WorldWideScience

Sample records for avoiding confidential statement

  1. Computer Security: Printing confidentially

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  2. Statement

    International Nuclear Information System (INIS)

    Full text: I want to focus on the two questions related to decommissioning and waste management posed to the panel, that I would like to restate as a question: Is it possible to decommission a nuclear facility and deal with the related wastes in case of absence of a final waste repository? My answer to this question is: the decommissioning of a nuclear facility is possible and should be pursued as far ahead of time as possible. The reasons for this statement are many. The most important ones are safety and costs. A nuclear power plant, at the moment of final shutdown, has thousands of square metres of contaminated surfaces, thousands of tonnes of activated materials and normally also many cubic metres of radioactive liquids that must continue to be kept isolated from the environment. This means continued and extensive maintenance and surveillance. First, decommissioning actions, that is decontamination and liquid waste solidification, should be carried out to reduce risk, maintenance and surveillance, and to minimize the production of additional operational wastes. Other decommissioning actions can minimize the volume and surface of wastes. The best, of course, would be to proceed also with waste conditioning. Is this possible without the availability of a repository? In my opinion - particularly if we are referring to a repository with engineered barriers - this is possible with minimum financial risk, on the basis of a clear definition of the areas of responsibility between waste producers and the body in charge of the repository. Let us analyse the problem in more detail. Today the average dimensions of a waste package and the expected radioactivity content are basically standardized. The data to be collected, in order for adequate waste package characterization, are also generally known. Even better is if the data are collected according to the guidance in certain IAEA publications, such as the one being published on record keeping and one on waste inventory

  3. Does Confidential Proxy Voting Matter?

    OpenAIRE

    Roberta Romano

    2002-01-01

    Confidential voting in corporate proxies is a principal recommendation in activist institutional investors' guidelines for corporate governance reforms. This paper examines the impact of the adoption of confidential corporate proxy voting on proposal outcomes through a panel data set of shareholder and management proposals submitted from 1986-98 to the 130 firms that adopted confidential voting in those years. Institutional investors promoting confidential voting maintain that private sector ...

  4. Does Confidential Proxy Voting Matter?

    OpenAIRE

    Romano, Roberta

    2002-01-01

    Confidential voting in corporate proxies is a principal recommendation in activist institutional investors' guidelines for corproate governance reforms. This paper examins the impact of the adoption of confidential corporate proxy voting on proposal outcoms through a panel data set of shareholder and management proposals submitted from 1986-98 to the 130 firms that adopted confidential voting in those years. Institutional investors promoting confidential voting maintain that private sector in...

  5. Does Confidential Proxy Voting Matter?

    OpenAIRE

    Romano, Roberta

    2002-01-01

    Confidential voting in corporate proxies is a principal recommendation in activist institutional investors' guidelines for corproate governance reforms. This paper examins the impact of the adoption of confidential corporate proxy voting on proposal outcoms through a panel data set of shareholder and management proposals submitted from 1986-98 to the 130 firms that adopted confidential voting in those years. Institutional investors promoting confidential voting maintain that private sector ...

  6. Does Confidential Proxy Voting Matter?

    OpenAIRE

    Roberta Romano

    2002-01-01

    Confidential voting in corporate proxies is a principal recommendation in activist institutional investors' guidelines for corporate governance reforms. This paper examines the impact of the adoption of confidential voting on proposal outcomes through a panel data set of shareholder and management proposals submitted from 1986-98 to 130 firms that adopted confidential voting in those years. Institutional investors promoting confidential voting maintain that private sector institutions have co...

  7. Confidentiality and Huntington's chorea.

    OpenAIRE

    Adams, J.

    1990-01-01

    A doctor has duties towards his patients of both confidentiality and veracity and at times these may conflict, as in the following case. A mother who has the symptoms of Huntington's chorea does not wish her daughters to know. The doctor must try to make her realise how valuable the information can be to the daughters, and thus obtain her consent to inform them. If the mother's consent cannot be obtained, then the doctor must tell the mother that he cannot allow her attitude to deprive the da...

  8. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  9. Detection and Avoidance of SQL Injection Attack In Multi-Tier Web Based Application

    Directory of Open Access Journals (Sweden)

    Ms. S.Raichal

    2013-06-01

    Full Text Available The aim of this paper is to prevent sql injection attack using stored procedure. In SQL injection attack,an attacker might deliver malicious SQL query segments as user input which could effect in a different database request. Using SQL injection attacks, an attacker might thus obtain and modify confidential information. An attacker could even use a SQL injection vulnerability as a basic IP or Port scanner of the internal corporate network. The stored procedure does not permit conditional statement there by the hacker cannot identify the IDs. The stored procedure is the new approach that is executed. Stored procedure avoids the attack which is more secured one where the conditional statements are not permitted. In sql injection input is set as conditional statements and the user can able to login into the website. But in this paper every condition are checked in the procedural language of stored procedure.Once it notices the condition statement the user will be blocked to log into the website. Only the correct form of passwords is acceptable.

  10. Financial Statements in Particular Entity

    OpenAIRE

    Hořáková, Marie

    2011-01-01

    The thesis delivers suggestions to improve procedures in a financial statement from particular company according to an analysis of individual financial statement pieces and tests of a financial statement report. The first part of the literature search is devoted to an analysis of preparing pieces of the Financial Statement, necessary to carry out at the end of any accounting year to avoid distorting in accounting. After counting all issues, the accounting entity is to close all accounting...

  11. Bioethics for clinicians: 8. Confidentiality

    OpenAIRE

    Kleinman, I; Baylis, F; Rodgers, S; P. Singer

    1997-01-01

    Physicians are obliged to keep information about their patients secret. The understanding that the physician will not disclose private information about the patient provides a foundation for trust in the therapeutic relationship. Respect for confidentiality is firmly established in codes of ethics and in law. It is sometimes necessary, however, for physicians to breach confidentiality. Physicians should familiarize themselves with legislation in their own province governing the disclosure of ...

  12. Evaluation in a competitive utility environment: the threat of confidentiality

    International Nuclear Information System (INIS)

    information needs and sources and revise existing policies. 2. Review process for handling confidentiality claims and revise existing policies. 3. Monitor restructuring activities. 4. Develop framework and specific guidelines. 5. Develop standards of conduct. 6. Hold workshops on confidentiality. 7. Design and implement a pilot project. 8. Establish and support consumer advocates. 9. Support more research on confidentiality. Utilities will be reluctant to support these activities and develop the new rules of the game. Regulators need to be more proactive and conduct the above activities promptly in order to avoid paralysis and inertia and to maintain the regulatory balance. The lack of a regulatory framework and specific policies for information access may only make existing problems more severe. The issue of confidentiality has broad sociopolitical dimensions. In the next few years, commissions will be asked to create information policies that will demonstrate the degree of their support for public access to utility- held information. These policies will be important since they can ''profoundly affect the manner in which an individual in a society, indeed a society itself, makes political, economic and social choices.'' Finally, in all likelihood, evaluators will need to adapt to an environment where utility data will be more difficult to obtain and disseminate. It is premature to see how increased confidentiality will affect the objectivity, usefulness, validity, and reliability of evaluations. If the evaluation community wishes to maintain the high its work, creative solutions will most needed

  13. Contractual Protection of Confidential Business Information: In Norwegian Employment- and Business Contracts

    OpenAIRE

    Coates, Sarah Lea

    2013-01-01

    Confidential information can be one of the most valuable assets in a business. By avoiding the disclosure of such information, companies are able to maintain their competitive advantage. The main purpose of this thesis is to establish how and to what extent companies can protect confidential business information by contractual regulations according to Norwegian law. This thesis was written with a scholarship from the research project "Nordic Restatement of Contract Law".

  14. 19 CFR 200.735-114 - Employees required to submit statements.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Employees required to submit statements. 200.735... Employees required to submit statements. Except as provided in § 200.735-114a, the following employees shall submit confidential statements of employment and financial interests: (a)(1) Employees in grade GS-13...

  15. Data Confidentiality Challenges in Big Data Applications

    Energy Technology Data Exchange (ETDEWEB)

    Yin, Jian; Zhao, Dongfang

    2015-12-15

    In this paper, we address the problem of data confidentiality in big data analytics. In many fields, much useful patterns can be extracted by applying machine learning techniques to big data. However, data confidentiality must be protected. In many scenarios, data confidentiality could well be a prerequisite for data to be shared. We present a scheme to provide provable secure data confidentiality and discuss various techniques to optimize performance of such a system.

  16. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  17. Confidentiality and integrity in crowdsourcing systems

    CERN Document Server

    Ranj Bar, Amin

    2014-01-01

    Confidentiality and Integrity in Crowdsourcing Systems focuses on identity, privacy, and security related issues in crowdsourcing systems and in particular the confidentiality and integrity of online data created via crowdsourcing. This book begins with an introduction to crowdsourcing and then covers the privacy and security challenges of Confidentiality. The book examines integrity in these systems and the management and control of crowdsourcing systems.

  18. WTO confidential: the case of asbestos.

    Science.gov (United States)

    Castleman, Barry

    2003-01-01

    The World Trade Organization (WTO), established in 1995, adjudicates "trade disputes" between member nations in cases with human rights, cultural, environmental, and public health significance. Throughout the resolution process and even after a case's conclusion, little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one party in a WTO case, who analyzes what happened from a public health point of view. The analysis concludes that the public health justification for banning asbestos was accepted in the end by WTO economists, despite the WTO's bias in favor of the party (Canada) making the free trade challenge (to public health legislation), despite the WTO's lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. The case nevertheless illustrates that the WTO's threat to national sovereignty could never withstand the light of day if the limitations and dangers of the process were open for all to see. PMID:17208721

  19. Avoid Logs to Avoid Ticks

    Institute of Scientific and Technical Information of China (English)

    莫文佳

    2004-01-01

    扁虱是莱姆关节炎的罪魁祸首。研究人员为了弄明白何处扁虱最猖獗, 不惜以身作饵,他们发现:The ticks were all over the log surface。因此告诫人 们:Avoid sitting on logs。

  20. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    is submitted: power of attorney; cofirmation on presenting the invention at an international exhibition; certified copy of the first patent application; statement on the basis of entitlement to file an application; statement by the inventor if he does not want to be mentioned in the patent application; proof of the payment of the patent application fee; statement of a joint representative if there are more applicants. Conclusion In order that a confidential invention receive  patent or petty patent protection, it is necessary to file a patent application. A confidential patent application is a very comprehensive document which has to be compiled with expert knowledge from both the technical field to which the application relates and the field of intellectual property protection. The shown content of the confidential patent application with an example can be useful for inventors in their attempts to draw up their own patent applications. [1] The structure and the content of a confidential patent application  is identical  to the content and the form of a patent application submitted to the Intellectual Property Office,a competent state institution for the protection of intellectual property. 

  1. The banker customer confidential relationship

    OpenAIRE

    Alqayem, Ameera

    2015-01-01

    This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University London Conscious of the limitations of the petroleum-based economy in Bahrain, the Bahraini government aims to improve other industries, such as finance. Therefore, the aim of this thesis is to study the current status of banking confidentiality in Bahrain, and to discover the possibilities for improvement in the banking sector in Bahrain, so that the country can succeed in being the financ...

  2. Perturbing Nonnormal Confidential Attributes: The Copula Approach

    OpenAIRE

    Rathindra Sarathy; Krishnamurty Muralidhar; Rahul Parsa

    2002-01-01

    Protecting confidential, numerical data in databases from disclosure is an important issue both for commercial organizations as well as data-gathering and disseminating organizations (such as the Census Bureau). Prior studies have shown that perturbation methods are effective in protecting such confidential data from snoopers. Perturbation methods have to provide legitimate users with accurate (unbiased) information, and also provide adequate security against disclosure of confidential inform...

  3. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk Ratings and related Confidential Information. 120.1060 Section 120.1060 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1060 Confidentiality of Reports, Risk Ratings and...

  4. Confidentiality and American semen donors.

    Science.gov (United States)

    Karow, A M

    1993-01-01

    Most American donor insemination programs include a policy of complete confidentiality concerning the donor of the semen. This is the result of a long legal tradition of American constitutional law. However, some slight abridgement of this body of legal decisions might be very much in the best interests of children arising from donor insemination, and even--in most cases, in fact--the donors themselves. With regard to the children, the factors involved are both those of genetic counseling, should the need arise, and psychological development. Of course, as at present, the donor must be relieved of all responsibility, both legal and financial. PMID:8348162

  5. 7 CFR 1209.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING..., Books and Records § 1209.62 Confidential treatment. All information obtained from books, records,...

  6. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential...

  7. 7 CFR 1260.203 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Promotion and Research Order Reports, Books and Records § 1260.203 Confidential treatment. All...

  8. 7 CFR 1219.63 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... § 1219.63 Confidential treatment. (a) All information obtained from the books, records, or reports...

  9. 7 CFR 1206.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this...

  10. 7 CFR 1221.127 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this...

  11. 7 CFR 1230.82 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1230.82 Section 1230.82 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... § 1230.82 Confidential treatment. All information obtained from the books, records or reports required...

  12. 7 CFR 1250.354 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Research and Promotion Order Reports, Books, and Records § 1250.354 Confidential treatment. (a)...

  13. 7 CFR 54.1033 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Confidential treatment. 54.1033 Section 54.1033 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards... and Poultry Products § 54.1033 Confidential treatment. Every design review specialist...

  14. 7 CFR 1150.278 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other...

  15. 7 CFR 1215.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Records § 1215.62 Confidential treatment. (a) All information obtained from books, records, or...

  16. 7 CFR 1160.403 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... Order Reports, Books and Records § 1160.403 Confidential treatment. (a) All persons, including...

  17. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment....

  18. 7 CFR 1220.243 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that...

  19. 7 CFR 1212.72 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this...

  20. 7 CFR 1218.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... § 1218.62 Confidential treatment. All information obtained from books, records, or reports under the...

  1. 7 CFR 1216.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act, this...

  2. 7 CFR 1150.173 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... Order Reports, Books and Records § 1150.173 Confidential treatment. All information obtained from...

  3. 46 CFR 249.11 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Confidentiality. 249.11 Section 249.11 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS AFFECTING SUBSIDIZED VESSELS AND OPERATORS APPROVAL OF UNDERWRITERS FOR MARINE HULL INSURANCE § 249.11 Confidentiality. (a) If the data submitted under this...

  4. A Model Privacy Statement for Ohio Library Web Sites.

    Science.gov (United States)

    Monaco, Michael J.

    The purpose of this research was to develop a model privacy policy statement for library World Wide Web sites. First, standards of privacy protection were identified. These standards were culled from the privacy and confidentiality policies of the American Library Association, the Federal Trade Commission's online privacy reports, the guidelines…

  5. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt;

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...

  6. 42 CFR 2.63 - Confidential communications.

    Science.gov (United States)

    2010-10-01

    ... CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Court Orders Authorizing Disclosure and Use § 2.63... injury, including homicide, rape, kidnapping, armed robbery, assault with a deadly weapon, or child...

  7. 15 CFR 806.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality. Information... publish or make available to any other person any information collected under the Act in such a...

  8. Biosafety Data as Confidential Business Information

    OpenAIRE

    Nielsen, Kaare M.

    2013-01-01

    Removal of confidentiality claims on biosafety data is necessary to adhere to standard scientific procedures of quality assurance, to increase transparency, to minimize impacts of conflicts of interests, and ultimately to improve public confidence in GMOs.

  9. Biosafety data as confidential business information.

    Directory of Open Access Journals (Sweden)

    Kaare M Nielsen

    Full Text Available Removal of confidentiality claims on biosafety data is necessary to adhere to standard scientific procedures of quality assurance, to increase transparency, to minimize impacts of conflicts of interests, and ultimately to improve public confidence in GMOs.

  10. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  11. Parents: Avoid Kids Foot Problems with the Right Shoes

    Science.gov (United States)

    ... Bookmark Parents: Avoid kids' foot problems with the right shoes Before you head to the store to ... College of Foot and Ankle Surgeons (ACFAS), All Rights Reserved. | Privacy Statement | Disclaimer | Terms and Conditions | Site ...

  12. Parents: Avoid Kids Foot Problems with the Right Shoes

    Science.gov (United States)

    ... Print | Share Avoid Kids Foot Problems with the Right Shoes Before you head to the store to ... College of Foot and Ankle Surgeons (ACFAS), All Rights Reserved. Privacy Statement | Disclaimer | Terms and Conditions | Site ...

  13. Teachers Avoiding Learners' Avoidance: Is It Possible?

    Science.gov (United States)

    Tadayyon, Maedeh; Zarrinabadi, Nourollah; Ketabi, Saeed

    2016-01-01

    Dealing with learners who prefer to take the back seat and avoid classroom participation can be every teacher's nightmare. This lack of participation may cause teacher frustration, and possibly the only way to reduce this lack of participation is to access the concept of avoidance strategy. Avoidance strategy is the abandonment of a classroom task…

  14. Making a Difference--The Impact of the Confidential Inquiry into Premature Deaths of People with Learning Disabilities

    Science.gov (United States)

    Heslop, Pauline; Marriott, Anna

    2015-01-01

    The Confidential Inquiry into premature deaths of people with learning disabilities (CIPOLD) was commissioned by the Department of Health in England in 2010 to investigate the avoidable or premature deaths of people with learning disabilities through retrospective reviews of deaths. Both the process of conducting CIPOLD and the findings of the…

  15. Confidentiality--An analysis of the issue.

    Science.gov (United States)

    Von Kanel, R L

    1997-01-01

    Today, in the high-tech, fast-paced health care arena in which professionals practice, confidential information and the right to privacy in one's personal life have become very basic concerns of society. Among the general public, a genuine interest exists about potential invasions of privacy and the undermining of confidentiality. Members of society are more educated concerning rights as the result of multimedia and education presented by health care professionals. New challenges for the professional attending to the health needs of society will be encountered as the complexity of health care increases (Pohlman, 1988). One must remember that the most intensely private and personal moments of an individual's life are revealed in hospital settings. Health care professionals have a duty at all times to diligently protect the confidence of each patient unless specific criteria is met so that disclosure is warranted. Dilemmas encountered often are complex and require a certain degree of expertise for resolution to occur. If ethical theory and principles are used in combination with some of the specific guidelines apropos to resolving confidentiality issues, creative solutions can be devised. Professionals, by the very nature of their experience and education, possess the talent to achieve this goal. Consequently, when guidelines for confidential treatment of information are followed, public trust of professionals will be ensured. Once trust is established, a significant step will have been taken toward the solution of problems of confidentiality in modern day health care. PMID:9393042

  16. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    Science.gov (United States)

    2011-12-14

    ... AGENCY Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor... to be Confidential Business Information (CBI). DATES: Access to the confidential data will occur on... (Captiva) from the development environment to the EPA confidential business environment. They will...

  17. EPS Confidentiality and Integrity mechanisms Algorithmic Approach

    CERN Document Server

    Orhanou, Ghizlane; Bentaleb, Youssef; Laassiri, Jalal

    2011-01-01

    The Long Term Evolution of UMTS is one of the latest steps in an advancing series of mobile telecommunications systems. Many articles have already been published on the LTE subject but these publications have viewed the subject from particular perspectives. In the present paper, a different approach has been taken. We are interested in the security features and the cryptographic algorithms used to ensure confidentiality and integrity of the transmitted data. A closer look is taken to the two EPS confidentiality and integrity algorithms based on the block cipher algorithm AES: the confidentiality algorithm EEA2 and the integrity algorithm EIA2. Furthermore, we focused on the implementation of both algorithms in C language in respect to the specifications requirements. We have tested our implementations according to the testsets given by the 3rd Generation Partnership Project (3GPP) implementation document. Some examples of the implementation tests are presented bellow.

  18. What Does Confidentiality Inside The Arbitration Mean?

    Directory of Open Access Journals (Sweden)

    Diana - Loredana HOGAŞ

    2014-06-01

    Full Text Available The principle of confidentiality is one of the highlights of the institution of arbitration. Its application is not uniform in the national legislation. The parties to an arbitration agreement may experience various unpleasant situations such as unwanted disclosure of issues they wanted to keep secret, although they had relied on the fact that the private nature of arbitration would protect them from prying eyes and unwanted third parties. In this article we take a brief foray into national and international legislation, analyzing the way in which the principle of confidentiality is applied.

  19. Rio 2016 financial statements

    OpenAIRE

    2015-01-01

    These documents include the report from independent auditors balance sheet, the statement of income, the statement of changes in equity, the statement of cash flows and the explanatory notes to the financial statements.

  20. 49 CFR 209.11 - Request for confidential treatment.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Request for confidential treatment. 209.11 Section... confidential treatment. (a) This section governs the procedures for requesting confidential treatment of any... documents required to be submitted by FRA regulations, and all investigative and compliance activities,...

  1. 28 CFR 0.29f - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Confidentiality. 0.29f Section 0.29f Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE 4-Office of the... investigation, disclose the identity of an employee who submits a complaint to the OIG without the...

  2. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  3. 41 CFR 60-742.3 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Confidentiality. 60-742.3 Section 60-742.3 Public Contracts and Property Management Other Provisions Relating to Public Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR 742-PROCEDURES FOR COMPLAINTS/CHARGES...

  4. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained...

  5. 40 CFR 716.55 - Confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Confidentiality claims. 716.55 Section 716.55 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL... for commercial distribution (including for test marketing purposes and for use in research...

  6. 42 CFR 59.11 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS GRANTS FOR FAMILY PLANNING SERVICES Project Grants for Family Planning Services § 59.11 Confidentiality. All information as to personal facts and circumstances obtained by the project staff about individuals receiving services must be...

  7. 37 CFR 261.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... section and as required by law, access to Confidential Information shall be limited to, and in the case of... ARBITRATION ROYALTY PANEL RULES AND PROCEDURES RATES AND TERMS FOR ELIGIBLE NONSUBSCRIPTION TRANSMISSIONS AND... Copyright Arbitration Royalty Panel proceedings under 17 U.S.C. 114(f)(2) and 112(e), under an...

  8. Maglev suspension in soundproofing cabins for confidential talks

    Directory of Open Access Journals (Sweden)

    I.I. Bogolepov

    2010-06-01

    Full Text Available This article discusses the idea of providing sound insulation of the room by using a magnetic suspension. It is based on the invention of the Abrakitov V. E.: sound bridge problem is solved by the avoidance of mechanical contact between the panel and the main structure by a magnetic suspension of sound-insulating vacuum panel. The problem is considered on the example of the cabin for private talks.The implementation of sound insulation from airborne sound is technically uncomplicated task, but there are some problems with the structural component of the sound - the sound energy transfer from box floor to office floor and further through the building structures, sometimes at great distance. Modern methods of eavesdropping can use successfully this way. This paper suggests using a magnetic suspension in soundproof rectangular cabins for confidential talks, which excludes leakage of speech information by more effective isolation of the structural sound. If it is necessary to stop the voice information leakage fundamentally by both air sound and structural sound ways, the authors propose to make a cabin from two steel spherical shells, exhausting all air between the walls and supporting the inner shell by the magnetic suspension in suspended condition. In addition, a spherical cabin is the only effective way of isolation from infrasound.The proposed soundproof rectangular and spherical cabins for confidential talks should be designed, manufactured and tested by experts in the field of acoustic, magnetic suspension, autonomous air regeneration and providing a vacuum. Only in this case the necessary acoustic, technological and operational characteristics of a new hi-tech product will be provided.

  9. WTO confidential: the case of asbestos. World Trade Organization.

    Science.gov (United States)

    Castleman, Barry

    2002-01-01

    The World Trade Organization (WTO), created in 1995, adjudicates "trade disputes" between member nations in cases with great human rights, cultural, environmental, and public health significance. Throughout the process of dispute resolution and even after a case is concluded, very little of what happens is made accessible to the public. However, it is one thing to criticize the WTO for its lack of transparency from outside the process, and another to critically examine what was withheld from disclosure and what dangers that presents. This is the inside story from a scientific adviser to one of the parties in a WTO case, analyzing what happened from a public health point of view. This analysis concludes that the public health justification of banning asbestos was accepted in the end by the economists at the WTO, despite the WTO's bias in favoring the party (Canada) making the free trade challenge (to public health legislation, in this case) in numerous stages of the process, despite the WTO's utter lack of expertise in science, medicine, engineering, and public health, and despite important erroneous statements made to the WTO under the cover of confidentiality. Despite its result, this case illustrates that the WTO's threat to national sovereignty could never withstand the light of day, that the people of the world would reject this dangerous free trade fundamentalism if the limitations and dangers of the process were open for all to see. PMID:12211289

  10. Data Confidentiality in Mobile Ad hoc Networks

    CERN Document Server

    Aldabbas, Hamza; Janicke, Helge; Al-Bayatti, Ali; 10.5121/ijwmn.2012.4117

    2012-01-01

    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nod...

  11. Security Analysis of Generalized Confidential Modulation

    Directory of Open Access Journals (Sweden)

    Hidema Tanaka

    2013-05-01

    Full Text Available We propose a new evaluation method for ‘generalized confidential modulation (GCM’ for quantum communication. Confidential modulation real izes a secret communication by using secret information for modulation and noise in a ch annel. Y-00 is one of the famous methods of GCM for quantum communication. The existing evaluat ion methods for GCM are based on stream ciphers. They can estimate its analytical se curity and the evaluation depends on the security status of pseudo random number generator ( PRNG which controls the modulation. On the other hand, our method is based on mode of oper ation for block ciphers and clears the weaknesses from structural viewpoint. Using our met hod, we can compare the security of different GCM structures. Our method of security ev aluation and comparison does not depend on the security status of PRNG. From the results of our evaluation, we conclude that the security of GCM is limited to computational securit y.

  12. Obscuring provenance confidential information via graph transformation

    OpenAIRE

    Hussein, Jamal; Moreau, Luc; Sassone, Vladimiro

    2015-01-01

    Provenance is a record that describes the people, institutions, entities, and activities involved in producing, influencing, or delivering a piece of data or a thing. In particular, the provenance of information is crucial in deciding whether information is to be trusted. PROV is a recent W3C specification for sharing provenance over the Web. However, provenance records may expose confidential information, such as identity of agents or specific attributes of entities or activities. It is ther...

  13. A study of confidential unit exclusion.

    Science.gov (United States)

    Kean, C A; Hsueh, Y; Querin, J J; Keating, L J; Allensworth, D D

    1990-10-01

    The effectiveness of the confidential unit exclusion (CUE) procedure recommended by the Food and Drug Administration has been questioned by the blood banking community. The purpose of this study was to determine whether donors were informing the blood center correctly regarding the disposition (transfuse or do not transfuse) of their donated blood. A letter explaining the confidential study and requesting permission to send the participant a questionnaire noting his or her self-exclusion choice was mailed to 230 donors who had chosen transfuse and 276 donors who had chosen do not transfuse. After consent was obtained, participants were sent a second packet and asked to indicate whether they had chosen correctly and, if not, to identify reasons for that incorrect choice. A seven-word terminology quiz made up of words from the CUE form was also enclosed. All participants who had chosen transfuse indicated that this was the correct choice. Approximately 50 percent of those who had chosen do not transfuse indicated that this was an incorrect choice; the most common reason was that "I was not paying attention." The most frequently misunderstood term was "confidential." Donors who chose do not transfuse had a significantly higher rate of error on the terminology quiz (p less than 0.01) than did those who chose transfuse. PMID:2219257

  14. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  15. Data Confidentiality in Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Hamza Aldabbas

    2012-03-01

    Full Text Available Mobile ad hoc networks (MANETs are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2 to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs, as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.

  16. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K1 and K2; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K1, and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K2. Then, the encrypted message and the intermediary MAC is again encrypted by using the K2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K2 and compared to the received MAC. The received ciphertext again is decrypted by the key K2 and compared with the first decrypted MAC twice by the key K2. The plaintext is obtained by decrypting the received ciphertext first by K2 and then by K1, using the corresponding decryption techniques respectively. The encryption techniques with key K2 provides the authentication and with key K1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  17. CRAC: Confidentiality Risk Assessment and IT-Architecture Comparison

    OpenAIRE

    Morali, Ayse; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roel

    2010-01-01

    CRAC is an IT-architecture-based method for assessing and comparing confidentiality risks of distributed IT systems. The method determines confidentiality risks by taking into account the effects of the leakage of confidential information (e.g. industrial secrets), and the paths that may be followed by different attackers (e.g. insider and outsider). We evaluate its effectiveness by applying it to a real-world outsourcing case.

  18. Processing of confidential information in distributed systems by fragmentation

    OpenAIRE

    Fabre, Jean-Charles; Pérennou, Tanguy

    1997-01-01

    This paper discusses how object orientation in application design enables confidentiality aspects to be handled more easily than in conventional approaches. The approach is based on the Fragmentation-Redundancy-Scattering technique developed at LAAS–CNRS for several years. This technique and previous developments are briefly summarized. The idea developed in this paper is based on object fragmentation at design time for reducing data processing in confidential objects; the more non confidenti...

  19. Avoidant personality disorder

    Science.gov (United States)

    ... Names Personality disorder - avoidant References American Psychiatric Association. Diagnostic and statistical manual of mental disorders. 5th ed. Arlington, VA: American Psychiatric Publishing. 2013. ...

  20. Avoidable mortality in Lithuania.

    OpenAIRE

    Gaizauskiene, A.; Gurevicius, R

    1995-01-01

    STUDY OBJECTIVE--The study aimed to analyse avoidable mortality in Lithuania as an index of the quality of health care and to assess trends in avoidable mortality from 1970-90. SETTING AND PARTICIPANTS--All deaths of Lithuanian residents aged between 0 and 64 years between 1970 and 1990 were analysed. MEASUREMENTS AND MAIN RESULTS--Twenty seven per cent of all deaths in this age group were avoidable. Avoidable deaths were grouped into preventable and treatable ones. Treatable causes of death ...

  1. 26 CFR 1.533-2 - Statement required.

    Science.gov (United States)

    2010-04-01

    ...) INCOME TAXES (CONTINUED) Corporations Used to Avoid Income Tax on Shareholders § 1.533-2 Statement... shareholders, the amounts that would be payable to each of the shareholders if the income of the...

  2. 28 CFR 40.10 - Records-nature; confidentiality.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Records-nature; confidentiality. 40.10 Section 40.10 Judicial Administration DEPARTMENT OF JUSTICE STANDARDS FOR INMATE GRIEVANCE PROCEDURES Minimum Standards for Inmate Grievance Procedures § 40.10 Records—nature; confidentiality. (a)...

  3. 7 CFR 2903.14 - Conflicts of interest and confidentiality.

    Science.gov (United States)

    2010-01-01

    ... Evaluation § 2903.14 Conflicts of interest and confidentiality. (a) During the peer evaluation process... or evaluation. Determinations of conflicts of interest will be based on the academic and... peer evaluations, will be kept confidential, except to those involved in the review process, to...

  4. 29 CFR 4010.13 - Confidentiality of information submitted.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Confidentiality of information submitted. 4010.13 Section... Confidentiality of information submitted. In accordance with § 4901.21(a)(3) of this chapter and ERISA section 4010(c), any information or documentary material that is not publicly available and is submitted...

  5. 7 CFR 1205.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1205.540 Section 1205.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... Confidential books, records, and reports. All information obtained from the books, records, and reports...

  6. 7 CFR 1210.532 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1210.532... WATERMELON RESEARCH AND PROMOTION PLAN Rules and Regulations Records § 1210.532 Confidential books, records, and reports. All information obtained from the books, records, and reports of handlers and...

  7. 10 CFR 207.4 - Confidentiality of energy information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Confidentiality of energy information. 207.4 Section 207.4 Energy DEPARTMENT OF ENERGY OIL COLLECTION OF INFORMATION Collection of Information Under the Energy Supply and Environmental Coordination Act of 1974 § 207.4 Confidentiality of energy information....

  8. 43 CFR 37.12 - Confidentiality of cave location information.

    Science.gov (United States)

    2010-10-01

    ... MANAGEMENT Cave Designation § 37.12 Confidentiality of cave location information. (a) Information disclosure... individual or organization assisting the land managing agency with cave management activities. To request... risk to cave resources of harm, theft, or destruction. (b) Requesting confidential...

  9. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted...

  10. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  11. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  12. [Some current threats to confidentiality in medicine].

    Science.gov (United States)

    Echeverría B, Carlos; Goic G, Alejandro; Herrera C, Carolina; Quintana V, Carlos; Rojas O, Alberto; Ruiz-Esquide, Gonzalo; Salinas R, Rodrigo; Serani M, Alejandro; Taboada R, Paulina; Vacarezza Y, Ricardo

    2015-03-01

    Social, technical and legal conditions of the current practice of medicine make it necessary to insist on certain actions and circumstances that may jeopardize the confidentiality of information, offered by patients to their health providers. Therefore, some effects of the current Chilean law are analyzed in this respect, regarding access to data from the clinical record of a patient. Also, the risks of putting certain data on social networking sites are analyzed, as well as some of its effects on clinical practice. The reasons because of mandatory reporting of diseases, meaning danger to public health, is allowed, are mentioned. We also discuss the difficulties involved in managing the results of preventative health screenings and its knowledge by third parties, as well as some possible violations of personal privacy, regarding dissemination of some people health information and its further mention or figuration in mass media. We conclude that it is a must for both physicians and other health team members, to safeguard confidentiality of data to which they have had access, as well as the need to know the relevant law, in order to respect human dignity of patients, each one as a person. We address the attention to the possibility that, practicing in a different way, it could endanger the reliability of clinical records, also impairing the quality of people's health care. PMID:26005823

  13. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  14. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  15. Position Statement On Climate Change.

    Science.gov (United States)

    2016-05-01

    The North Carolina Environmental Justice Network (NCEJN), a coalition of grassroots organizations, developed a statement to explain our environmental justice perspective on climate change to predominantly white environmental groups that seek to partner with us. NCEJN opposes strategies that reduce greenhouse emissions while maintaining or magnifying existing social, economic, and environmental injustices. Wealthy communities that consume a disproportionate share of resources avoid the most severe consequences of their consumption by displacing pollution on communities of color and low income. Therefore, the success of climate change activism depends on building an inclusive movement based on principles of racial, social and economic justice, and self-determination for all people. PMID:26920851

  16. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    ... Confidential Financial Disclosure Reports § 2634.901 Policies of confidential financial disclosure reporting. (a) The confidential financial reporting system set forth in this subpart is designed to complement... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Policies of confidential...

  17. Rio 2016 financial statements 2011

    OpenAIRE

    2015-01-01

    This document includes the report from independent auditors, the balance sheet, the statement of income, the statement of changes in equity, the statement of cash flows and the explanatory notes to the financial statements as of December 2011.

  18. Psychological Treatments to Avoid

    Science.gov (United States)

    Thomason, Timothy C.

    2010-01-01

    Certain psychological treatments should be avoided, and a list of such treatments would provide valuable guidance for counselors, as well as potential clients. It is well established that some therapies are potentially dangerous, and some fringe therapies are highly unlikely to help clients beyond a placebo effect. This article provides an…

  19. Avoiding the Flu

    Science.gov (United States)

    ... of this page please turn Javascript on. Feature: Flu Avoiding the Flu Past Issues / Fall 2009 Table of Contents Children ... should still get the 2009 H1N1 vaccine. H1N1 Flu: Who Should Be Vaccinated First The Centers for ...

  20. Myelin Avoids the JAM.

    Science.gov (United States)

    Follis, Rose M; Carter, Bruce D

    2016-08-17

    In this issue of Neuron, Redmond et al. (2016) identify junction adhesion molecule 2 (JAM2) as an inhibitor of somatodendritic myelination in spinal cord neurons, thereby elucidating how myelin forms on axons but avoids dendrites and cell bodies. PMID:27537479

  1. Plants to Avoid

    Science.gov (United States)

    Knowledge of poisonous plants is extremely important for home owners, gardeners, farmers, hunters, hikers, and the rest of the general public. Among the most important plants to avoid in the Delta Region are poison ivy, bull nettle, eastern black nightshade, Queen Ann’s lace, jimsonweed, and trumpe...

  2. Plagiarism in Personal Statements of Anesthesiology Residency Applicants.

    Science.gov (United States)

    Parks, Lance J; Sizemore, Daniel C; Johnstone, Robert E

    2016-02-15

    Plagiarism by residency applicants in their personal statements, as well as sites that sell personal statements, have been described, and led in 2011 to advice to avoid plagiarism and the caution that plagiarism detection software was available. We screened personal statements of 467 anesthesiology residency applicants from 2013-2014 using Viper Plagiarism Scanner software, and studied them for plagiarism. After quotes and commonly used phrases were removed, 82 statements contained unoriginal content of 8 or more consecutive words. After the study, 13.6% of personal statements from non-United States medical school graduates, and 4.0% from United States medical school graduates, contained plagiarized material, a significant difference. Plagiarized content ranged up to 58%. Plagiarism continues to occur in anesthesiology residency personal statements, with a higher incidence among graduates of non-United States medical schools. PMID:26462161

  3. Financial Statements Analysis

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on analyzing of a consolidated financial statements of a hypothetically SME. The interpretation of the financial position and performances is based on the more than 40 financial key ratios computed by using financial data from consolidated income statement, consolidated financial position and cash flow. However additional data from notes to financial statements are provided.

  4. Financial Statement Math

    OpenAIRE

    2007-01-01

    The purpose of this interactive exercise is to help you understand the math in the income statement and balance sheet., Give the proper mathematical computations in order to correctly prepare the income statement and the balance sheet.The exercise is divided into 3 parts: The income Statement, The Balance Sheet - Assets, The Balance Sheet - Liabilities,

  5. Financial Statements Analysis

    Directory of Open Access Journals (Sweden)

    Tănase Alin-Eliodor

    2014-10-01

    Full Text Available This article focuses on analyzing of a consolidated financial statements of a hypothetically SME. The interpretation of the financial position and performances is based on the more than 40 financial key ratios computed by using financial data from consolidated income statement, consolidated financial position and cash flow. However additional data from notes to financial statements are provided.

  6. Protecting the Confidentiality of the Therapeutic Relationship: "Jaffee v. Redmond."

    Science.gov (United States)

    Lens, Vicki

    2000-01-01

    Discusses the Supreme Court's 1996 decision in "Jaffee v. Redmond" and its importance for the social work profession. Maintains that the Court's establishment of a psychotherapy privilege acknowledges the importance of confidentiality in the psychotherapeutic relationship. (GCP)

  7. Privacy Perspectives for Online Searchers: Confidentiality with Confidence?

    Science.gov (United States)

    Duberman, Josh; Beaudet, Michael

    2000-01-01

    Presents issues and questions involved in online privacy from the information professional's perspective. Topics include consumer concerns; query confidentiality; securing computers from intrusion; electronic mail; search engines; patents and intellectual property searches; government's role; Internet service providers; database mining; user…

  8. 28 CFR 549.14 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... MEDICAL SERVICES Infectious Disease Management § 549.14 Confidentiality of information. Any disclosure of... System of Records Notice entitled “Inmate Physical and Mental Health Record System, JUSTICE/BOP-007”;...

  9. Confidentiality Revisited: Blessing Or Curse In International Commercial Arbitration?

    OpenAIRE

    Gu, W

    2006-01-01

    At a time when international arbitration is gaining increasing popularity with transnational businesses, there is general agreement that, among the principal advantages of arbitration as a method of dispute resolution, confidentiality is one of the most attractive selling points.

  10. Protecting Privacy and Confidentiality in Environmental Health Research

    OpenAIRE

    Resnik, David B.

    2010-01-01

    Environmental health researchers often need to make difficult decisions on how to protect privacy and confidentiality when they conduct research in the home or workplace. These dilemmas are different from those normally encountered in clinical research. Although protecting privacy and confidentiality is one of the most important principles of research involving human subjects, it can be overridden to prevent imminent harm to individuals or if required by law. Investigators should carefully co...

  11. Confidential database-as-a-service approaches: taxonomy and survey

    OpenAIRE

    J. Köhler; Jünemann, K.; Hartenstein, H.

    2015-01-01

    Outsourcing data to external providers has gained momentum with the advent of cloud computing. Encryption allows data confidentiality to be preserved when outsourcing data to untrusted external providers that may be compromised by attackers. However, encryption has to be applied in a way that still allows the external provider to evaluate queries received from the client. Even though confidential database-as-a-service (DaaS) is still an active field of research, various techniques already add...

  12. Security without obscurity a guide to confidentiality, authentication, and integrity

    CERN Document Server

    Stapleton, JJ

    2014-01-01

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor

  13. Financial Statement Preparing.

    OpenAIRE

    Benešová, Barbora

    2011-01-01

    Financial statement can be regarded as a key document made on the balancing day (the date of closing of books) in case of annual financial statement, or on another day than balancing day, in which case it is called a special-purpose or interim financial statement. Financial statement is defined by Act No. 563/1991 Coll., on accounting, as an indivisible whole, consisting of a balance sheet, a profit and loss statement and a supplement. Selected accounting entities under § 20 par. 1 further...

  14. AVOIDING MANUSCRIPT MISTAKES

    OpenAIRE

    Grindstaff, Terry L.; Saliba, Susan A.

    2012-01-01

    Writing a scientific manuscript can be a consuming, but rewarding task with a number of intrinsic and extrinsic benefits. The ability to write a scientific manuscript is typically not an emphasized component of most entry‐level professional programs. The purpose of this overview is to provide authors with suggestions to improve manuscript quality and to provide mechanisms to avoid common manuscript mistakes that are often identified by journal reviewers and editors.

  15. Indonesia : Avoiding the Trap

    OpenAIRE

    World Bank

    2014-01-01

    Within the next two decades Indonesia aspires to generate prosperity, avoid a middle-income trap and leave no one behind as it tries to catch up with high-income economies. These are ambitious goals. Realizing them requires sustained high growth and job creation, as well as reduced inequality. Can Indonesia achieve them? This report argues that the country has the potential to rise and bec...

  16. On partitions avoiding right crossings

    OpenAIRE

    Yan, Sherry H. F.; Xu, Yuexiao

    2011-01-01

    Recently, Chen et al. derived the generating function for partitions avoiding right nestings and posed the problem of finding the generating function for partitions avoiding right crossings. In this paper, we derive the generating function for partitions avoiding right crossings via an intermediate structure of partial matchings avoiding 2-right crossings and right nestings. We show that there is a bijection between partial matchings avoiding 2-right crossing and right nestings and partitions...

  17. Research on preserving User Confidentiality in Cloud Computing – Design of a Confidentiality Framework

    Directory of Open Access Journals (Sweden)

    Chaitanya Dwivedula

    2013-03-01

    Full Text Available Cloud Computing creates a dynamicresource sharing platform that provides dataanalytically to the proficient users who are atdemand to access data present in the cloud. Asthis data is stored outside the data owner's boundaries, they are skeptical for utilizingcloud technology in order to store or accesstheir data from those external cloudproviders who are outside their own controlenvironment. There are many issues for theseactive clients (companies or individuals to bepetrified at the thought of using cloudcomputing paradigm. Some of the main issuesthat make the clients swear against Cloud Computing are generated from threeimportant security aspects: Confidentiality, Integrity, and Availability.In this Research, we focused only on securitymodels that relate Confidentiality issues. We performed a literature Review foranalyzing the existing confidentialityframeworks and security models. We thendesigned a new theoretical framework forconfidentiality in Cloud computing byextracting this literature. We expect this Framework when implemented practically inthe cloud computing paradigm, may generatehuge successful results that motivate the clients to transform their businesses on to Cloud.

  18. Avoidable waste management costs

    International Nuclear Information System (INIS)

    This report describes the activity based costing method used to acquire variable (volume dependent or avoidable) waste management cost data for routine operations at Department of Energy (DOE) facilities. Waste volumes from environmental restoration, facility stabilization activities, and legacy waste were specifically excluded from this effort. A core team consisting of Idaho National Engineering Laboratory, Los Alamos National Laboratory, Rocky Flats Environmental Technology Site, and Oak Ridge Reservation developed and piloted the methodology, which can be used to determine avoidable waste management costs. The method developed to gather information was based on activity based costing, which is a common industrial engineering technique. Sites submitted separate flow diagrams that showed the progression of work from activity to activity for each waste type or treatability group. Each activity on a flow diagram was described in a narrative, which detailed the scope of the activity. Labor and material costs based on a unit quantity of waste being processed were then summed to generate a total cost for that flow diagram. Cross-complex values were calculated by determining a weighted average for each waste type or treatability group based on the volume generated. This study will provide DOE and contractors with a better understanding of waste management processes and their associated costs. Other potential benefits include providing cost data for sites to perform consistent cost/benefit analysis of waste minimization and pollution prevention (WMIN/PP) options identified during pollution prevention opportunity assessments and providing a means for prioritizing and allocating limited resources for WMIN/PP

  19. 77 FR 26709 - Swap Data Repositories: Interpretative Statement Regarding the Confidentiality and...

    Science.gov (United States)

    2012-05-07

    ... considering concepts of international law and comity in evaluating the extraterritorial scope of federal... held by trade repositories is a concept under discussion and development among international regulators... respect to questions relating to international consultation and coordination: Jacqueline Mesa,...

  20. Nuclear exports. Parliamentary control and confidentiality

    International Nuclear Information System (INIS)

    With its decision taken on 21. October 2014 (Az.: 2 BvE 5/11) the Federal Constitutional Court (BVerfG) decided during court proceedings between administrative bodies on the scope and limits of the parliamentary right of information. Even though the proceeding did not deal with nuclear exports but arm exports, foreign trade law, however, does not only designate an export licence obligation for military weapons but also for so called dual-use goods meaning goods, which can be used both for friendly as well as for military purposes. The export of these goods requires according to the so-called Dual-Use Regulation (EG) 428/2009 a licence. Annex I category 0 of the regulation (EG) 428/2009 lists a variety of nuclear materials, plants and equipment items for which this licence applies. In the same manner as arm exports, also exports of nuclear dual-use goods are being discussed in a special cabinet committee, the Federal Security Council (BSR), which shall coordinate cross-departmentally the German security and defence policy under consideration of economic interests and which categorises its results, according to the rules of procedure, as confidential. Also legally not regulated but common ''preliminary enquiries'' at the responsible Federal Ministry or rather Federal Office of Economics and Export Control by companies which plan an export and want to affirm the general approval for their export business prior to conclusion of contract take not only place for arm exports but also for nuclear dual-use goods. The decision by the Federal Constitutional Court can be applied to consultations about the authorisation of nuclear dual-use goods.

  1. Multi-receiver Wiretap Channel with Public and Confidential Messages

    CERN Document Server

    Ekrem, Ersen

    2011-01-01

    We study the multi-receiver wiretap channel with public and confidential messages. In this channel, there is a transmitter that wishes to communicate with two legitimate users in the presence of an external eavesdropper. The transmitter sends a pair of public and confidential messages to each legitimate user. While there are no secrecy constraints on the public messages, confidential messages need to be transmitted in perfect secrecy. We study the discrete memoryless multi-receiver wiretap channel as well as its Gaussian multi-input multi-output (MIMO) instance. First, we consider the degraded discrete memoryless channel, and obtain an inner bound for the capacity region by using an achievable scheme that uses superposition coding and binning. Next, we obtain an outer bound, and show that this outer bound partially matches the inner bound, providing a partial characterization for the capacity region of the degraded channel model. Second, we obtain an inner bound for the general, not necessarily degraded, disc...

  2. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  3. 75 FR 28070 - Comment Request for Information Collection: “Confidentiality & Disclosure of State Unemployment...

    Science.gov (United States)

    2010-05-19

    ... Request for Information Collection: ``Confidentiality & Disclosure of State Unemployment Compensation... Confidentiality and Disclosure of State Unemployment Compensation Information final rule and State Income and.... ADDRESSEE: Submit written comments to the Employment and Training Administration, Office of...

  4. 75 FR 70235 - Access to Confidential Business Information by Industrial Economics, Incorporated

    Science.gov (United States)

    2010-11-17

    ... AGENCY Access to Confidential Business Information by Industrial Economics, Incorporated AGENCY... will authorize its contractor, Industrial Economics, Incorporated (IEc) to access Confidential Business..., Industrial Economics, Incorporated (IEc) will assist the Office of Enforcement and Compliance...

  5. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret... trade secret information. To the extent that CMS relies on confidential commercial or trade secret... with Federal law....

  6. Independent consultants : fiduciary duties, trade secrets and confidential information

    Energy Technology Data Exchange (ETDEWEB)

    Fraser, B.; Wilhelmson, M. [McCarthy Tetrault, Vancouver, BC (Canada)

    1999-07-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potentialmisuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed.

  7. Independent consultants : fiduciary duties, trade secrets and confidential information

    Energy Technology Data Exchange (ETDEWEB)

    Fraser, B.; Wilhelmson, M. [McCarthy Tetrault, Vancouver, BC (Canada)

    1999-10-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary`s practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone`s benefit but the employer`s. Issues regarding defining rights and obligations by contract were also discussed.

  8. Independent consultants : fiduciary duties, trade secrets and confidential information

    International Nuclear Information System (INIS)

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  9. Redundant Robot Can Avoid Obstacles

    Science.gov (United States)

    Homayoun, Seraji; Colbaugh, Richard; Glass, Kristin

    1991-01-01

    Simple and direct control scheme enables redundant robot to avoid obstacles in workspace. In proposed scheme, called "configuration control", degrees of freedom used to configure robot to satisfy set of inequality constraints representing avoidance of obstacles, while simultaneously making end effector follow desired trajectory. Provides capability to avoid obstacles in dynamically varying environment where apriori planning of tasks not feasible.

  10. Opening statements and general statements by delegation

    International Nuclear Information System (INIS)

    23 delegations have submitted general reports and statements on the situation and evolution of the nuclear fuel cycle. Each report reflects the particular interests of the country that submitted it. All in all, these reports provide general background information on the subject of the conference

  11. CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks

    NARCIS (Netherlands)

    Morali, Ayse; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roel

    2009-01-01

    The leakage of confidential information (e.g.\\ industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the

  12. 40 CFR 2.205 - Final confidentiality determination by EPA legal office.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Final confidentiality determination by EPA legal office. 2.205 Section 2.205 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL PUBLIC INFORMATION Confidentiality of Business Information § 2.205 Final confidentiality determination by EPA legal office. (a) Role of EPA...

  13. 75 FR 1053 - Access to Confidential Business Information by Industrial Economics, Incorporated

    Science.gov (United States)

    2010-01-08

    ... AGENCY Access to Confidential Business Information by Industrial Economics, Incorporated AGENCY... will authorize its contractor, Industrial Economics, Incorporated (IEc) to access Confidential Business... Confidential Business Information Under EPA Contracts No. EP-W-6-065 and EP07H000213, Industrial...

  14. 76 FR 10360 - Access to Confidential Business Information by Guident Technologies Inc. and Its Identified...

    Science.gov (United States)

    2011-02-24

    ... AGENCY Access to Confidential Business Information by Guident Technologies Inc. and Its Identified...). Some of the information may be claimed or determined to be Confidential Business Information (CBI... environment to the EPA confidential business environment. They will also provide maintenance support...

  15. MEST- avoid next extinction

    Science.gov (United States)

    Cao, Dayong

    2012-11-01

    Asteroid 2011 AG5 will impact on Earth in 2040. (See Donald K. Yoemans, ``Asteroid 2011 AG5 - A Reality Check,'' NASA-JPL, 2012) In 2011, The author say: the dark hole will take the dark comet to impact our solar system in 20 years, and give a systemic model between the sun and its companion-dark hole to explain why were there periodicity mass extinction on earth. (see Dayong Cao, BAPS.2011.CAL.C1.7, BAPS.2011.DFD.LA.24, BAPS.2012.APR.K1.78 and BAPS.2011.APR.K1.17) The dark Asteroid 2011 AG5 (as a dark comet) is made of the dark matter which has a space-time (as frequence-amplitude square) center- a different systemic model from solar systemic model. It can asborb the space-time and wave. So it is ``dark.'' When many dark matters hit on our earth, they can break our atom structure and our genetic code to trigger the Mass Extinction. In our experiments, consciousness can change the systematic model and code by a life-informational technology. So it can change the output signals of the solar cell. (see Dayong Cao, BAPS.2011.MAR.C1.286 and BAPS.2012.MAR.P33.14) So we will develop the genetic code of lives to evolution and sublimation, will use the dark matter to change the systemic model between dark hole and sun and will avoid next extinction.

  16. 15 CFR 295.9 - Protection of confidential information.

    Science.gov (United States)

    2010-01-01

    ... confidential basis in connection with the activities of any business or joint research and development venture...) Information on the business operation of any member of the business or joint venture; (2) Trade secrets possessed by any business or any member of the joint venture....

  17. IT Confidentiality Risk Assessment for an Architecture-Based Approach

    NARCIS (Netherlands)

    Morali, Ayse; Zambon, Emmanuele; Etalle, Sandro; Overbeek, Paul

    2008-01-01

    Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The appro

  18. 75 FR 15635 - Delegations of Authority To Disclose Confidential Information

    Science.gov (United States)

    2010-03-30

    ... the public interest. As relevant here, the proposed amendments would extend the information-sharing..., investigative or rule enforcement responsibilities, which do not include business development purposes. The... disclosure system by requiring registered entities to update their lists of confidential data recipients...

  19. Zerber: r-Confidential Indexing for Distributed Documents

    OpenAIRE

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  20. 24 CFR 5.2007 - Certification of status and confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Certification of status and confidentiality. 5.2007 Section 5.2007 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development GENERAL HUD PROGRAM REQUIREMENTS; WAIVERS Protection for Victims of...

  1. 28 CFR 0.39b - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... disclose the identity of any person submitting an allegation of misconduct or reprisal pursuant to 28 CFR 0... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Confidentiality of information. 0.39b Section 0.39b Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE...

  2. Data confidentiality and data handling in research: a workshop report

    Directory of Open Access Journals (Sweden)

    Alison Hinds

    2008-12-01

    Outputs Workshop delegates were largely supportive of the recommendations made in the draft consensus document. Key recommendations included: a campaign at a national and local level highlighting the need to use personal patient records to inform research; standard operating procedures to ensure clearly defined processes are being followed; and the requirement for all patient data to be treated as confidential.

  3. 5 CFR 2634.904 - Confidential filer defined.

    Science.gov (United States)

    2010-01-01

    ... conferred financial or operational benefits; (C) Regulating or auditing any non-Federal entity; or (D) Other... FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Confidential Financial Disclosure... interests of any non-Federal entity; or (ii) The agency concludes that the duties and responsibilities...

  4. Confidentiality and Public Policy Regarding Children with HIV Infection.

    Science.gov (United States)

    Harvey, David C.

    1994-01-01

    Addresses the relationship between law and policy, examining significant gains in establishing legal precedents for protecting the educational rights of children with Human Immunodeficiency Virus (HIV) infection in confronting HIV-related discrimination. The article looks at legal principles of confidentiality, disclosure, negligence and potential…

  5. 15 CFR 718.3 - Disclosure of confidential business information.

    Science.gov (United States)

    2010-01-01

    ... administrative law judge segregate and restrict access to confidential business information contained in material..., the Export Administration Regulations (15 CFR parts 730 through 774), the International Traffic in... Administration Regulations (15 CFR parts 730 through 774), the International Traffic in Arms Regulations (22...

  6. 7 CFR 1207.540 - Confidential books, records, and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential books, records, and reports. 1207.540 Section 1207.540 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL... books, records, and reports. All information obtained from the books, records, and reports of...

  7. 15 CFR 30.60 - Confidentiality of Electronic Export Information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Confidentiality of Electronic Export Information. 30.60 Section 30.60 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade BUREAU OF THE CENSUS, DEPARTMENT OF COMMERCE FOREIGN TRADE REGULATIONS General Administrative...

  8. Secondary School Administrators' Attitudes toward Confidentiality in School Counseling

    Science.gov (United States)

    O'Connell, William P.

    2012-01-01

    The school counseling literature emphasizes the importance of confidentiality in the counseling relationship. In some circumstances, school policy may require disclosure of content discussed in counseling unrelated to threat of harm to self or others. This pilot study investigated secondary school principals' attitudes toward the practice of…

  9. 18 CFR 1b.20 - Request for confidential treatment.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Request for confidential treatment. 1b.20 Section 1b.20 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY....S.C. 1905, or is otherwise exempt by law from public disclosure. In such case, the person...

  10. Farm and Ranch Financial Statements

    OpenAIRE

    Israelsen, Clark; Feuz, Dillon

    2014-01-01

    This fact sheet is a brief overview of the financial statements and budgeting tools that are likely a part of most farm financial record keeping systems. Links are provided for additional detail on any one financial report or topic. A brief description of a Balance Sheet, a Profit Loss Statement or Income Statement, Statement of Cash Flows and Enterprise Analysis is included.

  11. Endless self-avoiding walks

    OpenAIRE

    Clisby, Nathan

    2013-01-01

    We introduce a self-avoiding walk model for which end-effects are completely eliminated. We enumerate the number of these walks for various lattices in dimensions two and three, and use these enumerations to study the properties of this model. We find that endless self-avoiding walks have the same connective constant as self-avoiding walks, and the same Flory exponent $\

  12. Communication Avoiding ILU0 Preconditioner

    OpenAIRE

    Grigori, Laura; Moufawad, Sophie

    2013-01-01

    In this paper we present a communication avoiding ILU0 preconditioner for solving large linear systems of equations by using iterative Krylov subspace methods. Recent research has focused on communication avoiding Krylov subspace methods based on so called s-step methods. However there is no communication avoiding preconditioner yet, and this represents a serious limitation of these methods. Our preconditioner allows to perform s iterations of the iterative method with no communication, throu...

  13. Audit of Financial Statement

    OpenAIRE

    Černá, Helena

    2011-01-01

    The goal of the work is the audit of financial statement of the selected subject and suggestions to improve process of audit and accounting to display the reality fair and accurately. The process of audit is simplified for small firms. Theoretic part is dedicated to laws and regulations, which are obligatory for audit, and technical literature for audit. In the second practical part, audit procedures for real company financial statement verification are implemented. This part is divide...

  14. Extendable self-avoiding walks

    OpenAIRE

    Grimmett, Geoffrey R.; Holroyd, Alexander E; Peres, Yuval

    2013-01-01

    The connective constant mu of a graph is the exponential growth rate of the number of n-step self-avoiding walks starting at a given vertex. A self-avoiding walk is said to be forward (respectively, backward) extendable if it may be extended forwards (respectively, backwards) to a singly infinite self-avoiding walk. It is called doubly extendable if it may be extended in both directions simultaneously to a doubly infinite self-avoiding walk. We prove that the connective constants for forward,...

  15. Prudent Self-Avoiding Walks

    Directory of Open Access Journals (Sweden)

    Anthony J. Guttmann

    2008-09-01

    Full Text Available We have produced extended series for prudent self-avoiding walks on the square lattice. These are subsets of self-avoiding walks. We conjecture the exact growth constant and critical exponent for the walks, and show that the (anisotropic generating function is almost certainly not differentiably-finite.

  16. Prudent Self-Avoiding Walks

    OpenAIRE

    Guttmann, Anthony J.; Dethridge, John C.

    2008-01-01

    We have produced extended series for prudent self-avoiding walks on the square lattice. These are subsets of self-avoiding walks. We conjecture the exact growth constant and critical exponent for the walks, and show that the (anisotropic) generating function is almost certainly not differentiably-finite.

  17. Acquaintance Rape: Effective Avoidance Strategies.

    Science.gov (United States)

    Levine-MacCombie, Joyce; Koss, Mary P.

    1986-01-01

    Determined that acknowledged and unacknowledged acquaintance rape victims and rape avoiders could be discriminated by situational variables and response strategies. Avoiders were less likely to have experienced passive or internalizing emotions at the time of the assault, perceived the assault as less violent, and were more likely to have utilized…

  18. Is patient confidentiality compromised with the electronic health record?: a position paper.

    Science.gov (United States)

    Wallace, Ilse M

    2015-02-01

    In order for electronic health records to fulfill their expected benefits, protection of privacy of patient information is key. Lack of trust in confidentiality can lead to reluctance in disclosing all relevant information, which could have grave consequences. This position paper contemplates whether patient confidentiality is compromised by electronic health records. The position that confidentiality is compromised was supported by the four bioethical principles and argued that despite laws and various safeguards to protect patients' confidentiality, numerous data breaches have occurred. The position that confidentiality is not compromised was supported by virtue ethics and a utilitarian viewpoint and argued that safeguards keep information confidential and the public feels relatively safe with the electronic health record. The article concludes with an ethically superior position that confidentiality is compromised with the electronic health record. Although organizational and governmental ways of enhancing the confidentiality of patient information within the electronic health record facilitate confidentiality, the ultimate responsibility of maintaining confidentiality rests with the individual end-users and their ethical code of conduct. The American Nurses Association Code of Ethics for nurses calls for nurses to be watchful with data security in electronic communications. PMID:25532832

  19. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....... protocols. A static analysis approach is developed for analyzing protocols specified in the extended LYSA. The proposed approach will over-approximate the possible executions of protocols while keeping track of all messages communicated over the network, and furthermore it will capture the potential...

  20. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  1. Legal issues of the electronic dental record: security and confidentiality.

    Science.gov (United States)

    Szekely, D G; Milam, S; Khademi, J A

    1996-01-01

    Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor. PMID:8594098

  2. An efficient steganography method for hiding patient confidential information.

    Science.gov (United States)

    Al-Dmour, Hayat; Al-Ani, Ahmed; Nguyen, Hung

    2014-01-01

    This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI). PMID:25569937

  3. Statement of changes in equity.

    OpenAIRE

    Gallardo Ramiro, M V; Hernández Gañán, S

    2010-01-01

    Since the new General Chart of Accounts was passed, the amount of financial information that is required to the corporations had increased. There have been two new financial statements too: Statement of Changes in Equity and Cash Flow Statement. We analyze the Statement of Changes in Equity on this paper, and the changes result of the new financial statement. Also, the statement of changes in equity has two new accounts: 8th group “Expenditure of Equity” and 9th group “Income of Equity”. The ...

  4. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  5. Auditing nuclear materials statements

    International Nuclear Information System (INIS)

    A standard that may be used as a guide for persons making independent examinations of nuclear materials statements or reports regarding inventory quantities on hand, receipts, production, shipment, losses, etc. is presented. The objective of the examination of nuclear materials statements by the independent auditor is the expression of an opinion on the fairness with which the statements present the nuclear materials position of a nuclear materials facility and the movement of such inventory materials for the period under review. The opinion is based upon an examination made in accordance with auditing criteria, including an evaluation of internal control, a test of recorded transactions, and a review of measured discards and materials unaccounted for (MUF). The standard draws heavily upon financial auditing standards and procedures published by the American Institute of Certified Public Accountants

  6. Confidential Data Hiding Using Wavlet Based Ecg Stegnography

    Directory of Open Access Journals (Sweden)

    Malashree K S

    2014-05-01

    Full Text Available With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as Point-of-Care (PoC applications in hospitals around the world. Therefore, huge amount of ECG signal collected by Body Sensor Networks (BSNs from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level etc. and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data is being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this project, a wavelet based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest.

  7. Legal aspects of medical confidentiality in the occupational setting.

    Science.gov (United States)

    Annas, G J

    1976-08-01

    The law of confidentiality of medical information in the occupational setting is undeveloped and subject to change. Nevertheless, when a physician-patient relationship is established, all of the traditional trappings, including the duty to maintain confidences, go along with it. In other settings, such as preemployment physicals, examinees implicitly consent for their "fitness' for the job to be disclosed, but do not assume that specific findings will be disclosed without their informed and written consent. To promote physician automony and worker confidence in the occupational physician, an explicit policy of confidentiality should be developed and agreed to by both management and workers. This policy should spell out the conditions under which specific information will be made available to the employer and should guarantee the confidentiality of all other medical information. Workers should also be given routine access to their medical files, and offered the chance to refute and have amended information in them that they can demonstrate is inaccurate. In short, workers in the occupational setting should, in general, be treated like private patients. Such a policy will satisfy both the law and the ethical standards of physicians, and will promote worker trust in the occupational physician. PMID:956937

  8. Privacy, confidentiality and abortion statistics: a question of public interest?

    Science.gov (United States)

    McHale, Jean V; Jones, June

    2012-01-01

    The precise nature and scope of healthcare confidentiality has long been the subject of debate. While the obligation of confidentiality is integral to professional ethical codes and is also safeguarded under English law through the equitable remedy of breach of confidence, underpinned by the right to privacy enshrined in Article 8 of the Human Rights Act 1998, it has never been regarded as absolute. But when can and should personal information be made available for statistical and research purposes and what if the information in question is highly sensitive information, such as that relating to the termination of pregnancy after 24 weeks? This article explores the case of In the Matter of an Appeal to the Information Tribunal under section 57 of the Freedom of Information Act 2000, concerning the decision of the Department of Health to withhold some statistical data from the publication of its annual abortion statistics. The specific data being withheld concerned the termination for serious fetal handicap under section 1(1)d of the Abortion Act 1967. The paper explores the implications of this case, which relate both to the nature and scope of personal privacy. It suggests that lessons can be drawn from this case about public interest and use of statistical information and also about general policy issues concerning the legal regulation of confidentiality and privacy in the future. PMID:21708829

  9. THE STATEMENT OF CASH FLOWS USING FINANCIAL STATEMENT EQUATIONS

    OpenAIRE

    Harold Fletcher; Thomas Ulrich

    2010-01-01

    This paper addresses one of the more difficult topics in teaching MBA level financial management, the statement of cash flows. By employing financial statement equations in preparing the statement of cash flows, students: (1) are employing tools that they are more familiar and comfortable with which mitigates their anxiety and enhances their understanding, (2) are better able to understand the logic of the statement of cash flows and the relationships that exist between it and the income stat...

  10. Neuromorphic UAS Collision Avoidance Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Using biologically-inspired neuromorphic optic flow algorithms is a novel approach in collision avoidance for UAS. Traditional computer vision algorithms rely on...

  11. Panic disorder and exercise avoidance

    Directory of Open Access Journals (Sweden)

    Ricardo W. Muotri

    2014-03-01

    Full Text Available Objectives: 1 To identify whether patients with panic disorder in general and those with the respiratory subtype in particular actively avoid exercise; 2 to investigate physiological differences in cardiopulmonary function parameters in patients with panic disorder in general, patients with the respiratory subtype of panic disorder, and healthy controls upon exercise challenge. Methods: Patients with panic disorder were classified as having either the respiratory or the non-respiratory subtype. Both groups were compared to controls in terms of exercise avoidance patterns and performance on cardiopulmonary exercise testing. Results: Patients with panic disorder exhibited higher exercise avoidance scores and worse performance on cardiopulmonary exercise testing as compared with controls. No differences were found between patients with the respiratory and non-respiratory subtypes. Conclusions: Exercise avoidance is present in panic disorder and is associated with poorer performance on cardiopulmonary exercise testing. These findings are not limited to patients with the respiratory subtype of the disorder.

  12. Endless self-avoiding walks

    Science.gov (United States)

    Clisby, Nathan

    2013-06-01

    We introduce a self-avoiding walk model for which end-effects are completely eliminated. We enumerate the number of these walks for various lattices in dimensions two and three, and use these enumerations to study the properties of this model. We find that endless self-avoiding walks have the same connective constant as self-avoiding walks, and the same Flory exponent ν. However, there is no power law correction to the exponential number growth for this new model, i.e. the critical exponent γ = 1 exactly in any dimension. In addition, the number growth has no analytic corrections to scaling, and we have convincing numerical evidence to support the conjecture that the amplitude for the number growth is a universal quantity. The technique by which end-effects are eliminated may be generalized to other models of polymers such as interacting self-avoiding walks.

  13. Endless self-avoiding walks

    International Nuclear Information System (INIS)

    We introduce a self-avoiding walk model for which end-effects are completely eliminated. We enumerate the number of these walks for various lattices in dimensions two and three, and use these enumerations to study the properties of this model. We find that endless self-avoiding walks have the same connective constant as self-avoiding walks, and the same Flory exponent ν. However, there is no power law correction to the exponential number growth for this new model, i.e. the critical exponent γ = 1 exactly in any dimension. In addition, the number growth has no analytic corrections to scaling, and we have convincing numerical evidence to support the conjecture that the amplitude for the number growth is a universal quantity. The technique by which end-effects are eliminated may be generalized to other models of polymers such as interacting self-avoiding walks. (paper)

  14. Avoidable nightmare; Der vermeidbare Albtraum

    Energy Technology Data Exchange (ETDEWEB)

    Sieg, Mirco

    2010-07-01

    Failure of photovoltaic systems because of serious damage is an increasing phenomenon. Especially in older systems, faulty projecting and installation may have costly late effects. Insurance companies reckon that most cases of damage and failure could easily be avoided. (orig.)

  15. Vision-based obstacle avoidance

    Science.gov (United States)

    Galbraith, John

    2006-07-18

    A method for allowing a robot to avoid objects along a programmed path: first, a field of view for an electronic imager of the robot is established along a path where the electronic imager obtains the object location information within the field of view; second, a population coded control signal is then derived from the object location information and is transmitted to the robot; finally, the robot then responds to the control signal and avoids the detected object.

  16. Self-avoiding quantum walks

    OpenAIRE

    Camilleri, Elizabeth; Rohde, Peter P.; Twamley, Jason

    2014-01-01

    Quantum walks exhibit many unique characteristics compared to classical random walks. In the classical setting, self-avoiding random walks have been studied as a variation on the usual classical random walk. Classical self-avoiding random walks have found numerous applications, most notably in the modeling of protein folding. We consider the analogous problem in the quantum setting. We complement a quantum walk with a memory register that records where the walker has previously resided. The w...

  17. Who participates in tax avoidance?

    OpenAIRE

    Alstadsæter, Annette; Jacob, Martin

    2013-01-01

    This paper analyzes the sources of heterogeneity in legal tax avoidance strategies across individuals. Three conditions are required for a taxpayer to participate in tax avoidance: incentive, access, and awareness. Using rich Swedish administrative panel data with a unique link between corporate and individual tax returns, we analyze individual participation in legal tax planning around the 2006 Swedish tax reform. Our results suggest that closely held corporations are utilized to facilitate ...

  18. Predator Avoidance in Extremophile Fish

    Directory of Open Access Journals (Sweden)

    Martin Plath

    2013-02-01

    Full Text Available Extreme habitats are often characterized by reduced predation pressures, thus representing refuges for the inhabiting species. The present study was designed to investigate predator avoidance of extremophile populations of Poecilia mexicana and P. sulphuraria that either live in hydrogen sulfide-rich (sulfidic springs or cave habitats, both of which are known to have impoverished piscine predator regimes. Focal fishes that inhabited sulfidic springs showed slightly weaker avoidance reactions when presented with several naturally occurring predatory cichlids, but strongest differences to populations from non-sulfidic habitats were found in a decreased shoaling tendency with non-predatory swordtail (Xiphophorus hellerii females. When comparing avoidance reactions between P. mexicana from a sulfidic cave (Cueva del Azufre and the adjacent sulfidic surface creek (El Azufre, we found only slight differences in predator avoidance, but surface fish reacted much more strongly to the non-predatory cichlid Vieja bifasciata. Our third experiment was designed to disentangle learned from innate effects of predator recognition. We compared laboratory-reared (i.e., predator-naïve and wild-caught (i.e., predator-experienced individuals of P. mexicana from a non-sulfidic river and found no differences in their reaction towards the presented predators. Overall, our results indicate (1 that predator avoidance is still functional in extremophile Poecilia spp. and (2 that predator recognition and avoidance reactions have a strong genetic basis.

  19. CONSOLIDATED FINANCIAL STATEMENTS UNDER IFRS

    OpenAIRE

    Tănase Alin-Eliodor; Calotă Traian-Ovidiu

    2013-01-01

    This article is focuses on accounting consolidation techniques and the preparation of consolidation worksheets for the components of financial statements (statement of comprehensive income, statement of changes in equity, and financial position). The presented group includes parent company, two subsidiaries (only one fully controlled by the parent company) and a jointly controlled entity. The financial statements are presented under the following standards IFRS 3 Business Combination, IAS 27 ...

  20. CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks

    OpenAIRE

    Morali, Ayse; Zambon, Emmanuele; Etalle, Sandro; Wieringa, Roel

    2009-01-01

    The leakage of confidential information (e.g.\\ industrial secrets, patient records and user credentials) is one of the risks that have to be accounted for and mitigated by organizations dealing with confidential data. Unfortunately, assessing confidentiality risk is challenging, particularly in the presence of cross- organization cooperation, like in the case of outsourcing. This is due to the complexity of business networks. This paper presents an IT-architecture based method for assessing a...

  1. 3 CFR - Presidential Signing Statements

    Science.gov (United States)

    2010-01-01

    ... issued statements addressing constitutional or other legal questions upon signing bills into law (signing... of the use of signing statements to raise constitutional objections to statutory provisions. There is no doubt that the practice of issuing such statements can be abused. Constitutional...

  2. Fundamentals of Financial Statements Audit

    OpenAIRE

    World Bank

    2011-01-01

    The purpose of an audit is to enhance the degree of confidence of intended users in the financial statements. The objective of an audit of financial statements is to enable an auditor to express an opinion as to whether the financial statements are prepared, in all material respects, in accordance with International Financial Reporting Standards or another identified financial reporting fr...

  3. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... only protects the right to confidentiality for patients who are 18 or older. CONCLUSIONS: Our findings indicate that Lithuanian GPs frequently violate adolescents' right to confidential health services. The study highlights the need for a comprehensive strategy to strengthen the confidentiality...... of sexual and reproductive health services for this group in Lithuanian primary care....

  4. Avoidance: grammatical or semantic causes?

    OpenAIRE

    Hulstijn, J.H.; de Marchena, E.

    1989-01-01

    This article follows up on a study by Dagut and Laufer (1985), who found that Hebrew learners of English avoid phrasal verbs, such as ‘let down’, while preferring one-word verbs, such as ‘;disappoint’, since phrasal verbs do not exist in Hebrew. A corollary derived from Dagut and Laufer's study is that Dutch learners of English would tend not to avoid English phrasal verbs, since phrasal verbs also exist in Dutch. It was hypothesized, however, that Dutch learners of English as a second langua...

  5. Case Reports on the Web Redux: Confidentiality Still in Jeopardy

    OpenAIRE

    Markovitz, Barry P; Goodman, Kenneth W

    2003-01-01

    We reported at AMIA 1999 on the apparent lack of privacy protection for the subjects of case reports at 32 websites. It has been clear for some time that print journal editors and Institutional Review Boards require informed consent from patients or their surrogates if they can be potentially identified in publications.1–3 We found in 1999 that this level of confidentiality protection was not being applied to case reports on the Internet.4 This report is a follow up evaluation of those and 26...

  6. Avoiding unfavourable outcomes in liposuction

    Directory of Open Access Journals (Sweden)

    Atul Khanna

    2013-01-01

    Full Text Available The origin of liposuction can be traced to an adverse event by Dujarrier in 1921 when he used a uterine curette to remove fat from the knees of a ballerina ending in an amputation secondary to damage of the femoral artery. The history of liposuction since then has been one of avoiding complications and optimising outcome. After this adverse event, liposuction was abandoned until the 1960′s when Schrudde revived the practice using small stab incisions and sharp curettage with the secondary suction to aspirate the freed tissue. This technique was associated with a high incidence of complications especially seroma and skin necrosis. Illouz then replaced the curette with a blunt cannula connected to vacuum pump thus avoiding the complications of a sharp curette. Despite the presence of various techniques for liposuction, suction assisted liposuction (SAL is still the standard technique of liposuction. This article aims to discuss literature regarding the various aspects of liposuction (SAL and to highlight the salient points in the literature and in the senior author′s experience in order to avoid unfavourable outcomes in liposuction. A literature review on avoiding complication is in liposuction including some of the seminal papers on liposuction. Liposuction is generally a safe procedure with reproducible outcome. Just like any surgical procedure it should be treated with the utmost care. Illouz published 10 commandments for liposuction in 1989 and we review these commandments to demonstrate how liposuction has evolved.

  7. Avoiding plagiarism in academic writing.

    Science.gov (United States)

    Anderson, Irene

    Plagiarism means taking the work of another and presenting it as one's own, resulting in potential upset for the original author and disrepute for the professions involved. This article aims to explore the issue of plagiarism and some mechanisms for detection and avoidance. PMID:19186631

  8. Plagiarism Avoidance in Academic Submissions

    OpenAIRE

    Cully, Philip

    2013-01-01

    The purpose of this paper is to provide undergraduate students with an introductory resource focusing on plagiarism avoidance. It sets out to identify often confusing associated nuances. From the perspective of paraphrasing, the requirements attaching to the necessary provision of proper citations are explored. The paper concludes by pondering the topic of reliability of sources.

  9. Avoidance: grammatical or semantic causes?

    NARCIS (Netherlands)

    J.H. Hulstijn; E. Marchena

    1989-01-01

    This article follows up on a study by Dagut and Laufer (1985), who found that Hebrew learners of English avoid phrasal verbs, such as ‘let down’, while preferring one-word verbs, such as ‘;disappoint’, since phrasal verbs do not exist in Hebrew. A corollary derived from Dagut and Laufer's study is t

  10. Python Switch Statement

    Directory of Open Access Journals (Sweden)

    2008-06-01

    Full Text Available The Python programming language does not have a built in switch/case control structure as found in many other high level programming languages. It is thought by some that this is a deficiency in the language, and the control structure should be added. This paper demonstrates that not only is the control structure not needed, but that the methods available in Python are more expressive than built in case statements in other high level languages.

  11. 29 CFR 4901.24 - Special rules for trade secrets and confidential commercial or financial information submitted to...

    Science.gov (United States)

    2010-07-01

    ... confidential business information and designate, with appropriate markings, the portion(s) of the submission to... secret or is commercial or financial information that is privileged or confidential. Facts...

  12. 7 CFR 981.75 - Confidential nature of records and reports.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential nature of records and reports. 981.75 Section 981.75 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING... GROWN IN CALIFORNIA Order Regulating Handling Records and Reports § 981.75 Confidential nature...

  13. 42 CFR 51.45 - Confidentiality of protection and advocacy system records.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality of protection and advocacy system... GRANTS REQUIREMENTS APPLICABLE TO THE PROTECTION AND ADVOCACY FOR INDIVIDUALS WITH MENTAL ILLNESS PROGRAM Access to Records, Facilities and Individuals § 51.45 Confidentiality of protection and advocacy...

  14. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.1 Statutory authority for confidentiality of drug abuse patient records. The restrictions of these regulations upon the disclosure and use of drug abuse patient records were initially authorized by section...

  15. 49 CFR 512.4 - When requesting confidentiality, what should I submit?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false When requesting confidentiality, what should I... INFORMATION Submission Requirements § 512.4 When requesting confidentiality, what should I submit? Any person... requesting that the information be withheld from public disclosure pursuant to 5 U.S.C. 552(b) shall...

  16. 41 CFR 102-75.320 - Does appraisal information need to be kept confidential?

    Science.gov (United States)

    2010-07-01

    ... information need to be kept confidential? 102-75.320 Section 102-75.320 Public Contracts and Property... information need to be kept confidential? Yes, appraisals, appraisal reports, appraisal analyses, and other... personnel who can substantiate the need to know this information. Appraisal information must not be...

  17. 76 FR 69722 - Access to Confidential Business Information by Protection Strategies Incorporated

    Science.gov (United States)

    2011-11-09

    ... AGENCY Access to Confidential Business Information by Protection Strategies Incorporated AGENCY... access to the Toxic Substances Control Act (TSCA) confidential business information and to provide notice... contractor, PSI of Arlington, VA, to access information which has been submitted to EPA under all sections...

  18. 19 CFR 206.47 - Limited disclosure of certain confidential business information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Limited disclosure of certain confidential business information under administrative protective order. 206.47 Section 206.47 Customs Duties UNITED... Investigations for Relief From Market Disruption § 206.47 Limited disclosure of certain confidential...

  19. 19 CFR 206.17 - Limited disclosure of certain confidential business information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Limited disclosure of certain confidential business information under administrative protective order. 206.17 Section 206.17 Customs Duties UNITED... Investigations Relating to Global Safeguard Actions § 206.17 Limited disclosure of certain confidential...

  20. 19 CFR 210.39 - In camera treatment of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information....39 In camera treatment of confidential information. (a) Definition. Except as hereinafter provided... protective orders or orders granting in camera treatment are not made part of the public record and are...

  1. 30 CFR 291.111 - How does MMS treat the confidential information I provide?

    Science.gov (United States)

    2010-07-01

    ... regulations at 43 CFR part 2 to give submitters an opportunity to object to disclosure. (c) MMS retains the... 30 Mineral Resources 2 2010-07-01 2010-07-01 false How does MMS treat the confidential information... SHELF LANDS ACT § 291.111 How does MMS treat the confidential information I provide? (a) Any person...

  2. 7 CFR 3405.21 - Confidential aspects of proposals and awards.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Confidential aspects of proposals and awards. 3405.21 Section 3405.21 Agriculture Regulations of the Department of Agriculture (Continued) COOPERATIVE STATE... PROGRAM Supplementary Information § 3405.21 Confidential aspects of proposals and awards. When a...

  3. 7 CFR 2903.22 - Confidential aspects of applications and awards.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Confidential aspects of applications and awards. 2903.22 Section 2903.22 Agriculture Regulations of the Department of Agriculture (Continued) OFFICE OF... Information § 2903.22 Confidential aspects of applications and awards. When an application results in an...

  4. 7 CFR 3406.28 - Confidential aspects of proposals and awards.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Confidential aspects of proposals and awards. 3406.28 Section 3406.28 Agriculture Regulations of the Department of Agriculture (Continued) COOPERATIVE STATE... GRANTS PROGRAM Supplementary Information § 3406.28 Confidential aspects of proposals and awards. When...

  5. 7 CFR 3402.21 - Confidential aspects of applications and awards.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Confidential aspects of applications and awards. 3402.21 Section 3402.21 Agriculture Regulations of the Department of Agriculture (Continued) COOPERATIVE... § 3402.21 Confidential aspects of applications and awards. When an application results in a grant,...

  6. 29 CFR 1208.5 - Material relating to mediation function-confidential.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Material relating to mediation function-confidential. 1208.5 Section 1208.5 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD AVAILABILITY OF INFORMATION § 1208.5 Material relating to mediation function—confidential. (a) All...

  7. Attitude of Lithuanian residents to confidentiality of adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....

  8. 21 CFR 20.55 - Indexing trade secrets and confidential commercial or financial information.

    Science.gov (United States)

    2010-04-01

    ... or financial information. 20.55 Section 20.55 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT... secrets and confidential commercial or financial information. Whenever the Food and Drug Administration... exempt from public disclosure as trade secret or confidential commercial or financial data...

  9. 47 CFR 51.335 - Notice of network changes: Confidential or proprietary information.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Notice of network changes: Confidential or proprietary information. 51.335 Section 51.335 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Carriers § 51.335 Notice of network changes: Confidential or proprietary information. (a) If an...

  10. 28 CFR 100.20 - Confidentiality of trade secrets/proprietary information.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Confidentiality of trade secrets... RECOVERY REGULATIONS, COMMUNICATIONS ASSISTANCE FOR LAW ENFORCEMENT ACT OF 1994 § 100.20 Confidentiality of trade secrets/proprietary information. With respect to any information provided to the FBI under...

  11. 15 CFR Supplement No. 1 to Part 718 - Confidential Business Information Declared or Reported *

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Confidential Business Information Declared or Reported * No. Supplement No. 1 to Part 718 Commerce and Foreign Trade Regulations Relating to... WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION Pt. 718, Supp. 1 Supplement No. 1 to...

  12. Confidential Communication Through Chaos Encryption in Wireless Sensor Network

    Institute of Scientific and Technical Information of China (English)

    CHEN Shuai; ZHONG Xian-xin

    2007-01-01

    A new byte block cipher algorithm with discrete chaos and Feistel structure has been studied for confidential communication in wireless sensor network to improve security. After permutation, the byte block was encrypted through a Feistel structure in multiple turns and afterwards replaced again. The child keys are the composite sequence of discrete chaos and linear congruence sequences. Both the plain text and cipher text are of 8 bits. The number of keys is alterable. A nonlinear encryption function in the Feistel structure with chaos was constructed. The cipher algorithm was realized in the Micaz node,and the confidential communication experiment in wireless sensor network was completed successfully. Additional ROM memory required for the cipher algorithm is 4144 bytes and an additional RAM memory 61 bytes. The cipher algorithm is nonlinear chaos and the Feistel structure holds the best of the RC6, DES and SKIPJACK cipher algorithms.The result shows that the algorithm needs a little memory and is safe at a high level.

  13. XDS-I outsourcing proxy: ensuring confidentiality while preserving interoperability.

    Science.gov (United States)

    Ribeiro, Luís S; Viana-Ferreira, Carlos; Oliveira, José Luís; Costa, Carlos

    2014-07-01

    The interoperability of services and the sharing of health data have been a continuous goal for health professionals, patients, institutions, and policy makers. However, several issues have been hindering this goal, such as incompatible implementations of standards (e.g., HL7, DICOM), multiple ontologies, and security constraints. Cross-enterprise document sharing (XDS) workflows were proposed by Integrating the Healthcare Enterprise (IHE) to address current limitations in exchanging clinical data among organizations. To ensure data protection, XDS actors must be placed in trustworthy domains, which are normally inside such institutions. However, due to rapidly growing IT requirements, the outsourcing of resources in the Cloud is becoming very appealing. This paper presents a software proxy that enables the outsourcing of XDS architectural parts while preserving the interoperability, confidentiality, and searchability of clinical information. A key component in our architecture is a new searchable encryption (SE) scheme-Posterior Playfair Searchable Encryption (PPSE)-which, besides keeping the same confidentiality levels of the stored data, hides the search patterns to the adversary, bringing improvements when compared to the remaining practical state-of-the-art SE schemes. PMID:25014941

  14. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  15. Quantum key based burst confidentiality in optical burst switched networks.

    Science.gov (United States)

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks. PMID:24578663

  16. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  17. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations......' expectations with regard to confidentiality protection for adolescents in this domain, and explores the factors related to the diversity of these expectations. METHODS: Two national surveys of Lithuanian residents completed in 2005 and 2012 using anonymous questionnaires. Participants rated their expectations...

  18. 75 FR 24688 - Access to Confidential Business Information by Guident Technologies Inc.’s Identified Subcontractor

    Science.gov (United States)

    2010-05-05

    ... AGENCY Access to Confidential Business Information by Guident Technologies Inc.'s Identified... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to the..., maintenance, and operations for the Confidential Business Information Systems and for Test...

  19. Obstacle Avoidance Through Visual Teleoperation

    Directory of Open Access Journals (Sweden)

    Muhammad Usman Keerio

    2009-01-01

    Full Text Available This paper presents a novel controlling approach forHumanoid Robot to work safely in critical situations like badlight environment using Visual Teleoperation. In this regardmodeling environments for Humanoid Teleoperation Systemis developed. Here virtual reality modeling environmentincludes development of virtual Humanoid BHR-2, andvirtual objects like table etc. The main goal of this work is toenhance our visual teleoperation system for BHR-2 in orderto avoid any collision during real time operation. SoftwareMaya is used for modeling and simulations. Maya plug-insin VC++ provides efficient modeling rule, real timeinteraction, and time saving rendering approach in a virtualenvironment. In this paper the validity of proposed scheme isshown by conducting experiments using offline step overtrajectory to avoid obstacle in bad light environment.

  20. Jam avoidance with autonomous systems

    OpenAIRE

    Tordeux, Antoine; Lassarre, Sylvain

    2015-01-01

    Many car-following models are developed for jam avoidance in highways. Two mechanisms are used to improve the stability: feedback control with autonomous models and increasing of the interaction within cooperative ones. In this paper, we compare the linear autonomous and collective optimal velocity (OV) models. We observe that the stability is significantly increased by adding predecessors in interaction with collective models. Yet autonomous and collective approaches are close when the speed...

  1. Consumer Privacy and Marketing Avoidance

    OpenAIRE

    Il-Horn Hann; Kai-Lung Hui; Sang-Yong Tom Lee; Ivan Png

    2005-01-01

    We introduce consumer avoidance into analytical marketing research. We show that consumer efforts to conceal themselves and to deflect marketing have a crucial impact on sellers¡¯ marketing strategy. Under reasonable conditions, seller marketing is a strategic complement with consumer concealment. Hence, consumer measures to conceal themselves from marketing will increase its cost-effectiveness and lead sellers to market more. Policies that encourage consumers to conceal their identities woul...

  2. Avoiding congestion in recommender systems

    International Nuclear Information System (INIS)

    Recommender systems use the historical activities and personal profiles of users to uncover their preferences and recommend objects. Most of the previous methods are based on objects’ (and/or users’) similarity rather than on their difference. Such approaches are subject to a high risk of increasingly exposing users to a narrowing band of popular objects. As a result, a few objects may be recommended to an enormous number of users, resulting in the problem of recommendation congestion, which is to be avoided, especially when the recommended objects are limited resources. In order to quantitatively measure a recommendation algorithm's ability to avoid congestion, we proposed a new metric inspired by the Gini index, which is used to measure the inequality of the individual wealth distribution in an economy. Besides this, a new recommendation method called directed weighted conduction (DWC) was developed by considering the heat conduction process on a user–object bipartite network with different thermal conductivities. Experimental results obtained for three benchmark data sets showed that the DWC algorithm can effectively avoid system congestion, and greatly improve the novelty and diversity, while retaining relatively high accuracy, in comparison with the state-of-the-art methods. (paper)

  3. Presentation of Consolidated Statement of Cash Flows under IAS 7, Statement of Cash Flows

    OpenAIRE

    Tănase Alin-Eliodor; Calota Traian-Ovidiu

    2013-01-01

    The consolidated financial statements must includ a specific statement, regarding cash flows from all activities of the entity, called „consolidated statement of cash flow”. Information for preparing cash flow statements can be found in all other components of the financial statements, such as financial position, statement of comprehensive income and statement of changes in equity. The cash flow statement shall report cash flows during the period classified by operating, investing and financi...

  4. Perceptions of healthcare professionals for colleague confidentiality. A descriptive study.

    Directory of Open Access Journals (Sweden)

    Karkasina Α.

    2013-01-01

    Full Text Available Introduction: Cooperation among nurses is related to Colleague’s Confidentiality Protection, according to Nursing Deontology and their Code of Ethics.The purpose of this study was the evaluation of nursing personnel attitudes, perceptions and behavior towards Colleague’s Confidentiality. Methodology: This study was conducted on the basis of the Master Studies in “Management of health services and crisis management” of University of Peloponnese from July till November of 2011. The sample of the study included nursing personnel of General Hospital of Sparta, of Molai and of Panarkadian Hospital of Tripolis. Based on the study of literature a questionnaire was constructed. Data consistency was tested by Cronbach α (α= 0,81. Specifically, the questionnaire reflected the attitudes and perceptions related to the behavior of the nursing staff regarding the cooperation among them and their collaboration with patients. It also included questions investigating actions made by the participants in case a colleague put in danger patient’s life or risked an infection. Finally, there were questions regarding the participants’ satisfaction from actions taken in case they made a report for a nursing error to the ward they were working. 200 questionnaires were distributed and 177 were finally answered (88.5% respone rate. For the statistical analysis the statistical program SPSS V.16 was used. Results: 9.7% of the participants were men and the rest 90,3% were women. Mean age of the sample was 36,8 years with the lowest to be 20 years old and the highest 58 years old. The majority of the participants (40% said that they had reported an error but they didn’t do it officially. The main reason for non-reporting it was because of the Colleague’s Confidentiality’s Protection. A rate of 48% of the nurses knew Nurses’ Code of Ethics and the law existence supporting it. A rate of 32.5% of the participants considered that by reporting an error, the

  5. Statement on virginity testing.

    Science.gov (United States)

    2015-07-01

    Virginity testing (virginity examination) is a gynecological examination that is intended to correlate the status and appearance of the hymen with previous sexual contact to determine whether a female has had or is habituated to sexual intercourse. Virginity examinations are practiced in many countries, often forcibly, including in detention places; on women who allege rape or are accused of prostitution; and as part of public or social policies to control sexuality. The Independent Forensic Expert Group (IFEG) - thirty-five preeminent independent forensic experts from eighteen countries specialized in evaluating and documenting the physical and psychological effects of torture and ill-treatment - released a statement on the practice in December 2014. In its statement, the IFEG outlines the physical and psychological effects of forcibly conducting virginity examinations on females based on its collective experience. The Group assesses whether, based on the effects, forcibly conducted virginity examinations constitute cruel, inhuman, or degrading treatment or torture. Finally, the IFEG addresses the medical interpretation, relevance, and ethical implications of such examinations. The IFEG concludes that virginity examinations are medically unreliable and have no clinical or scientific value. These examinations are inherently discriminatory and, in almost all instances, when conducted forcibly, result in significant physical and mental pain and suffering, thereby constituting cruel, inhuman and degrading treatment or torture. When virginity examinations are forcibly conducted and involve vaginal penetration, the examination should be considered as sexual assault and rape. Involvement of health professionals in these examinations violates the basic standards and ethics of the professions. PMID:26048511

  6. Avoiding unfavourable outcomes in liposuction

    OpenAIRE

    Atul Khanna; George Filobbos

    2013-01-01

    The origin of liposuction can be traced to an adverse event by Dujarrier in 1921 when he used a uterine curette to remove fat from the knees of a ballerina ending in an amputation secondary to damage of the femoral artery. The history of liposuction since then has been one of avoiding complications and optimising outcome. After this adverse event, liposuction was abandoned until the 1960′s when Schrudde revived the practice using small stab incisions and sharp curettage with the secondary suc...

  7. Jam avoidance with autonomous systems

    CERN Document Server

    Tordeux, Antoine

    2016-01-01

    Many car-following models are developed for jam avoidance in highways. Two mechanisms are used to improve the stability: feedback control with autonomous models and increasing of the interaction within cooperative ones. In this paper, we compare the linear autonomous and collective optimal velocity (OV) models. We observe that the stability is significantly increased by adding predecessors in interaction with collective models. Yet autonomous and collective approaches are close when the speed difference term is taking into account. Within the linear OV models tested, the autonomous models including speed difference are sufficient to maximise the stability.

  8. Attacker Control and Impact for Confidentiality and Integrity

    CERN Document Server

    Askarov, Aslan

    2011-01-01

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security is guaranteed when such mechanisms are used. This paper presents a new semantic framework for expressing security policies for declassification and endorsement in a language-based setting. The key insight is that security can be characterized in terms of the influence that declassification and endorsement allow to the attacker. The new framework introduces two notions of security to describe the influence of the attacker. Attacker control defines what the attacker is able to learn from observable effects of this code; attacker impact captures the attacker's influence on trusted locations. This ap...

  9. MLA Statement of Professional Ethics.

    Science.gov (United States)

    ADE Bulletin, 2002

    2002-01-01

    Intends for this statement to embody reasonable norms for ethical conduct in teaching, research, and related public service activities in the modern languages and literatures. Lists seven governing premises of the statement. Examines ethical conduct in academic relationships, discussing obligations to students, colleagues, staff members, the…

  10. Aerospace Education. NSTA Position Statement

    Science.gov (United States)

    National Science Teachers Association (NJ1), 2008

    2008-01-01

    National Science Teachers Association (NSTA) has developed a new position statement, "Aerospace Education." NSTA believes that aerospace education is an important component of comprehensive preK-12 science education programs. This statement highlights key considerations that should be addressed when implementing a high quality aerospace education…

  11. Reading and understanding financial statements.

    Science.gov (United States)

    White, Joseph P

    2005-01-01

    Feeling comfortable reading and understanding financial statements is critical to the success of healthcare executives and physicians involved in management. Businesses use three primary financial statements: a balance sheet represents the equation, Assets = Liabilities + Equity; an income statement represents the equation, Revenues - Expenses = Net Income; a statement of cash flows reports all sources and uses of cash during the represented period. The balance sheet expresses financial indicators at one particular moment in time, whereas the income statement and the statement of cash flows show activity that occurred over a stretch of time. Additional information is disclosed in attached footnotes and other supplementary materials. There are two ways to prepare financial statements. Cash-basis accounting recognizes revenue when it is received and expenses when they are paid. Accrual-basis accounting recognizes revenue when it is earned and expenses when they are incurred. Although cash-basis is acceptable, periodically using the accrual method reveals important information about receivables and liabilities that could otherwise remain hidden. Become more engaged with your financial statements by spending time reading them, tracking key performance indicators, and asking accountants and financial advisors questions. This will help you better understand your business and build a successful future. PMID:16095076

  12. Obstacle-avoiding navigation system

    Science.gov (United States)

    Borenstein, Johann; Koren, Yoram; Levine, Simon P.

    1991-01-01

    A system for guiding an autonomous or semi-autonomous vehicle through a field of operation having obstacles thereon to be avoided employs a memory for containing data which defines an array of grid cells which correspond to respective subfields in the field of operation of the vehicle. Each grid cell in the memory contains a value which is indicative of the likelihood, or probability, that an obstacle is present in the respectively associated subfield. The values in the grid cells are incremented individually in response to each scan of the subfields, and precomputation and use of a look-up table avoids complex trigonometric functions. A further array of grid cells is fixed with respect to the vehicle form a conceptual active window which overlies the incremented grid cells. Thus, when the cells in the active window overly grid cell having values which are indicative of the presence of obstacles, the value therein is used as a multiplier of the precomputed vectorial values. The resulting plurality of vectorial values are summed vectorially in one embodiment of the invention to produce a virtual composite repulsive vector which is then summed vectorially with a target-directed vector for producing a resultant vector for guiding the vehicle. In an alternative embodiment, a plurality of vectors surrounding the vehicle are computed, each having a value corresponding to obstacle density. In such an embodiment, target location information is used to select between alternative directions of travel having low associated obstacle densities.

  13. Adaptive avoidance of reef noise.

    Directory of Open Access Journals (Sweden)

    Stephen D Simpson

    Full Text Available Auditory information is widely used throughout the animal kingdom in both terrestrial and aquatic environments. Some marine species are dependent on reefs for adult survival and reproduction, and are known to use reef noise to guide orientation towards suitable habitat. Many others that forage in food-rich inshore waters would, however, benefit from avoiding the high density of predators resident on reefs, but nothing is known about whether acoustic cues are used in this context. By analysing a sample of nearly 700,000 crustaceans, caught during experimental playbacks in light traps in the Great Barrier Reef lagoon, we demonstrate an auditory capability in a broad suite of previously neglected taxa, and provide the first evidence in any marine organisms that reef noise can act as a deterrent. In contrast to the larvae of species that require reef habitat for future success, which showed an attraction to broadcasted reef noise, taxa with a pelagic or nocturnally emergent lifestyle actively avoided it. Our results suggest that a far greater range of invertebrate taxa than previously thought can respond to acoustic cues, emphasising yet further the potential negative impact of globally increasing levels of underwater anthropogenic noise.

  14. [Health professionals may have a dilemma about confidentiality healthcare of adolescents].

    Science.gov (United States)

    Boisen, Kirsten; Adolphsen, Caroline; Svensson, Jannet; Jensen, Rikke; Teilmann, Grete

    2016-09-01

    Confidentiality is paramount in healthcare, yet according to Danish guidelines, health professionals have to inform parents about their child´s situation until the age of 18 years. This is in contrast to Danish legislation regarding informed consent, where adolescents aged 15 years can consent to treatment. Young people value confidentiality, although they are unaware of the current guidelines. International guidelines on youth-friendly health services recommend split visits and confidential care while at the same time acknowledging parents' caretaking role, especially in adolescents with chronic illness. PMID:27593236

  15. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... filed in the Copyright Office for digital audio recording devices or media. 201.29 Section 201.29...'s Reports, and other verification information filed in the Copyright Office for digital audio... appropriate parties. (b) Definitions. (1) Access includes inspection of and supervised making of notes...

  16. Method of protection of the confidential information with use of permutable functions

    OpenAIRE

    Stella G. Spirina

    2011-01-01

    In work it is offered recurenting a method of construction of permutable whole functions in fields Gаluа GF from (p) to the set degree on the basis of basic as question of protection of the confidential information.

  17. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Industrial Economics Incorporated AGENCY... Economics Incorporated (IEI) of Cambridge, MA, to access information which has been submitted to EPA...

  18. 76 FR 37111 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2011-06-24

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Computer Sciences Corporation and Its Identified... contractor, Computer Sciences Corporation of Chantilly, VA and Its Identified Subcontractors, to...

  19. Knowledge, attitudes, and awareness of Croatian dentists concerning patients' confidentiality and privacy.

    Science.gov (United States)

    Budimir, Vice; Cerjan-Letica, Gordana; Budimir, Jozo; Macan, Darko

    2013-03-01

    Confidentiality and privacy have always been a vital part of the health care provider-patient relationship. The aim of this study was to identify and analyze the knowledge, attitudes, and awareness of dentists in Croatia concerning patients' confidentiality and privacy and to determine the degree to which they were protecting patients' confidentiality and privacy in everyday practice. Survey data were collected from seventy of the approximately 4,000 dentists in Croatia who had been randomly selected using the registry of the Croatian Chamber of Dental Medicine. Our strategy for data collection included visits to the dental offices and clinics. The data showed that dentists displayed a lack of awareness and had a poor attitude toward respecting patients' rights to confidentiality and privacy. This study indicated the need to educate dentists about their responsibilities and legal obligations. PMID:23486904

  20. Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images

    OpenAIRE

    Al-Haj, Ali

    2014-01-01

    Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality for the header data of the image but not for the pixel data. On the other hand, it offers mechanisms to achieve authenticity and integrit...

  1. Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security

    OpenAIRE

    Ivan Ognyanov Kuyumdzhiev

    2014-01-01

    Facebook allows people to easily share information about themselves which in some cases could be classified as confidential or sensitive in the organisation they’re working for. In this paper we discuss the type of data stored by Facebook and the scope of the terms “confidential” and “sensitive data”. The intersection of these areas shows that there is high possibility for confidential data disclosure in organisations with none or ineffective security policy. This paper proposes a strategy fo...

  2. Would Tax Evasion and Tax Avoidance Undermine a National Retail Sales Tax?

    OpenAIRE

    Murray, Matthew N.

    1997-01-01

    Argues that shifting to an indirect tax system (a national sales tax) will not necessarily reduce tax avoidance and tax evasion behavior by businesses and individuals, particularly if the tax rate is set high to maintain revenue neutrality. Lack of experience in administering a high-rate, indirect tax system precludes definitive statements regarding the likely extent of tax base erosion under a national sales tax.

  3. Lists of environmental statements projects

    International Nuclear Information System (INIS)

    The document is a collection of five lists of the Environmental Statements Projects related to nuclear power reactors, consumer products in which by-product radionuclides may be used, ERDA facilities, and, for the Department of Housing and Urban Development, Modular Integrated Utilities Systems. The lists are arranged by (1) Project name, (2) Project docket number, (3) NRC Environmental Project Manager, (4) ORNL Task Group Leader, and (5) ORNL editor. In each list, the first issue date listed for each project is the issue date of its Draft Environmental Statement (DES), and the second issue date is that of the Final Environmental Statement (FES). The lists will be updated as the Environmental Statements Project continues. (U.S.)

  4. Basic statements of relativity theory

    OpenAIRE

    Wolfgang Muschik

    2010-01-01

    Some basic statements of relativity theory, starting out with geometry and observers up to Einstein's field equations, are collected in a systematical order without any proof, to serve as a short survey of tools and results.

  5. Financial statement and final accounts

    OpenAIRE

    ČERNÁ, Ilona

    2011-01-01

    The main task of accounting is to inform truthfully and accurately show business assets, the sources from which assets were acquired and the financial situation - the economic result for a certain period of time. These users will find information in public documents of final accounts, which are made statements - balance sheet, profit and loss account and the annex to these financial statements. To ensure the correctness and completeness of the data in the accounting process is an important ba...

  6. Hinkley Point 'C': a summary of the Environmental Statement

    International Nuclear Information System (INIS)

    The Environmental Statement describes the potentially significant environmental effects of the proposed pressurized water reactor station at Hinkley Point in Somerset, and the ways in which the Central Electricity Generating Board (CEGB) intends to avoid, reduce or remedy these effects. It also explains the CEGB's reasons for proposing a PWR at Hinkley Point. The Environmental Statement has been produced to inform local authorities, the public and the Secretary of State for Energy about the CEGB's proposals. The Secretary of State has to decide whether or not consent for construction of Hinkley Point 'C' power station should be given, and in reaching that decision has to consider, amongst other matters, the environmental effects of the project. This summary and the Environmental Statement also describe the CEGB's plans for developing Hinkley Point 'C. Some details are yet to be finalised and may be subject to change, but this will not affect the overall validity of the environmental analysis given in these documents. Greater detail can be found in the full Environmental Statement. (author)

  7. Confidentiality Protection of Digital Health Records in Cloud Computing.

    Science.gov (United States)

    Chen, Shyh-Wei; Chiang, Dai Lun; Liu, Chia-Hui; Chen, Tzer-Shyong; Lai, Feipei; Wang, Huihui; Wei, Wei

    2016-05-01

    Electronic medical records containing confidential information were uploaded to the cloud. The cloud allows medical crews to access and manage the data and integration of medical records easily. This data system provides relevant information to medical personnel and facilitates and improve electronic medical record management and data transmission. A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study. This technique helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions. It will create patients a positive attitudes to maintain the health. The patients make decision on their own for those whom has access to their records over a specific span of time specified by the patients. Storing data in the cloud environment can reduce costs and enhance the share of information, but the potential threat of information security should be taken into consideration. This study is proposing the cloud-based secure transmission mechanism is suitable for multiple users (like nurse aides, patients, and family members). PMID:27059737

  8. Security, privacy, and confidentiality issues on the Internet.

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559

  9. Financial Report - Financial Statements of Company

    OpenAIRE

    Novotná, Eliška

    2014-01-01

    This thesis deals with the closing of books and the final accounts, or more precisely final accounts in a broader sense, of the business entity in the Czech Republic. The theoretical part focuses on the preparatory work before closing the books that lead to the preparation of financial statements, it means the balance sheet, income statement, notes to the financial statements, alternatively cash flow statement and statement of changes in the equity. Preparatory works mean such as inventory...

  10. 76 FR 44915 - Statement of Policy Regarding Communications in Connection With the Collection of Decedents' Debts

    Science.gov (United States)

    2011-07-27

    ... collector can avoid misleading consumers about their personal obligation to pay the debt. \\2\\ 75 FR 62,389..., 2010.\\3\\ \\3\\ 75 FR 70,262 (Nov. 17, 2010). In response to the proposed Statement, the Commission...; and (2) what procedures will the estate use to distribute its assets. \\6\\ 75 FR 62,389 at...

  11. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti......In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring...

  12. Telemedicine and security. Confidentiality, integrity, and availability: a Canadian perspective.

    Science.gov (United States)

    Jennett, P; Watanabe, M; Igras, E; Premkumar, K; Hall, W

    1996-01-01

    The health care system is undergoing major reform, characterized by organized delivery systems (regionalization, decentralization, devolution, etc); shifts in care delivery sites; changing health provider roles; increasing consumer responsibilities; and accountability. Rapid advances in information technology and telecommunications have led to a new type of information infrastructure which can play a major role in this reform. Compatible health information systems are now being integrated and connected across institutional, regional, and sectorial boundaries. In the near future, these information systems will readily be accessed and shared by health providers, researchers, policy makers, health consumers, and the public. SECURITY is a critical characteristic of any health information system. This paper will address three fields associated with SECURITY: confidentiality, integrity, and availability. These will be defined and examined as they relate to specific aspects of Telemedicine, such as electronic integrated records and clinical databases; electronic transfer of documents; as well as data storage and disposal. The guiding principles, standards, and safeguards being considered and put in place to ensure that telemedicine information intrastructures can protect and benefit all stakeholders' rights and needs in both primary and secondary uses of information will be reviewed. Implemented, proposed, and tested institutional, System, and Network solutions will be discussed; for example, encryption-decryption methods; data transfer standards; individual and terminal access and entry I.D. and password levels; smart card access and PIN number control; data loss prevention strategies; interference alerts; information access keys; algorithm safeguards; and active marketing to users of standards and principles. Issues such as policy, implementation, and ownership will be addressed. PMID:10163762

  13. When security and medicine missions conflict: confidentiality in prison settings.

    Science.gov (United States)

    Allen, Scott A; Aburabi, Raed

    2016-06-13

    Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings. PMID:27219904

  14. Obesity and Healthcare Avoidance: A Systematic Review

    OpenAIRE

    Robert D McGuigan; Jenny M Wilkinson

    2015-01-01

    This review addresses the issue of health care avoidance and obesity. English language journal articles published between 1990 and 2012 that addressed the review question|“is being overweight or obese an unrecognized factor in healthcare avoidance?” were located using major databases. A modified JADAD scoring system was then used to assess papers. Ten papers were identified which directly addressed the review question. A positive relationship exists between obesity and healthcare avoidance. T...

  15. Spanish Consensus Statement

    Science.gov (United States)

    Rey, Guillermo Álvarez; Cuesta, Jordi Ardevol; Loureda, Rafael Arriaza; España, Fernando Ávila; Matas, Ramón Balius; Pazos, Fernando Baró; de Dios Beas Jiménez, Juan; Rosell, Jorge Candel; Fernandez, César Cobián; Ros, Francisco Esparza; Colmenero, Josefina Espejo; de Prado, Jorge Fernández; Cota, Juan José García; González, Jose Ignacio Garrido; Santander, Manuela González; Munilla, Miguel Ángel Herrador; Ruiz, Francisco Ivorra; Díaz, Fernando Jiménez; Marqueta, Pedro Manonelles; Fernandez, Antonio Maestro; Benito, Juan José Muñoz; Vilás, Ramón Olivé; Teres, Xavier Peirau; Amaro, José Peña; Roque, Juan Pérez San; Parenteu, Christophe Ramírez; Serna, Juan Ribas; Álvarez, Mikel Sánchez; Marchori, Carlos Sanchez; Soto, Miguel del Valle; Alonso, José María Villalón; García, Pedro Guillen; de la Iglesia, Nicolas Hugo; Alcorocho, Juan Manuel Lopez

    2016-01-01

    On the 21st of March, 2015, experts met at Clínica CEMTRO in Madrid, Spain, under the patronage of The Spanish Society for Sports Traumatology (SETRADE), The Spanish Federation of Sports Medicine (FEMEDE), The Spanish Association of Medical Services for Football Clubs (AEMEF), and The Spanish Association of Medical Services for Basketball Clubs (AEMB) with the aim of establishing a round table that would allow specialists to consider the most appropriate current general actions to be taken when treating muscle tears in sport, based on proven scientific data described in the medical literature. Each expert received a questionnaire prior to the aforementioned meeting comprising a set of questions concerning therapeutic indications generally applied in the different stages present during muscle repair. The present Consensus Document is the result of the answers to the questionnaire and resulting discussion and consensus over which are the best current indications in the treatment of muscle tears in sport. Avoiding immobilization, not taking nonsteroidal anti-inflammatory drugs (NSAIDs) randomly, fostering early mobilization, increasing vascularization of injured, site and regulating inflammatory mechanisms—without inhibiting these from the early stages of the recovery period—all stood out as main points of the Consensus Document. Additionally, there is controversy concerning cell stimulation techniques and the use of growth factors or cell inhibitors. The decision concerning discharge was unanimous, as was the criteria considered when it came to performing sport techniques without pain. PMID:27213161

  16. Intersections of gender and age in health care: adapting autonomy and confidentiality for the adolescent girl.

    Science.gov (United States)

    Pinto, Kristina C

    2004-01-01

    Autonomy and confidentiality are central topics in adolescent health care, both pertaining to findings that nonparent adults often benefit adolescent girls' psychological resilience. Traditionally, autonomy captures a patient's right to self-determine a course of treatment, whereas confidentiality is understood as privacy between doctor and patient. The author proposes a revision of these constructs to accommodate the psychology of adolescent girls in health care contexts through a case study of a 17-year-old girl's hospitalization. In particular, the importance of voice and trust in girls' psychology calls for understanding autonomy as self in relationship and confidentiality as mutual confidence. Suggestions for practice are guided by the premise that girls' health care can foster psychological risk or resilience, depending on the doctor-patient relationship. PMID:14725177

  17. Confidentiality, 'no blame culture' and whistleblowing, non-physician practice and accountability.

    Science.gov (United States)

    White, Stuart M

    2006-12-01

    Confidentiality is a core tenet of medical professionalism, which enables the maintenance of trust in a doctor-patient relationship. However, both the amount of personal data stored and the number of third parties who might access this data have increased dramatically in the digital age, necessitating the introduction of various national data protection acts. Paradoxically, the Freedom of Information Act 2000 allows United Kingdom citizens to access information held by public bodies, including hospitals. Furthermore, the Public Interest Disclosure Act 1998 actively protects physicians who breach their duty of confidentiality in the name of public interest ('whistleblowing'). This article explores the evolution of the law and ethics in this area, and draws attention to the difficulties in balancing confidentiality against freedom of information. In addition, the role and responsibilities of the non-physician anaesthetist are examined. PMID:17219939

  18. How Do Speakers Avoid Ambiguous Linguistic Expressions?

    Science.gov (United States)

    Ferreira, V.S.; Slevc, L.R.; Rogers, E.S.

    2005-01-01

    Three experiments assessed how speakers avoid linguistically and nonlinguistically ambiguous expressions. Speakers described target objects (a flying mammal, bat) in contexts including foil objects that caused linguistic (a baseball bat) and nonlinguistic (a larger flying mammal) ambiguity. Speakers sometimes avoided linguistic-ambiguity, and they…

  19. Exact enumeration of self-avoiding walks

    OpenAIRE

    Schram, Raoul D.; Barkema, Gerard T.; Bisseling, Rob H.

    2011-01-01

    A prototypical problem on which techniques for exact enumeration are tested and compared is the enumeration of self-avoiding walks. Here, we show an advance in the methodology of enumeration, making the process thousands or millions of times faster. This allowed us to enumerate self-avoiding walks on the simple cubic lattice up to a length of 36 steps.

  20. Strategic Family Therapy of Avoidant Behavior.

    Science.gov (United States)

    Burgess, Thomas A.; Hinkle, J. Scott

    1993-01-01

    Notes that Millon's biopsychosocial model asserts that socioenvironmental factors of parental or peer rejection may shape development of avoidant behavior but does not elaborate on how family system may perpetuate its existence once disorder has evolved. Presents brief overview of avoidant behavior and strategic family therapy case study.…

  1. Computer Security: improve software, avoid blunder

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Recently, a severe vulnerability has been made public about how Apple devices are wrongly handling encryption. This vulnerability rendered SSL/TLS protection useless, and permitted attackers checking out a wireless network to capture or modify data in encrypted sessions.   In other words, all confidential data like passwords, banking information, etc. could have been siphoned off by a targeted attack. While Apple has been quick in providing adequate security patches for iOS devices and Macs, it is an excellent example of how small mistakes can lead to big security holes. Here is the corresponding code from Apple’s Open Source repository. Can you spot the issue? 1 static OSStatus 2 SSLVerifySignedServerKeyExchange(SSLContext *ctx, bool isRsa, SSLBuffer signedParams, uint8_t *signature, UInt16 signatureLen) 3 { 4              OSStatus &nb...

  2. Build a Positive Classroom Environment: Avoid Competition!

    Science.gov (United States)

    Self, Nancy S.

    2009-01-01

    Elementary teachers often instigate competition among their students through such common statements as: "Students who make 100 on the spelling test may have 10 minutes of extra center time" and "The most creatively written story this week will be placed on the bulletin board." While such pronouncements motivate some students into action, they…

  3. Nuclear security information: A balancing act between confidentiality and transparency

    International Nuclear Information System (INIS)

    Full text: Nuclear information security - the control of access to sensitive information as well as classification and control measures for nuclear security information - is one of the principles of nuclear security culture. On the other hand the genera l public should be aware, that security is a key consideration for nuclear plant operation and transports of nuclear material. The internet has influenced society and today in all areas access to information is quite easy and taken for granted. Nuclear security is no exception and general information about security is necessary. It is clear that details relating to sensitive security arrangements cannot be divulged to the general public but the release of appropriate information can be helpful in acquiring public confidence and support for nuclear security. The particular content and mode of disseminating this information is a balancing act between confidentiality and transparency. It may vary according to local and national circumstances, the particular public being addressed and prevailing circumstances and conditions. Taking up examples from the nuclear and the non-nuclear field, the paper will focus on some reflections on what could or should be observed, when giving information in sensitive areas and in particular on nuclear security matters. Reflections such as: When evaluating the pros and cons of a transparent policy in the field of nuclear security and trying to evaluate what information may be disclosed, we have to be aware, that we are acting in the delicate field of the nuclear discussion. Further our behaviour will be compared with the information policy in nuclear safety, where in general absolutely open information is applied. Information in general is spread by Medias. When entering in the information business. we have to understand and care about how the Medias work and behave. We have to decide who will enter in contact with the Medias and which information has to be given to whom, at what time and

  4. 10 CFR 709.26 - Protection of confidentiality of CI evaluation records to include polygraph examination records...

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Protection of confidentiality of CI evaluation records to... Protection of confidentiality of CI evaluation records to include polygraph examination records and other pertinent documentation. (a) DOE owns all CI evaluation records, including polygraph examination records...

  5. 49 CFR 512.20 - How does the agency treat information submitted pursuant to this part before a confidentiality...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false How does the agency treat information submitted pursuant to this part before a confidentiality determination is made? 512.20 Section 512.20 Transportation... Confidential § 512.20 How does the agency treat information submitted pursuant to this part before...

  6. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  7. Application of information technology may increase the efficacy of Confidential Unit Exclusion (CUE) in blood donors

    OpenAIRE

    Jalalian, Mehrdad; Mahboobi, Hamidreza

    2013-01-01

    Confidential Unit Exclusion (CUE) refers to a procedure by which a blood donor designates confidentially whether his or her blood might not be safe for transfusion. It applies to situations in which an individual who is not eligible for blood donation in terms of blood safety feel pressured by others to donate his or her blood. A potential problem in the CUE system is misunderstanding of the procedure and its significance by blood donors as well as the lack of their confidence regarding the c...

  8. Cost-Benefit Analysis of Confidentiality Policies for Advanced Knowledge Management Systems

    Energy Technology Data Exchange (ETDEWEB)

    May, D

    2003-03-01

    Knowledge Discovery (KD) processes can create new information within a Knowledge Management (KM) system. In many domains, including government, this new information must be secured against unauthorized disclosure. Applying an appropriate confidentiality policy achieves this. However, it is not evident which confidentiality policy to apply, especially when the goals of sharing and disseminating knowledge have to be balanced with the requirements to secure knowledge. This work proposes to solve this problem by developing a cost-benefit analysis technique for examining the tradeoffs between securing and sharing discovered knowledge.

  9. Developing cancer warning statements for alcoholic beverages

    OpenAIRE

    Pettigrew, Simone; Jongenelis, Michelle; Chikritzhs, Tanya; Slevin, Terry; Pratt, Iain S; Glance, David; Liang, Wenbin

    2014-01-01

    Background There is growing evidence of the increased cancer risk associated with alcohol consumption, but this is not well understood by the general public. This study investigated the acceptability among drinkers of cancer warning statements for alcoholic beverages. Methods Six focus groups were conducted with Australian drinkers to develop a series of cancer-related warning statements for alcohol products. Eleven cancer warning statements and one general health warning statement were subse...

  10. COMPARATIVE FINANCIAL STATEMENTS. CONVERGENCE VERSUS DIVERGENCE

    Directory of Open Access Journals (Sweden)

    Nicolae ECOBICI

    2010-09-01

    Full Text Available In this paper I compared the Romanian financial statements with the US GAAP financial statements in terms of two criteria: first the reference period and secondly the shape, structure and content of financial statements. Nowadays the two accounting systems, the French and Anglo-Saxon, tend to harmonize. I will present the convergences and the divergences between the financial statements of Romania, subject to OMFP 3055/2009, in parallel with the Anglo-Saxon accounting system.

  11. Chairperson's concluding statement

    International Nuclear Information System (INIS)

    Organization and the United Nations Development Programme made substantial, direct contributions to the work of the Forum and the presentations at this conference. After having looked back, let us now go forward together and join in our efforts to transform discussions into actions. He urged cooperation to make concerted efforts to inform the public of the measures still needed to avoid further radiation exposures from radionuclides released by the accident, to formulate reasonable and fair measures to compensate for injuries and disruptions of lives, and utilize our limited resources most effectively for the common good

  12. In Brief: Geoengineering draft statement

    Science.gov (United States)

    Showstack, Randy

    2009-04-01

    The American Meteorological Society (AMS) has prepared a draft policy statement on geoengineering the climate system, which the AMS Council is considering for approval. The statement notes, “Geoengineering will not substitute for either aggressive mitigation or proactive adaptation. It could contribute to a comprehensive risk management strategy to slow climate change and alleviate its negative impacts, but the potential for adverse and unintended consequences implies a need for adequate research, appropriate regulation, and transparent consideration.” The statement, if adopted, indicates that AMS recommends enhanced research on the scientific and technological potential for geoengineering the climate system; additional study of the historical, ethical, legal, political, and societal aspects of the geoengineering issues; and the development and analysis of policy options to promote transparency and international cooperation in exploring geoengineering options along with restrictions on reckless efforts to manipulate the climate system. AMS is accepting comments on the draft statement until 23 April. For more information, visit http://ametsoc.org/policy/draftstatements/index.html#draft.

  13. Mission Statements: One More Time.

    Science.gov (United States)

    Detomasi, Don

    1995-01-01

    It is argued that well-conceived college and university mission statements can be useful in setting objectives for planning and for public information dissemination and marketing. The experience of the University of Calgary (Alberta) illustrates a successful process of drafting and reaching agreement on such a document. (MSE)

  14. NPT review conference: Australian statement

    International Nuclear Information System (INIS)

    The article contains the text of statement delivered by the leader of the Australian delegation to the Second Nuclear Non-Proliferation Treaty Review Conference in Geneva on August 14, 1980. An outline is given of Australian policy regarding nuclear weapons proliferation

  15. 12 CFR 327.2 - Certified statements.

    Science.gov (United States)

    2010-01-01

    ... known as the quarterly certified statement invoice. Each insured depository institution shall file and certify its quarterly certified statement invoice in the manner and form set forth in this section. (2) The quarterly certified statement invoice shall reflect the institution's risk assignment,...

  16. Lectures on Self-Avoiding Walks

    OpenAIRE

    Bauerschmidt, Roland; Duminil-Copin, Hugo; Goodman, Jesse; Slade, Gordon

    2012-01-01

    These lecture notes provide a rapid introduction to a number of rigorous results on self-avoiding walks, with emphasis on the critical behaviour. Following an introductory overview of the central problems, an account is given of the Hammersley--Welsh bound on the number of self-avoiding walks and its consequences for the growth rates of bridges and self-avoiding polygons. A detailed proof that the connective constant on the hexagonal lattice equals $\\sqrt{2+\\sqrt{2}}$ is then provided. The la...

  17. End patterns of self-avoiding walks

    International Nuclear Information System (INIS)

    Consider a fixed end pattern (a short self-avoiding walk) that can occur as the first few steps of an arbitrarily long self-avoiding walk on Z/sup d/. It is a difficult open problem to show that as N → ∞, the fraction of N-step self-avoiding walks beginning with this pattern converges. It is shown that as N → ∞, this fraction is bounded away from zero, and that the ratio of the fractions for N and N + 2 converges to one. Similar results are obtained when patterns are specified at both ends, and also when the endpoints are fixed

  18. Passive avoidence learning in the young rat.

    Science.gov (United States)

    Blozovski, D; Cudennec, A

    1980-09-01

    A step-through locomotor passive avoidance task is described requiring the suppression of a spontaneous escape reaction from a cool toward a warm compartment in order to avoid an electric shock delivered in the warm side. We observed no lerning of this task at 9 days of age, a very low but significant level of acquisition at 11 days, a slow but progressive improvement of avoidance from the 13th until the 17th day when the adult capacity was achieved, and a marked increase in the rate between 17-20 days. PMID:7409331

  19. Avoidant/Restrictive Food Intake Disorder

    Science.gov (United States)

    ... Intake Disorder Binge Eating Disorder Bulimia Nervosa Pica Rumination Disorder Avoidant/restrictive food intake disorder is characterized ... Intake Disorder Binge Eating Disorder Bulimia Nervosa Pica Rumination Disorder NOTE: This is the Consumer Version. CONSUMERS: ...

  20. Avoid the Consequences of High Blood Pressure

    Science.gov (United States)

    ... Resources Stroke More Avoid the Consequences of High Blood Pressure Infographic Updated:Jun 19,2014 View a downloadable version of this infographic High Blood Pressure • Home • About High Blood Pressure (HBP) • Why HBP ...

  1. Dual Eligibles and Potentially Avoidable Hospitalizations

    Data.gov (United States)

    U.S. Department of Health & Human Services — About 25 percent of the hospitalizations for dual eligible beneficiaries in 2005 were potentially avoidable. Medicare and Medicaid spending for those potentially...

  2. Avoiding Anemia: Boost Your Red Blood Cells

    Science.gov (United States)

    ... link, please review our exit disclaimer . Subscribe Avoiding Anemia Boost Your Red Blood Cells If you’re ... and sluggish, you might have a condition called anemia. Anemia is a common blood disorder that many ...

  3. Growing partially directed self-avoiding walks

    OpenAIRE

    Privman, V.

    1985-01-01

    A partially directed self-avoiding walk model with the 'kinetic growth' weighting is solved exactly, on the square lattice and for two restricted, strip geometries. Some finite-size effects are examined.

  4. Family Key to Helping Teens Avoid Obesity

    Science.gov (United States)

    ... 159681.html Family Key to Helping Teens Avoid Obesity Good relationship with parents, especially between fathers and ... develop healthy habits that may protect them against obesity, a new study suggests. The researchers also found ...

  5. How to avoid overheating during exercise

    Science.gov (United States)

    ... patientinstructions/000865.htm How to avoid overheating during exercise To use the sharing features on this page, ... condition can get heat illness. Stay Cool During Exercise Try these tips to help prevent heat-related ...

  6. The challenges for scientists in avoiding plagiarism.

    Science.gov (United States)

    Fisher, E R; Partin, K M

    2014-01-01

    Although it might seem to be a simple task for scientists to avoid plagiarism and thereby an allegation of research misconduct, assessment of trainees in the Responsible Conduct of Research and recent findings from the National Science Foundation Office of Inspector General regarding plagiarism suggests otherwise. Our experiences at a land-grant academic institution in assisting researchers in avoiding plagiarism are described. We provide evidence from a university-wide multi-disciplinary course that understanding how to avoid plagiarism in scientific writing is more difficult than it might appear, and that a failure to learn the rules of appropriate citation may cause dire consequences. We suggest that new strategies to provide training in avoiding plagiarism are required. PMID:24785995

  7. Active Collision Avoidance for Planetary Landers Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Advancements in radar technology have resulted in commercial, automotive collision avoidance radars. These radar systems typically use 37GHz or 77GHz interferometry...

  8. Conjecture on Avoidance of Big Crunch

    Institute of Scientific and Technical Information of China (English)

    SUN Cheng-Yi; ZHANG De-Hai

    2006-01-01

    By conjecturing the physics at the Planck scale, we modify the definition of the Hawking temperature and modify the Friedmann equation. It is found that we can avoid the singularity of the big crunch and obtain a bouncing cosmological model.

  9. Polymers as Self-Avoiding Walks

    OpenAIRE

    Freed, Karl F.

    1981-01-01

    A brief overview is presented of the relation of the properties of real polymers to the problem of self-avoiding random walks. The self-consistent field method is discussed wherein the non-Markovian continuous self-avoiding polymer is replaced by a self-consistent Markovian approximation. An outline is presented of the method of solution of the resultant nonlinear integrodifferential equations. A description is also presented of the scaling theories which provide a means for deducing some exp...

  10. Weakly prudent self-avoiding bridges

    OpenAIRE

    Bacher, Axel; Beaton, Nicholas,

    2014-01-01

    We define and enumerate a new class of self-avoiding walks on the square lattice, which we call \\emphweakly prudent bridges. Their definition is inspired by two previously-considered classes of self-avoiding walks, and can be viewed as a combination of those two models. We consider several methods for recursively generating these objects, each with its own advantages and disadvantages, and use these methods to solve the generating function, obtain very long series, and randomly generate walks...

  11. Guidelines for Students Who Are Sharing Confidential Information with Colleges and Universities.

    Science.gov (United States)

    Robinson, Annette Clem

    This paper reports on cases in which colleges have handled confidential assessment reports of students with special learning needs in a manner that violated the students' rights to privacy. Guidelines are suggested for students in order to ensure that information that is shared with postsecondary institutions is used in a way that will enhance…

  12. 76 FR 23586 - Access to Confidential Business Information by Syracuse Research Corporation

    Science.gov (United States)

    2011-04-27

    ... AGENCY Access to Confidential Business Information by Syracuse Research Corporation AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Syracuse Research.... The EPA/DC Public Reading Room hours of operation are 8:30 a.m. to 4:30 p.m., Monday through...

  13. 5 CFR 213.3301 - Positions of a confidential or policy-determining nature.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Positions of a confidential or policy-determining nature. 213.3301 Section 213.3301 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL... or policy-determining nature. (a) Upon specific authorization by OPM, agencies may make...

  14. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Protection of trade secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade...

  15. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    Science.gov (United States)

    2012-02-29

    ... AGENCY Access to Confidential Business Information; Protection Strategies Incorporated AGENCY... Strategies Incorporated (PSI) of Arlington, VA, to access information which has been submitted to EPA under all sections of the Toxic Substances Control Act (TSCA). Some of the information may be claimed...

  16. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ...: COMMUNITY RIGHT-TO-KNOW Community Access to Information § 370.64 What information can I claim as trade... 40 Protection of Environment 27 2010-07-01 2010-07-01 false What information can I claim as trade secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION...

  17. 19 CFR 206.66 - Limited disclosure of certain confidential business information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Limited disclosure of certain confidential business information under administrative protective order. 206.66 Section 206.66 Customs Duties UNITED... Investigations For Action in Response to Trade Diversion; Reviews of Action Taken § 206.66 Limited disclosure...

  18. 32 CFR 727.8 - Confidential and privileged character of service provided.

    Science.gov (United States)

    2010-07-01

    ... legal sense as outlined in the Code of Professional Responsibility, as opposed to confidential in the... individual legal assistance client by name or any other particular, such as social security number, shall be... fear that their confidence will be abused or used against them in any way. While case files are...

  19. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON HEALTH CARE PROVIDERS, SUPPLIERS AND PRACTITIONERS Disclosure of Information by the Healthcare Integrity... 45 Public Welfare 1 2010-10-01 2010-10-01 false Confidentiality of Healthcare Integrity...

  20. 77 FR 25475 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-04-30

    ... AGENCY Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import... notices similar to this one in the Federal Register, the latest one being at 76 FR 362, January 4, 2011... information at issue: the preliminary inquiry and the notice of opportunity to comment. a. Inquiry To...

  1. 75 FR 4812 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-01-29

    ... AGENCY Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental... Information EPA has previously published notices similar to this one in the Federal Register, at 74 FR 20293, May 1, 2009, and 72 FR 21006, April 27, 2007 that address issues similar to those raised by...

  2. 76 FR 362 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2011-01-04

    ... AGENCY Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental... previously published notices similar to this one in the Federal Register, the latest one being at 75 FR 4812... issue: The preliminary inquiry and the notice of opportunity to comment. a. Inquiry To Learn...

  3. 77 FR 109 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import...

    Science.gov (United States)

    2012-01-03

    ... AGENCY Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims Regarding Waste Import... published notices similar to this one in the Federal Register, the latest one being at 76 FR 362, January 4... and the notice of opportunity to comment. a. Inquiry To Learn Whether Affected Businesses (Other...

  4. 75 FR 44951 - Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims

    Science.gov (United States)

    2010-07-30

    ... AGENCY Inquiry To Learn Whether Businesses Assert Business Confidentiality Claims AGENCY: Environmental... previously published notices similar to this one in the Federal Register, the latest one being at 75 FR 4812... issue: The preliminary inquiry and the notice of opportunity to comment. a. Inquiry To Learn...

  5. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Science.gov (United States)

    2010-01-01

    ... protection of Intellectual Property. (a) General. The Secretary, in consultation with the Office of... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  6. 20 CFR 603.5 - What are the exceptions to the confidentiality requirement?

    Science.gov (United States)

    2010-04-01

    ... the circumstances under which electronic signatures, contracts, and other records relating to such... only if authorized by State law and if such disclosure does not interfere with the efficient administration of the State UC law. Disclosure of confidential UC information is permissible under the...

  7. 77 FR 30486 - Confidentiality of Information; Magnuson-Stevens Fishery Conservation and Management...

    Science.gov (United States)

    2012-05-23

    ... Information; Magnuson-Stevens Fishery Conservation and Management Reauthorization Act AGENCY: National Marine... management of the fishery. Id. 1853(b)(8). The Magnuson-Stevens Act sets forth information confidentiality... FR 7075). The revisions were non-substantive. ] NMFS now proposes substantive and...

  8. 78 FR 79692 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2013-12-31

    ... AGENCY Clean Water Act; Contractor Access to Confidential Business Information AGENCY: Environmental... access to CBI submitted to EPA under Section 308 of the Clean Water Act (CWA) and in connection with... of water-related initiatives for a variety of industries. To obtain assistance in responding to...

  9. 77 FR 60962 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2012-10-05

    ... AGENCY 40 CFR Part 2 Clean Water Act; Contractor Access to Confidential Business Information AGENCY...) Office of Water's (OW's) Office of Science and Technology (OST) has authorized Eastern Research Group... of Water in the preparation of effluent guidelines and standards for certain industries. We...

  10. 75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-13

    ... AGENCY Clean Water Act; Contractor Access to Confidential Business Information AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: The Environmental Protection Agency's (EPA) Office of Water... of section 308 of the Clean Water Act (CWA). Some information being transferred from the pulp,...

  11. 40 CFR 68.152 - Substantiating claims of confidential business information.

    Science.gov (United States)

    2010-07-01

    ... business information. 68.152 Section 68.152 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Risk Management Plan § 68.152 Substantiating claims of confidential business information. (a) An owner or operator claiming that information...

  12. 40 CFR 68.151 - Assertion of claims of confidential business information.

    Science.gov (United States)

    2010-07-01

    ... business information. 68.151 Section 68.151 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Risk Management Plan § 68.151 Assertion of claims of confidential business information. (a) Except as provided in paragraph (b) of...

  13. Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images.

    Science.gov (United States)

    Al-Haj, Ali

    2015-04-01

    Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality for the header data of the image but not for the pixel data. On the other hand, it offers mechanisms to achieve authenticity and integrity for the pixel data but not for the header data. In this paper, we propose a crypto-based algorithm that provides confidentially, authenticity, and integrity for the pixel data, as well as for the header data. This is achieved by applying strong cryptographic primitives utilizing internally generated security data, such as encryption keys, hashing codes, and digital signatures. The security data are generated internally from the header and the pixel data, thus a strong bond is established between the DICOM data and the corresponding security data. The proposed algorithm has been evaluated extensively using DICOM images of different modalities. Simulation experiments show that confidentiality, authenticity, and integrity have been achieved as reflected by the results we obtained for normalized correlation, entropy, PSNR, histogram analysis, and robustness. PMID:25266442

  14. 21 CFR 20.28 - Food and Drug Administration determinations of confidentiality.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Food and Drug Administration determinations of confidentiality. 20.28 Section 20.28 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PUBLIC INFORMATION General Policy § 20.28 Food and Drug Administration determinations...

  15. 76 FR 9012 - Access to Confidential Business Information by Electronic Consulting Services, Inc.

    Science.gov (United States)

    2011-02-16

    ...EPA has authorized its contractor, Electronic Consulting Services, Inc. (ECS) of Fairfax, VA, to access information which has been submitted to EPA under all sections of the Toxic Substances Control Act (TSCA). Some of the information may be claimed or determined to be Confidential Business Information...

  16. 78 FR 71903 - 2013 Revisions to the Greenhouse Gas Reporting Rule and Final Confidentiality Determinations for...

    Science.gov (United States)

    2013-11-29

    ... on stratospheric water vapor, itself a greenhouse gas, led to an increase in the factor used to... on Green House Gases Tool FR Federal Register F-GHG fluorinated greenhouse gas F-HTF fluorinated heat... Greenhouse Gas Reporting Rule and Final Confidentiality Determinations for New or Substantially Revised...

  17. 75 FR 70672 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2010-11-18

    ... AGENCY Access to Confidential Business Information by Computer Sciences Corporation and Its Identified... contractor, Computer Sciences Corporation (CSC) of Chantilly, VA and Its Identified Subcontractors, to access... required to support OPPT computer applications; OPPT staff; and their development staff. Specific types...

  18. Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems.

    Science.gov (United States)

    Ibaida, Ayman; Khalil, Ibrahim

    2013-12-01

    With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as point-of-care (PoC) applications in hospitals around the world. Therefore, huge amount of ECG signal collected by body sensor networks from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level, etc., and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data are being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this paper, a wavelet-based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest. To evaluate the effectiveness of the proposed technique on the ECG signal, two distortion measurement metrics have been used: the percentage residual difference and the wavelet weighted PRD. It is found that the proposed technique provides high-security protection for patients data with low (less than 1%) distortion and ECG data remain diagnosable after watermarking (i.e., hiding patient confidential data) and as well as after watermarks (i.e., hidden data) are removed from the watermarked data. PMID:23708767

  19. 78 FR 19801 - 2013 Revisions to the Greenhouse Gas Reporting Rule and Proposed Confidentiality Determinations...

    Science.gov (United States)

    2013-04-02

    .... Proposed Amendments to Subpart A--Global Warming Potentials In today's action, we are proposing to revise... provided, unless the comment includes information claimed to be confidential business information (CBI) or... electronic copy of today's proposal will also be available through the WWW. ] Following the...

  20. Conducting Research with Children: The Limits of Confidentiality and Child Protection Protocols

    Science.gov (United States)

    Williamson, Emma; Goodenough, Trudy; Kent, Julie; Ashcroft, Richard

    2005-01-01

    This paper addresses the issue of child protection protocols within research conducted with children. Based partly on primary data this paper raises questions about the role of ethics committees in defining the limits of confidentiality in relation to child protection protocols within research, the perceptions of both children and parents about…

  1. 42 CFR 2a.6 - Issuance of Confidentiality Certificates; single project limitation.

    Science.gov (United States)

    2010-10-01

    ... responsibilities in the research project, major changes in the scope or direction of the research protocol, or... SERVICES GENERAL PROVISIONS PROTECTION OF IDENTITY-RESEARCH SUBJECTS § 2a.6 Issuance of Confidentiality... training and experience of all personnel having major responsibilities in the research project; (2)...

  2. Consolidated financial statements for fiscal year 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-01

    The following overview and accompanying audited financial statements have been prepared for Fiscal Year (FY) 1996 to report the financial position and the results of operations of the Department of Energy. These statements include the consolidated Statement of Financial Position and the consolidated Statement of Operations and Changes in Net Position. The statements have been prepared in accordance with the Office of Management and Budget Bulletin No. 94-01, Form and Content for Agency Financial Statements, and were developed in accordance with the hierarchy of accounting standards described therein. The overview provides a narrative on the Department of Energy`s mission, activities, and accomplishments. Utilizing performance measures as the primary vehicle for communicating Departmental accomplishments and results, this overview discusses the most significant measures while others are discussed in the supplemental information to the financial statements.

  3. Analysis of the ethical aspects of professional confidentiality in dental practice.

    Science.gov (United States)

    Garbin, Cléa Adas Saliba; Garbin, Artênio José Isper; Saliba, Nemre Adas; de Lima, Daniela Coelho; de Macedo, Ana Paula Ayala

    2008-01-01

    From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43%) reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57%) believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient. PMID:19089294

  4. Analysis of the ethical aspects of professional confidentiality in dental practice

    Directory of Open Access Journals (Sweden)

    Cléa Adas Saliba Garbin

    2008-02-01

    Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  5. Scaling of Self-Avoiding Walks and Self-Avoiding Trails in Three Dimensions

    OpenAIRE

    Prellberg, T.

    2001-01-01

    Motivated by recent claims of a proof that the length scale exponent for the end-to-end distance scaling of self-avoiding walks is precisely $7/12=0.5833...$, we present results of large-scale simulations of self-avoiding walks and self-avoiding trails with repulsive contact interactions on the hypercubic lattice. We find no evidence to support this claim; our estimate $\

  6. Critical Two-Point Function of the 4-Dimensional Weakly Self-Avoiding Walk

    Science.gov (United States)

    Bauerschmidt, Roland; Brydges, David C.; Slade, Gordon

    2015-08-01

    We prove decay of the critical two-point function for the continuous-time weakly self-avoiding walk on , in the upper critical dimension d = 4. This is a statement that the critical exponent exists and is equal to zero. Results of this nature have been proved previously for dimensions using the lace expansion, but the lace expansion does not apply when d = 4. The proof is based on a rigorous renormalisation group analysis of an exact representation of the continuous-time weakly self-avoiding walk as a supersymmetric field theory. Much of the analysis applies more widely and has been carried out in a previous paper, where an asymptotic formula for the susceptibility is obtained. Here, we show how observables can be incorporated into the analysis to obtain a pointwise asymptotic formula for the critical two-point function. This involves perturbative calculations similar to those familiar in the physics literature, but with error terms controlled rigorously.

  7. Avoiding barriers in control of mowing robot

    Institute of Scientific and Technical Information of China (English)

    QIU Bai-jing; QIAN Guo-hong; XIANG Zhong-ping; LI Zuo-peng

    2006-01-01

    Due to complicated barriers,it is difficult to track the path of the mowing robot and to avoid barriers.In order to solve the problem,a method based on distance-measuring sensors and fuzzy control inputs was proposed.Its track was composed of beelines and was easy to tail.The fuzzy control inputs were based on the front barrier distance and the difference between the left and right barrier distance measured by ultrasonic sensors;the output was the direction angle.The infrared sensors around the robot improved its safety in avoiding barriers.The result of the method was feasible,agile,and stable.The distance between the robot and the barriers could be changed by altering the inputs and outputs of fuzzy control and the length of the beelines.The disposed sensors can fulfill the need of the robot in avoiding barriers.

  8. Avoidable deaths in Greenland 1968-1985

    DEFF Research Database (Denmark)

    Bjerregaard, Peter; Juel, K

    1990-01-01

    suicides and alcohol related diseases were high in the capital and East Greenland and low in West Greenlandic settlements. It is concluded that further studies on preventable diseases and causes of death, in particular certain infectious diseases, accidents and suicides, are needed.......The concept of avoidable deaths suggests that certain deaths ought not occur in a given society because it is possible to prevent or treat the disease or condition. A list of avoidable deaths is time and community specific as it reflects the socioeconomic conditions, professional medical capacity...... and political will of the society. A list of avoidable deaths is proposed for Greenland which includes, inter alia, meningitis, lung cancer, acute respiratory infections, suicides, boat accidents and alcohol related diseases and accidents. All were considerably more common in Greenland than in Denmark...

  9. Functional neuroimaging of avoidance habits in OCD

    Science.gov (United States)

    Gillan, Claire M; Apergis-Schoute, Annemieke M; Morein-Zamir, Sharon; Urcelay, Gonzalo P; Sule, Akeem; Fineberg, Naomi A; Sahakian, Barbara J; Robbins, Trevor W

    2016-01-01

    Objective The goal of this study was to determine the neural correlates of excessive habit formation in obsessive-compulsive disorder (OCD). We aimed to (i) test for neurobiological convergence with the known pathophysiology of OCD and (ii) infer, based on abnormalities in brain activation, whether these habits arise from dysfunction in the goal-directed or habit system. Method Thirty-seven OCD patients and 33 controls learned to avoid shocks while undergoing a functional Magnetic Resonance Imaging (fMRI) scan. Following 4 blocks of training, we tested if the avoidance response had become a habit by removing the threat of shock and measuring continued avoidance. We tested for task-related differences in brain activity in 3 ROIs, the caudate, putamen and medial orbitofrontal cortex at a statistical threshold of pdifferences in the build up of stimulus-response habits themselves. PMID:25526600

  10. Confidential dominance relation based rough approximation model%基于置信优势关系的粗糙集近似模型

    Institute of Scientific and Technical Information of China (English)

    苟光磊; 王国胤; 利节; 吴迪

    2014-01-01

    不完备有序信息处理是现实生活中的常见问题。多种拓展优势关系及其粗糙集模型被提出并用于解决不完全的偏好决策问题,但均未考虑序关系特性,与现实语义存在矛盾。对此,提出一种置信优势关系及其粗糙集近似模型,讨论了基于置信优势关系的粗糙集模型与已有模型的关系。与现有的拓展关系相比,该置信优势关系满足序关系特性,避免了语义上的矛盾。定理证明和实例分析表明,置信优势关系粗糙集近似模型的近似精度和分类精度更优。%Incomplete ordered information processing is a common problem in the real life. Various extended dominance relation rough set models are already proposed to solve the incomplete ordinal decision problem. But there exits some ambivalence over the real semantics because the characteristics of the order relation are not considered. Therefore, the confidence dominance relation and its rough set approximation model are presented. Relationships between the confidential dominance relation based rough set model and existing models are discussed. Compared with the current expansion relations, confidence dominance relation fits the characteristics of the order relation to avoid semantic contradiction. Theorem proving and example analysis show that the confidential dominance relation based rough approximation model has better approximate accuracy and classification accuracy.

  11. Autonomous Collision avoidance for Unmanned aerial systems

    OpenAIRE

    Melega, Marco

    2014-01-01

    Unmanned Aerial System (UAS) applications are growing day by day and this will lead Unmanned Aerial Vehicle (UAV) in the close future to share the same airspace of manned aircraft.This implies the need for UAS to define precise safety standards compatible with operations standards for manned aviation. Among these standards the need for a Sense And Avoid (S&A) system to support and, when necessary, sub¬stitute the pilot in the detection and avoidance of hazardous situations (e.g. midair collis...

  12. A collision avoidance system for workpiece protection

    Energy Technology Data Exchange (ETDEWEB)

    Schmitt, D.J.; Weber, T.M.; Novak, J.L. [Sandia National Labs., Albuquerque, NM (United States); Maslakowski, J.E. [Rockwell International Corp., Canoga Park, CA (United States). Rocketdyne Div.

    1995-04-01

    This paper describes an application of Sandia`s non-contact capacitive sensing technology for collision avoidance during the manufacturing of rocket engine thrust chambers. The collision avoidance system consists of an octagon shaped collar with a capacitive proximity sensor mounted on each face. The sensors produced electric fields which extend several inches from the face of the collar and detect potential collisions between the robot and the workpiece. A signal conditioning system processes the sensor output and provides varying voltage signals to the robot controller for stopping the robot.

  13. Self Organization and Self Avoiding Limit Cycles

    OpenAIRE

    Hexner, Daniel; Levine, Dov

    2014-01-01

    A simple periodically driven system displaying rich behavior is introduced and studied. The system self-organizes into a mosaic of static ordered regions with three possible patterns, which are threaded by one-dimensional paths on which a small number of mobile particles travel. These trajectories are self-avoiding and non-intersecting, and their relationship to self-avoiding random walks is explored. Near $\\rho=0.5$ the distribution of path lengths becomes power-law like up to some cutoff le...

  14. Self-Avoiding Walks with Writhe

    OpenAIRE

    Moroz, J. David; Kamien, Randall D.

    1997-01-01

    We map self-avoiding random walks with a chemical potential for writhe to the three-dimensional complex O(N) Chern-Simons theory as N -> 0. We argue that at the Wilson-Fisher fixed point which characterizes normal self-avoiding walks (with radius of gyration exponent nu = 0.588) a small chemical potential for writhe is irrelevant and the Chern-Simons field does not modify the monomer- monomer correlation function. For a large chemical potential the polymer collapses.

  15. Self-avoiding walks with writhe

    International Nuclear Information System (INIS)

    We map self-avoiding random walks with a chemical potential for writhe to the three-dimensional complex O(N) Chern-Simons theory as N→0. We argue that at the Wilson-Fisher fixed point which characterizes normal self-avoiding walks (with radius of gyration exponent ν∼0.588) a small chemical potential for writhe is irrelevant and the Chern-Simons field does not modify the monomer-monomer correlation function. For a large chemical potential the polymer collapses. (orig.)

  16. Benchmarking Collision Avoidance Schemes for Dynamic Environments

    OpenAIRE

    Martinez-Gomez, Luis; Fraichard, Thierry

    2009-01-01

    This paper evaluates and compare three state-of-the-art collision avoidance schemes designed to operate in dynamic environments. The first one is an extension of the popular Dynamic Window approach; it is henceforth called TVDW which stands for Time-Varying Dynamic Window. The second one called NLVO builds upon the concept of Non Linear Velocity Obstacle which is a generalization of the Velocity Obstacle concept. The last one is called ICS-Avoid, it draws upon the concept of Inevitable Collis...

  17. Beliefs, Anxiety, and Avoiding Failure in Mathematics

    OpenAIRE

    Steve Chinn

    2012-01-01

    Mathematics anxiety has been the subject of several books and numerous research papers, suggesting that it is a significant issue for many people. Children and adults develop strategies to cope with this anxiety, one of which is avoidance. This paper presents data taken from over 2500 mathematics test papers in order to compare the levels of accuracy and the frequency of the use of the “no attempt” strategy, that is, avoidance, for arithmetic problems given to children aged from 10 years to a...

  18. Financial Statement Fraud Detection using Text Mining

    OpenAIRE

    Rajan Gupta; Nasib Singh Gill

    2013-01-01

    Data mining techniques have been used enormously by the researchers’ community in detecting financial statement fraud. Most of the research in this direction has used the numbers (quantitative information) i.e. financial ratios present in the financial statements for detecting fraud. There is very little or no research on the analysis of text such as auditor’s comments or notes present in published reports. In this study we propose a text mining approach for detecting financial statement frau...

  19. Control of Bank Consolidated Financial Statements Quality

    OpenAIRE

    Margarita S. Ambarchyan

    2013-01-01

    The author presents the multiple linear regression model of bank consolidated financial statements quality. The article considers six characteristics that can be used to estimate the level of bank consolidated financial statements quality. The multiple linear regression model was developed, using the results of point-based system of consolidated financial statements of thirty European bank and financial groups on the basis of the developed characteristics. The author offers to use the charact...

  20. Saskatchewan Energy Holdings Ltd. consolidated financial statements

    International Nuclear Information System (INIS)

    The consolidated financial statements of Saskatchewan Energy Holdings Ltd. (formerly Saskatchewan Energy Corporation) as of December 31, 1990, and the consolidated statements of earnings and retained earnings and changes in cash position for the year are presented. Data include an inventory of supplies, natural gas in storage, property, plant and equipment. Financial statements are also presented for the year ending December 31, 1989, with comparative figures for the seven months ending December 31, 1988

  1. Financial Statement Fraud Detection using Text Mining

    Directory of Open Access Journals (Sweden)

    Rajan Gupta

    2013-01-01

    Full Text Available Data mining techniques have been used enormously by the researchers’ community in detecting financial statement fraud. Most of the research in this direction has used the numbers (quantitative information i.e. financial ratios present in the financial statements for detecting fraud. There is very little or no research on the analysis of text such as auditor’s comments or notes present in published reports. In this study we propose a text mining approach for detecting financial statement fraud by analyzing the hidden clues in the qualitative information (text present in financial statements.

  2. New statement of leave format

    CERN Multimedia

    HR Department

    2009-01-01

    Following the communication of the Standing Concertation Committee published in Weekly Bulletin No. 18-19 of 27 April 2009, the current statement of leave on monthly pay slips has been replaced with the EDH Leave Transactions report that displays the up-to-date situation of individual leave balances at all times. The report is available on EDH. Additionally, the layout of the pay slip has been modernised. The new version of the pay slip will be send out from September 2009 onwards. Finance and Purchasing Department, Personnel Accounting Human Resources Department, Organisation and Procedures General Infrastructure Services Department, Administrative Information Services

  3. Complications to Avoid with Pre-Diabetes

    Science.gov (United States)

    ... Resources Stroke More Complications to Avoid with Pre-diabetes Updated:Nov 19,2015 If I ignore the ... This content was last reviewed August 2015. Pre-diabetes • Introduction • About Pre-diabetes • What's the Problem? Intro ...

  4. Avoidance Motivation and Conservation of Energy

    NARCIS (Netherlands)

    Roskes, Marieke; Elliot, Andrew J.; Nijstad, Bernard A.; De Dreu, Carsten K. W.

    2013-01-01

    Compared to approach motivation, avoidance motivation evokes vigilance, attention to detail, systematic information processing, and the recruitment of cognitive resources. From a conservation of energy perspective it follows that people would be reluctant to engage in the kind of effortful cognitive

  5. Teaching Preschool Children to Avoid Poison Hazards

    Science.gov (United States)

    Dancho, Kelly A.; Thompson, Rachel H.; Rhoades, Melissa M.

    2008-01-01

    We evaluated the effectiveness of group safety training and in situ feedback and response interruption to teach preschool children to avoid consuming potentially hazardous substances. Three children ingested ambiguous substances during a baited baseline assessment condition and continued to ingest these substances following group safety training.…

  6. Organising European technical documentation to avoid duplication.

    Science.gov (United States)

    Donawa, Maria

    2006-04-01

    The development of comprehensive accurate and well-organised technical documentation that demonstrates compliance with regulatory requirements is a resource-intensive, but critically important activity for medical device manufacturers. This article discusses guidance documents and method of organising technical documentation that may help avoid costly and time-consuming duplication. PMID:16736662

  7. Reasonable Avoidability, Responsibility and Lifestyle Diseases

    DEFF Research Database (Denmark)

    Andersen, Martin Marchman

    2012-01-01

    In “Health, Luck and Justice” Shlomi Segall argues for a luck egalitarian approach to justice in health care. As the basis for a just distribution he suggests a principle of Reasonable Avoidability, which he takes to imply that we do not have justice-based reasons to treat diseases brought about ...

  8. Your Adolescent: Anxiety and Avoidant Disorders

    Science.gov (United States)

    ... the problem manifests in school avoidance, the initial goal will be to get the youngster back to school as soon as possible. Cognitive-Behavioral Therapy In many cases, cognitive-behavioral psychotherapy techniques are effective in addressing adolescent anxiety disorders. ...

  9. Pathogen evolution under host avoidance plasticity.

    Science.gov (United States)

    McLeod, David V; Day, Troy

    2015-09-01

    Host resistance consists of defences that limit pathogen burden, and can be classified as either adaptations targeting recovery from infection or those focused upon infection avoidance. Conventional theory treats avoidance as a fixed strategy which does not vary from one interaction to the next. However, there is increasing empirical evidence that many avoidance strategies are triggered by external stimuli, and thus should be treated as phenotypically plastic responses. Here, we consider the implications of avoidance plasticity for host-pathogen coevolution. We uncover a number of predictions challenging current theory. First, in the absence of pathogen trade-offs, plasticity can restrain pathogen evolution; moreover, the pathogen exploits conditions in which the host would otherwise invest less in resistance, causing resistance escalation. Second, when transmission trades off with pathogen-induced mortality, plasticity encourages avirulence, resulting in a superior fitness outcome for both host and pathogen. Third, plasticity ensures the sterilizing effect of pathogens has consequences for pathogen evolution. When pathogens castrate hosts, selection forces them to minimize mortality virulence; moreover, when transmission trades off with sterility alone, resistance plasticity is sufficient to prevent pathogens from evolving to fully castrate. PMID:26336170

  10. Learn to Avoid or Overcome Leadership Obstacles

    Science.gov (United States)

    D'Auria, John

    2015-01-01

    Leadership is increasingly recognized as an important factor in moving schools forward, yet we have been relatively random in how we prepare and support them. Four obstacles often block or diminish their effectiveness. Avoiding or overcoming each of these requires an underlying set of skills and knowledge that we believe can be learned and…

  11. The Advocacy or Avoidance of Only Children.

    Science.gov (United States)

    Falbo, Toni

    A brief review of the psychological literature on the characteristics of only children is presented in order to determine if the one-child family should be avoided or advocated. The relevant literature is found to be limited in quantity and conceptualization of the only child. Previous literature is divided into three types of study: those with…

  12. Bilocal Dynamics for Self-Avoiding Walks

    CERN Document Server

    Caracciolo, Sergio; Ferraro, G; Papinutto, Mauro; Pelissetto, A; Caracciolo, Sergio; Causo, Maria Serena; Ferraro, Giovanni; Papinutto, Mauro; Pelissetto, Andrea

    2000-01-01

    We introduce several bilocal algorithms for lattice self-avoiding walks that provide reasonable models for the physical kinetics of polymers in the absence of hydrodynamic effects. We discuss their ergodicity in different confined geometries, for instance in strips and in slabs. A short discussion of the dynamical properties in the absence of interactions is given.

  13. Self-avoiding random walk in superspace

    International Nuclear Information System (INIS)

    The model is presented, where all the critical exponents are calculated exactly. It corresponds to a self-avoiding random walk in superspace of dimension D≤4. For the correlation length the validity of Flory's conjecture (ν=3/(D+2)) is confirmed. (orig.)

  14. Bilocal Dynamics for Self-Avoiding Walks

    OpenAIRE

    Caracciolo, Sergio; Causo, Maria Serena; Ferraro, Giovanni; Papinutto, Mauro; Pelissetto, Andrea

    1999-01-01

    We introduce several bilocal algorithms for lattice self-avoiding walks that provide reasonable models for the physical kinetics of polymers in the absence of hydrodynamic effects. We discuss their ergodicity in different confined geometries, for instance in strips and in slabs. A short discussion of the dynamical properties in the absence of interactions is given.

  15. Specific Language Impairment at Adolescence: Avoiding Complexity

    Science.gov (United States)

    Tuller, Laurice; Henry, Celia; Sizaret, Eva; Barthez, Marie-Anne

    2012-01-01

    This study explores complex language in adolescents with specific language impairment (SLI) with the aim of finding out how aspects of language characteristic of typical syntactic development after childhood fare and, in particular, whether there is evidence that individuals with SLI avoid using structures whose syntactic derivation involves…

  16. Working with Avoidant Children: A Clinical Challenge.

    Science.gov (United States)

    Berson, Nancy; Meisburger, Diana

    1998-01-01

    Presents strategies for interviewing and assisting highly avoidant children who may be victims of maltreatment. Discusses factors inhibiting their self-disclosure, the importance of managing child safety, and establishing and maintaining rapport. Describes strategies including pacing the interview, empowering the child, and using distancing…

  17. Obesity and Healthcare Avoidance: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Robert D McGuigan

    2015-03-01

    Full Text Available This review addresses the issue of health care avoidance and obesity. English language journal articles published between 1990 and 2012 that addressed the review question|“is being overweight or obese an unrecognized factor in healthcare avoidance?” were located using major databases. A modified JADAD scoring system was then used to assess papers. Ten papers were identified which directly addressed the review question. A positive relationship exists between obesity and healthcare avoidance. The major contributory factors were being female, have a diagnosed mental health problem and perceived or actual bias and discrimination by health professionals. The review also highlights the importance of the relationship between healthcare professionals and their patients, and the physical environment in which interactions occur as these may contribute to avoidance behaviors. Concern about obesity is rising and while there has been much discussion about strategies to reduce obesity this review highlights the need for thinking more broadly about the way in which overweight and obese individuals interact with preventative health strategies.

  18. Obsessive compulsive disorder with pervasive avoidance

    OpenAIRE

    Sharma Parul; Sharma Ravi; Kumar Ramesh; Sharma Dinesh

    2009-01-01

    Obsessive compulsive disorder (OCD) is a common disorder, but some of its atypical presentations are uncommon and difficult to diagnose. We report one such case which on initial presentation appeared to be psychotic protocol but after detailed workup was diagnosed as OCD with marked avoidance symptoms.

  19. Doppler micro sense and avoid radar

    Science.gov (United States)

    Gorwara, Ashok; Molchanov, Pavlo; Asmolova, Olga

    2015-10-01

    There is a need for small Sense and Avoid (SAA) systems for small and micro Unmanned Aerial Systems (UAS) to avoid collisions with obstacles and other aircraft. The proposed SAA systems will give drones the ability to "see" close up and give them the agility to maneuver through tight areas. Doppler radar is proposed for use in this sense and avoid system because in contrast to optical or infrared (IR) systems Doppler can work in more harsh conditions such as at dusk, and in rain and snow. And in contrast to ultrasound based systems, Doppler can better sense small sized obstacles such as wires and it can provide a sensing range from a few inches to several miles. An SAA systems comprised of Doppler radar modules and an array of directional antennas that are distributed around the perimeter of the drone can cover the entire sky. These modules are designed so that they can provide the direction to the obstacle and simultaneously generate an alarm signal if the obstacle enters within the SAA system's adjustable "Protection Border". The alarm signal alerts the drone's autopilot to automatically initiate an avoidance maneuver. A series of Doppler radar modules with different ranges, angles of view and transmitting power have been designed for drones of different sizes and applications. The proposed Doppler radar micro SAA system has simple circuitry, works from a 5 volt source and has low power consumption. It is light weight, inexpensive and it can be used for a variety of small unmanned aircraft.

  20. Statement

    International Nuclear Information System (INIS)

    Idaho National Engineering and Environmental Laboratory (INEEL), established more than 50 years ago, INEEL's had a historical mission to support development of many designs, systems, codes and safety features for nuclear power facilities around the world. It has also been a disposal site for radioactive and hazardous wastes, particularly those wastes associated with the US nuclear weapons programmes and the United States Navy's nuclear ships. There are many public concerns when a nuclear facility closure is announced.The point that I would like to make today is that such an announcement should not come as unexpected news to the local communities. Facility closure could result in facility reuse or complete dismantlement. If a facility is to be dismantled, environmental contamination must be addressed to reduce risks to humans and the environment. If it is possible to reduce contamination to acceptable levels, a wide range of land uses may be possible. If not, provisions for long term stewardship must be made. Changes in employment and funding levels, whether for a commercial power plant or a government programme. Communities need to plan for social and economic impacts that will occur. Future land use plans, with provision for local involvement in the selection of cleanup remedies and a clear understanding of environmental restrictions on land that may be released from ownership of the controlling entity. Funding for adequate closure activities, for long term monitoring, and for necessary actions in the future needs to be ensured. Security arrangements need to be anticipated and agreed upon with local entities.This is particularly important because local governments are frequently the 'first responders' to incidents on or near the facility during its operational phases; that role will continue or be expanded upon post-closure

  1. Statement

    International Nuclear Information System (INIS)

    Full text: In Canada, we have not yet decommissioned a nuclear power plant, although there are some prototypes in safe store. However, we have decommissioned a commercial isotope production facility and a small research reactor facility, and the sites were ultimately released from regulatory control. We are currently involved in regulating the decommissioning of Atomic Energy of Canada's research facility at Whiteshell in Manitoba and various small infrastructure programmes at the Chalk River National Laboratories. For these type of projects, IAEA guidance forms the basis for our regulatory decisions. Clearance of materials is based on IAEA guidance criteria. These criteria are used for material contaminated with artificial radiation or with technologically enhanced naturally occurring radioactive material. We have not established clearance criteria for material bound for recycle or reuse for the simple reason that the industries that would receive such material have taken a 'zero tolerance' stance. Scrap steel recyclers are loath to take material with any level of contamination in case it cannot be passed on. The main decommissioning or remediation experience in Canada is with historical uranium mines and their associated tailings, and with contaminated lands associated with the historical use of radium and uranium.These are really intervention activities. While Canadian nuclear regulation does not contain explicit criteria for the release of buildings or sites from regulatory control, our current regulatory scheme does specify that the regulator may order the cleanup of unlicensed sites that could give rise to doses greater than 1 mSv/a We have therefore taken that criterion of a potential dose of 1 mSv/a to be the upper bound for cleanup for historically contaminated sites and then apply as low as reasonably achievable (ALARA) considerations to establish site specific clearance levels. Since many of these sites are in rural areas with a very low population density and varying traditional uses, we take site specific approaches to assessing potential doses. For example, as well as establishing maximum acceptable gamma dose rates, we acquire information on local hunting, fishing and product gathering practices and estimates of the typical times that could be spent on the land in question. As you can imagine, this requires extensive consultation with the local population.We believe this approach is a good one as it helps build confidence in the local population that their situation is understood, and is particularly important when we are dealing with communities which still obtain a significant portion of their diet directly from the local area. In some situations, sites have been released completely from regulatory control. In other situations, regulatory controls could be reduced to requirements for posting of warning signs, public education programmes and filing of information on recommended restrictions with the local government land registry. In summary, Canada is taking a site by site approach to decommissioning and remediation projects using criteria consistent with international guidance. (author)

  2. Statement

    International Nuclear Information System (INIS)

    It is generally up to the operator to propose to the regulator some dismantling strategy. The regulator hence has to judge if these strategies are safe and sustainable. Regulators often propose strategies that involve large waiting periods before dismantling. Their arguments are based on: Favourable effect of radioactive decay; Possibility of benefiting from new dismantling technologies; Benefits of waiting from a financial point of view. For all these reasons, the regulator should promote in most cases immediate dismantling. The main reason for deferred dismantling would be if large amounts of waste cannot be eliminated and would be kept safer within the facility. Entombment is definitely not a sustainable option as it requires, as for long term storage, permanent surveillance and maintenance. If a waste elimination pathway (such as a disposal facility) does not exist for certain categories of waste, a choice has to be made by the operator between: Proposing deferred dismantling because the waste is considered safer if it is enclosed in the facility; and developing and building a specific waste storage facility. Recent experience involving the nuclear industry as well as the conventional industry has shown the necessity to keep track of past uses of land and to at least define the minimum use restrictions when a facility handling hazardous materials has been occupying the site. Contaminated soil can be left in place, provided that optimization has been done and that it is not justified to intervene on a cost/effect basis. This topic has of course to be dealt with in an open discussion organized with stakeholders. An impact study has to be provided and land use restrictions have to be put in place and, as a precaution, possibly continuous monitoring of the funded site

  3. Statement

    International Nuclear Information System (INIS)

    Full text: The question of clearance of materials, buildings and sites from regulatory control is one of the most controversial and discussed questions, if not the most, at all conferences, workshops and working groups dealing with decommissioning. In fact, the aspects of clearance, recycling and reuse have a major influence on global decommissioning costs. Furthermore, these questions involve different stakeholders: on the one hand the owner and operator of the plant, on the other hand the general public and, between both, the regulator. Finally, the recent evolution of the regulations related to the use within the non-nuclear industry of materials containing natural radioactivity and to the cleanup of contaminated sites from post activities leads necessarily to the comparison of criteria to be handled in both industries. What are the differences between these industries? One difference is certainly the public relationship to those industries, and thus the public perception of the risk from the material handled in both industries. On the one hand, it is fissile material, which must be dangerous; on the other hand it is fertilizer, which nearly everybody spreads over his or her land.That cannot be dangerous, it is accepted because it is part of normal life such as driving a car, and the risk is considered normal. But one more becquerel in a car arising from cleared steel from the nuclear industry is not normal, and thus not accepted. The nuclear industry is thus faced with a public perception leading to a public acceptance of zero additional doses from that industry, while a non-negligible additional dose from medicine and normal life such as flying are accepted. Another difference is certainly the type of material contaminated with radionuclides and the type of radioactivity. On the one hand, we have mainly metals and concrete contaminated or activated. And there is even a difference between contaminated and activated structures. In fact, existing decontamination techniques make it more or less easy to decontaminate most structures with only surface contamination, whatever are the clearance limits; it is possible to recover the basic material behind the removable contaminated layer. In the case of activated shielding structures, however, the thickness of the layer considered as radioactive depends greatly on the clearance criteria. On the other hand, stakeholders have to deal with enormous amounts of slightly contaminated raw material or process residues, mostly with isotopes from the U and Th families. I would like to finish this introduction with a few observations from a remediation project of a storage area where Ra contaminated residues and debris from a former non-licensed Ra production facility are stored. The authorities in my country are now dealing with this remediation programme. The disposed amount of contaminated material is in the range of 220 000 m3, between three and four times the amount of low level waste arising from all the licensed practices in the country since the beginning of nuclear activities and including future waste from the decommissioning of existing plants.The activity concentration of the Ra storage area is of the order of 10 000 Bq/g at some places, but the average concentration is somewhere between 10 and probably 100 Bq/g. Should we now treat this material in the same way as contaminated material from controlled areas? Or should we manage the waste from decommissioning as we will manage that from this Ra contaminated storage? Or should we use different strategies? These are some of the questions for discussion. (author)

  4. Statement

    International Nuclear Information System (INIS)

    This presentation deals summarizes the results of a recent National Research Council report on establishing clearance standards for the release of radioactively contaminated materials. The National Research Council report, deal with the Disposition Dilemma: Controlling the Release of Solid Materials from Nuclear Regulatory Commission-Licensed Facilities, was undertaken at the request of the US Nuclear Regulatory Commission (NRC) to help inform its deliberations on the development of a new standard. The Research Council was asked to provide advice on the following issues: The sufficiency of the technical bases needed to establish a standard; How to incorporate the concerns of stakeholders in the standard setting process; Changes, if any, that should be made to the NRC's current clearance system. Accordingly, the report recommends that the NRC: Proceed forthwith to evaluate alternatives to the current system; Involve stakeholders in a broad based evaluation process of alternative approaches; Adopt a dose based standard as the primary standard and consider the establishment of a separate collective dose standard; 10 mSv per year as a starting point in establishing a dose based standard; Continue to review, assess and participate in ongoing international efforts to manage the disposition of slightly contaminated materials. In conclusion it is stated that the experience in the USA suggests that the establishment of a clearance standard is likely to be a long and painful process. It is suggested that the NRC and the international community give careful consideration to the use of risk based approaches as they evaluate alternatives for establishing these standards

  5. Statement

    International Nuclear Information System (INIS)

    Full text: 1. A clearance system based on universal clearance levels is not sustainable. Universal criteria based on radioactivity limits for the removal of control will lead to problems with the public if unexpected or unaccounted for uses lead to significant exposures, or exposures that are not justified. Universal clearance levels are usually based on the hypothesis of waste dilution in recycling processes (such as for steel). It is prone to criticism and will have to be reevaluated, in particular if extended dismantling programmes are carried out in a country or through unique steel recycling companies, leading to changing clearance levels. Moreover, in some cases, industrial processes can lead to radionuclide concentration in some materials, like slag, that can lead to disposal or recycling problems. Social demands can lead to changes in the impact levels accepted in the future, leading to difficulties. In France, a system has been implemented that is not based on clearance levels for release in the public domain. Provided that it is implemented on a coherent, nationwide basis, this system does not lead to an excessive burden for the industry, and has led to a wide social acceptance of the system. 2. Clearance on a case by case basis is feasible On the other hand, it is possible to clear material on a case by case basis, provided that the clearance pathway of the material is well defined, and an impact study is provided. The clearance pathway has to be authorized after an open discussion has taken place between involved stakeholders, including representatives of the public and of antinuclear associations. A follow-up system has to be provided to be able to identify items involving cleared materials, should concern arise afterwards. If the material is recycled, clearance impact criteria do not have to be taken into account, and the impact study has to be made on a case by case basis. 3. Segregation between 'conventional' and 'radioactive' waste is achievable The objective is to achieve a segregation between 'nuclear waste' (waste susceptible to be or to have been contaminated by radionuclides or activated) and 'conventional waste' (waste that is not susceptible to be or to have been contaminated nor activated). Note that this distinction is made without using any screening level to distinguish between 'nuclear' and 'conventional' waste categories.The definition of 'nuclear waste' is quite wide and clearly contains a measure of precaution. This segregation between nuclear and conventional waste has to be made without any measurement basis in order to provide a valid additional line of defence in the whole system; hence other arguments are needed to make this distinction. These arguments are: An analysis of the functions achieved by the materials within the facility, which determines if they can ever be contaminated or activated; An analysis of the past operating history of the facility, including incidents and accidents, in order to determine whether this material has served another purpose or could have been contaminated during an incident or an accident, which are situations in which the facility is operated beyond its normal operating boundaries. It can be seen that these arguments are strongly linked to the physical position of the object or material in the facility; hence the distinction between 'nuclear' and 'conventional' waste can be made on a geographical basis. A corresponding facility waste zoning can be implemented. Linked with appropriate radioactivity measurements, that increase confidence that conventional waste is indeed conventional, this system can provide a high level of confidence in this segregation. This system has been implemented successfully in France, and has been shown to not put an unbearable burden on the operators, provided that it is included in a nationwide, coherent policy, including available and cost efficient waste elimination options (e.g. repositories) for very low level waste. (author)

  6. Statement

    International Nuclear Information System (INIS)

    Full text: I am glad to be here for this presentation this morning. As you know, the Republic of Korea has had much experience in the construction and operation of nuclear power plants (NPPs), but we have no experience in decommissioning. The first research reactor in the Republic of Korea, KRR-1 TRIGA Mark II, first started operation in 1962, and the second one, KRR-2 TRIGA Mark III, first started in 1972. Operation of both of these was phased out in 1995 when they reached the end of their life span and also due to the operation of a new research reactor, HANARO (High-flux Advanced Neutron Application Reactor), at the site of the Korea Atomic Energy Research Institute (KAERI) in Taejon. The decommissioning project for both research reactors was launched in January 1997 and will be completed in December 2008. KAERI has to choose the immediate decommissioning approach because of the following reasons. First, the land and reactor buildings were sold to the Korea Electric Power Co. (KEPCO) in 1985. By the terms of the Atomic Energy Act, KAERI as the operator must decommission the reactor. Second, research and development related to decommissioning should be carried out for secure NPP decommissioning that is upcoming. Lastly, KAERI must prevent the spread of radiation hazards into the reactor building's environs, which is rapidly becoming a densely populated area because of urbanization. Most of the radioactive wastes produced during decommissioning will be packed in 4 m3 ISO type containers, which will then be stored until they are transported to the national disposal site for low and intermediate level waste. Even though it is not certain when the disposal site will be operational, decommissioning should not be deferred. Both of the reactors and related facilities are not in good condition because of minimum budgeting for the maintenance of the facilities. The most important issue is how to keep radioactive materials in a safe and well controlled condition. Therefore, KAERI decided upon immediate decommissioning of both research reactors. Currently, the Republic of Korea has 17 NPPs in operation.They consist of 13 PWR and 4 CANDU type PHWR reactors.The first NPP in the Republic of Korea was Kori-1, which started operation in 1978. Taking into account its design life span of 30 years, it will be shut down in 2008. But the utility company for the NPP, the Korea Hydro-Nuclear Co. (KHNC), is promoting the extension of its life. However, it is expected that there will be many difficulties in obtaining public acceptance. In considering the decommissioning of the NPP, it is recommended that heavily populated countries such as the Republic of Korea choose immediate decommissioning. According to the power supply plan of Korea, 11 more NPPs are being planned for construction and operation until the year 2015. However, it is not easy to get new sites for them. Therefore, it is desirable to locate the new reactors at current sites. Most of the sites have duplicate reactors, but their life spans are not comparable with each other. Therefore, decommissioning should wait until both reactors at the site have reached the end of their life. After decommissioning of the retired reactor, it is desirable to install the Korean Standard Nuclear Plant (KSNP), which has a capacity of 1400 MW(e). This will be one way of resolving the siting problem and reducing the cost of decommissioning and construction. If the Republic of Korea decides to start decommissioning NPPs in 2013, it is necessary to secure the necessary and related technologies for successful decommissioning through R and D. Therefore, during the decommissioning of KRR-1 and KRR-2, basic technologies will be developed and demonstrated under middle to long term R and D programmes. The object of the first stage of the programme, from August 2001 to March 2004, is technology development related to the decommissioning of the research reactor. During the second stage of the programme, April 2004 to March 2007, the basic techniques will be developed for the decommissioning of NPPs.Thank you for your attention. (author)

  7. 20 CFR 335.3 - Execution of statement of sickness and supplemental doctor's statement.

    Science.gov (United States)

    2010-04-01

    ...-abuse professional as defined in 49 CFR part 40.3, if the infirmity involves alcohol or controlled... supplemental doctor's statement. 335.3 Section 335.3 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS... sickness and supplemental doctor's statement. (a) Who may execute. A statement of sickness and any...

  8. Measuring Patients’ Attachment Avoidance in Psychotherapy: Development of the Attachment Avoidance in Therapy Scale (AATS

    Directory of Open Access Journals (Sweden)

    András Láng

    2012-11-01

    Full Text Available A new scale measuring patient-therapist attachment avoidance was developed. Attachment Avoidance in Therapy Scale is a new measure based on the Bartholomew model of adult attachment (Bartholomew & Horowitz, 1991 and the Experience in Close Relationships Scale (Brennan, Clark, & Shaver, 1998 to measure patients’ attachment avoidance towards therapists. With 112 patient-therapist dyads participating in the study, validation of a preliminary scale – measuring both attachment anxiety and attachment avoidance in therapy – took place using therapists’ evaluations of patients’ relational behavior and patients’ self-reports about their attitude toward psychotherapy. Analysis of the data revealed six underlying scales. Results showed all six scales to be reliable. Validation of scales measuring attachment anxiety failed. The importance of Attachment Avoidance in Therapy Scale and its subscales is discussed.

  9. Bursting neurons and ultrasound avoidance in crickets

    Directory of Open Access Journals (Sweden)

    Gary eMarsat

    2012-07-01

    Full Text Available Decision making in invertebrates often relies on simple neural circuits composed of only a few identified neurons. The relative simplicity of these circuits makes it possible to identify the key computation and neural properties underlying decisions. In this review, we summarize recent research on the neural basis of ultrasound avoidance in crickets, a response that allows escape from echolocating bats. The key neural property shaping behavioral output is high-frequency bursting of an identified interneuron, AN2, which carries information about ultrasound stimuli from receptor neurons to the brain. AN2's spike train consists of clusters of spikes –bursts– that may be interspersed with isolated, non-burst spikes. AN2 firing is necessary and sufficient to trigger avoidance steering but only high-rate firing, such as occurs in bursts, evokes this response. AN2 bursts are therefore at the core of the computation involved in deciding whether or not to steer away from ultrasound. Bursts in AN2 are triggered by synaptic input from nearly synchronous bursts in ultrasound receptors. Thus the population response at the very first stage of sensory processing –the auditory receptor- already differentiates the features of the stimulus that will trigger a behavioral response from those that will not. Adaptation, both intrinsic to AN2 and within ultrasound receptors, scales the burst-generating features according to the stimulus statistics, thus filtering out background noise and ensuring that bursts occur selectively in response to salient peaks in ultrasound intensity. Furthermore AN2’s sensitivity to ultrasound varies adaptively with predation pressure, through both developmental and evolutionary mechanisms. We discuss how this key relationship between bursting and the triggering of avoidance behavior is also observed in other invertebrate systems such as the avoidance of looming visual stimuli in locusts or heat avoidance in beetles.

  10. New Results on Multiple-Input Multiple-Output Broadcast Channels with Confidential Messages

    CERN Document Server

    Liu, Ruoheng; Poor, H Vincent; Shamai, Shlomo

    2011-01-01

    This paper presents two new results on multiple-input multiple-output (MIMO) Gaussian broadcast channels with confidential messages. First, the problem of the MIMO Gaussian wiretap channel is revisited. A matrix characterization of the capacity-equivocation region is provided, which extends the previous result on the secrecy capacity of the MIMO Gaussian wiretap channel to the general, possibly imperfect secrecy setting. Next, the problem of MIMO Gaussian broadcast channels with two receivers and three independent messages: a common message intended for both receivers, and two confidential messages each intended for one of the receivers but needing to be kept asymptotically perfectly secret from the other, is considered. A precise characterization of the capacity region is provided, generalizing the previous results which considered only two out of three possible messages.

  11. Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security

    Directory of Open Access Journals (Sweden)

    Ivan Ognyanov Kuyumdzhiev

    2014-08-01

    Full Text Available Facebook allows people to easily share information about themselves which in some cases could be classified as confidential or sensitive in the organisation they’re working for. In this paper we discuss the type of data stored by Facebook and the scope of the terms “confidential” and “sensitive data”. The intersection of these areas shows that there is high possibility for confidential data disclosure in organisations with none or ineffective security policy. This paper proposes a strategy for managing the risks of information leakage. We define five levels of controls against posting non-public data on Facebook - security policy, applications installed on employees’ workstations, specific router software or firmware, software in the cloud, Facebook itself. Advantages and disadvantages of every level are evaluated. As a result we propose developing of new control integrated in the social media.

  12. IT architecture-based confidentiality risk assessment in networks of organizations

    OpenAIRE

    Morali, Ayse

    2011-01-01

    Today almost every organization benefits from business opportunities created by digitalization. Digitalization allows, among others, to develop software products on shared platforms, to remotely access and alter patient records or remotely control power generators. This change in the technical environment has triggered changes in the legal environment, and introduced new compliance requirements. Consequently, protecting the confidentiality of digital information assets has become a major conc...

  13. Using Social Networking Sites for Communicable Disease Control: Innovative Contact Tracing or Breach of Confidentiality?

    OpenAIRE

    Mandeville, KL; Harris, M; Thomas, HL; Chow, Y; Seng, C.

    2013-01-01

    Social media applications such as Twitter, YouTube and Facebook have attained huge popularity, with more than three billion people and organizations predicted to have a social networking account by 2015. Social media offers a rapid avenue of communication with the public and has potential benefits for communicable disease control and surveillance. However, its application in everyday public health practice raises a number of important issues around confidentiality and autonomy. We report here...

  14. Substandard emergency obstetric care - a confidential enquiry into maternal deaths at a regional hospital in Tanzania

    DEFF Research Database (Denmark)

    Sorensen, Bjarke Lund; Elsass, Peter; Nielsen, Brigitte Bruun;

    2010-01-01

    OBJECTIVE: (i) To identify clinical causes of maternal deaths at a regional hospital in Tanzania and through confidential enquiry (CE) assess major substandard care and make a comparison to the findings of the internal maternal deaths audits (MDAs); (ii) to describe hospital staff reflections on ......, and staff dedication to the process was questioned. CONCLUSION: Quality assurance of emergency obstetric care might be strengthened by supplementing internal MDA with external CE....

  15. Medical confidentiality in the late nineteenth and early twentieth centuries: an Anglo-German comparison1

    OpenAIRE

    2010-01-01

    Professional secrecy of doctors became an issue of considerable medico-legal and political debate in the late nineteenth and early twentieth centuries in both Germany and England, although the legal preconditions for this debate were quite different in the two countries. While in Germany medical confidentiality was a legal obligation and granted in court, no such statutory recognition of doctors’ professional secrecy existed in England. This paper is a comparative analysis of medical secrecy ...

  16. Security and confidentiality approach for the Clinical E-Science Framework (CLEF)

    OpenAIRE

    Kalra, D.; Singleton, P; Ingram, D.; Milan, J.; Mackay, J.; Detmer, D.; Rector, A.

    2005-01-01

    CLEF is an MRC sponsored project in the E-Science programme that aims to establish policies and infrastructure for the next generation of integrated clinical and bioscience research. One of the major goals of the project is to provide a pseudonymised repository of histories of cancer patients that can be accessed by researchers. Robust mechanisms and policies are needed to ensure that patient privacy and confidentiality are preserved while delivering a repository of such med...

  17. Consistent inference that does not rely on confidential weighting variables: empirical likelihood and linearisation approaches

    OpenAIRE

    Berger, Y. G.

    2016-01-01

    Auxiliary variables are often used to derive survey weights for point estimation. The weights do not contain enough information for consistent variance estimation and confidence intervals. Standard variance estimators and empirical likelihood confidence intervals rely on the values of the auxiliary variables and on inclusion probabilities. Unfortunately, there are numerous situations when the users do not have access to these variables and probabilities, because of confidentiality issues. We ...

  18. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina

    Directory of Open Access Journals (Sweden)

    Leitner Michael

    2006-10-01

    Full Text Available Abstract Background Geographic Information Systems (GIS can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. Results We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. Conclusion The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made

  19. Confidentiality and data sharing: vulnerabilities of the Mexican Genomics Sovereignty Act

    OpenAIRE

    Rojas-Martínez, Augusto

    2015-01-01

    A law known as “Genomic Sovereignty Act”, instituted in 2011, regulates research on the human genome in Mexico. This law establishes Government regulations for the exportation of DNA samples from Mexican nationals for population genetics studies. The Genomic Sovereignty Act protects fundamental human values, as confidentiality and non-discrimination based on personal genetic information. It also supports the development of the genome-based medical biotechnology and the bio-economy. Current la...

  20. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  1. Medical confidentiality and the protection of Jehovah's Witnesses' autonomous refusal of blood

    OpenAIRE

    Muramoto, O

    2000-01-01

    Mr Ridley of the Watch Tower Society (WTS), the controlling religious organisation of Jehovah's Witnesses (JWs), mischaracterises the issue of freedom and confidentiality in JWs' refusal of blood by confusing inconsistent organisational policies with actual Biblical proscriptions. Besides exaggeration and distortion of my writings, Ridley failed to present substantive evidence to support his assertion that no pressure exists to conform to organisational policy nor systematic monitoring which ...

  2. Confidentiality and data sharing: vulnerabilities of the Mexican Genomics Sovereignty Act.

    Science.gov (United States)

    Rojas-Martínez, Augusto

    2015-07-01

    A law known as "Genomic Sovereignty Act", instituted in 2011, regulates research on the human genome in Mexico. This law establishes Government regulations for the exportation of DNA samples from Mexican nationals for population genetics studies. The Genomic Sovereignty Act protects fundamental human values, as confidentiality and non-discrimination based on personal genetic information. It also supports the development of the genome-based medical biotechnology and the bio-economy. Current laws for the protection of the genomic confidentiality, however, are inexplicit and insufficient, and the legal and technological instruments are primitive and insufficient to safeguard this bioethical principle. In addition, this law may undermine efforts of the national and international scientific communities to cooperate with big-data analysis for the development of the genome-based biomedical sciences. The argument of this article is that deficiencies in the protection of the confidentiality of genomic information and limitations in data sharing severely weaken the objectives and scope of the Genomic Sovereignty Act. In addition, the Act may compromise the national biomedical development and the international cooperation for research and development in the field of human genomics. PMID:25990230

  3. Embedding patients confidential data in ECG signal for healthcare information systems.

    Science.gov (United States)

    Ibaida, Ayman; Khalil, Ibrahim; Al-Shammary, Dhiah

    2010-01-01

    In Wireless tele-cardiology applications, ECG signal is widely used to monitor cardiac activities of patients. Accordingly, in most e-health applications, ECG signals need to be combined with patient confidential information. Data hiding and watermarking techniques can play a crucial role in ECG wireless tele-monitoring systems by combining the confidential information with the ECG signal since digital ECG data is huge enough to act as host to carry tiny amount of additional secret data. In this paper, a new steganography technique is proposed that helps embed confidential information of patients into specific locations (called special range numbers) of digital ECG host signal that will cause minimal distortion to ECG, and at the same time, any secret information embedded is completely extractable. We show that there are 2.1475 × 10(9) possible special range numbers making it extremely difficult for intruders to identify locations of secret bits. Experiments show that percentage residual difference (PRD) of watermarked ECGs can be as low as 0.0247% and 0.0678% for normal and abnormal ECG segments (taken from MIT-BIH Arrhythmia database) respectively. PMID:21097076

  4. 45 CFR 1636.3 - Access to written statements.

    Science.gov (United States)

    2010-10-01

    ... CLIENT IDENTITY AND STATEMENT OF FACTS § 1636.3 Access to written statements. (a) Written statements of... party other than those listed in paragraph (a) of this section any right of access to the...

  5. 77 FR 52721 - Appraisal Subcommittee; Proposed Policy Statements

    Science.gov (United States)

    2012-08-30

    ... defined in the proposed Policy Statement) to the ASC via the extranet application for inclusion on the... INSTITUTIONS EXAMINATION COUNCIL Appraisal Subcommittee; Proposed Policy Statements AGENCY: Appraisal Subcommittee of the Federal Financial Institutions Examination Council ACTION: Proposed policy statements...

  6. 48 CFR 222.406-6 - Payrolls and statements.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Payrolls and statements... Labor Standards for Contracts Involving Construction 222.406-6 Payrolls and statements. (a) Submission..., Statement of Compliance, with each payroll report....

  7. The Feasibility of Avoiding Future Climate Impacts: Results from the AVOID Programmes

    Science.gov (United States)

    Lowe, J. A.; Warren, R.; Arnell, N.; Buckle, S.

    2014-12-01

    The AVOID programme and its successor, AVOID2, have focused on answering three core questions: how do we characterise potentially dangerous climate change and impacts, which emissions pathways can avoid at least some of these impacts, and how feasible are the future reductions needed to significantly deviate from a business-as-usual future emissions pathway. The first AVOID project succeeded in providing the UK Government with evidence to inform its position on climate change. A key part of the work involved developing a range of global emissions pathways and estimating and understanding the corresponding global impacts. This made use of a combination of complex general circulation models, simple climate models, pattern-scaling and state-of-the art impacts models. The results characterise the range of avoidable impacts across the globe in several key sectors including river and coastal flooding, cooling and heating energy demand, crop productivity and aspects of biodiversity. The avoided impacts between a scenario compatible with a 4ºC global warming and one with a 2ºC global warming were found to be highly sector dependent and avoided fractions typically ranged between 20% and 70%. A further key aspect was characterising the magnitude of the uncertainty involved, which is found to be very large in some impact sectors although the avoided fraction appears a more robust metric. The AVOID2 programme began in 2014 and will provide results in the run up to the Paris CoP in 2015. This includes new post-IPCC 5th assessment evidence to inform the long-term climate goal, a more comprehensive assessment of the uncertainty ranges of feasible emission pathways compatible with the long-term goal and enhanced estimates of global impacts using the latest generation of impact models and scenarios.

  8. Position Statement on Active Outdoor Play

    Directory of Open Access Journals (Sweden)

    Mark S. Tremblay

    2015-06-01

    Full Text Available A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N = 9 and cross-sectorial individuals/organizations (N = 17, and an extensive stakeholder consultation process (N = 1908. More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: “Access to active play in nature and outdoors—with its risks— is essential for healthy child development. We recommend increasing children’s opportunities for self-directed play outdoors in all settings—at home, at school, in child care, the community and nature.” The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development.

  9. The 7 Aarhus Statements on Climate Change

    DEFF Research Database (Denmark)

    Basse, Ellen Margrethe; Svenning, Jens-Christian; Olesen, Jørgen E; Besenbacher, Flemming; Læssøe, Jeppe; Seidenkrantz, Marit-Solveig; Lange, Lene

    2009-01-01

    statements were also communicated to the Danish Government as well as to the press. This article is the product of the collective subsequent work of the seven theme responsibles and is a presentation of each theme statement in detail, emphasizing the current state of knowledge and how it may be used to...

  10. 78 FR 31924 - Appraisal Subcommittee; Policy Statements

    Science.gov (United States)

    2013-05-28

    ... Statements on the date set forth below. \\1\\ 77 FR 52721 (Aug. 30, 2012). \\2\\ The 50 States, the District of... education, experience requirements, and examination. Three of the five Commenters addressing this proposed... INSTITUTIONS EXAMINATION COUNCIL Appraisal Subcommittee; Policy Statements AGENCY: Appraisal Subcommittee...

  11. 27 CFR 5.63 - Mandatory statements.

    Science.gov (United States)

    2010-04-01

    ....” (2) Optional statement. In addition, the advertisement may also state the alcohol content in degrees... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Mandatory statements. 5.63 Section 5.63 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU,...

  12. 27 CFR 7.52 - Mandatory statements.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Mandatory statements. 7.52 Section 7.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT....52 Mandatory statements. (a) Responsible advertiser. The advertisement shall state the name...

  13. 27 CFR 4.62 - Mandatory statements.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Mandatory statements. 4.62 Section 4.62 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT... statements. (a) Responsible advertiser. The advertisement shall state the name and address of the...

  14. 7 CFR 4279.137 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... accordance with Generally Accepted Accounting Principles will be required. (b) If specific circumstances... 7 Agriculture 15 2010-01-01 2010-01-01 false Financial statements. 4279.137 Section 4279.137... § 4279.137 Financial statements. (a) The lender will determine the type and frequency of submission...

  15. 75 FR 22577 - Proposed Privacy Policy Statement

    Science.gov (United States)

    2010-04-29

    ... From the Federal Register Online via the Government Publishing Office ELECTION ASSISTANCE COMMISSION Proposed Privacy Policy Statement AGENCY: U.S. Election Assistance Commission. ACTION: Notice and request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election...

  16. 14 CFR 313.6 - Energy statements.

    Science.gov (United States)

    2010-01-01

    ... action taken or to be taken upon energy efficiency and conservation. The administrative law judge or the... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Energy statements. 313.6 Section 313.6... REGULATIONS IMPLEMENTATION OF THE ENERGY POLICY AND CONSERVATION ACT § 313.6 Energy statements. (a) Each...

  17. 12 CFR 611.515 - Information statement.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information statement. 611.515 Section 611.515 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM ORGANIZATION Transfer of Authorities § 611.515 Information statement. (a) The bank and association shall prepare an information...

  18. 29 CFR 570.101 - Introductory statement.

    Science.gov (United States)

    2010-07-01

    ... Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR REGULATIONS CHILD LABOR REGULATIONS, ORDERS AND STATEMENTS OF INTERPRETATION General Statements of Interpretation of the Child Labor...) This subpart discusses the meaning and scope of the child labor provisions contained in the Fair...

  19. 48 CFR 35.005 - Work statement.

    Science.gov (United States)

    2010-10-01

    ..., and objectives of the research or development effort; (2) Background information helpful to a clear... CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 35.005 Work statement. (a) A clear and complete work statement concerning the area of exploration (for basic research) or the end objectives (for development...

  20. UV Impacts Avoided by the Montreal Protocol

    Science.gov (United States)

    Newman, Paul; McKenzie, Richard

    2010-01-01

    Temporal and geographical variabilities in the future "World Expected" UV environment are compared with the "World Avoided", which would have occurred without the Montreal Protocol on protection of the ozone layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes which could also be important.

  1. How to avoid deferred-compensation troubles.

    Science.gov (United States)

    Freeman, Todd I

    2005-06-01

    Executive compensation packages have long included stock options and deferred compensation plans in order to compete for talent. Last year, Congress passed a law in response to the Enron debacle, in which executives were perceived to be protecting their deferred compensation at the expense of employees, creditors, and investors. The new law is designed to protect companies and their shareholders from being raided by the very executives that guided the company to financial ruin. Physicians who are part owners of medical practices need to know about the changes in the law regarding deferred compensation and how to avoid costly tax penalties. This article discusses how the changes affect medical practices as well as steps physician-owned clinics can take to avoid the risk of penalty, such as freezing deferred compensation and creating a new deferred compensation plan. PMID:16050311

  2. Construction dispute research conceptualisation, avoidance and resolution

    CERN Document Server

    2014-01-01

    There are three specific purposes of Construction Dispute Research. First, this volume aims to summarise studies on construction dispute. Second, apart from the theoretical constructs, where appropriate empirical tests are also included. This approach serves to go beyond the commonly used anecdotal approach for the subject matters. Third, it is the sincere hope of the authors that this book will help shaping research agenda of construction dispute.  The studies are mostly framed from a management perspective drawing on methods and concepts in contract law, economics, psychology and management science.   The book has twenty chapters that are arranged in four parts covering conceptualisation, avoidance, negotiation and mediation. Part 1 is devoted for dispute conceptualisation. A building is only as strong as its foundation. Thus it is no better start to study construction dispute by conceptualisation. The theme of Part 2 is dispute avoidance. The conventional wisdom of ‘prevention is better than cure’ se...

  3. Obstacle Detection and Avoidance Autonomous Car

    OpenAIRE

    K.Vasavi; M.V.S.Praveen

    2014-01-01

    Driving models are needed by many researchers to improve traffic safety and to advance autonomous vehicle design. To be most useful, a driving model must state specifically what information is needed and how it is processed. So we developed an “Obstacle Avoidance and Detection Autonomous Car” based on sensor application. The essential part of this autonomous car is that it drives taking the energy from solar panel. This paper explains the method of interfacing the solar panel, relay circuit b...

  4. Anorexia nervosa and food avoidance emotional disorder.

    OpenAIRE

    Higgs, J F; Goodyer, I M; Birch, J.

    1989-01-01

    A retrospective and longitudinal study was carried out on all children and adolescents who presented to a child psychiatry service over a period of 26 years to identify the nature, course, and outcome of cases meeting criteria for anorexia nervosa (n = 27). Two groups of the same age were identified for comparison, firstly those with food avoidance and emotional disorders (n = 23), and secondly those with emotional disorders but no symptoms associated with eating (n = 22). The results confirm...

  5. Robot maps, robot moves, robot avoids

    OpenAIRE

    Farrugia, Claire; Duca, Edward

    2014-01-01

    Robotics is a cornerstone for this century’s innovations. From robot nurses to your own personal assistant, most robots need to know: ‘where is it?’ ‘Where should it go?’ And ‘how to get there?’ Without answers to these questions a robot cannot do much. http://www.um.edu.mt/think/robot-maps-robot-moves-robot-avoids/

  6. Can subjectivity be avoided in translation evaluation?

    OpenAIRE

    Segers, Winibert; Kockaert, Hendrik

    2015-01-01

    The didactics of translation and interpreting Testing and assessment criteria and methods Can subjectivity be avoided in translation evaluation? Winibert Segers & Hendrik J Kockaert, KU Leuven Camiel Paulusstraat 8, 2630 Aartselaar, België Is translation evaluation a subjective, personal matter? Is evaluating translations the same as beer tasting or listening to a piece of music? Is the judgment determined by personal taste? We will try to answe...

  7. Inhibited Sexual Desire and Sexual Avoidance

    OpenAIRE

    Morse, William I.

    1985-01-01

    Inhibited sexual desire (ISD) is one of the most common sexual dysfunctions, especially in women. Family physicians have an opportunity to recognize ISD before the associated problems become entrenched, and to guide couples toward satisfactory resolution. A summary is presented of current thinking on ISD and its causes. Case reports and observations about frequency of and treatment for ISD are included. Much less has been written about sexual avoidance in the presence of desire. A definition ...

  8. Normal coronary arteriogram. An avoidable test?

    OpenAIRE

    Ilsley, C; Stockley, A; Clitsakis, D; Layton, C

    1982-01-01

    Between 10 and 20% of coronary arteriograms in patients with chest pain show normal vessels, often in association with a history of "atypical" angina. Conventional non-invasive tests are inaccurate in this group of patients compared with those with classical angina. This study prospectively evaluates combined 12 lead exercise electrocardiography and thallium-201 scintigraphy as a screening test in patients with atypical angina in order to determine whether normal arteriograms are avoidable in...

  9. Airborne Collision Detection and Avoidance for Small UAS Sense and Avoid Systems

    Science.gov (United States)

    Sahawneh, Laith Rasmi

    The increasing demand to integrate unmanned aircraft systems (UAS) into the national airspace is motivated by the rapid growth of the UAS industry, especially small UAS weighing less than 55 pounds. Their use however has been limited by the Federal Aviation Administration regulations due to collision risk they pose, safety and regulatory concerns. Therefore, before civil aviation authorities can approve routine UAS flight operations, UAS must be equipped with sense-and-avoid technology comparable to the see-and-avoid requirements for manned aircraft. The sense-and-avoid problem includes several important aspects including regulatory and system-level requirements, design specifications and performance standards, intruder detecting and tracking, collision risk assessment, and finally path planning and collision avoidance. In this dissertation, our primary focus is on developing an collision detection, risk assessment and avoidance framework that is computationally affordable and suitable to run on-board small UAS. To begin with, we address the minimum sensing range for the sense-and-avoid (SAA) system. We present an approximate close form analytical solution to compute the minimum sensing range to safely avoid an imminent collision. The approach is then demonstrated using a radar sensor prototype that achieves the required minimum sensing range. In the area of collision risk assessment and collision prediction, we present two approaches to estimate the collision risk of an encounter scenario. The first is a deterministic approach similar to those been developed for Traffic Alert and Collision Avoidance (TCAS) in manned aviation. We extend the approach to account for uncertainties of state estimates by deriving an analytic expression to propagate the error variance using Taylor series approximation. To address unanticipated intruders maneuvers, we propose an innovative probabilistic approach to quantify likely intruder trajectories and estimate the probability of

  10. Intellectual Capital Statements -When Rhetoric meets Logic

    DEFF Research Database (Denmark)

    Krag, Lotte

    of representation is calculus and mathematical rules. To illustrate the importance of describing a firm by not only using numbers the article illustrates the differences between intellectual capital statements and traditional balance sheets. The intellectual capital statement is often accused of not...... being a valid document to assess a company's value by, but this article argues that although intellectual capital statements make use of another way of presenting arguments than traditional balance sheets do they are still valid for describing a firm. The article argues that the intellectual capital...... statement uses rhetoric and thus should be analyzed accordingly instead of being compared with traditional accounting. Finally, the case of Byggeplandata is used as an illustration of how rhetoric is applied in an intellectual capital statement....

  11. Resonating Statements: Discursive acts in IT projects

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept of...... resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study of an IT...... project in a Danish local government spans a two-year time period and demonstrates a double-loop legitimization process. First, resonating statements are produced to localize a national IT initiative to support the specificity of a local government discourse. Second, the resonating statements are used as...

  12. Urban water restrictions: Attitudes and avoidance

    Science.gov (United States)

    Cooper, Bethany; Burton, Michael; Crase, Lin

    2011-12-01

    In most urban cities across Australia, water restrictions remain the dominant policy mechanism to restrict urban water consumption. The extensive adoption of water restrictions as a means to limit demand, over several years, means that Australian urban water prices have consistently not reflected the opportunity cost of water. Given the generally strong political support for water restrictions and the likelihood that they will persist for some time, there is value in understanding households' attitudes in this context. More specifically, identifying the welfare gains associated with avoiding urban water restrictions entirely would be a nontrivial contribution to our knowledge and offer insights into the benefits of alternative policy responses. This paper describes the results from a contingent valuation study that investigates consumers' willingness to pay to avoid urban water restrictions. Importantly, the research also investigates the influence of cognitive and exogenous dimensions on the utility gain associated with avoiding water restrictions. The results provide insights into the impact of the current policy mechanism on economic welfare.

  13. Granting silence to avoid wireless collisions

    KAUST Repository

    Choi, Jung Il

    2010-10-01

    We describe grant-to-send, a novel collision avoidance algorithm for wireless mesh networks. Rather than announce packets it intends to send, a node using grant-to-send announces packets it expects to hear others send. We present evidence that inverting collision avoidance in this way greatly improves wireless mesh performance. Evaluating four protocols from 802.11 meshes and 802.15.4 sensor networks, we find that grant-to-send matches or outperforms CSMA and RTS/CTS in all cases. For example, in a 4-hop UDP flow, grantto- send can achieve 96% of the theoretical maximum throughput while maintaining a 99.9% packet delivery ratio. Grant-tosend is also general enough to replace protocol-specific collision avoidance mechanisms common to sensor network protocols. Grant-to-send is simple. For example, incorporating it into 802.11 requires only 11 lines of driver code and no hardware changes. Furthermore, as it reuses existing 802.11 mechanisms, grant-to-send inter-operates with current networks and can be incrementally deployed. © 2010 IEEE.

  14. Traffic jam driving with NMV avoidance

    Science.gov (United States)

    Milanés, Vicente; Alonso, Luciano; Villagrá, Jorge; Godoy, Jorge; de Pedro, Teresa; Oria, Juan P.

    2012-08-01

    In recent years, the development of advanced driver assistance systems (ADAS) - mainly based on lidar and cameras - has considerably improved the safety of driving in urban environments. These systems provide warning signals for the driver in the case that any unexpected traffic circumstance is detected. The next step is to develop systems capable not only of warning the driver but also of taking over control of the car to avoid a potential collision. In the present communication, a system capable of autonomously avoiding collisions in traffic jam situations is presented. First, a perception system was developed for urban situations—in which not only vehicles have to be considered, but also pedestrians and other non-motor-vehicles (NMV). It comprises a differential global positioning system (DGPS) and wireless communication for vehicle detection, and an ultrasound sensor for NMV detection. Then, the vehicle's actuators - brake and throttle pedals - were modified to permit autonomous control. Finally, a fuzzy logic controller was implemented capable of analyzing the information provided by the perception system and of sending control commands to the vehicle's actuators so as to avoid accidents. The feasibility of the integrated system was tested by mounting it in a commercial vehicle, with the results being encouraging.

  15. See-and-Avoid Collision Avoidance Using ADS-B Signal and Radar Sensing Project

    Data.gov (United States)

    National Aeronautics and Space Administration — IAI proposes an innovative collision avoidance radar and communication technology to detect and track both cooperative and non-cooperative targets. The system...

  16. Avoiding Negative Outcomes: Tracking the Mechanisms of Avoidance Learning in Humans During Fear Conditioning

    OpenAIRE

    Delgado, Mauricio R.; Jou, Rita L.; Liz Phelps

    2009-01-01

    Previous research across species has shown that the amygdala is critical for learning about aversive outcomes, while the striatum is involved in reward-related processing. Less is known, however, about the role of the amygdala and the striatum in learning how to exert control over emotions and avoid negative outcomes. One potential mechanism for active avoidance of stressful situations is postulated to involve amygdala–striatal interactions. The goal of this study was to investigate the physi...

  17. Avoiding negative outcomes: tracking the mechanisms of avoidance learning in humans during fear conditioning

    Directory of Open Access Journals (Sweden)

    Mauricio R Delgado

    2009-11-01

    Full Text Available Previous research across species has shown that the amygdala is critical for learning about aversive outcomes, while the striatum is involved in reward-related processing. Less is known, however, about the role of the amygdala and the striatum in learning how to exert control over emotions and avoid negative outcomes. One potential mechanism for active avoidance of stressful situations is postulated to involve amygdala-striatal interactions. The goal of this study was to investigate the physiological and neural correlates underlying avoidance learning in humans. Specifically, we used a classical conditioning paradigm where three different conditioned stimuli (CS were presented. One stimulus predicted the delivery of a shock upon stimulus offset (CS+, while another predicted no negative consequences (CS-. A third conditioned cue also predicted delivery of a shock, but participants were instructed that upon seeing this stimulus, they could avoid the shock if they chose the correct action (AV +. After successful learning, participants could then easily terminate the shock during subsequent stimulus presentations (AV-. Physiological responses (as measured by SCRs confirmed a main effect of conditioning, particularly showing higher arousal responses during pre (AV+ compared to post (AV- learning of an avoidance response. Consistent with animal models, amygdala-striatal interactions were observed to underlie the acquisition of an avoidance response. These results support a mechanism of active coping with conditioned fear that allows for the control over emotional responses such as fears that can become maladaptive and influence our decision-making.

  18. The global cost of eliminating avoidable blindness

    Directory of Open Access Journals (Sweden)

    Kirsten L Armstrong

    2012-01-01

    Full Text Available Aims : To complete an initial estimate of the global cost of eliminating avoidable blindness, including the investment required to build ongoing primary and secondary health care systems, as well as to eliminate the ′backlog′ of avoidable blindness. This analysis also seeks to understand and articulate where key data limitations lie. Materials and Methods : Data were collected in line with a global estimation approach, including separate costing frameworks for the primary and secondary care sectors, and the treatment of backlog. Results : The global direct health cost to eliminate avoidable blindness over a 10-year period from 2011 to 2020 is estimated at $632 billion per year (2009 US$. As countries already spend $592 billion per annum on eye health, this represents additional investment of $397.8 billion over 10 years, which is $40 billion per year or $5.80 per person for each year between 2010 and 2020. This is concentrated in high-income nations, which require 68% of the investment but comprise 16% of the world′s inhabitants. For all other regions, the additional investment required is $127 billion. Conclusions : This costing estimate has identified that low- and middle-income countries require less than half the additional investment compared with high-income nations. Low- and middle-income countries comprise the greater investment proportion in secondary care whereas high-income countries require the majority of investment into the primary sector. However, there is a need to improve sector data. Investment in better data will have positive flow-on effects for the eye health sector.

  19. CORPORATE SOCIAL RESPONSIBILITY VERSUS TAX AVOIDANCE PRACTICES

    Directory of Open Access Journals (Sweden)

    Stoian Ciprian-Dumitru

    2012-07-01

    Full Text Available Worldwide crisis has made multinational companies that are engaged in corporate social responsibility actions to manage their businesses through the lens of various tax avoidance practices. The content of this paper is important due to the fact that tries to identify the impact in case of companies active in corporate social responsibility actions versus their tax structures orientation. Corporate social responsibility literature did not paid enough attention on the impact of the tax avoidance practices of companies. Tax, as a concept, brings in itself an important corporate financial impact with subsequent effects for the life of multiple citizens in countries where private entities are operating. Even though companies are usually expressing their ethical and responsible conduct in respect of the social environment, there are many cases when the business practices were not aligned with the declared corporate behavior. This paper seeks firstly to examine whether companies engaged in tax avoidance practices (ex. offshore tax havens consider that continue to act socially responsible. Secondly, the paper examines the influence on attending the stakeholders’ goals for those companies practicing tax avoidance and its implications on corporate social responsibility actions. Moreover, the paper focuses also on the aspects described before from the perspective of the corporate entities operating in Romania. This paper’s intention is to use and to develop the results of previous research carried out by Lutz Preus (University of London and, subsequently, by Senators Levin, Coleman and Obama in their “Stop Tax Haven Abuse Bill”. The implications and the objectives of this material are to highlight, to identify and to spot clearly the relations and the influences of the tax haven practices of corporations versus their undertaken social responsibility actions. Moreover, this paper brings a fresh perspective of this topic from the

  20. Wireless vehicular networks for car collision avoidance

    CERN Document Server

    2013-01-01

    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  1. The International Double Taxation – Avoiding Methods

    Directory of Open Access Journals (Sweden)

    Nicoleta Barbuta-Misu

    2009-06-01

    Full Text Available The paper presents the main causes that determine double taxation, its forms, i.e. the economicdouble taxation and the international legal double taxation, the need for eliminating the double taxation andavoiding methods. In the presentation of the avoidance methods have been used practical examples forcomparison of the tax advantages for income beneficiary between: the total exemption method andprogressive exemption method, on the one hand, and total crediting method and ordinary crediting method,on the other hand, but the comparing of tax reduction between methods of exemption and crediting.

  2. Understanding, Avoiding, and Managing Severe Filler Complications.

    Science.gov (United States)

    Rzany, Berthold; DeLorenzi, Claudio

    2015-11-01

    Any injectable filler may elicit moderate-to-severe adverse events, ranging from nodules to abscesses to vascular occlusion. Fortunately, severe adverse events are uncommon for the majority of fillers currently on the market. Because these are rare events, it is difficult to identify the relevant risk factors and to design the most efficacious treatment strategies. Poor aesthetic outcomes are far more common than severe adverse events. These in contrast should be easily avoidable by ensuring that colleagues receive proper training and follow best practices. PMID:26441099

  3. Families of prudent self-avoiding walks

    OpenAIRE

    Bousquet-Mélou, Mireille

    2010-01-01

    A self-avoiding walk (SAW) on the square lattice is prudent if it never takes a step towards a vertex it has already visited. Prudent walks differ from most classes of SAW that have been counted so far in that they can wind around their starting point. Their enumeration was first addressed by Préa in 1997. He defined 4 classes of prudent walks, of increasing generality, and wrote a system of recurrence relations for each of them . However, these relations involve more and more parameters as t...

  4. How to avoid unnatural hierarchical thermal leptogenesis

    CERN Document Server

    Clarke, Jackson D

    2015-01-01

    A one-flavour naturalness argument suggests that the Type I seesaw model cannot naturally explain neutrino masses and the baryon asymmetry of the Universe via hierarchical thermal leptogenesis. We prove that there is no way to avoid this conclusion in a minimal three-flavour setup. We then comment on the simplest ways out. In particular, we focus on a resolution utilising a second Higgs doublet. Such models predict an automatically SM-like Higgs boson, (maximally) TeV-scale scalar states, and low- to intermediate-scale hierarchical leptogenesis with $10^3\\text{ GeV}\\lesssim M_{N_1}\\lesssim 10^7\\text{ GeV}$.

  5. Avoiding plagiarism: guidance for nursing students.

    Science.gov (United States)

    Price, Bob

    The pressures of study, diversity of source materials, past assumptions relating to good writing practice, ambiguous writing guidance on best practice and students' insecurity about their reasoning ability, can lead to plagiarism. With the use of source checking software, there is an increased chance that plagiarised work will be identified and investigated, and penalties given. In extreme cases, plagiarised work may be reported to the Nursing and Midwifery Council and professional as well as academic penalties may apply. This article provides information on how students can avoid plagiarism when preparing their coursework for submission. PMID:24568425

  6. Avoidance learning : a review of theoretical models and recent developments

    OpenAIRE

    Krypotos, Angelos-Miltiadis; Effting, Marieke; Kindt, Merel; Beckers, Tom

    2015-01-01

    Avoidance is a key characteristic of adaptive and maladaptive fear. Here, we review past and contemporary theories of avoidance learning. Based on the theories, experimental findings and clinical observations reviewed, we distill key principles of how adaptive and maladaptive avoidance behavior is acquired and maintained. We highlight clinical implications of avoidance learning theories and describe intervention strategies that could reduce maladaptive avoidance and prevent its return. We end...

  7. Avoidance Learning: A Review of Theoretical Models and Recent Developments

    OpenAIRE

    Angelos-Miltiadis Krypotos; Tom Beckers

    2015-01-01

    Avoidance is a key characteristic of adaptive and maladaptive fear. Here, we review past and contemporary theories of avoidance learning. Based on the theories, experimental findings and clinical observations reviewed, we distil key principles of how adaptive and maladaptive avoidance behavior is acquired and maintained. We highlight clinical implications of avoidance learning theories and describe intervention strategies that could reduce maladaptive avoidance and prevent its return. We e...

  8. The 7 Aarhus Statements on Climate Change

    DEFF Research Database (Denmark)

    Basse, Ellen Margrethe; Svenning, J.-C.; Olesen, Jørgen E;

    2009-01-01

    ; Nanotechnology solutions for a sustainable future; Citizens and society, and The Arctic. The main responsible scientists for the seven conference themes and representatives from the think-tank CONCITO delivered 'The 7 Aarhus Statements on Climate Change' as part of the closing session of the conference. The...... statements were also communicated to the Danish Government as well as to the press. This article is the product of the collective subsequent work of the seven theme responsibles and is a presentation of each theme statement in detail, emphasizing the current state of knowledge and how it may be used to...

  9. Avoidance of strobe lights by zooplankton

    Science.gov (United States)

    Hamel, Martin J.; Richards, Nathan S.; Brown, Michael L.; Chipps, Steven R.

    2010-01-01

    Underwater strobe lights can influence the behavior and distribution of fishes and are increasingly used as a technique to divert fish away from water intake structures on dams. However, few studies examine how strobe lights may affect organisms other than targeted species. To gain insight on strobe lighting effects on nontarget invertebrates, we investigated whether underwater strobe lights influence zooplankton distributions and abundance in Lake Oahe, South Dakota. Zooplankton were collected using vertical tows at 3 discrete distances from an underwater strobe light to quantify the influence of light intensity on zooplankton density. Samples were collected from 3 different depth ranges (0–10 m, 10–20 m and 20–30 m) at zooplankton sampled from 17 August to 15 September 2004. Night time zooplankton densities significantly decreased in surface waters when strobe lights were activated. Copepods exhibited the greatest avoidance patterns, while Daphnia avoidance varied throughout sampling depths. These results indicate that zooplankton display negative phototaxic behavior to strobe lights and that researchers must be cognizant of potential effects to the ecosystem such as altering predator–prey interactions or affecting zooplankton distribution and growth.

  10. Shape optimization of self-avoiding curves

    Science.gov (United States)

    Walker, Shawn W.

    2016-04-01

    This paper presents a softened notion of proximity (or self-avoidance) for curves. We then derive a sensitivity result, based on shape differential calculus, for the proximity. This is combined with a gradient-based optimization approach to compute three-dimensional, parameterized curves that minimize the sum of an elastic (bending) energy and a proximity energy that maintains self-avoidance by a penalization technique. Minimizers are computed by a sequential-quadratic-programming (SQP) method where the bending energy and proximity energy are approximated by a finite element method. We then apply this method to two problems. First, we simulate adsorbed polymer strands that are constrained to be bound to a surface and be (locally) inextensible. This is a basic model of semi-flexible polymers adsorbed onto a surface (a current topic in material science). Several examples of minimizing curve shapes on a variety of surfaces are shown. An advantage of the method is that it can be much faster than using molecular dynamics for simulating polymer strands on surfaces. Second, we apply our proximity penalization to the computation of ideal knots. We present a heuristic scheme, utilizing the SQP method above, for minimizing rope-length and apply it in the case of the trefoil knot. Applications of this method could be for generating good initial guesses to a more accurate (but expensive) knot-tightening algorithm.

  11. Collision avoidance for CTV: Requirements and capabilities

    Science.gov (United States)

    Nosek, Thomas P.

    Cargo transfer vehicle (CTV) operations near Space Station Freedom will require positive collision avoidance maneuver (CAM) capability to preclude any change of collision, even in the event of CTV failures. The requirements for CAM are discussed, and the CAM design approach and design of the Orbiting Maneuvering Vehicle (OMV) are reviewed; this design met requirements for OMV operation near the Space Station, provided a redundant collision avoidance maneuver capability. Significant portions of the OMV CAM design should be applicable to CTV. The key features of the OMV design are summarized and related to the CTV mission design to that of OMV's. CAM is a defined sequence of events executed by the CTV to place the vehicle in a safe position relative to a target such as the Space Station. CAM can be performed through software commands to the propulsion system, or through commands pre-stored in hardware. Various techniques for triggering CAM are considered, and the risks associated with CAM enable and execution in phases are considered. OMV CAM design features both hardware and software CAM capability, with analyses conducted to assess the ability to meet the collision-free requirement during all phases of the mission.

  12. Ship Collision Avoidance by Distributed Tabu Search

    Directory of Open Access Journals (Sweden)

    Dong-Gyun Kim

    2015-03-01

    Full Text Available More than 90% of world trade is transported by sea. The size and speed of ships is rapidly increasing in order to boost economic efficiency. If ships collide, the damage and cost can be astronomical. It is very difficult for officers to ascertain routes that will avoid collisions, especially when multiple ships travel the same waters. There are several ways to prevent ship collisions, such as lookouts, radar, and VHF radio. More advanced methodologies, such as ship domain, fuzzy theory, and genetic algorithm, have been proposed. These methods work well in one-on-one situations, but are more difficult to apply in multiple-ship situations. Therefore, we proposed the Distributed Local Search Algorithm (DLSA to avoid ship collisions as a precedent study. DLSA is a distributed algorithm in which multiple ships communicate with each other within a certain area. DLSA computes collision risk based on the information received from neighboring ships. However, DLSA suffers from Quasi-Local Minimum (QLM, which prevents a ship from changing course even when a collision risk arises. In our study, we developed the Distributed Tabu Search Algorithm (DTSA. DTSA uses a tabu list to escape from QLM that also exploits a modified cost function and enlarged domain of next-intended courses to increase its efficiency. We conducted experiments to compare the performance of DLSA and DTSA. The results showed that DTSA outperformed DLSA.

  13. Cash flow statement in financial statement analysis for small and medium sized enterprises

    OpenAIRE

    Hyvönen, Valtteri

    2016-01-01

    BACKGROUND AND MOTIVATION A new EU's accounting directive (2013/34/EU) focuses on the reliefs for financial statement disclosures of SMEs. Although directive 2013/34/EU is not taking a stand on cash flow preparation, in Finland a working group set by the Ministry of employment and economy has proposed that only large companies would be obliged to prepare cash flow statement as a part of financial statement. The Finnish parliament accepted the proposal in the part of renewed accounting law...

  14. 21 CFR 201.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Statement of identity. 201.61 Section 201.61 Food...: GENERAL LABELING Labeling Requirements for Over-the-Counter Drugs § 201.61 Statement of identity. (a) The... features a statement of the identity of the commodity. (b) Such statement of identity shall be in terms...

  15. 21 CFR 801.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Statement of identity. 801.61 Section 801.61 Food... DEVICES LABELING Labeling Requirements for Over-the-Counter Devices § 801.61 Statement of identity. (a... principal features a statement of the identity of the commodity. (b) Such statement of identity shall be...

  16. 7 CFR 1980.445 - Periodic financial statements and audits.

    Science.gov (United States)

    2010-01-01

    ... the lender's analysis of the statements to the Agency. (a) Audited financial statements. Except as... 7 Agriculture 14 2010-01-01 2009-01-01 true Periodic financial statements and audits. 1980.445... Program § 1980.445 Periodic financial statements and audits. All borrowers will be required to...

  17. 28 CFR 10.2 - Language of registration statement.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Language of registration statement. 10.2... ON ACTIVITIES WITHIN THE UNITED STATES Registration Statement § 10.2 Language of registration statement. Registration statements must be in English if possible. If in a foreign language they must...

  18. 40 CFR 156.68 - First aid statement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false First aid statement. 156.68 Section... aid statement. (a) Product as sold and distributed. Each product must bear a first aid statement if... with water prior to use, the label may also include a statement describing how the first aid...

  19. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    Science.gov (United States)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  20. Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel

    CERN Document Server

    Singh, Raju

    2011-01-01

    The security of bio-metric information - finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.

  1. Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel

    Directory of Open Access Journals (Sweden)

    Raju Singh

    2011-03-01

    Full Text Available The security of bio-metric information – finger print, retina mapping, DNA mapping and some otherchemical and biological modified genes related information - transfer through low bandwidth andunreliable or covert channel is challenging task. Therefore, Security of biometric information is essentialrequirement in this fast developing communication world. Thus, in this paper, we propose efficient andeffective mechanism for confidentiality and authentication for biometric information transmitted by usingarithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed ofencryption, decryption and authentication process. It uses arithmetic encoding scheme and public keycryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.

  2. Council approves statement on natural hazards

    Science.gov (United States)

    As a scientific society, AGU may adopt positions of advocacy on geophysical science isues based on their intrinsic merits and needs. On December 18, 1996, the AGU Council approved a Union position statement regarding scientific research and education in natural hazards. The complete position statement follows and also is posted at the Union Web Site, http://www.agu.org. Other Union position statements and information about proposing a position statement are in the AGU Handbook and at the Union Web Site.Few locations on Earth are immune from droughts, storms, floods, fires, earthquakes, landslides, tsunamis, volcanic eruptions, sea level changes, water course changes, atmospheric electrical storms, and impacts from comets and asteroids. Humans and technological systems are also threatened by natural hazards that occur in space. The effects of space weather, for example, can wreak havoc with the satellites we use to provide communications, weather forecasts, and defense and positioning information.

  3. Financial Statement Analysis for Nonprofit Organizations

    OpenAIRE

    Travaglini, Claudio

    2007-01-01

    A financial statement analysis framework for nonprofit organizations is proposed, based on Nonprofit Commission of Certified Public Accountants Association (Commissione Aziende Nonprofit Ordine Nazionale Dottori Commercialisti) for Italian Nonprofits.

  4. Briefing statement : Waubay Wetland Management District

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This briefing statement details the Waubay National Wildlife Refuge, staff, funding, history, refuges facts and maps, general management, public use and depredation...

  5. Annual report and accounting statements 2007: ELETROBRAS

    International Nuclear Information System (INIS)

    This document reports the actives of the ELETROBRAS during the year 2007 related to: electricity market, international activities, strategic planning, financial indicators, business analysis, relationship with investors, energy marketing, operational research, technological development, financial statements, social responsibility and environment

  6. Online, Batch and CICS Social Security Statement

    Data.gov (United States)

    Social Security Administration — A database that contains client preference information for the SSA initiated Social Security Statement as well as other data including SSN, disposition for paper SS...

  7. DECWEB - Internet Fiscal Statement Submission

    Directory of Open Access Journals (Sweden)

    Mihai Ianciu

    2009-12-01

    Full Text Available

    The latest technologies are used not only in business, considered the most dynamic field of activity, but also in Governmental strategies of interaction with the civil society and  the business environment. The governmental functional and technological requirements created new concepts and approaches of electronic business (G2G, G2B, and G2C. In Romania, the Ministry of Communications and Information Technology was the trend setter. It developed a large number of proofs of concept and pilot projects covering a wide area of services that needed to evolve electronically. Together with the Ministry of Public Finance, it defined the requirements and specifications for DECWEB, the programme that allows companies to submit their fiscal statements via Internet.

    DECWEB system is a keystone programme for the Ministry of Public Finance on its way towards moving administration and services for society to information age. Highly awarded, the first DECWEB initiative was a successful proof of concept and it needed to be upgraded to a new professional version with extended functionalities, higher flexibility and advanced security mechanisms. This paper describes the DECWEB project and how technology and professional services enhanced Governmental activities, why the project was such a success and how it will evolve.

  8. DECWEB - Internet Fiscal Statement Submission

    Directory of Open Access Journals (Sweden)

    Mihai Ianciu

    2009-12-01

    Full Text Available The latest technologies are used not only in business, considered the most dynamic field of activity, but also in Governmental strategies of interaction with the civil society and  the business environment. The governmental functional and technological requirements created new concepts and approaches of electronic business (G2G, G2B, and G2C. In Romania, the Ministry of Communications and Information Technology was the trend setter. It developed a large number of proofs of concept and pilot projects covering a wide area of services that needed to evolve electronically. Together with the Ministry of Public Finance, it defined the requirements and specifications for DECWEB, the programme that allows companies to submit their fiscal statements via Internet. DECWEB system is a keystone programme for the Ministry of Public Finance on its way towards moving administration and services for society to information age. Highly awarded, the first DECWEB initiative was a successful proof of concept and it needed to be upgraded to a new professional version with extended functionalities, higher flexibility and advanced security mechanisms. This paper describes the DECWEB project and how technology and professional services enhanced Governmental activities, why the project was such a success and how it will evolve.

  9. Hilar cholangiocarcinoma: expert consensus statement.

    Science.gov (United States)

    Mansour, John C; Aloia, Thomas A; Crane, Christopher H; Heimbach, Julie K; Nagino, Masato; Vauthey, Jean-Nicolas

    2015-08-01

    An American Hepato-Pancreato-Biliary Association (AHPBA)-sponsored consensus meeting of expert panellists met on 15 January 2014 to review current evidence on the management of hilar cholangiocarcinoma in order to establish practice guidelines and to agree consensus statements. It was established that the treatment of patients with hilar cholangiocarcinoma requires a coordinated, multidisciplinary approach to optimize the chances for both durable survival and effective palliation. An adequate diagnostic and staging work-up includes high-quality cross-sectional imaging; however, pathologic confirmation is not required prior to resection or initiation of a liver transplant trimodal treatment protocol. The ideal treatment for suitable patients with resectable hilar malignancy is resection of the intra- and extrahepatic bile ducts, as well as resection of the involved ipsilateral liver. Preoperative biliary drainage is best achieved with percutaneous transhepatic approaches and may be indicated for patients with cholangitis, malnutrition or hepatic insufficiency. Portal vein embolization is a safe and effective strategy for increasing the future liver remnant (FLR) and is particularly useful for patients with an FLR of biliary cancers. PMID:26172136

  10. Statement of Agreements Registered With The Agency

    International Nuclear Information System (INIS)

    This document contains a statement of all the agreements which had been registered with the Agency by 30 June 1960 under the Regulations for the Registration of Agreements adopted by the Board of Governors in implementation of Article XXII. B of the Statute. In compliance with Article VI of the Regulations this statement is hereby transmitted to all Members of the Agency for their information. A copy is also being sent to the Secretary-General of the United Nations

  11. Financial Statements and book-closing

    OpenAIRE

    Boušová, Kateřina

    2013-01-01

    The bachelor thesis deals with the process of creating financial statement preceded by certain preparation works and closing of individual accounts. In its initial part, the thesis describes legal regulations governing the area of the financial statement process. Then it informs about the individual steps of preparation works, which precede closing of accounts. These operations are important for objective accuracy and completeness of accountancy. Next part of the thesis describes accounting s...

  12. How to Write an Outcome Statement.

    Science.gov (United States)

    Dickerson, Pamela S

    2015-09-01

    Educators within the health professions are increasingly asked to demonstrate outcomes of educational interventions. Within academia and clinical practice, educators are expected to measure, monitor, and, in many cases, report outcomes of their work. As continuing education transitions to a more deliberate emphasis on outcomes, common questions include how to identify and measure outcomes and how to write an outcome statement. This article will focus on how to write an outcome statement. PMID:26352037

  13. Transparency in Central Bank Financial Statement Disclosures

    OpenAIRE

    Kenneth Sullivan

    2000-01-01

    The IMF's development of the Code of Good Practices on Transparency in Monetary and Financial Policies and the introduction of safeguards assessments have increased emphasis on transparency of the disclosures made in central bank financial statements. This paper, which updates WP/00/186, looks at the disclosure requirements for central banks under International Financial Reporting Standards and provides practical guidance for those responsible for preparing central bank financial statements.

  14. The Benefits of Financial Statement Comparability

    OpenAIRE

    de Franco, Gus; Kothari, S.P.; Verdi, Rodrigo

    2011-01-01

    Investors, regulators, academics, and researchers all emphasize the importance of financial statement comparability. However, an empirical construct of comparability is typically not specified. In addition, little evidence exists on the benefits of comparability to users. This study attempts to fill these gaps by developing a measure of financial statement comparability. Empirically, this measure is positively related to analyst following and forecast accuracy, and negatively related to analy...

  15. LEGAL-EASE:Analyzing Chinese Financial Statements

    Institute of Scientific and Technical Information of China (English)

    EDWARD; MA

    2008-01-01

    In this article,we will focus on under- standing and analyzing the typical accounts of Chinese financial statements,including the balance sheet and income statement. Accounts are generally incorrectly prepared. This can be due to several factors,incom- petence,as well as more serious cases of deliberate attempts to deceive.Regardless, accounts can be understood and errors or specific acts of misrepresentation uncovered. We will conduct some simple analysis to demonstrate how these can be spotted.

  16. Is the statement of Murphy's Law valid?

    OpenAIRE

    Chatterjee, Atanu

    2015-01-01

    Murphy's Law is $not$ a law in the formal sense yet popular science often compares it with the Second Law of Thermodynamics as both the statements point toward a more disorganized state with time. In this paper, we first construct a mathematically equivalent statement for Murphy's Law and then disprove it using the intuitive idea that energy differences will level off along the paths of steepest descent, or along trajectories of least action.

  17. Culture and Corporate Governance Statement Disclosure

    OpenAIRE

    Theo Christopher; Salleh Hassan

    2005-01-01

    This study examines the influence of culture on Corporate Governance Statement disclosure in the annual reports of the major airline companies in Malaysia and Australia. The cultural research of Hofstede (1980) and the accounting value dimensions of Gray (1988) imply that Malaysian Airlines, from a large power distance country, will disclose less Corporate Governance Statement information in their annual report than Qantas Airlines, from a small power distance country. The results obtained fr...

  18. New pattern theorems for square lattice self-avoiding walks and self-avoiding polygons

    International Nuclear Information System (INIS)

    A general pattern theorem for weighted self-avoiding polygons (SAPs) and self-avoiding walks (SAWs) in Z2 is obtained. The pattern theorem for SAPs fits into the general framework of the pattern theorem for lattice clusters introduced by Madras (1999 Ann. Comb. 3 357-84). Note that, unlike other pattern theorems proved for SAPs, this pattern theorem does not rely on first establishing a relationship between SAPs and SAWs. These results are applied to obtain pattern theorems for self-interacting SAPs and self-interacting SAWs

  19. BELTracker: evidence sentence retrieval for BEL statements.

    Science.gov (United States)

    Rastegar-Mojarad, Majid; Komandur Elayavilli, Ravikumar; Liu, Hongfang

    2016-01-01

    Biological expression language (BEL) is one of the main formal representation models of biological networks. The primary source of information for curating biological networks in BEL representation has been literature. It remains a challenge to identify relevant articles and the corresponding evidence statements for curating and validating BEL statements. In this paper, we describe BELTracker, a tool used to retrieve and rank evidence sentences from PubMed abstracts and full-text articles for a given BEL statement (per the 2015 task requirements of BioCreative V BEL Task). The system is comprised of three main components, (i) translation of a given BEL statement to an information retrieval (IR) query, (ii) retrieval of relevant PubMed citations and (iii) finding and ranking the evidence sentences in those citations. BELTracker uses a combination of multiple approaches based on traditional IR, machine learning, and heuristics to accomplish the task. The system identified and ranked at least one fully relevant evidence sentence in the top 10 retrieved sentences for 72 out of 97 BEL statements in the test set. BELTracker achieved a precision of 0.392, 0.532 and 0.615 when evaluated with three criteria, namely full, relaxed and context criteria, respectively, by the task organizers. Our team at Mayo Clinic was the only participant in this task. BELTracker is available as a RESTful API and is available for public use.Database URL: http://www.openbionlp.org:8080/BelTracker/finder/Given_BEL_Statement. PMID:27173525

  20. Avoiding Deontic Explosion by Contextually Restricting Aggregation

    Science.gov (United States)

    Meheus, Joke; Beirlaen, Mathieu; van de Putte, Frederik

    In this paper, we present an adaptive logic for deontic conflicts, called P2.1 r , that is based on Goble's logic SDL a P e - a bimodal extension of Goble's logic P that invalidates aggregation for all prima facie obligations. The logic P2.1 r has several advantages with respect to SDL a P e. For consistent sets of obligations it yields the same results as Standard Deontic Logic and for inconsistent sets of obligations, it validates aggregation "as much as possible". It thus leads to a richer consequence set than SDL a P e. The logic P2.1 r avoids Goble's criticisms against other non-adjunctive systems of deontic logic. Moreover, it can handle all the 'toy examples' from the literature as well as more complex ones.

  1. Mars Rover Local Navigation And Hazard Avoidance

    Science.gov (United States)

    Wilcox, B. H.; Gennery, D. B.; Mishkin, A. H.

    1989-03-01

    A Mars rover sample return mission has been proposed for the late 1990's. Due to the long speed-of-light delays between Earth and Mars, some autonomy on the rover is highly desirable. JPL has been conducting research in two possible modes of rover operation, Computer-Aided Remote Driving and Semiautonomous Navigation. A recently-completed research program used a half-scale testbed vehicle to explore several of the concepts in semiautonomous navigation. A new, full-scale vehicle with all computational and power resources on-board will be used in the coming year to demonstrate relatively fast semiautonomous navigation. The computational and power requirements for Mars rover local navigation and hazard avoidance are discussed.

  2. Avoidable cancers in the Nordic countries. Radiation

    DEFF Research Database (Denmark)

    Winther, J F; Ulbak, Kaare; Dreyer, L;

    1997-01-01

    countries occurs at an average effective dose per capita per year of about 3 mSv (Iceland, 1.1 mSv) from natural sources, and about 1 mSv from man-made sources. While the natural sources are primarily radon in indoor air, natural radionuclides in food, cosmic radiation and gamma radiation from soil and......Exposure to solar and ionizing radiation increases the risk for cancer in humans. Some 5% of solar radiation is within the ultraviolet spectrum and may cause both malignant melanoma and non-melanocytic skin cancer; the latter is regarded as a benign disease and is accordingly not included in our...... estimation of avoidable cancers. Under the assumption that the rate of occurrence of malignant melanoma of the buttocks of both men and women and of the scalp of women would apply to all parts of the body in people completely unexposed to solar radiation, it was estimated that approximately 95% of all...

  3. Avoidable cancers in the Nordic countries. Radiation

    DEFF Research Database (Denmark)

    Winther, J F; Ulbak, Kaare; Dreyer, L; Pukkala, E; Osterlind, A

    1997-01-01

    estimated that the exposure of the Nordic populations to natural sources of ionizing radiation other than radon and to medical sources will each give rise to an annual total of 2120 cancers at various sites. For all types of ionizing radiation, the annual total will be 4420 cancer cases, or 3.9% of all......Exposure to solar and ionizing radiation increases the risk for cancer in humans. Some 5% of solar radiation is within the ultraviolet spectrum and may cause both malignant melanoma and non-melanocytic skin cancer; the latter is regarded as a benign disease and is accordingly not included in our...... estimation of avoidable cancers. Under the assumption that the rate of occurrence of malignant melanoma of the buttocks of both men and women and of the scalp of women would apply to all parts of the body in people completely unexposed to solar radiation, it was estimated that approximately 95% of all...

  4. Weakly directed self-avoiding walks

    CERN Document Server

    Bacher, Axel

    2010-01-01

    We define a new family of self-avoiding walks (SAW) on the square lattice, called weakly directed walks. These walks have a simple characterization in terms of the irreducible bridges that compose them. We determine their generating function. This series has a complex singularity structure and in particular, is not D-finite. The growth constant is approximately 2.54 and is thus larger than that of all natural families of SAW enumerated so far (but smaller than that of general SAW, which is about 2.64). We also prove that the end-to-end distance of weakly directed walks grows linearly. Finally, we study a diagonal variant of this model.

  5. Collision Avoidance of Trains Using Arm7

    Directory of Open Access Journals (Sweden)

    Dr. K. R. R. Mohan Rao

    2015-11-01

    Full Text Available Railways are the popular mode of Transport in almost all major cities of the World. Railways are the most widely used and comfortable modes of transportation system. The major cause for railway accidents is collision of trains on the same track. The main aim of this anti collision system is to identify collision points and to report these error cases to main control room nearer to the station as well as grid control station. Majority of accidents occurred due to improper communication among the network between drivers and control room, due to wrong signaling, worst atmospheric condition, immediate change of route. The train driver doesn’t get proper information in time leading to hazardous situations. So this system by using zigbee protocol provides communication in between trains, which provide information or track id of one train to another train to avoid collision.

  6. Artifacts in CT: recognition and avoidance.

    Science.gov (United States)

    Barrett, Julia F; Keat, Nicholas

    2004-01-01

    Artifacts can seriously degrade the quality of computed tomographic (CT) images, sometimes to the point of making them diagnostically unusable. To optimize image quality, it is necessary to understand why artifacts occur and how they can be prevented or suppressed. CT artifacts originate from a range of sources. Physics-based artifacts result from the physical processes involved in the acquisition of CT data. Patient-based artifacts are caused by such factors as patient movement or the presence of metallic materials in or on the patient. Scanner-based artifacts result from imperfections in scanner function. Helical and multisection technique artifacts are produced by the image reconstruction process. Design features incorporated into modern CT scanners minimize some types of artifacts, and some can be partially corrected by the scanner software. However, in many instances, careful patient positioning and optimum selection of scanning parameters are the most important factors in avoiding CT artifacts. PMID:15537976

  7. Mars rover local navigation and hazard avoidance

    Science.gov (United States)

    Wilcox, B. H.; Gennery, D. B.; Mishkin, A. H.

    1989-01-01

    A Mars rover sample return mission has been proposed for the late 1990's. Due to the long speed-of-light delays between earth and Mars, some autonomy on the rover is highly desirable. JPL has been conducting research in two possible modes of rover operation, Computer-Aided Remote Driving and Semiautonomous Navigation. A recently-completed research program used a half-scale testbed vehicle to explore several of the concepts in semiautonomous navigation. A new, full-scale vehicle with all computational and power resources on-board will be used in the coming year to demonstrate relatively fast semiautonomous navigation. The computational and power requirements for Mars rover local navigation and hazard avoidance are discussed.

  8. Obstacle Avoiding Robot – A Promising One

    Directory of Open Access Journals (Sweden)

    RAKESH CHANDRA KUMAR

    2013-04-01

    Full Text Available In today’s world ROBOTICS is a fast growing and interesting field. ROBOT has sufficient intelligence to cover the maximum area of provided space. It has an infrared sensor which are used to sense the obstacles coming in between the path of ROBOT. It will move in a particular direction and avoid the obstacle which is coming in its path.Autonomous Intelligent Robots are robots that can perform desired tasks in unstructured environments without continuous human guidance. The minimum number of gearmotor allows the walking robot to minimize the power consumption while construct a program that can produce coordination of multi-degree of freedom for the movement of the robot. It is found that two gearmotors are sufficient to produce the basic walking robot and one voltage regulators are needed to control the load where it is capable of supplying enough current to drive two gearmotors for each wheel.

  9. Experiential Avoidance and Technological Addictions in Adolescents.

    Science.gov (United States)

    García-Oliva, Carlos; Piqueras, José A

    2016-06-01

    Background and aims This study focuses on the use of popular information and communication technologies (ICTs) by adolescents: the Internet, mobile phones, and video games. The relationship of ICT use and experiential avoidance (EA), a construct that has emerged as underlying and transdiagnostic to a wide variety of psychological problems, including behavioral addictions, is examined. EA refers to a self-regulatory strategy involving efforts to control or escape from negative stimuli such as thoughts, feelings, or sensations that generate strong distress. This strategy, which may be adaptive in the short term, is problematic if it becomes an inflexible pattern. Thus, the aim of this study was to explore whether EA patterns were associated with addictive or problematic use of ICT in adolescents. Methods A total of 317 students of the Spanish southeast between 12 and 18 years old were recruited to complete a questionnaire that included questions about general use of each ICTs, an experiential avoidance questionnaire, a brief inventory of the Big Five personality traits, and specific questionnaires on problematic use of the Internet, mobile phones, and video games. Results Correlation analysis and linear regression showed that EA largely explained results regarding the addictive use of the Internet, mobile phones, and video games, but not in the same way. As regards gender, boys showed a more problematic use of video games than girls. Concerning personality factors, conscientiousness was related to all addictive behaviors. Discussion and conclusions We conclude that EA is an important construct that should be considered in future models that attempt to explain addictive behaviors. PMID:27363463

  10. Nuclear safety policy statement in korea

    International Nuclear Information System (INIS)

    Full text: Wide varieties of programs to enhance nuclear safety have been established and implemented by the Korean government in accordance with the Nuclear Safety Policy Statement announced in September 1994. The policy statement was intended to set the long-term policy goals for maintaining and achieving high-level of nuclear safety and also help the public understand the national policy and a strong will of the government toward nuclear safety. It has been recognized as very effective in developing safety culture in nuclear-related organizations and also enhancing nuclear safety in Korea. However, ageing of operating nuclear power plants and increasing of new nuclear facilities have demanded a new comprehensive national safety policy to cover the coming decade, taking the implementation results of the policy statement of 1994 and the changing environment of nuclear industries into consideration. Therefore, the results of safety policy implementation have been reviewed and, considering changing environment and future prospects, a new nuclear safety policy statement as a highest level national policy has been developed. The implementation results of 11 regulatory policy directions such as the use of Probabilistic Safety Assessment, introduction of Periodic Safety Review, strengthening of safety research, introduction of Risk Based Regulation stipulated in the safety policy statement of 1994 were reviewed and measures taken after various symposia on nuclear safety held in Nuclear Safety Days since 1995 were evaluated. The changing international and domestic environment of nuclear industry were analysed and future prospects were explored. Based on the analysis and review results, a draft of new nuclear safety policy statement was developed. The draft was finalized after the review of many prominent experts in Korea. Considering changing environment and future prospects, new policy statement that will show government's persistent will for nuclear safety has been

  11. Confidentiality and the physician-patient relationship -- ethical reflections from a surgical waiting room.

    Science.gov (United States)

    Clark, Peter A

    2002-11-01

    The physician-patient relationship is the primary focus of ethics in medicine. It is both a personal and a professional relationship that is founded on trust, confidence, dignity and mutual respect. Trust is the bridge to the physician-patient relationship, and the burden is on the physician not only to expect the patient's trust but also to build a solid foundation upon which the patient can place his or her trust. Great strides have been made by physicians in refining the physician-patient relationship especially in understanding and respecting the patients' right of self-determination regarding medical decision-making and protecting their rights of privacy and confidentiality. However, further refinements are needed on both sides regarding this relationship. Breaches of confidentiality are occurring in places like surgical waiting rooms and as a result, the physician-patient relationship is being damaged. This article identifies some legitimate concerns and offers some concrete solutions so that the physician-patient relationship can be further refined and the virtues and rights that support it can be reinforced. PMID:12444393

  12. Contractual obligations and the sharing of confidential health information in sport.

    Science.gov (United States)

    Anderson, L

    2008-09-01

    As an employee, a sports doctor has obligations to their employer, but also professional and widely accepted obligations of a doctor to the patient (in this case the individual team member). The conflict is evident when sports doctors are asked by an athlete to keep personal health information confidential from the coach and team management, and yet both doctor and athlete have employment contracts specifying that such information shall be shared. Recent research in New Zealand shows that despite the presence of an employment contract, there appears to be a wide range of behaviours among sports doctors when an athlete requests that information about them be kept from team management. Many seem willing to honour requests to keep health information about the athlete confidential, thereby being in breach of the employment contract, while others insist on informing team management against the wishes of the athlete. There are a number of potential solutions to this dilemma from forcing doctors to meet their contractual obligations, to limiting the expectations of the employment contract. This paper suggests that at times it may be appropriate to do both, making the position of the doctor clearer and supporting the ability of this group to resist pressure by coaches and management through having a robust code of ethics. PMID:18757625

  13. An Integrated Algorithm supporting Confidentiality and Integrity for secured Access and Storage of DICOM Images

    Directory of Open Access Journals (Sweden)

    Suresh Jaganathan

    2012-04-01

    Full Text Available In healthcare industry, the patient\\'s medical data plays a vital role because diagnosis of any ailments is done by using those data. The high volume of medical data leads to scalability and maintenance issues when using health-care provider\\'s on-site picture archiving and communication system (PACS and network oriented storage system. Therefore a standard is needed for maintaining the medical data and for better diagnosis. Since the medical data reflects in a similar way to individuals’ personal information, secrecy should be maintained. Maintaining secrecy can be done by encrypting the data, but as medical data involves images and videos, traditional text based encryption/decryption schemes are not adequate for providing confidentiality. In this paper, we propose an algorithm for securing the DICOM format medical archives by providing better confidentiality and maintaining their integrity. Our contribution in this algorithm is of twofold: (1 Development of Improved Chaotic based Arnold Cat Map for encryption/decryption of DICOM files and (2 Applying a new hash algorithm based on chaotic theory for those encrypted files for maintaining integrity. By applying this algorithm, the secrecy of medical data is maintained. The proposed algorithm is tested with various DICOM format image archives by studying the following parameters i PSNR - for quality of images and ii Key - for security.

  14. A data-hiding technique with authentication, integration, and confidentiality for electronic patient records.

    Science.gov (United States)

    Chao, Hui-Mei; Hsu, Chin-Ming; Miaou, Shaou-Gang

    2002-03-01

    A data-hiding technique called the "bipolar multiple-number base" was developed to provide capabilities of authentication, integration, and confidentiality for an electronic patient record (EPR) transmitted among hospitals through the Internet. The proposed technique is capable of hiding those EPR related data such as diagnostic reports, electrocardiogram, and digital signatures from doctors or a hospital into a mark image. The mark image could be the mark of a hospital used to identify the origin of an EPR. Those digital signatures from doctors and a hospital could be applied for the EPR authentication. Thus, different types of medical data can be integrated into the same mark image. The confidentiality is ultimately achieved by decrypting the EPR related data and digital signatures with an exact copy of the original mark image. The experimental results validate the integrity and the invisibility of the hidden EPR related data. This newly developed technique allows all of the hidden data to be separated and restored perfectly by authorized users. PMID:11936596

  15. Avoidance orientation moderates the effect of threatening messages

    NARCIS (Netherlands)

    Riet, van 't J.P.; Ruiter, R.A.C.; Vries, de H.

    2012-01-01

    This study investigated the influence of individual differences in people's dispositional avoidance orientation on the persuasive effects of low- and high-threat messages promoting moderate drinking. First, participents (N = 99) individual differences in avoidance orientation were assessed, after wh

  16. US Forest Service Aerial Fire Retardant Hydrographic Avoidance Areas: Aquatic

    Data.gov (United States)

    US Forest Service, Department of Agriculture — A map services on the www depicting aerial retardant avoidance areas for hydrographic feature data. Aerial retardant avoidance area for hydrographic feature data...

  17. [What type of avoidance for peanut allergic children?].

    Science.gov (United States)

    Feuillet-Dassonval, C; Agne, P-S-A; Rancé, F; Bidat, E

    2006-09-01

    We analyzed, from the literature, the balance benefit/risk of a strict avoidance of peanut in children with peanut allergy. The benefits of a strict avoidance diet seem limited: reactions to the low doses and to the peanut oil refined are rare and most often slight. It is not proven that a strict avoidance facilitates the cure of allergy. On the other hand, strict avoidance could induce a worsening of allergy, with deterioration of quality of life, creation of food neophobia. In case of cure of allergy, it is difficult to normalize the diet after a strict avoidance. Outside of the rare sensitive patients to a very low dose of peanut, for which a strict avoidance is counseled, the report benefits risk is in favor of the prescription of adapted avoidance to the eliciting dose. For the majority of the peanut allergic children, it seems to us that the avoidance can and must be limited to the non hidden peanut. PMID:16828543

  18. Facilitator--and Self-Directed Groups: A Statement-by-Statement Interaction Study

    Science.gov (United States)

    Conyne, Robert K.; Rapin, Lynn S.

    1977-01-01

    This study compared the effectiveness of facilitator-directed and self-directed personal growth group treatments toward inducing therapeutic verbal interaction. An interaction process analysis approach, the Hill Interaction Matrix (HIM) statement-by-statement system, was used to examine treatment differences. (Author)

  19. Unobserved Tax Avoidance and the Tax Elasticity of FDI

    OpenAIRE

    Egger, Peter; Merlo, Valeria; Wamser, Georg

    2014-01-01

    This paper investigates the tax responsiveness of multinational firms’ investment decisions in foreign countries, distinguishing firms that are able to avoid taxes (avoiders) from those that are not (non-avoiders). From a theoretical point of view, the tax responsiveness of firms crucially depends on this distinction. Empirically, however, a firm’s ability to avoid profit taxes is inherently unobservable to the researcher. To address this problem, we use a finite mixture modeling approach whi...

  20. Effects of optimism on creativity under approach and avoidance motivation

    OpenAIRE

    Icekson, Tamar; Roskes, Marieke; Moran, Simone

    2014-01-01

    Focusing on avoiding failure or negative outcomes (avoidance motivation) can undermine creativity, due to cognitive (e.g., threat appraisals), affective (e.g., anxiety), and volitional processes (e.g., low intrinsic motivation). This can be problematic for people who are avoidance motivated by nature and in situations in which threats or potential losses are salient. Here, we review the relation between avoidance motivation and creativity, and the processes underlying this relation. We highli...

  1. Relative valuation of alternative methods of tax avoidance

    OpenAIRE

    Inger, Kerry Katharine

    2012-01-01

    This paper examines the relative valuation of alternative methods of tax avoidance. Prior studies find that firm value is positively associated with overall measures of tax avoidance; I extend this research by providing evidence that investors distinguish between methods of tax reduction in their valuation of tax avoidance. The impact of tax avoidance on firm value is a function of tax risk, permanence of tax savings, tax planning costs, implicit taxes and contrasts in disclosures of tax re...

  2. Avoidance Learning: A Review of Theoretical Models and Recent Developments

    Directory of Open Access Journals (Sweden)

    Angelos-Miltiadis Krypotos

    2015-07-01

    contemporary theories of avoidance learning. Based on the theories, experimental findings and clinical observations reviewed, we distil key principles of how adaptive and maladaptive avoidance behavior is acquired and maintained. We highlight clinical implications of avoidance learning theories and describe intervention strategies that could reduce maladaptive avoidance and prevent its return. We end with a brief overview of recent developments and avenues for further research.

  3. Conjunctions and Collision Avoidance with Electrodynamic Tethers

    Science.gov (United States)

    Levin, E.

    2013-09-01

    Electrodynamic propulsion technology is currently in development by NASA, ESA, and JAXA for the purpose of affordable removal of large debris objects from LEO. At the same time, the Naval Research Laboratory is preparing a 3U CubeSat with a 1-km electrodynamic tether for a flight demonstration of electrodynamic propulsion. This type of propulsion does not require fuel. The electrodynamic thrust is the Lorentz force acting on the electric current in a long conductor (tether) in the geomagnetic field. Electrons are collected from the ambient plasma on one end and emitted back into the plasma from the other end. The electric current loop is closed through the ionosphere, as demonstrated in two previous flights. The vehicle is solar powered. To support safe navigation of electrodynamic tethers, proper conjunction analysis and collision avoidance strategies are needed. The typical lengths of electrodynamic tethers for near-term applications are measured in kilometers, and the conjunction geometry is very different from the geometry of conjunctions between compact objects. It is commonly thought that the collision cross-section in a conjunction between a tether and a compact object is represented by the product of the tether length and the size of the object. However, rigorous analysis shows that this is not the case, and that the above assumption leads to grossly overestimated collision probabilities. The paper will present the results of a detailed mathematical analysis of the conjunction geometry and collision probabilities in close approaches between electrodynamic tethers and compact objects, such as satellites, rocket bodies, and debris fragments. Electrodynamic spacecraft will not require fuel, and therefore, can thrust constantly. Their orbit transfers can take many days, but can result in major orbit changes, including large rotations of the orbital plane, both in the inclination and the node. During these orbit transfers, the electrodynamic spacecraft will

  4. 47 CFR 51.609 - Determination of avoided retail costs.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Determination of avoided retail costs. 51.609... (CONTINUED) INTERCONNECTION Resale § 51.609 Determination of avoided retail costs. (a) Except as provided in § 51.611, the amount of avoided retail costs shall be determined on the basis of a cost study...

  5. Deforestation, leakage and avoided deforestation policies: a spatial analysis

    OpenAIRE

    DELACOTE, Philippe; Elizabeth J. Z. Robinson; Roussel, Sebastien

    2015-01-01

    This paper analyses the impact of several avoided deforestation policies within a patchy forested landscape. Central is the idea that deforestation choices in one area influence deforestation decisions in nearby patches. We explore the interplay between forest landscapes comprising heterogeneous patches, localised spatial displacement, and avoided deforestation policies. Avoided deforestation policies at a landscape level are respectively: two Payments for Environmental Services (PES) policie...

  6. A missed scalp laceration causing avoidable sequelae

    Science.gov (United States)

    Basyuni, Shadi; Panayi, Andreana; Sharma, Valmiki; Santhanam, Vijay

    2016-01-01

    Introduction We present the case of an overlooked scalp laceration in an 81-year-old lady who presented with polytrauma following a fall down stairs. Complications that developed required more extensive treatment compared to what would have sufficed with early identification. Presentation of case Imaging on admission to hospital showed multiple vertebrae and rib fractures as well as a large cranial subcutaneous haematoma with no intracerebral bleed. Before the laceration was identified, the patient developed acute anaemia requiring transfusion. Continued reduction in haemoglobin levels called for a more thorough examination of the scalp. Investigation, following copious irrigation, revealed a large laceration. The presence of infection and necrotic tissue necessitated a general anaesthetic for debridement and closure. Disscussion Diagnostic errors are more common in patients presenting with multiple or severe injuries. Initial management in trauma cases should focus on more evident or life threatening injuries However, it is important that reflections and recommendations are continually made to reduce diagnostic errors, which are higher in polytraumatised patients. Various factors including haemodynamic instability and patient positioning added to the elusive nature of this wound. Adequate examination of lacerations requires thorough cleaning as coagulated blood and other material may obscure findings. This is particularly important in scalp lacerations where the overlying hair can form a barrier that is effective at hiding the wound edges. Conclusion This case highlights the importance of a thorough secondary survey; an effective examination technique would have avoided the need for extensive treatment to manage the sequelae of the missed scalp laceration. PMID:27088847

  7. Avoidable cancers in the Nordic countries. Occupation

    DEFF Research Database (Denmark)

    Dreyer, L; Andersen, A; Pukkala, E

    1997-01-01

    around the year 2000, with 1,890 among men and fewer than 25 among women. The proportions that could be avoided if industrial carcinogens were eliminated would be 70% of mesotheliomas, 20% of cancers of the nasal cavity and sinuses, 12% of lung cancers, 5% of laryngeal cancers, 2% of urinary bladder...... million people (3.7 million men and 0.2 million women) in the Nordic countries were potentially exposed to above-average levels of one or more verified industrial carcinogens. It is expected that these exposures will result in a total of about 1,900 new cases of cancer every year in the Nordic countries...... cancers, 1% of the leukaemias, and 1% of renal cancers. Overall, it is estimated that verified industrial carcinogens will account for approximately 3% of all cancers in men and less than 0.1% of all cancers in women in the Nordic countries around the year 2000. No attempt was made to estimate the...

  8. Avoiding selection bias in gravitational wave astronomy

    International Nuclear Information System (INIS)

    When searching for gravitational waves in the data from ground-based gravitational wave detectors, it is common to use a detection threshold to reduce the number of background events which are unlikely to be the signals of interest. However, imposing such a threshold will also discard some real signals with low amplitude, which can potentially bias any inferences drawn from the population of detected signals. We show how this selection bias is naturally avoided by using the full information from the search, considering both the selected data and our ignorance of the data that are thrown away, and considering all relevant signal and noise models. This approach produces unbiased estimates of parameters even in the presence of false alarms and incomplete data. This can be seen as an extension of previous methods into the high false rate regime where we are able to show that the quality of parameter inference can be optimized by lowering thresholds and increasing the false alarm rate. (paper)

  9. Approach-avoidance activation without anterior asymmetry

    Directory of Open Access Journals (Sweden)

    AnderoUusberg

    2014-03-01

    Full Text Available Occasionally, the expected effects of approach-avoidance motivation on anterior EEG alpha asymmetry fail to emerge, particularly in studies using affective picture stimuli. These null findings have been explained by insufficient motivational intensity of, and/or overshadowing interindividual variability within the responses to emotional pictures. These explanations were systematically tested using data from 70 students watching 5 types of affective pictures ranging from very pleasant to unpleasant. The stimulus categories reliably modulated self-reports as well as the amplitude of late positive potential, an ERP component reflecting orienting towards motivationally significant stimuli. The stimuli did not, however, induce expected asymmetry effects either for the sample or individual participants. Even while systematic stimulus-dependent individual differences emerged in self-reports as well as LPP amplitudes, the asymmetry variability was dominated by stimulus-independent interindividual variability. Taken together with previous findings, these results suggest that under some circumstances anterior asymmetry may not be an inevitable consequence of core affect. Instead, state asymmetry shifts may be overpowered by stable trait asymmetry differences and/or stimulus-independent yet situation-dependent interindividual variability, possibly caused by processes such as emotion regulation or anxious apprehension.

  10. Self-avoiding walks crossing a square

    International Nuclear Information System (INIS)

    We study a restricted class of self-avoiding walks (SAWs) which start at the origin (0, 0), end at (L, L), and are entirely contained in the square [0, L] x [0, L] on the square lattice Z2. The number of distinct walks is known to grow as λL2+o(L2). We estimate λ = 1.744 550 ± 0.000 005 as well as obtaining strict upper and lower bounds, 1.628 1/3). We also consider the model in which a weight or fugacity x is associated with each step of the walk. This gives rise to a canonical model of a phase transition. For x 1/μ it grows as L2. Here μ is the growth constant of unconstrained SAWs in Z2. For x = 1/μ we provide numerical evidence, but no proof, that the average walk length grows as L4/3. Another problem we study is that of SAWs, as described above, that pass through the central vertex of the square. We estimate the proportion of such walks as a fraction of the total, and find it to be just below 80% of the total number of SAWs. We also consider Hamiltonian walks under the same restriction. They are known to grow as τL2+o(L2) on the same L x L lattice. We give precise estimates for τ as well as upper and lower bounds, and prove that τ < λ

  11. The amygdala: securing pleasure and avoiding pain

    Directory of Open Access Journals (Sweden)

    Anushka B P Fernando

    2013-12-01

    Full Text Available The amygdala has traditionally been associated with fear, mediating the impact of negative emotions on memory. However, this view does not fully encapsulate the function of the amygdala, nor the impact that processing in this structure has on the motivational limbic corticostriatal circuitry of which it is an important structure. Here we discuss the interactions between different amygdala nuclei with cortical and striatal regions involved in motivation; interconnections and parallel circuitries that have become increasingly understood in recent years. We review the evidence that the amygdala stores memories that allow initially motivationally neutral stimuli to become associated through pavlovian conditioning with motivationally relevant outcomes which, importantly, can be either appetitive (e.g. food or aversive (e.g. electric shock. We also consider how different psychological processes supported by the amygdala such as conditioned reinforcement and punishment, conditioned motivation and suppression, and conditioned approach and avoidance behavior, are not only psychologically but also neurobiologically dissociable, being mediated by distinct yet overlapping neural circuits within the limbic corticostriatal circuitry. Clearly the role of the amygdala goes beyond encoding aversive stimuli to also encode the appetitive, requiring an appreciation of the amygdala’s mediation of both appetitive and fearful behavior through diverse psychological processes.

  12. Avoided valence transition in a plutonium superconductor.

    Science.gov (United States)

    Ramshaw, B J; Shekhter, Arkady; McDonald, Ross D; Betts, Jon B; Mitchell, J N; Tobash, P H; Mielke, C H; Bauer, E D; Migliori, Albert

    2015-03-17

    The d and f electrons in correlated metals are often neither fully localized around their host nuclei nor fully itinerant. This localized/itinerant duality underlies the correlated electronic states of the high-Tc cuprate superconductors and the heavy-fermion intermetallics and is nowhere more apparent than in the 5f valence electrons of plutonium. Here, we report the full set of symmetry-resolved elastic moduli of PuCoGa5--the highest Tc superconductor of the heavy fermions (Tc = 18.5 K)--and find that the bulk modulus softens anomalously over a wide range in temperature above Tc. The elastic symmetry channel in which this softening occurs is characteristic of a valence instability--therefore, we identify the elastic softening with fluctuations of the plutonium 5f mixed-valence state. These valence fluctuations disappear when the superconducting gap opens at Tc, suggesting that electrons near the Fermi surface play an essential role in the mixed-valence physics of this system and that PuCoGa5 avoids a valence transition by entering the superconducting state. The lack of magnetism in PuCoGa5 has made it difficult to reconcile with most other heavy-fermion superconductors, where superconductivity is generally believed to be mediated by magnetic fluctuations. Our observations suggest that valence fluctuations play a critical role in the unusually high Tc of PuCoGa5. PMID:25737548

  13. Avoiding sexual harassment liability in veterinary practices.

    Science.gov (United States)

    Lacroix, C A; Wilson, J F

    1996-05-15

    Harassment based on gender violates the rule of workplace equality established by Title VII of the Civil Rights Act and enforced by the EEOC. In 1986, the US Supreme Court, in Meritor Savings Bank v Vinson, established the criteria that must be met for a claim of hostile environment sexual harassment to be considered valid. Plaintiffs must show that they were subjected to conduct based on their gender, that it was unwelcome, and that it was severe and pervasive enough to alter their condition of employment, resulting in an abusive working environment. There have been few sexual harassment cases involving veterinary professionals, and it is our goal to help keep the number of filed actions to a minimum. The most effective way to avoid hostile environment sexual harassment claims is to confront the issue openly and to adopt a sexual harassment policy for the practice. When it comes to sexual harassment, an ounce of prevention is unquestionably worth a pound of cure. PMID:8641947

  14. Geoengineering to Avoid Overshoot: An Analysis of Uncertainty

    Science.gov (United States)

    Tanaka, Katsumasa; Cho, Cheolhung; Krey, Volker; Patt, Anthony; Rafaj, Peter; Rao-Skirbekk, Shilpa; Wagner, Fabian

    2010-05-01

    assumptions are used in the GAINS model to generate pollutants emissions scenarios. Such scenarios are combined with a set of GGI low mitigation scenarios and prescribed to the climate and carbon cycle model ACC2. ACC2 is employed to quantify the warming due to air pollution abatement and the geoengineering profile to avoid such a warming. Furthermore, the implications of such geoengineering interventions (e.g. ecosystem impact and adaptation capacity) are examined. References AMS (Americal Meteorological Society) (2009) A Policy Statement on 20 July 2009. http://www.ametsoc.org/policy/2009geoengineeringclimate_amsstatement.pdf Andreae (2005) Nature, 435, 1187-1190, doi:10.1038/nature03671. Crutzen (2006) Climatic Change, 77, 211-219. Kloster et al. (2009) Climate Dynamics, 33, doi:10.1007/s00382-009-0573-0. Meinshausen et al. (2009) Nature, 458, 1158-1162, doi:10.1038/nature08017. Raddatz and Tanaka (2010) Prepared for a re-submission to Geophysical Research Letters. Rasch et al. (2008) Philosophical Transactions of The Royal Society A, 366, 4007-4037, doi:10.1098/rsta.2008.0131. Riahi et al. (2007) Technological Forecasting and Social Change, 74, 887-935, doi:10.1016/j.techfore.2006.05.026. Robock (2008) Bulletin of the Atomic Scientists, 64, 14-18, doi: 10.2968/064002006. Tanaka (2008) Ph.D. thesis. International Max Planck Research School on Earth System Modelling, Hamburg, Germany. http://www.sub.uni-hamburg.de/opus/volltexte/2008/3654/ Tanaka et al. (2009) Geophysical Research Letters, 36, L16709, doi:10.1029/2009GL039642. Wigley (2008) Science, 314, 452-454, doi:10.1126/science.1131728.

  15. Why Do Consumers Avoid Certain Brands? : A Study of Brand Avoidance Within the Swedish Cosmetics Industry

    OpenAIRE

    Vong, Amy; Hellberg, Anna; Melander, Joanna

    2016-01-01

    Background - As of today, the positive forms of consumer-brand relationships have been intensively researched, whereas its counterpart has attained far less attention. Whilst current literature is focused on increasing positive brand equity, the knowledge of negative brand equity is sparse. When the brand-consumer relationship is negatively affected and the brand equity is unfavourable, rejection of a specific brand, namely brand avoidance might occur. This may affect companies negatively if ...

  16. Final environmental statement for the geothermal leasing program

    Energy Technology Data Exchange (ETDEWEB)

    1973-12-31

    This second of the four volumes of the Geothermal Leasing Program final impact statement contains the individual environmental statements for the leasing of federally owned geothermal resources for development in three specific areas: Clear Lake-Geysers; Mono Lake-Long Valley; and Imperial Valley, all in California. It also includes a summary of the written comments received and departmental responses relative to the Draft Environmental Impact Statement issued in 1971; comments and responses on the Draft Environmental Impact Statement; consultation and coordination in the development of the proposal and in the preparation of the Draft Environmental Statement; and coordination in the review of the Draft Environmental Statement.

  17. 49 CFR 510.3 - Compulsory process, the service thereof, claims for confidential treatment, and terms of compliance.

    Science.gov (United States)

    2010-10-01

    ... the Motor Vehicle Information and Cost Savings Act, as amended, 15 U.S.C. 1901 et seq.: (1) Subpoenas; (2) Information gathering hearings; (3) Administrative depositions; (4) General or special orders... confidentiality made during an information gathering hearing or an administrative deposition may be made orally...

  18. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997)...

  19. 21 CFR 170.102 - Confidentiality of information in a premarket notification for a food contact substance (FCN).

    Science.gov (United States)

    2010-04-01

    ... food contact substance (FCN). (a) During the 120-day period of the Food and Drug Administration (FDA... 21 Food and Drugs 3 2010-04-01 2009-04-01 true Confidentiality of information in a premarket notification for a food contact substance (FCN). 170.102 Section 170.102 Food and Drugs FOOD AND...

  20. How biological microtubules may avoid decoherence

    International Nuclear Information System (INIS)

    Full text: Entangled superpositions persisting for hundreds of milliseconds in protein assemblies such as microtubules (MTs) are proposed in biological functions, e.g. quantum computation relevant to consciousness in the Penrose-Hameroff 'Orch OR' model. Cylindrical polymers of the protein tubulin, MTs organize cell activities. The obvious question is how biological quantum states could avoid decoherence, e.g. in the brain at 37.6 degrees centigrade. Screening/sheelding: tubulin protein states/functions are governed by van der Waals London forces, quantum interactions among clouds of delocalizable electrons in nonpolar 'hydrophobic' intra-protein pockets screened from external van der Waals thermal interactions. Such pockets include amino acid resonance structures benzene and indole rings. (Anesthetic gases erase consciousness solely by interfering with London forces in hydrophobic pockets in various brain proteins). Hence tubulin states may act as superpositioned qubits also shielded at the MT level by counter-ion Debye plasma layers (due to charged C-termini tails on tubulin) and by water-ordering actin gels which embed MTs in a quasi-solid. Biological systems may also exploit thermodynamic gradients to give extremely low effective temperatures. Decoherence free subspaces: paradoxically, a system coupled strongly to its environment through certain degrees of freedom can effectively 'freeze' other degrees of freedom (quantum Zeno effect), enabling coherent superpositions and entanglement to persist. Metabolic energy supplied to MT collective dynamics (e.g. Froehlich coherence) can cause Bose-Einstein condenzation and counter decoherence as lasers avoid decoherence at room temperature. Topological quantum error correction: MT lattice structure reveals various helical winding paths through adjacent tubulins which follow the Fibonacci series. Propagation/interactions of quasi-particles along these paths may process information. As proposed by Kitaev (1997), various