techniques address these problems far more effectively, making these modern robust methods understandable, practical, and easily accessible.* Assumes no previous training in statistics * Explains how and why modern statistical methods provide more accurate results than conventional methods* Covers the latest developments on multiple comparisons * Includes recent advanc

  16. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  17. Key energy technologies for Europe

    International Nuclear Information System (INIS)

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO2 capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  18. [Potentiation strategies].

    Science.gov (United States)

    Doumy, Olivier; Bennabi, Djamila; El-Hage, Wissam; Allaïli, Najib; Bation, Rémy; Bellivier, Frank; Holtzmann, Jérôme; Bubrovszky, Maxime; Camus, Vincent; Charpeaud, Thomas; Courvoisier, Pierre; d'Amato, Thierry; Garnier, Marion; Haesebaert, Frédéric; Bougerol, Thierry; Lançon, Christophe; Moliere, Fanny; Nieto, Isabel; Richieri, Raphaëlle; Saba, Ghassen; Courtet, Philippe; Vaiva, Guillaume; Leboyer, Marion; Llorca, Pierre-Michel; Aouizerate, Bruno; Haffen, Emmanuel

    2016-03-01

    Lithium is among the most classically recommended add-on therapeutic strategy for the management of depressive patients showing unsuccessful response to standard antidepressant medications. The effectiveness of the add-on strategy with lithium requires achieving plasma levels above 0.5mEq/L. Mood-stabilizing antiepileptic drugs such as carbamazepine, valproate derivatives or lamotrigine have not demonstrated conclusive therapeutic effects for the management of depressive patients showing unsuccessful response to standard antidepressant medications. Thyroid hormones are considered among the currently recommended add-on therapeutic strategy for the management of depressive patients showing unsuccessful response to standard antidepressant medications. The effectiveness of the add-on strategy with thyroid hormones requires achieving plasma concentration of TSH close to the lower limits at the normal range (0.4μUI/L) or even below it. Second-generation antipsychotics such as aripiprazole or quetiapine have consistently demonstrated significant therapeutic effects for the management of depressive patients showing unsuccessful response to standard antidepressant medications. Second-generation antipsychotics however require the careful monitoring of both cardiovascular and metabolic adverse effects. PMID:26970936

  19. CSR STRATEGIES

    OpenAIRE

    LAURENTIU BARANGA; ION STEGAROIU

    2011-01-01

    Corporate Social Responsibility (CSR) has got three components: economic responsibility of shareholders, corporate environmental responsibility, corporate responsibility of the society. Each component of the CSR has its own features, according to which adequate individual behaviour is established. Knowing these features is very important in CSR strategy development.

  20. Transfusion strategy

    DEFF Research Database (Denmark)

    Jakobsen, Carl-Johan

    2014-01-01

    Blood transfusion is associated with increased morbidity and mortality and numerous reports have emphasised the need for reduction. Following this there is increased attention to the concept of patient blood management. However, bleeding is relatively common following cardiac surgery and is furth...... conclusion the evidence supports that each institution establishes its own patient blood management strategy to both conserve blood products and maximise outcome....