WorldWideScience

Sample records for coalitions applied key

  1. Mobilizing Communities around HIV Prevention for Youth: How Three Coalitions Applied Key Strategies to Bring about Structural Changes

    Science.gov (United States)

    Chutuape, Kate S.; Willard, Nancy; Sanchez, Kenia; Straub, Diane M.; Ochoa, Tara N.; Howell, Kourtney; Rivera, Carmen; Ramos, Ibrahim; Ellen, Jonathan M.

    2010-01-01

    Increasingly, HIV prevention efforts must focus on altering features of the social and physical environment to reduce risks associated with HIV acquisition and transmission. Community coalitions provide a vehicle for bringing about sustainable structural changes. This article shares lessons and key strategies regarding how three community…

  2. Minority coalition governance in Denmark

    DEFF Research Database (Denmark)

    Christiansen, Flemming Juul; Pedersen, Helene Helboe

    2014-01-01

    in this share of coalition agreement-based laws. The analyses are based on unique data on legislative as well as governmental coalition agreements entered by three Danish governments with varying parliamentary strength. This study brings the blooming literature on coalition agreements one step further......Coalition governance is a challenge for political parties because it involves cooperation and compromises between parties that have different political goals and are competitors in political elections. Coalition coordination is crucial for the intra-coalitional cooperation of the governing parties....... A key element in coalition coordination is coalition agreements, which to a varying degree constrain the behaviour of the coalition partners. This article explores the share of laws that were precisely defined in government agreements and/or legislative agreements, and sets out to explain variation...

  3. Developmental Stages and Work Capacities of Community Coalitions: How Extension Educators Address and Evaluate Changing Coalition Needs

    Science.gov (United States)

    Nichols, Allison; Riffe, Jane; Peck, Terrill; Kaczor, Cheryl; Nix, Kelly; Faulkner-Van Deysen, Angela

    2014-01-01

    Extension educators provide resources to community coalitions. The study reported here adds to what is known about community coalitions and applies an assessment framework to a state-level coalition-based Extension program on healthy relationships and marriages. The study combines the Internal Coalition Outcome Hierarchy (ICOH) framework with four…

  4. Coalitional negotiation

    OpenAIRE

    Mauleon, Ana; Vannetelbosch, Vincent

    1999-01-01

    We develop a two-stage negotiation model to study the impact of costly inspections on both the coalition formation outcome and the per-member payoffs. In the first stage, the players are forming coalitions and inside each coalition formed the members share the coalition benefits. We adopt the largest consistent set (LCS) to predict which coalition structures are possibly stable. We also introduce a refinement,the largest cautious consistent set (LCCS). In the second stage, the inspection game...

  5. Agile Coalition Environment (ACE)

    National Research Council Canada - National Science Library

    McGuire, Michele; Daniel, Dale

    2004-01-01

    .... Interoperability is achieved across all applications, platforms, and security domains. ACE is presented as a network capability that can be applied to the Coalition Enterprise Information Exchange System (CENTRIXS...

  6. Building successful coalitions for promoting advance care planning.

    Science.gov (United States)

    Marchand, Lucille; Fowler, Kathryn J; Kokanovic, Obrad

    2006-01-01

    Advance care planning (ACP) has had few successful initiatives. This qualitative study explores the challenges and successes of an advance care planning coalition in Wisconsin called Life Planning 2000 using key informant interviews (n = 24) and grounded theory. Major themes included: commitment (the need for leadership, recruitment of key members, and funding); cohesiveness (disparate groups collaborating toward a common purpose), and outcomes (shift in paradigm from signing documents to process of advanced care planning, new-found collaborative relationships, and educational tool development). Coalitions need to define short-, intermediate-, and long-term goals that result in measurable outcomes and an evaluation process. Resources must be commensurate with goals. Strong leadership, paid staff adequate funding, and the collaboration of diverse groups working toward common goals are the basic requirements of a successful coalition.

  7. The paradoxes and promise of community coalitions.

    Science.gov (United States)

    Chavis, D M

    2001-04-01

    Community coalitions, as they are currently applied, are unique organizations whose ability to promote community change is different from other types of community organizations. This article explores those differences and elaborates how community coalitions can use those differences to transform conflict into greater capacity, equity, and justice. Concerns are also raised in this article about how community coalitions can intentionally and unintentionally protect the status quo and contain the empowerment of grassroots leadership and those of marginalized groups. There is a need for more theory, research, and discourse on how community coalitions can transform conflict into social change and how they can increase the power of grassroots and other citizen-lead organizations.

  8. Developing and maintaining state-wide adolescent pregnancy prevention coalitions: a preliminary investigation.

    Science.gov (United States)

    Nezlek, J B; Galano, J

    1993-09-01

    This paper presents the results of a study of state-wide adolescent pregnancy prevention coalitions. Key informants in five states throughout the southern United States were given semi-structured interviews regarding the adolescent pregnancy prevention coalitions in their states. From these interviews and other documents, conclusions were drawn regarding the nature and importance of the environments within which these coalitions operate, the universe of activities in which coalitions engage, and the stages of development of these coalitions. Katz and Kahn's model of social organizations served as the basis for understanding coalitions in terms of these three considerations. Future research should consider the utility of organizational models that can explain more fully the organization--committee hybrid structure that tends to characterize these coalitions.

  9. The Bigger, the Better: Coalitions in the GATT/WTO

    Directory of Open Access Journals (Sweden)

    Gabriel Cepaluni

    2012-12-01

    Full Text Available What does it take to make a coalition successful? Bigger coalitions are more likely to be successful because the GATT/WTO is a consensus-based institution and countries are informally penalized if they isolate themselves. Through a Bayesian statistical analysis, the article corroborates the above hypothesis. To further investigate the research question, qualitative case studies of the G-10 in the Uruguay Round and the Public Health Coalition in the Doha Round are conducted. These cases show that the more convincing the framing of a position, the better are the chances of coalitions keeping a large number of followers and supporters, thereby affecting their odds of success. By building a unique database and applying a new research design to the topic, the study rigorously tests theories about coalitions that had previously only been proposed but not empirically analyzed.

  10. A Qualitative Examination of the Implementation of a Community-Academic Coalition

    Science.gov (United States)

    Boydell, Katherine M.; Volpe, Tiziana

    2004-01-01

    Many recent grant initiatives have mandated coalition building as a key component of their health promotion efforts. Health service leaders are increasingly representing their organizations on coalitions and need to better understand the complexities involved in their creation and management. In this paper we focus on the implementation of a…

  11. An assessment of the Pacific Regional Cancer Coalition: outcomes and implications of a regional coalition internal and external assessment.

    Science.gov (United States)

    Sy, Angela U; Heckert, Karen A; Buenconsejo-Lum, Lee; Hedson, Johnny; Tamang, Suresh; Palafox, Neal

    2011-11-01

    The Pacific Regional Cancer Coalition (PRCC) provides regional leadership in the U.S. Affiliated Pacific Islands (USAPI) to implement the Regional Comprehensive Control Plan: 2007-2012, and to evaluate its coalition and partnerships. The Pacific Center of Excellence in the Elimination of Disparities (CEED), aims to reduce cancer disparities and conducts evaluation activities relevant to cancer prevention and control in the USAPI. The PRCC Self (internal) and Partner (external) Assessments were conducted to assess coalition functioning, regional and national partnerships, sustainability, and the role of regionalism for integrating all chronic disease prevention and control in the Pacific. Self-administered questionnaires and key informant telephone interviews with PRCC members (N=20), and representatives from regional and national partner organizations were administered (N=26). Validated multi item measures using 5-point scales on coalition and partnership characteristics were used. Chronbach's alphas and averages for the measures were computed. Internal coalition measures: satisfaction (4.2, SD=0.48) communication (4.0, SD=0.56), respect (4.0, SD=0.60) were rated more highly than external partnership measures: resource sharing (3.5, SD=0.74), regionalism (3.9, SD=0.47), use of findings (3.9, SD=0.50). The PRCC specifically identified its level of "collaboration" with external partners including Pacific CEED. External partners identified its partnership with the PRCC in the "coalition" stage. PRCC members and external partners are satisfied with their partnerships. All groups should continue to focus on building collaboration with partners to reflect a truly regional approach to sustain the commitment, the coalitions and the programming to reduce cancer in the USAPI. PRCC and partners should also work together to integrate all chronic disease prevention and control efforts in the Pacific.

  12. Course of Action Analysis for Coalition Operations

    National Research Council Canada - National Science Library

    Wagenhals, Lee W; Reid, Tom; Smillie, Robert J; Levis, Alexander H

    2001-01-01

    ...) of the Commander in Chief, United States Pacific Command. The goal of DSCCO is to apply and integrate organizational design concepts and decision support technologies in planning and executing multi-national coalition operations...

  13. Advocacy coalitions involved in California's menu labeling policy debate: Exploring coalition structure, policy beliefs, resources, and strategies.

    Science.gov (United States)

    Payán, Denise D; Lewis, LaVonna B; Cousineau, Michael R; Nichol, Michael B

    2017-03-01

    Advocacy coalitions often play an important role in the state health policymaking process, yet little is known about their structure, composition, and behavior. In 2008, California became the first state to enact a menu labeling law. Using the advocacy coalition framework, we examine different facets of the coalitions involved in California's menu labeling policy debate. We use a qualitative research approach to identify coalition members and explore their expressed beliefs and policy arguments, resources, and strategies by analyzing legislative documents (n = 87) and newspaper articles (n = 78) produced between 1999 and 2009. Between 2003 and 2008, six menu labeling bills were introduced in the state's legislature. We found the issue received increasing media attention during this period. We identified two advocacy coalitions involved in the debate-a public health (PH) coalition and an industry coalition. State organizations acted as coalition leaders and participated for a longer duration than elected officials. The structure and composition of each coalition varied. PH coalition leadership and membership notably increased compared to the industry coalition. The PH coalition, led by nonprofit PH and health organizations, promoted a clear and consistent message around informed decision making. The industry coalition, led by a state restaurant association, responded with cost and implementation arguments. Each coalition used various resources and strategies to advance desired outcomes. PH coalition leaders were particularly effective at using resources and employing advocacy strategies, which included engaging state legislators as coalition members, using public opinion polls and information, and leveraging media resources to garner support. Policy precedence and a local policy push emerged as important policymaking strategies. Areas for future research on the state health policymaking process are discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. The DELTA PREP Initiative: Accelerating Coalition Capacity for Intimate Partner Violence Prevention

    Science.gov (United States)

    Zakocs, Ronda; Freire, Kimberley E.

    2018-01-01

    Background The DELTA PREP Project aimed to build the prevention capacity of 19 state domestic violence coalitions by offering eight supports designed to promote prevention integration over a 3-year period: modest grant awards, training events, technical assistance, action planning, coaching hubs, the Coalition Prevention Capacity Assessment, an online workstation, and the online documentation support system. Objectives Using quantitative and qualitative data, we sought to explain how coalitions integrated prevention within their structures and functions and document how DELTA PREP supports contributed to coalitions’ integration process. Results We found that coalitions followed a common pathway to integrate prevention. First, coalitions exhibited precursors of organizational readiness, especially having prevention champions. Second, coalitions engaged in five critical actions: engaging in dialogue, learning about prevention, forming teams, soliciting input from the coalition, and action planning. Last, by engaging in these critical actions, coalitions enhanced two key organizational readiness factors—developing a common understanding of prevention and an organizational commitment to prevention. We also found that DELTA PREP supports contributed to coalitions’ abilities to integrate prevention by supporting learning about prevention, fostering a prevention team, and engaging in action planning by leveraging existing opportunities. Two DELTA PREP supports—coaching hubs and the workstation—did not work as initially intended. From the DELTA PREP experience, we offer several lessons to consider when designing future prevention capacity-building initiatives. PMID:26245934

  15. A Resolution Prover for Coalition Logic

    OpenAIRE

    Nalon, Cláudia; Zhang, Lan; Dixon, Clare; Hustadt, Ullrich

    2014-01-01

    We present a prototype tool for automated reasoning for Coalition Logic, a non-normal modal logic that can be used for reasoning about cooperative agency. The theorem prover CLProver is based on recent work on a resolution-based calculus for Coalition Logic that operates on coalition problems, a normal form for Coalition Logic. We provide an overview of coalition problems and of the resolution-based calculus for Coalition Logic. We then give details of the implementation of CLProver and prese...

  16. Advocacy Coalitions involved in California’s Menu Labeling Policy Debate: Exploring Coalition Structure, Policy Beliefs, Resources, and Strategies

    Science.gov (United States)

    Payán, Denise D.; Lewis, LaVonna B.; Cousineau, Michael R.; Nichol, Michael B.

    2017-01-01

    Advocacy coalitions often play an important role in the state health policymaking process, yet little is known about their structure, composition, and behavior. In 2008, California became the first state to enact a menu labeling law. Using the advocacy coalition framework, we examine different facets of the coalitions involved in California’s menu labeling policy debate. We use a qualitative research approach to identify coalition members and explore their expressed beliefs and policy arguments, resources, and strategies by analyzing legislative documents (n=87) and newspaper articles (n=78) produced between 1999 and 2009. Between 2003 and 2008, six menu labeling bills were introduced in the state’s legislature. We found the issue received increasing media attention during this period. We identified two advocacy coalitions involved in the debate—a public health (PH) coalition and an industry coalition. State organizations acted as coalition leaders and participated for a longer duration than elected officials. The structure and composition of each coalition varied. PH coalition leadership and membership notably increased compared to the industry coalition. The PH coalition, led by nonprofit PH and health organizations, promoted a clear and consistent message around informed decision making. The industry coalition, led by a state restaurant association, responded with cost and implementation arguments. Each coalition used various resources and strategies to advance desired outcomes. PH coalition leaders were particularly effective at using resources and employing advocacy strategies, which included engaging state legislators as coalition members, using public opinion polls and information, and leveraging media resources to garner support. Policy precedence and a local policy push emerged as important policymaking strategies. Areas for future research on the state health policymaking process are discussed. PMID:28161674

  17. A Resolution Prover for Coalition Logic

    Directory of Open Access Journals (Sweden)

    Cláudia Nalon

    2014-04-01

    Full Text Available We present a prototype tool for automated reasoning for Coalition Logic, a non-normal modal logic that can be used for reasoning about cooperative agency. The theorem prover CLProver is based on recent work on a resolution-based calculus for Coalition Logic that operates on coalition problems, a normal form for Coalition Logic. We provide an overview of coalition problems and of the resolution-based calculus for Coalition Logic. We then give details of the implementation of CLProver and present the results for a comparison with an existing tableau-based solver.

  18. Complexity in Coalition Operations: The Campaign of the Sixth Coalition Against Napoleon

    National Research Council Canada - National Science Library

    Turner, Kenneth

    2003-01-01

    The Campaign of the Sixth Coalition, from the Summer of 1813 until the abdication of Napoleon in April 1814, offers some important and valid insights into the successful execution of coalition warfare...

  19. Legislative coalitions with incomplete information.

    Science.gov (United States)

    Dragu, Tiberiu; Laver, Michael

    2017-03-14

    In most parliamentary democracies, proportional representation electoral rules mean that no single party controls a majority of seats in the legislature. This in turn means that the formation of majority legislative coalitions in such settings is of critical political importance. Conventional approaches to modeling the formation of such legislative coalitions typically make the "common knowledge" assumption that the preferences of all politicians are public information. In this paper, we develop a theoretical framework to investigate which legislative coalitions form when politicians' policy preferences are private information, not known with certainty by the other politicians with whom they are negotiating over what policies to implement. The model we develop has distinctive implications. It suggests that legislative coalitions should typically be either of the center left or the center right. In other words our model, distinctively, predicts only center-left or center-right policy coalitions, not coalitions comprising the median party plus parties both to its left and to its right.

  20. Rivalry of Advocacy Coalitions in the Czech Pension Reform

    Directory of Open Access Journals (Sweden)

    Potůček Martin

    2016-06-01

    Full Text Available The Czech Republic, as many other countries of Central and Eastern Europe, faced and is still facing a pension-reform challenge. The diversification of pension pillars led to the massive displacements of participant contributions from the public PAYG pension pillars to the newly constructed private, defined-contribution, fully-funded pillars. In the Czech Republic, the adoption of the relevant law was preceded by serious political conflict between supporters and opponents of this step (both among different political actors and among professionals. In an analysis of the conflict we critically apply the Advocacy Coalition Framework. We work mainly with the analysis of policy documents, public statements of the individual actors and an analysis of voting on the relevant law in both chambers of the Czech Parliament towards the identification of the crystallization process of two clear-cut coalitions between actors from both sides of the spectrum. The Advocacy Coalition Framework in exploring the dynamics of the public-policy process proved to be able to explain situations where there is sharp political conflict. Through the lens of the devil-shift of both camps (advocacy coalitions with different beliefs, each fell into extreme positions within the coalition to affirm the correctness of their arguments and positions.

  1. Measuring coalition functioning: refining constructs through factor analysis.

    Science.gov (United States)

    Brown, Louis D; Feinberg, Mark E; Greenberg, Mark T

    2012-08-01

    Internal and external coalition functioning is an important predictor of coalition success that has been linked to perceived coalition effectiveness, coalition goal achievement, coalition ability to support evidence-based programs, and coalition sustainability. Understanding which aspects of coalition functioning best predict coalition success requires the development of valid measures of empirically unique coalition functioning constructs. The goal of the present study is to examine and refine the psychometric properties of coalition functioning constructs in the following six domains: leadership, interpersonal relationships, task focus, participation benefits/costs, sustainability planning, and community support. The authors used factor analysis to identify problematic items in our original measure and then piloted new items and scales to create a more robust, psychometrically sound, multidimensional measure of coalition functioning. Scales displayed good construct validity through correlations with other measures. Discussion considers the strengths and weaknesses of the refined instrument.

  2. Coalition Within a Coalition: The Baltics in the European Union

    Directory of Open Access Journals (Sweden)

    Irina M. Busygina

    2017-03-01

    Full Text Available This article gives an overview of small power problem focusing on the behav­iour of small power states within coalitions and their proneness to free riding. To pursue an independent agenda and increase their significance within large associa­tions, the authors argue, small powers tend to create ‘coalitions within coalitions’, essentially acting as free riders and transferring costs and political responsibility for decision-making to larger players. Such an asymmetric strategy makes it possi­ble for small powers to advance their interests within alliances and save resources. The authors test this hypothesis on the behaviour of the Baltics in the European Union. It is demonstrated that Lithuania, Latvia, and Estonia have created a stable small coalition within the EU and actively form ad hoc alliances with the leading states to push union-level decisions, as it was the case with settling the migrant issue. In other areas, these states tend to benefit from the free rider behaviour.

  3. Values for graph-restricted games with coalition structure

    NARCIS (Netherlands)

    Khmelnitskaya, Anna Borisovna

    We consider a new model for TU games with both coalition and cooperation structures that applies to different network situations, in particular, to sharing an international river with multiple users without international firms. Our approach to the value for such a game is close to that of Myerson

  4. Coalitions: Organizational, Political, Command & Control Challenges

    Science.gov (United States)

    2009-05-01

    coalitions, leur histoire récente, les caractéristiques et les défis des coalitions militaires et, enfin, les obstacles rencontrés par les...caractéristiques générales. Une brève histoire des coalitions militaires du 20ième siècle est présentée, suivie d’une évaluation de leur évolution

  5. On the nature of voters' coalition preferences.

    Science.gov (United States)

    Plescia, Carolina; Aichholzer, Julian

    2017-07-03

    An expanding literature indicates that in multiparty systems with coalition governments, citizens consider the post-electoral bargaining process among parties when casting their vote. Yet, we know surprisingly little about the nature of voters' coalition preferences. This paper uses data from the Austrian National Election Study to examine the determinants as well as the independence of preferences for coalitions as political object. We find that coalition preferences are strongly informed by spatial considerations; but additional non-ideological factors, such as party and leader preferences, also play a fundamental role. We also find that coalitions enjoy a certain degree of independence from other objects of vote choice and they do not always represent a simple average score on the feeling thermometer of the constituent parties. There are, however, substantial differences among voters, with party identifiers and those with extreme ideology being less likely to consider coalitions as separate entities from their component parties.

  6. On the nature of voters’ coalition preferences

    Science.gov (United States)

    Plescia, Carolina; Aichholzer, Julian

    2017-01-01

    ABSTRACT An expanding literature indicates that in multiparty systems with coalition governments, citizens consider the post-electoral bargaining process among parties when casting their vote. Yet, we know surprisingly little about the nature of voters’ coalition preferences. This paper uses data from the Austrian National Election Study to examine the determinants as well as the independence of preferences for coalitions as political object. We find that coalition preferences are strongly informed by spatial considerations; but additional non-ideological factors, such as party and leader preferences, also play a fundamental role. We also find that coalitions enjoy a certain degree of independence from other objects of vote choice and they do not always represent a simple average score on the feeling thermometer of the constituent parties. There are, however, substantial differences among voters, with party identifiers and those with extreme ideology being less likely to consider coalitions as separate entities from their component parties. PMID:28824702

  7. Overlapping coalition formation games in wireless communication networks

    CERN Document Server

    Wang, Tianyu; Saad, Walid; Han, Zhu

    2017-01-01

    This brief introduces overlapping coalition formation games (OCF games), a novel mathematical framework from cooperative game theory that can be used to model, design and analyze cooperative scenarios in future wireless communication networks. The concepts of OCF games are explained, and several algorithmic aspects are studied. In addition, several major application scenarios are discussed. These applications are drawn from a variety of fields that include radio resource allocation in dense wireless networks, cooperative spectrum sensing for cognitive radio networks, and resource management for crowd sourcing. For each application, the use of OCF games is discussed in detail in order to show how this framework can be used to solve relevant wireless networking problems. Overlapping Coalition Formation Games in Wireless Communication Networks provides researchers, students and practitioners with a concise overview of existing works in this emerging area, exploring the relevant fundamental theories, key techniqu...

  8. Conservative treatment of patients with tarsal coalitions

    Directory of Open Access Journals (Sweden)

    A. V. Sapogoosky

    2015-01-01

    Full Text Available Tarsal coalition is a pathological condition with abnormal fusion between two or more tarsal bones. The aim of the study was to evaluate effectiveness of conservative treatment in patients with tarsal coalitions. The treatment included reducing the intensity of physical activity, medication, orthotics, physiotherapy. For evaluation of effectiveness of the treatment, we used the AOFAS scale. The results of the study demonstrated that conservative treatment in patients with tarsal coalitions was focused onon temporary pain release. Conservative treatment has limited efficacy for patients with symptomatic tarsal coalitions because of short pain release in the majority of children (98 %. The indications for conservative treatment in patients with symptomatic tarsal coalitions should be pain and hindfoot valgus less than 15°. In other cases, conservative treatment should be considered as preoperative preparation.

  9. Advocacy coalitions and wind power development: Insights from Quebec

    International Nuclear Information System (INIS)

    Jegen, Maya; Audet, Gabriel

    2011-01-01

    This article addresses the issue of wind energy acceptance in the Canadian province of Quebec and, in particular, the impact of different models of wind power development on the degree of social acceptance. We show that the dominant advocacy coalition, which favors a hard path energy development in general, enforces a large-scale development of wind energy. Two other coalitions - a soft path coalition and a nationalist coalition - oppose this development, but not wind energy per se. We argue that difference in belief systems explains their opposition rather than planning issues or NIMBY concerns. We also contend that, despite its predominance over (wind) energy policy, the hard path coalition is willing to learn and make concessions towards the soft path coalition, but not towards the nationalist coalition. - Highlights: → We address social acceptance of wind energy. → We illustrate the interaction of advocacy coalitions. → Different advocacy coalitions support different models of wind energy development. → Models of wind energy development influence the degree of social acceptance. → Opposition is not aimed at wind energy per se, but at the hard path model.

  10. Coalitional game theory as a promising approach to identify candidate autism genes.

    Science.gov (United States)

    Gupta, Anika; Sun, Min Woo; Paskov, Kelley Marie; Stockham, Nate Tyler; Jung, Jae-Yoon; Wall, Dennis Paul

    2018-01-01

    Despite mounting evidence for the strong role of genetics in the phenotypic manifestation of Autism Spectrum Disorder (ASD), the specific genes responsible for the variable forms of ASD remain undefined. ASD may be best explained by a combinatorial genetic model with varying epistatic interactions across many small effect mutations. Coalitional or cooperative game theory is a technique that studies the combined effects of groups of players, known as coalitions, seeking to identify players who tend to improve the performance--the relationship to a specific disease phenotype--of any coalition they join. This method has been previously shown to boost biologically informative signal in gene expression data but to-date has not been applied to the search for cooperative mutations among putative ASD genes. We describe our approach to highlight genes relevant to ASD using coalitional game theory on alteration data of 1,965 fully sequenced genomes from 756 multiplex families. Alterations were encoded into binary matrices for ASD (case) and unaffected (control) samples, indicating likely gene-disrupting, inherited mutations in altered genes. To determine individual gene contributions given an ASD phenotype, a "player" metric, referred to as the Shapley value, was calculated for each gene in the case and control cohorts. Sixty seven genes were found to have significantly elevated player scores and likely represent significant contributors to the genetic coordination underlying ASD. Using network and cross-study analysis, we found that these genes are involved in biological pathways known to be affected in the autism cases and that a subset directly interact with several genes known to have strong associations to autism. These findings suggest that coalitional game theory can be applied to large-scale genomic data to identify hidden yet influential players in complex polygenic disorders such as autism.

  11. Subtalar Coalition: A Case Report

    Directory of Open Access Journals (Sweden)

    CG Chua

    2013-11-01

    Full Text Available Subtalar coalition is an uncommon condition that usually manifests in early adolescence(1. Frequently, this condition is missed. Delayed diagnosis may result in osteoarthritis requiring triple arthrodesis. Here, we report two patients with subtalar coalition. The first patient is a 12 year old boy who presented with right ankle pain for one year and was treated with excision of the coalition and bone wax insertion at the excision site. We followed up the patient for two years and the result was excellent with full range of movement of his right ankle and subtalar joint attained within two months. He returned to athletic activity by six months and was discharged with no complications after two years. The second patient is a 15 year old girl who presented with bilateral ankle pain and swelling for three years and was treated with excision of the coalition and subtalar interpositional arthroplasty bilaterally. She defaulted follow up after seven months as she was very satisfied with the result. We wish to highlight this condition which may be misdiagnosed as flexible flat foot or ankle sprain.

  12. Coalitions to engineer the climate

    Science.gov (United States)

    Moreno-Cruz, J. B.; Ricke, K.; Caldeira, K.

    2012-12-01

    Solar geoengineering is the deliberate reduction of the amount of incoming solar radiation absorbed by Earth's climate system with the aim of reducing impacts of anthropogenic climate change. The international politics of solar geoengineering differ markedly from those of greenhouse-gas emissions reductions. A central question is who will decide whether and how much solar geoengineering will be deployed. It is unlikely that a single small actor could implement and sustain global-scale geoengineering that harms much of the world without intervention from harmed world powers. Thus, in practice, some minimum amount of aggregate power would be needed to successfully impose will upon the rest of the world. Here we formulate a series of games, calibrated with physical and economic models of climate change, to evaluate how international coalitions to implement geoengineering may form. In the scenarios examined, climate models are assumed to correctly predict the future and damage is parameterized in terms of regional temperature and precipitation changes only, and do not consider other, possibly formidable, risks. The coalitions set the "global thermostat" to maximize benefit to coalition members. As a result, non-members would be better off under a global optimum solution, but would be worse off with no geoengineering at all. Nonetheless, it appears unlikely that solar geoengineering could be implemented by actors who are perceived in advance to be harming the interests of a majority of the world's powers.; Comparison of results under a globally optimal versus >50% military-spending power coalition over 6 decades of solar geoengineering implementation. (a) shows how the amount of solar geoengineering (in units of stratospheric aerosol optical depth, AOD) implemented by a Power Proportionate Distribution coalition under a military-spending-weighted power scheme (dotted), compared to the amount that minimizes net global damages (thick grey) (the population and GDP

  13. Towards a New Theory of Feminist Coalition: Accounting for the Heterogeneity of Gender, Race, Class, and Sexuality through an Exploration of Power and Responsibility

    Directory of Open Access Journals (Sweden)

    Holly Jeanine Boux

    2016-06-01

    Full Text Available This paper develops a novel theory of feminist coalition that centers and redefines the concepts of power and responsibility. After outlining several key ways in which feminist coalition work has been addressed by both theorists and practitioners, it goes on to explore how accounting for the complex experiences of identity rooted in factors such as race, class, gender, and sexuality continues to complicate the process of coalition building and theorizing. From these foundations, the article develops a theory of feminist coalition that speaks to how such a movement—or organizations within such a movement—can drive the political will for transformation and turn this will into political action without glossing over vital differences in people’s daily experiences of gender as it intersects with other systems of domination and oppression. The key argument made herein is that an explicit focus on power and responsibility can help us develop more functional answers to critical and still pressing questions, such as: Who is included—explicitly or implicitly—in feminist coalitions? And what issues, or agendas, are we working towards changing through these coalitions?

  14. Wind energy aggregation: A coalitional game approach

    KAUST Repository

    Baeyens, E.

    2011-12-01

    In this paper we explore the extent to which a group of N wind power producers can exploit the statistical benefits of aggregation and quantity risk sharing by forming a willing coalition to pool their variable power to jointly offer their aggregate power output as single entity into a forward energy market. We prove that wind power generators will always improve their expected profit when they aggregate their generated power and use tools from coalitional game theory to design fair sharing mechanisms to allocate the payoff among the coalition participants. We show that the corresponding coalitional game is super-additive and has a nonempty core. Hence, there always exists a mechanism for profit-sharing that makes the coalition stable. However, the game is not convex and the celebrated Shapley value may not belong to the core of the game. An allocation mechanism that minimizes the worst-case dissatisfaction is proposed. © 2011 IEEE.

  15. A Cross-Layer Optimization Approach for Energy Efficient Wireless Sensor Networks: Coalition-Aided Data Aggregation, Cooperative Communication, and Energy Balancing

    Directory of Open Access Journals (Sweden)

    Qinghai Gao

    2007-01-01

    Full Text Available We take a cross-layer optimization approach to study energy efficient data transport in coalition-based wireless sensor networks, where neighboring nodes are organized into groups to form coalitions and sensor nodes within one coalition carry out cooperative communications. In particular, we investigate two network models: (1 many-to-one sensor networks where data from one coalition are transmitted to the sink directly, and (2 multihop sensor networks where data are transported by intermediate nodes to reach the sink. For the many-to-one network model, we propose three schemes for data transmission from a coalition to the sink. In scheme 1, one node in the coalition is selected randomly to transmit the data; in scheme 2, the node with the best channel condition in the coalition transmits the data; and in scheme 3, all the nodes in the coalition transmit in a cooperative manner. Next, we investigate energy balancing with cooperative data transport in multihop sensor networks. Built on the above coalition-aided data transmission schemes, the optimal coalition planning is then carried out in multihop networks, in the sense that unequal coalition sizes are applied to minimize the difference of energy consumption among sensor nodes. Numerical analysis reveals that energy efficiency can be improved significantly by the coalition-aided transmission schemes, and that energy balancing across the sensor nodes can be achieved with the proposed coalition structures.

  16. Incentives and stability of international climate coalitions: An integrated assessment

    International Nuclear Information System (INIS)

    Bosetti, Valentina; Carraro, Carlo; De Cian, Enrica; Massetti, Emanuele; Tavoni, Massimo

    2013-01-01

    This paper analyses the incentives to participate in an international climate agreement and the stability of the resulting climate coalition using the integrated assessment model WITCH. Coalition stability is assessed under alternative assumptions concerning the pure rate of time preference, the aggregation of social welfare, and the severity of climate damages. The profitability, stability, and strong potential internal stability of a number of coalitions, those potentially effective in reducing GHG emissions, is explored in the paper. The main conclusion is that only the grand coalition, i.e. a coalition where all world regions cooperate to reduce emissions, can maintain GHG concentration below 550 ppm CO 2 -eq. However, this coalition is not internally stable, even when allowing for monetary transfers across world regions. Nonetheless, the paper also shows that strongly potentially internally stable coalitions exist, though of smaller size, which can mitigate global warming and limit GHG concentrations to 600 ppm CO 2 -eq. - Highlights: ► We analyse climate coalitions with an integrated assessment model. ► Coalitions’ profitability and stability is analysed under alternative assumptions. ► Effective coalitions should include larger emitters (such as India and China). ► A coalition that achieves 550 ppm CO 2 -eq is not internally stable. ► A stable coalition can achieve around 518 ppme in 2050 and 600 ppme in 2100

  17. Immunization Action Coalition

    Science.gov (United States)

    ... IAC | Contact | A-Z Index | Donate | Shop | SUBSCRIBE Immunization Action Coalition Favorites ACIP Recommendations Package Inserts Additional Immunization Resources Photos Adult Vaccination Screening Checklists Ask the ...

  18. International Clean Energy Coalition

    Energy Technology Data Exchange (ETDEWEB)

    Erin Skootsky; Matt Gardner; Bevan Flansburgh

    2010-09-28

    In 2003, the National Association of Regulatory Utility Commissioners (NARUC) and National Energy Technology Laboratories (NETL) collaboratively established the International Clean Energy Coalition (ICEC). The coalition consisting of energy policy-makers, technologists, and financial institutions was designed to assist developing countries in forming and supporting local approaches to greenhouse gas mitigation within the energy sector. ICEC's work focused on capacity building and clean energy deployment in countries that rely heavily on fossil-based electric generation. Under ICEC, the coalition formed a steering committee consisting of NARUC members and held a series of meetings to develop and manage the workplan and define successful outcomes for the projects. ICEC identified India as a target country for their work and completed a country assessment that helped ICEC build a framework for discussion with Indian energy decisionmakers including two follow-on in-country workshops. As of the conclusion of the project in 2010, ICEC had also conducted outreach activities conducted during United Nations Framework Convention on Climate Change (UNFCCC) Ninth Conference of Parties (COP 9) and COP 10. The broad goal of this project was to develop a coalition of decision-makers, technologists, and financial institutions to assist developing countries in implementing affordable, effective and resource appropriate technology and policy strategies to mitigate greenhouse gas emissions. Project goals were met through international forums, a country assessment, and in-country workshops. This project focused on countries that rely heavily on fossil-based electric generation.

  19. Coparenting and toddler's interactive styles in family coalitions.

    Science.gov (United States)

    Fivaz-Depeursinge, Elisabeth; Lopes, Francesco; Python, Maryline; Favez, Nicolas

    2009-12-01

    The current study examined the coparenting and toddler's interactive styles in family coalitions. According to structural family theory, boundaries between generations are clear in alliances, but disturbed in coalitions: the parents look to the child to regulate their conflictual relationship and the child attempts to meet this need. In a normative sample studied longitudinally during the Lausanne Trilogue Play situation (LTP, N=38), 15 coalition cases were detected. Styles of coparenting and of child's interactions were determined and compared in coalition and alliance cases at 18 months. Findings confirm the structural family model by showing the specific ways in which the coparenting and the toddler's interactive styles are associated in 3 different patterns of coalitions: binding, detouring, and triangulation. They illustrate how the child's triangular capacity, or her ability to simultaneously communicate with both parents, is used to regulate the parents' relationship. They suggest that the LTP observational paradigm is a promising assessment method of early family interactions. They point to the importance of assessing early the child's contribution to family coalitions.

  20. Set-Theoretic Inequalities in Stochastic Noncooperative Games with Coalition

    Directory of Open Access Journals (Sweden)

    Ailada Treerattrakoon

    2008-04-01

    Full Text Available We model and analyze antagonistic stochastic games of three players, two of whom form a coalition against the third one. The actions of the players are modeled by random walk processes recording the cumulative damages to each player at any moment of time. The game continues until the single player or the coalition is defeated. The defeat of any particular player takes place when the associated process (representing the collateral damage crosses a fixed threshold. Once the threshold is exceeded at some time, the associated player exits the game. All involved processes are being “observed by a third party process” so that the information regarding the status of all players is restricted to those special epochs. Furthermore, all processed are modulated (with their parameters being modified in due course of the game. We obtain a closed form joint functional of the named processes at key reference points.

  1. Progress in Promoting Research Reactor Coalitions

    International Nuclear Information System (INIS)

    Goldman, Ira; Adelfang, Pablo; Alldred, Kevin; Mote, Nigel

    2008-01-01

    This presentation treats of the IAEA's role in Promoting Research Reactor (RR) coalitions, presents the strategic view, the types of coalitions, the 2007-2008 activities and Results, and the upcoming activities. The RR Coalitions Progress is presented first (Initial discussions, project design, approval of NTI grant request, informal consultations and development of 'national' proposals, Number of 'models' identified, exploratory missions/meetings, initial implementation of several coalitions, IAEA coordination, ideas/proposals/ventures, initial support. Some countries, institutes, or users want access to reactor capabilities without, or in advance of, building a domestic facility. Some countries, institutes, or users need access to alternative capabilities to permit the closure/consolidation of marginal facilities. Cooperative arrangements will result in increased utilization for each participant. The results from the reactor view are as follows: cover increases in order levels or scientific research; cover facility outages (planned or un-planned); delegate 'less profitable' products and services; access capacity for new products and services; reduce transport needs by geographical optimization; reduce investment needs by contracting for complementary capabilities; reduce costs of medical radio-isotope for R and D; share best practices in operations and safety. The results from the stakeholder View are: Better information on what reactors can offer/provide; greater range of services; more proactive product and service support; greater reliability in supplies of products and services. The types of coalitions are of different forms to meet needs, capabilities, objectives of members. In general they start small, evolve, change form, expand as confidence grows. The role of the Scientific consortium is to: distribute excess demand, test new concepts for implementation at high-flux reactors, direct requests for access to most appropriate RR, share best practices

  2. Sustainability in a state comprehensive cancer control coalition: lessons learned.

    Science.gov (United States)

    Desmond, Renee A; Chapman, Kathryn; Graf, Gavin; Stanfield, Bret; Waterbor, John W

    2014-03-01

    The Alabama Comprehensive Cancer Control Coalition (ACCCC) has developed an integrated and coordinated approach to reducing cancer incidence, morbidity, and mortality, and to improving the quality of life for cancer survivors, their families, and their caregivers. The ACCCC is currently in a maintenance phase and a formal plan for sustainability of the coalition was needed to keep the members engaged and productive. A training session in coalition sustainability conducted in 2013 identified the following elements as essential to success: (1) increased marketing of the coalition by simplifying its mission; (2) improved networking including flexibility in coalition meeting location and attendance; (3) increased membership satisfaction through transformational leadership; (4) revision of the working structure of committees and improved accountability; and (5) enhancement of partner satisfaction with coalition activities designed to recruit and retain new partners. A self-administered membership satisfaction survey was given to assess coalition mission, meeting logistics, organization, capacity building, and coalition goals. Results indicated that the subcategories of communication, mission, and meeting logistics were rated satisfied to very satisfied on a five-point scale. Although the ACCCC had clearly written goals, improvement could be made in leadership participation and new member orientation could be improved. Most members rated their parent organization as highly involved with the ACCCC and many offered suggestions on capacity building. Results of the sustainability training have clarified the ACCCC's plans to ensure coalition viability and improve strategies to inform stakeholders of the benefits of participation in the coalition.

  3. Towards a Formal Model of Privacy-Sensitive Dynamic Coalitions

    Directory of Open Access Journals (Sweden)

    Sebastian Bab

    2012-04-01

    Full Text Available The concept of dynamic coalitions (also virtual organizations describes the temporary interconnection of autonomous agents, who share information or resources in order to achieve a common goal. Through modern technologies these coalitions may form across company, organization and system borders. Therefor questions of access control and security are of vital significance for the architectures supporting these coalitions. In this paper, we present our first steps to reach a formal framework for modeling and verifying the design of privacy-sensitive dynamic coalition infrastructures and their processes. In order to do so we extend existing dynamic coalition modeling approaches with an access-control-concept, which manages access to information through policies. Furthermore we regard the processes underlying these coalitions and present first works in formalizing these processes. As a result of the present paper we illustrate the usefulness of the Abstract State Machine (ASM method for this task. We demonstrate a formal treatment of privacy-sensitive dynamic coalitions by two example ASMs which model certain access control situations. A logical consideration of these ASMs can lead to a better understanding and a verification of the ASMs according to the aspired specification.

  4. Pressures on TV Programs: Coalition for Better Television's Case.

    Science.gov (United States)

    Shipman, John M., Jr.

    In 1981, the conservative Coalition for Better Television (CBTV) threatened an economic boycott against advertisers who marketed their wares on programs that the coalition felt had excessive sex and violence. Because television networks are dependent on advertising, the coalition believed economic pressure on advertisers would force a…

  5. Complexities of coalition building: leaders' successes, strategies, struggles, and solutions.

    Science.gov (United States)

    Mizrahi, T; Rosenthal, B B

    2001-01-01

    Government and private funding initiatives are promoting coalitions, collaborations, and other interorganizational approaches to address complex community, social services, and health issues. Social work organizers and administrators are increasingly leading coalitions themselves or representing their organizations in collaborative planning and problem solving, often without understanding how to manage the complexities involved in interorganizational relationships. This article reports on aspects of a larger quantitative and qualitative research project that studied coalition dynamics, operations, and outcomes. Coalition leaders interviewed defined success in multiple ways. Competent leadership was the factor most often identified with coalition success.

  6. Organizational Member Involvement in Physical Activity Coalitions across the United States: Development and Testing of a Novel Survey Instrument for Assessing Coalition Functioning

    Science.gov (United States)

    Bornstein, Daniel B.; Pate, Russell R.; Beets, Michael W.; Saunders, Ruth P.; Blair, Steven N.

    2015-01-01

    Introduction: Coalitions are often composed of member organizations. Member involvement is thought to be associated with coalition success. No instrument currently exists for evaluating organizational member involvement in physical activity coalitions. This study aimed to develop a survey instrument for evaluating organizational member involvement…

  7. Lessons Learned and Challenges in Building a Filipino Health Coalition

    Science.gov (United States)

    Aguilar, David E.; Abesamis-Mendoza, Noilyn; Ursua, Rhodora; Divino, Lily Ann M.; Cadag, Kara; Gavin, Nicholas P.

    2010-01-01

    In recent years, community-based coalitions have become an effective channel to addressing various health problems within specific ethnic communities. The purpose of this article is twofold: (a) to describe the process involved in building the Kalusugan Coalition (KC), a Filipino American health coalition based in New York City, and (b) to highlight the lessons learned and the challenges from this collaborative venture. The challenges described also offer insights on how the coalition development process can be greatly affected by the partnership with an academic institution on a community-based research project. Because each cultural group has unique issues and concerns, the theoretical framework used by KC offers creative alternatives to address some of the challenges regarding coalition infrastructures, leadership development, unexpected change of coalition dynamics, and cultural nuances. PMID:19098260

  8. Management and governance processes in community health coalitions: a procedural justice perspective.

    Science.gov (United States)

    Weiner, Bryan J; Alexander, Jeffrey A; Shortell, Stephen M

    2002-12-01

    Community-based coalitions are a popular strategy for promoting community health despite the fact that coalitions often fail to achieve measurable results. Using a procedural justice framework, this study seeks to advance knowledge about the relationship between coalition governance and management processes and indicators of coalition functioning. Member survey data from 25 coalitions participating in the Community Care Network Demonstration Program were analyzed using two-stage least squares regression. Results show that personal influence in decision making. decision process clarity, and collaborative conflict resolution were significantly associated with procedural fairness perceptions. Procedural fairness perceptions, in turn, were positively associated with member satisfaction with coalition decisions, but not personal engagement in the coalition or organizational integration of coalition goals and activities. Personal influence in decision making and collaborative conflict resolution also exhibited direct relationships with all three indicators of coalition functioning examined in the study.

  9. Maritime Coalitions: When is Unity of Command Required

    National Research Council Canada - National Science Library

    Gahlinger, Gregory J

    2007-01-01

    .... The concepts of Unity of Command, Unity of Effort and Parallel, Lead Nation, or Integrated coalition command structures are viable across a broad spectrum of maritime coalition operations but do have...

  10. Coalition-based multimedia peer matching strategies for P2P networks

    Science.gov (United States)

    Park, Hyunggon; van der Schaar, Mihaela

    2008-01-01

    In this paper, we consider the problem of matching users for multimedia transmission in peer-to-peer (P2P) networks and identify strategies for fair resource division among the matched multimedia peers. We propose a framework for coalition formation, which enables users to form a group of matched peers where they can interact cooperatively and negotiate resources based on their satisfaction with the coalition, determined by explicitly considering the peer's multimedia attributes. In addition, our proposed approach goes a step further by introducing the concept of marginal contribution, which is the value improvement of the coalition induced by an incoming peer. We show that the best way for a peer to select a coalition is to choose the coalition that provides the largest division of marginal contribution given a deployed value-division scheme. Moreover, we model the utility function by explicitly considering each peer's attributes as well as the cost for uploading content. To quantify the benefit that users derive from a coalition, we define the value of a coalition based on the total utility that all peers can achieve jointly in the coalition. Based on this definition of the coalition value, we use an axiomatic bargaining solution in order to fairly negotiate the value division of the upload bandwidth given each peer's attributes.

  11. Coalition Cooperation Defines Roadmap for E85 and Biodiesel

    Energy Technology Data Exchange (ETDEWEB)

    2007-06-01

    This Clean Cities success story relates how Colorado's Colorado Biofuels Coalition was formed and provides guidance on forming other such coalitions. This Colorado's coalition sucessfully increase the number of fueling stations providing biofuels and has goals to the number even more. Plans also include assisting with financing infrastructure, making alternative fuels available to more fleets, and educating about E85 and biodiesel use.

  12. Creation of the Quebrada Arriba Community and Academic Partnership: An Effective Coalition for Addressing Health Disparities in Older Puerto Ricans.

    Science.gov (United States)

    Orellano-Colón, Elsa M; González-Laboy, Yolanda; De Jesús-Rosario, Amarelis

    2017-06-01

    The objective of this project was to develop a community-academic coalition partnership to conduct community-based participatory research (CBPR) to address health disparities in older adults with chronic conditions living in the Quebrada Arriba community. We used the 'Developing and Sustaining CPPR Partnerships: A Skill-Building Curriculum', to create the Quebrada Arriba Community-Academic Partnership (QACAP). We assessed the meetings effectiveness and the CBPR experiences of the coalition members in the community-academic partnership. The stepwise process resulted in: the development of The Coalition for the Health and Wellbeing of Older People of Quebrada Arriba; the partnership's mission and vision; the operating procedures; the formulation of the research question, and; the action plan for obtaining funding resources. The mean levels of satisfaction for each of the items of the Meeting Effectiveness Evaluation tool were 100%. The mean agreement rating scores on variables related to having a positive experience with the coalition, members' representativeness of community interest, respectful contacts between members, the coalition's vision and mission, the participation of the members in establishing the prioritized community problem, and sharing of resources between the members was 100%. The steps used to build the QACAP provided an effective structure to create the coalition and captured the results of coalition activities. Partners' time to build trust and developing a sufficient understanding of local issues, high interest of the community members, flexibility of the partners, capitalization on the partners' strengths, and the shared decision building process were key contributors of this coalition's success.

  13. Inter-Party Conflict Management in Coalition Governments: Analyzing the Role of Coalition Agreements in Belgium, Germany, Italy and the Netherlands

    Directory of Open Access Journals (Sweden)

    Catherine Moury

    2013-07-01

    Full Text Available In this article, we focus on manifest interparty conflict over policy issues and the role of coalition agreements in solving these conflicts. We present empirical findings on the characteristics of coalition agreements including deals over policy controversy and on inter-party conflict occurring during the lifetime of governments in Germany, Belgium, Italy and the Netherlands. We analyze the ways in which parties in government were or were not constrained by written deals over disputed issues. Coalition agreements from all four countries include specific policy deals, one third of which are precisely defined. These policy deals concern both consensual and controversial issues. Our central finding is that, in the case of intra-party conflict, parties almost always fall back on the initial policy deals when these exist. As such, policy statements of the coalition agreement facilitate decision making in each of the countries studied.

  14. Rethinking the Factors of Success: Social Support and Community Coalitions

    Science.gov (United States)

    Haithcox-Dennis, Melissa; DeWeese, Amanda; Goodman, Jessica

    2013-01-01

    Background: Coalitions are often the strategy of choice when needs are great, resources are few, and individual efforts have proven unsuccessful in addressing serious health issues. Despite the widespread use of coalitions and extensive research, no definitive list of factors predicting coalition success has been identified. One factor, social…

  15. Crisis and Policy Reformcraft: Advocacy Coalitions and Crisis-induced Change in Swedish Nuclear Energy Policy

    Energy Technology Data Exchange (ETDEWEB)

    Nohrstedt, Daniel

    2007-04-15

    This dissertation consists of three interrelated essays examining the role of crisis events in Swedish nuclear energy policymaking. The study takes stock of the idea of 'crisis exceptionalism' raised in the literature, which postulates that crisis events provide openings for major policy change. In an effort to explain crisis-induced outcomes in Swedish nuclear energy policy, each essay explores and develops theoretical assumptions derived from the Advocacy Coalition Framework (ACF). The introduction discusses the ACF and other theoretical perspectives accentuating the role of crisis in policymaking and identifies three explanations for crisis-induced policy outcomes: minority coalition mobilization, learning, and strategic action. Essay 1 analyzes the nature and development of the Swedish nuclear energy subsystem. The results contradict the ACF assumption that corporatist systems nurture narrow subsystems and small advocacy coalitions, but corroborate the assumption that advocacy coalitions remain stable over time. While this analysis identifies temporary openings in policymaking venues and in the advocacy coalition structure, it is argued that these developments did not affect crisis policymaking. Essay 2 seeks to explain the decision to initiate a referendum on nuclear power following the 1979 Three Mile Island accident. Internal government documents and other historical records indicate that strategic considerations superseded learning as the primary explanation in this case. Essay 3 conducts an in-depth examination of Swedish policymaking in the aftermath of the 1986 Chernobyl accident in an effort to explain the government's decision not to accelerate the nuclear power phaseout. Recently disclosed government documents show that minority coalition mobilization was insufficient to explain this decision. In this case, rational learning and strategic action provided a better explanation. The main theoretical contribution derived from the three

  16. Crisis and Policy Reformcraft: Advocacy Coalitions and Crisis-induced Change in Swedish Nuclear Energy Policy

    International Nuclear Information System (INIS)

    Nohrstedt, Daniel

    2007-04-01

    This dissertation consists of three interrelated essays examining the role of crisis events in Swedish nuclear energy policymaking. The study takes stock of the idea of 'crisis exceptionalism' raised in the literature, which postulates that crisis events provide openings for major policy change. In an effort to explain crisis-induced outcomes in Swedish nuclear energy policy, each essay explores and develops theoretical assumptions derived from the Advocacy Coalition Framework (ACF). The introduction discusses the ACF and other theoretical perspectives accentuating the role of crisis in policymaking and identifies three explanations for crisis-induced policy outcomes: minority coalition mobilization, learning, and strategic action. Essay 1 analyzes the nature and development of the Swedish nuclear energy subsystem. The results contradict the ACF assumption that corporatist systems nurture narrow subsystems and small advocacy coalitions, but corroborate the assumption that advocacy coalitions remain stable over time. While this analysis identifies temporary openings in policymaking venues and in the advocacy coalition structure, it is argued that these developments did not affect crisis policymaking. Essay 2 seeks to explain the decision to initiate a referendum on nuclear power following the 1979 Three Mile Island accident. Internal government documents and other historical records indicate that strategic considerations superseded learning as the primary explanation in this case. Essay 3 conducts an in-depth examination of Swedish policymaking in the aftermath of the 1986 Chernobyl accident in an effort to explain the government's decision not to accelerate the nuclear power phaseout. Recently disclosed government documents show that minority coalition mobilization was insufficient to explain this decision. In this case, rational learning and strategic action provided a better explanation. The main theoretical contribution derived from the three essays is to posit

  17. Evolution of fairness and coalition formation in three-person ultimatum games.

    Science.gov (United States)

    Nishimura, Takeshi; Okada, Akira; Shirata, Yasuhiro

    2017-05-07

    We consider the evolution of fairness and coalition formation in a three-person ultimatum game in which the coalition value depends on its size. Traditional game theory, which assumes selfish and rational players, predicts the largest and efficient coalition with a proposer exploiting most of the total value. In a stochastic evolutionary model (the frequency-dependent Moran process with mutations) where players make errors in estimating the payoffs and strategies of others, evolutionary selection favors the formation of a two-person subcoalition under weak selection and in the low mutation limit if and only if its coalition value exceeds a high proportion (0.7) of that of the largest coalition. Proposers offer 30-35% of the subcoalition value to a coalition member, excluding a non-member. Multilateral bargaining is critically different from the bilateral one. Coalition-forming behavior may cause economic inefficiency and social exclusion. Stochastic evolutionary game theory thus provides theoretical support to explain the behavior of human subjects in economic experiments of a three-person ultimatum game. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Northeast Solar Energy Market Coalition (NESEMC)

    Energy Technology Data Exchange (ETDEWEB)

    Rabago, Karl R. [Pace Energy and Climate Center Pace University School of Law

    2018-03-31

    The Northeast Solar Energy Market Coalition (NESEMC) brought together solar energy business associations and other stakeholders in the Northeast to harmonize regional solar energy policy and advance the solar energy market. The Coalition was managed by the Pace Energy and Climate Center, a project of the Pace University Elisabeth Haub School of Law. The NESEMC was funded by the U.S. Department of Energy SunShot Initiative as a cooperative agreement through 2017 as part of Solar Market Pathways.

  19. A critical evaluation of subtalar joint arthrosis associated with middle facet talocalcaneal coalition in 21 surgically managed patients: a retrospective computed tomography review. Investigations involving middle facet coalitions-part III.

    Science.gov (United States)

    Kernbach, Klaus J; Barkan, Howard; Blitz, Neal M

    2010-01-01

    Symptomatic middle facet talocalcaneal coalition is frequently associated with rearfoot arthrosis that is often managed surgically with rearfoot fusion. However, no objective method for classifying the extent of subtalar joint arthrosis exists. No study has clearly identified the extent of posterior facet arthrosis present in a large cohort treated surgically for talocalcaneal coalition through preoperative computerized axial tomography. The authors conducted a retrospective review of 21 patients (35 feet) with coalition who were surgically treated over a 12-year period for coalition on at least 1 foot. Using a predefined original staging system, the extent of the arthrosis was categorized into normal or mild (Stage I), moderate (Stage II), and severe (Stage III) arthrosis. The association of stage and age is statistically significant. All of the feet with Stage III arthrosis had fibrous coalitions. No foot with osseous coalition had Stage III arthrosis. The distribution of arthrosis staging differs between fibrous and osseous coalitions. Only fibrous coalitions had the most advanced arthrosis (Stage III), whereas osseous coalitions did not. This suggests that osseous coalitions may have a protective effect in the prevention of severe degeneration of the subtalar joint. Concomitant subtalar joint arthrosis severity progresses with age; surgeons may want to consider earlier surgical intervention to prevent arthrosis progression in patients with symptomatic middle facet talocalcaneal coalition.

  20. How guiding coalitions promote positive culture change in hospitals: a longitudinal mixed methods interventional study.

    Science.gov (United States)

    Bradley, Elizabeth H; Brewster, Amanda L; McNatt, Zahirah; Linnander, Erika L; Cherlin, Emily; Fosburgh, Heather; Ting, Henry H; Curry, Leslie A

    2018-03-01

    Quality collaboratives are widely endorsed as a potentially effective method for translating and spreading best practices for acute myocardial infarction (AMI) care. Nevertheless, hospital success in improving performance through participation in collaboratives varies markedly. We sought to understand what distinguished hospitals that succeeded in shifting culture and reducing 30-day risk-standardised mortality rate (RSMR) after AMI through their participation in the Leadership Saves Lives (LSL) collaborative. We conducted a longitudinal, mixed methods intervention study of 10 hospitals over a 2-year period; data included surveys of 223 individuals (response rates 83%-94% depending on wave) and 393 in-depth interviews with clinical and management staff most engaged with the LSL intervention in the 10 hospitals. We measured change in culture and RSMR, and key aspects of working related to team membership, turnover, level of participation and approaches to conflict management. The six hospitals that experienced substantial culture change and greater reductions in RSMR demonstrated distinctions in: (1) effective inclusion of staff from different disciplines and levels in the organisational hierarchy in the team guiding improvement efforts (referred to as the 'guiding coalition' in each hospital); (2) authentic participation in the work of the guiding coalition; and (3) distinct patterns of managing conflict. Guiding coalition size and turnover were not associated with success (p values>0.05). In the six hospitals that experienced substantial positive culture change, staff indicated that the LSL learnings were already being applied to other improvement efforts. Hospitals that were most successful in a national quality collaborative to shift hospital culture and reduce RSMR showed distinct patterns in membership diversity, authentic participation and capacity for conflict management. © Article author(s) (or their employer(s) unless otherwise stated in the text of the

  1. Impact of coalition interoperability on PKI

    Science.gov (United States)

    Krall, Edward J.

    2003-07-01

    This paper examines methods for providing PKI interoperability among units of a coalition of armed forces drawn from different nations. The area in question is tactical identity management, for the purposes of confidentiality, integrity and non-repudiation in such a dynamic coalition. The interoperating applications under consideration range from email and other forms of store-and-forward messaging to TLS and IPSEC-protected real-time communications. Six interoperability architectures are examined with advantages and disadvantages of each described in the paper.

  2. Posteromedial subtalar coalition: imaging appearances in three cases

    International Nuclear Information System (INIS)

    McNally, E.G.

    1999-01-01

    Objective. To define the imaging appearances in three cases of posteromedial subtalar coalition.Design. Three patients who presented with hindfoot pain were found to have non-osseous coalition involving the posteromedial hindfoot. This entity is distinct from conventional middle facet coalition as the sustentaculum is uninvolved.Results. Plain radiographs, available in two cases, demonstrated subtle irregularity of the posterior facet. MRI (three cases) demonstrated a mixed bony and cartilaginous mass lying posterior to the sustentaculum. There was trabecular oedema within the mass and adjacent talus, and narrowing of the space between the middle and posterior facets. Prominence and dilatation of the posterior tibial veins with tenosynovitis of the adjacent tibialis posterior tendon was seen. CT demonstrated the bony mass but did not detect the adjacent bony oedema.Conclusion. Posteromedial subtalar coalition may present with hindfoot pain and stiffness. The presence of a pseudarthrosis posterior to a normal middle facet is characteristic. The abnormality can be difficult to detect on plain radiographs. (orig.)

  3. Posteromedial subtalar coalition: imaging appearances in three cases

    Energy Technology Data Exchange (ETDEWEB)

    McNally, E.G. [Dept. of Radiology, Nuffield Orthopaedic Centre, Oxford (United Kingdom)

    1999-12-01

    Objective. To define the imaging appearances in three cases of posteromedial subtalar coalition.Design. Three patients who presented with hindfoot pain were found to have non-osseous coalition involving the posteromedial hindfoot. This entity is distinct from conventional middle facet coalition as the sustentaculum is uninvolved.Results. Plain radiographs, available in two cases, demonstrated subtle irregularity of the posterior facet. MRI (three cases) demonstrated a mixed bony and cartilaginous mass lying posterior to the sustentaculum. There was trabecular oedema within the mass and adjacent talus, and narrowing of the space between the middle and posterior facets. Prominence and dilatation of the posterior tibial veins with tenosynovitis of the adjacent tibialis posterior tendon was seen. CT demonstrated the bony mass but did not detect the adjacent bony oedema.Conclusion. Posteromedial subtalar coalition may present with hindfoot pain and stiffness. The presence of a pseudarthrosis posterior to a normal middle facet is characteristic. The abnormality can be difficult to detect on plain radiographs. (orig.)

  4. Gait analysis with an integrated system for functional assessment of talocalcaneal coalition.

    Science.gov (United States)

    Giacomozzi, Claudia; Benedetti, Maria Grazia; Leardini, Alberto; Macellari, Velio; Giannini, Sandro

    2006-01-01

    There is little knowledge of the functional performance of patients with talocalcaneal coalition because of the marginal quantitative information accessible using current motion-analysis and plantar pressure-measurement techniques. A novel system was developed for comprehensively measuring foot-floor interaction during the stance phase of gait that integrates instrumentation for simultaneously measuring bony segment position, ground reaction force, and plantar pressure with synchronization of spatial and temporal variables. An advanced anatomically based analysis of foot joint rotations was also applied. Tracking of numerous anatomical landmarks allowed accurate selection of three footprint subareas and reliable estimation of relevant local forces and moments. Eight patients (11 feet) with talocalcaneal coalition were analyzed. Major impairment of the rearfoot was found in nonsurgical patients, with an everted attitude, limited plantarflexion, and overloading in all three components of ground reaction force. Surgical patients showed more normal loading patterns in each footprint subarea. This measuring system allowed for accurate inspection of the effects of surgical treatment in the entire foot and at several footprint subareas. Surgical treatment of talocalcaneal coalition seems to be effective in restoring more physiologic subtalar and forefoot motion and loading patterns.

  5. A coalition formation game for transmitter cooperation in OFDMA uplink communications

    KAUST Repository

    Chelli, Ali; Tembine, Hamidou; Alouini, Mohamed-Slim

    2014-01-01

    the nodes is modelled using coalitional game theory. In this game, each coalition tries to maximize its utility in terms of rate. In the absence of cooperation cost, it can be shown that the grand coalition is sum-rate optimal and stable, i.e., the mobile

  6. The Influence of Community Context on How Coalitions Achieve HIV-Preventive Structural Change

    Science.gov (United States)

    Reed, Sarah J.; Miller, Robin Lin; Francisco, Vincent T.

    2014-01-01

    Community coalition action theory (CCAT) depicts the processes and factors that affect coalition formation, maintenance, institutionalization, actions, and outcomes. CCAT proposes that community context affects coalitions at every phase of development and operation. We analyzed data from 12 "Connect to Protect" coalitions using inductive…

  7. Coincidence of role expectations between staff and volunteer members of drug free community coalitions.

    Science.gov (United States)

    Goldstein, Marc B; Sapere, Heather; Daviau, John

    2017-08-01

    Community coalitions have proliferated as a means of addressing a range of complex community problems. Such coalitions often consist of a small paid staff and volunteer members. The present study examines one likely contributor to coalition effectiveness: the degree of agreement on role expectations between paid staff and volunteer members. Role confusion occurs when paid staff and volunteers differ in their expectations of who is responsible for accomplishing specific tasks. Staff and volunteer members from 69 randomly selected Drug Free Coalitions in the United States as well as 21 Drug Free Coalitions in Connecticut were asked to respond to an online survey asking about 37 specific coalition tasks critical for effective coalition functioning and the degree to which paid staff and/or voluntary members should be responsible for accomplishing each. Our final sample consisted of 476 individuals from 35 coalitions. Using coalitions as the unit of analysis, we found significant differences between paid staff and volunteer coalition members on nine tasks reflecting four domains: meeting leadership and participation, (2) planning and implementation leadership, (3) publicity/media relations, and (4) logistical functions. Implications of these differences and ways that evaluators could help coalitions deal with differing role expectations were discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Theories of coalition formation: An empirical test using data from Danish local government

    DEFF Research Database (Denmark)

    Skjæveland, Asbjørn; Serritzlew, Søren; Blom-Hansen, Jens

    2007-01-01

    Theories of coalition formation represent a diverse set of arguments about why some government coalitions form while others do not. In this article, the authors present a systematic empirical test of the relative importance of the various arguments. The test is designed to avoid a circularity...... problem present in many coalition studies - namely that the theories are tested on data of national government coalitions in postwar Europe: the very data that gave rise to the theories in the first place. Instead, the authors focus on government coalitions at the municipal level. They base their analysis...... on office and policy motives. At the same time, the analysis raises the question of whether actors really seek minimal coalitions....

  9. Coalitions in the quantum Minority game: Classical cheats and quantum bullies

    International Nuclear Information System (INIS)

    Flitney, Adrian P.; Greentree, Andrew D.

    2007-01-01

    In a one-off Minority game, when a group of players agree to collaborate they gain an advantage over the remaining players. We consider the advantage obtained in a quantum Minority game by a coalition sharing an initially entangled state versus that obtained by a coalition that uses classical communication to arrive at an optimal group strategy. In a model of the quantum Minority game where the final measurement basis is randomized, quantum coalitions outperform classical ones when carried out by up to four players, but an unrestricted amount of classical communication is better for larger coalition sizes

  10. Learning from Iraq and Afghanistan: Four Lessons for Building More Effective Coalitions

    Directory of Open Access Journals (Sweden)

    White Nathan

    2016-06-01

    Full Text Available Despite many tactical and operational successes by brave military and civilian personnel, post-9/11 operations by U.S. led coalitions in Iraq and Afghanistan did not achieve their intended outcomes. Although many efforts are underway by discrete organizations within coalition countries to identify and learn their own lessons from these conflicts, comparatively less attention is paid to broader lessons for successful coalitions. Given that the U.S. and its allies will most certainly form coalitions in the future for a range of different contingency scenarios, these lessons are equally deserving of close examination. This article identifies four interrelated lessons from Iraq and Afghanistan that can be utilized to inform more effective coalition development and employment.

  11. International Land Coalition: Women's access to land

    OpenAIRE

    International Land Coalition (ILC)

    2008-01-01

    Metadata only record The International Land Coalition (ILC) started as the Popular Coalition to Eradicate Hunger and Poverty. This is a global alliance of intergovernmental, governmental and civil-society organizations committed to rural poverty eradication. On their website, (on the left click on documents) the link presents a list of resources related to the role of women and access to land. There are case studies and country reports in Cambodia, India, Indonesia, Kenya and Nepal, as wel...

  12. Coalitions of things: supporting ISR tasks via internet of things approaches

    Science.gov (United States)

    Preece, Alun; Taylor, Ian; Dawson, Andrew; Braines, Dave; O'Leary, Nick; Thomas, Anna; Tomsett, Richard; La Porta, Tom; Bakdash, Jonathan Z.; Zaroukian, Erin

    2017-05-01

    In the wake of rapid maturing of Internet of Things (IoT) approaches and technologies in the commercial sector, the IoT is increasingly seen as a key `disruptive' technology in military environments. Future operational environments are expected to be characterized by a lower proportion of human participants and a higher proportion of autonomous and semi-autonomous devices. This view is reflected in both US `third offset' and UK `information age' thinking and is likely to have a profound effect on how multinational coalition operations are conducted in the future. Much of the initial consideration of IoT adoption in the military domain has rightly focused on security concerns, reflecting similar cautions in the early era of electronic commerce. As IoT approaches mature, this initial technical focus is likely to shift to considerations of interactivity and policy. In this paper, rather than considering the broader range of IoT applications in the military context, we focus on roles for IoT concepts and devices in future intelligence, surveillance and reconnaissance (ISR) tasks, drawing on experience in sensor-mission resourcing and human-computer collaboration (HCC) for ISR. We highlight the importance of low training overheads in the adoption of IoT approaches, and the need to balance proactivity and interactivity (push vs pull modes). As with sensing systems over the last decade, we emphasize that, to be valuable in ISR tasks, IoT devices will need a degree of mission-awareness in addition to an ability to self-manage their limited resources (power, memory, bandwidth, computation, etc). In coalition operations, the management and potential sharing of IoT devices and systems among partners (e.g., in cross-coalition tactical-edge ISR teams) becomes a key issue due heterogeneous factors such as language, policy, procedure and doctrine. Finally, we briefly outline a platform that we have developed in order to experiment with human-IoT teaming on ISR tasks, in both

  13. Tobacco Control and Health Advocacy in the European Union: Understanding Effective Coalition-Building.

    Science.gov (United States)

    Weishaar, Heide; Collin, Jeff; Amos, Amanda

    2016-02-01

    Coalitions of supporters of comprehensive tobacco control policy have been crucial in achieving policy success nationally and internationally, but the dynamics of such alliances are not well understood. Qualitative semi-structured, narrative interviews with 35 stakeholders involved in developing the European Council Recommendation on smoke-free environments. These were thematically analyzed to examine the dynamics of coalition-building, collaboration and leadership in the alliance of organizations which successfully called for the development of comprehensive European Union (EU) smoke-free policy. An alliance of tobacco control and public health advocacy organizations, scientific institutions, professional bodies, pharmaceutical companies, and other actors shared the goal of fighting the harms caused by second-hand smoke. Alliance members jointly called for comprehensive EU smoke-free policy and the protection of the political debates from tobacco industry interference. The alliance's success was enabled by a core group of national and European actors with long-standing experience in tobacco control, who facilitated consensus-building, mobilized allies and synchronized the actions of policy supporters. Representatives of Brussels-based organizations emerged as crucial strategic leaders. The insights gained and identification of key enablers of successful tobacco control advocacy highlight the strategic importance of investing into tobacco control at European level. Those interested in effective health policy can apply lessons learned from EU smoke-free policy to build effective alliances in tobacco control and other areas of public health. © The Author 2015. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco.

  14. Building Coalitions for a Diversified and Sustainable Tourism: Two Case Studies from Hungary

    Directory of Open Access Journals (Sweden)

    Zoltán Lakner

    2018-04-01

    Full Text Available The development of the tourism sector has been a question of strategic importance for Hungary, a small, open economy with limited natural resources. At the same time, these efforts often generate considerable environmental conflicts, decreasing the sustainability of the environment. To understand the potential methods of sustainable tourism development, and to develop the optimal policy, it is essential to clarify the actors, their systems of interest and the potential ways of forging coalitions between them. The article presents an analysis of two case studies of rural tourism development: the “softening” of tourism at the most important touristic attraction in Hungary, Lake Balaton; and the conflicts arising from wine tourism development. Based on institutional economics, principle–agent theory and strategic management, and applying the MACTOR method, the authors identify the key actors, present the network of their mutual influences and goals, determine the most important conflicts and highlight the potential coalitions between them from the point of view of sustainable rural tourism development, as well as ways to further develop the regulatory environment. Based on this analysis, the article proves: (1 the importance of the modernization and re-organization of the public administration structure, focusing on optimal utilization of resources, as opposed to attaching to traditions; (2 the importance of forming clusters of different partners; (3 the strengthening of the knowledge base of decisions concerning sustainable tourism management; and (4 increasing conscious planning, based on the inclusion of different interest groups and long-term prognoses in local decision making, minimises the environmental burden of tourism.

  15. Local Self-Government as an Architect of Coalitions for Local Development

    Directory of Open Access Journals (Sweden)

    Anna Gąsior-Niemiec

    2014-12-01

    Full Text Available The paper addresses the new role played by local self-government units in Poland. Main factors that determine the public authorities’ capacity to become architects of coalitions for local development are identified. Coalitions are defined as partnerships linking and mobilizing stakeholders anchored in three sectors: public, economic and non-governmental. The coalition-making role of the public organs is investigated on the basis of Local Action Groups (LAGs, which are pro-developmental cross-sector organizations established in rural areas of the Podkarpackie (Sub-Carpathian Voivodesh ip, Poland. Findings are presented that draw on quantitative and qualitative results of the research project that investigated mechanisms involved in the operation of the cross-s ector coalitions. The dominant role of the public authorities in those coalitions is demonstrated. The Community-led Local Development model is referred to as the future framework for LAGs.

  16. Coalition Building for Health: A Community Garden Pilot Project with Apartment Dwelling Refugees.

    Science.gov (United States)

    Eggert, Lynne K; Blood-Siegfried, Jane; Champagne, Mary; Al-Jumaily, Maha; Biederman, Donna J

    2015-01-01

    Refugees often experience compromised health from both pre- and post-migration stressors. Coalition theory has helped guide the development of targeted programs to address the health care needs of vulnerable populations. Using the Community Coalition Action Theory as a framework, a coalition was formed to implement a community garden with apartment-dwelling refugees. Outcomes included successful coalition formation, a community garden, reported satisfaction from all gardeners with increased vegetable intake, access to culturally meaningful foods, and evidence of increased community engagement. The opportunity for community health nurses to convene a coalition to affect positive health for refugees is demonstrated.

  17. Examining Capacity and Functioning of Bicycle Coalitions: A Descriptive Study

    Directory of Open Access Journals (Sweden)

    Melissa Bopp

    2017-11-01

    Full Text Available BackgroundBicycle coalitions represent a strong partner in creating bike-friendly communities through advocacy for physical infrastructure, encouragement for biking, or education about safety. Despite their versatility, little is known about their functioning. Therefore, the purpose of this study was to examine capacity, strengths, and weaknesses of these organizations.MethodsBicycle coalitions/advocacy groups from English-speaking countries were recruited to take part in an online survey via email invitation. The survey addressed basic information about the coalition (community demographics, location, leadership, communication strategies, coalition priorities, barriers to programming/activities, and partners.ResultsCoalitions (n = 56 from four countries completed the survey. Most coalitions operated as a non-profit (n = 44, 95.7%, 45% (n = 21 have paid staff as leaders, while 37% (n = 17 have volunteers as leaders. The following skills were represented in coalitions’ leadership: fundraising (n = 31, 53.4%, event planning (n = 31, 53.4%, urban planning (n = 26, 44%, and policy/legislation expertise (n = 26, 44.8%. Education (n = 26, 63.4% and encouragement (n = 25, 61.6% were viewed as top priorities and the safety of bicyclists (n = 21, 46.7% and advocacy for infrastructure and policy (n = 22, 48.9% is the focus of most activities. A lack of financial resources (n = 36, 81.8% and capable personnel (n = 25, 56.8% were significant barriers to offering programming in the community and that the availability of grants to address issues (n = 38, 86.4% would be the top motivator for improvements.ConclusionBike coalitions represent a critical partner in creating activity-friendly environments and understanding their capacity allows for creating skill/capacity building intervention programs, development of effective toolkits and fostering strong collaborations to address physical inactivity.

  18. CFCC: A Covert Flows Confinement Mechanism for Virtual Machine Coalitions

    Science.gov (United States)

    Cheng, Ge; Jin, Hai; Zou, Deqing; Shi, Lei; Ohoussou, Alex K.

    Normally, virtualization technology is adopted to construct the infrastructure of cloud computing environment. Resources are managed and organized dynamically through virtual machine (VM) coalitions in accordance with the requirements of applications. Enforcing mandatory access control (MAC) on the VM coalitions will greatly improve the security of VM-based cloud computing. However, the existing MAC models lack the mechanism to confine the covert flows and are hard to eliminate the convert channels. In this paper, we propose a covert flows confinement mechanism for virtual machine coalitions (CFCC), which introduces dynamic conflicts of interest based on the activity history of VMs, each of which is attached with a label. The proposed mechanism can be used to confine the covert flows between VMs in different coalitions. We implement a prototype system, evaluate its performance, and show that our mechanism is practical.

  19. National Coalition for Homeless Veterans

    Science.gov (United States)

    ... Continues Support of National Campaign to End Veteran Homelessness Nov. 14, 2017 This Veterans Day, Harbor Freight ... support of the national campaign to end veteran homelessness through generous contributions to the National Coalition for ...

  20. Religious coalition opposes gene patents.

    Science.gov (United States)

    James, J S

    1995-05-19

    The biotechnology industry is concerned about a coalition of mainstream religious leaders, working with Jeremy Rifkin of the Foundation of Economic Trends, who oppose the patenting of human and animal life forms, body parts, and genes. The coalition called a press conference on May 18 to ask the government to prohibit the current patenting practices for genetic engineering. The biotechnology industry argues that patents indicate that a company's research tool has significant value, and encourages capitalists to invest their dollars in the development of new treatments for diseases. They also argue that the 29 biotech drugs that are on the market have been developed as a result of patents on genes. Although most business leaders are united in opposing restrictions, many scientists are divided, citing both religious and scientific reasons.

  1. The bone scan in tarsal coalition: a case report

    International Nuclear Information System (INIS)

    De Lima, R.T.; Mishkin, F.S.

    1996-01-01

    Tarsal coalition is abnormal fusion of two or more tarsal bones. The union may be fibrous, cartilaginous, or osseous and can be congenital or acquired in response to infection, articular disorders, trauma, or surgery. We report a case of fibrous talocalcaneal coalition in a 15-year-old boy in whom bone scintigraphy employing pinhole lateral views confirmed the clinical diagnosis when plain radiographs showed minimal changes and computed tomography was equivocal. The diagnosis of symptomatic tarsal coalition is important in that it is a common remediable cause of peroneal spastic flat foot, a frequently encountered condition. Scintigraphy provides important information about the presence and localization of this condition. (orig.). With 3 figs

  2. The bone scan in tarsal coalition: a case report

    Energy Technology Data Exchange (ETDEWEB)

    De Lima, R.T. [Department of Radiology, Division of Nuclear Medicine, Harbor-UCLA Medical Center, Torrance, CA (United States); Mishkin, F.S. [Department of Radiology, Division of Nuclear Medicine, Harbor-UCLA Medical Center, Torrance, CA (United States)

    1996-10-01

    Tarsal coalition is abnormal fusion of two or more tarsal bones. The union may be fibrous, cartilaginous, or osseous and can be congenital or acquired in response to infection, articular disorders, trauma, or surgery. We report a case of fibrous talocalcaneal coalition in a 15-year-old boy in whom bone scintigraphy employing pinhole lateral views confirmed the clinical diagnosis when plain radiographs showed minimal changes and computed tomography was equivocal. The diagnosis of symptomatic tarsal coalition is important in that it is a common remediable cause of peroneal spastic flat foot, a frequently encountered condition. Scintigraphy provides important information about the presence and localization of this condition. (orig.). With 3 figs.

  3. Structural and Community Change Outcomes of the Connect-to-Protect Coalitions: Trials and Triumphs Securing Adolescent Access to HIV Prevention, Testing, and Medical Care.

    Science.gov (United States)

    Miller, Robin Lin; Reed, Sarah J; Chiaramonte, Danielle; Strzyzykowski, Trevor; Spring, Hannah; Acevedo-Polakovich, Ignacio D; Chutuape, Kate; Cooper-Walker, Bendu; Boyer, Cherrie B; Ellen, Jonathan M

    2017-09-01

    Connect to Protect (C2P), a 10-year community mobilization effort, pursued the dual aims of creating communities competent to address youth's HIV-related risks and removing structural barriers to youth health. We used Community Coalition Action Theory (CCAT) to examine the perceived contributions and accomplishments of 14 C2P coalitions. We interviewed 318 key informants, including youth and community leaders, to identify the features of coalitions' context and operation that facilitated and undermined their ability to achieve structural change and build communities' capability to manage their local adolescent HIV epidemic effectively. We coded the interviews using an a priori coding scheme informed by CCAT and scholarship on AIDS-competent communities. We found community mobilization efforts like C2P can contribute to addressing the structural factors that promote HIV-risk among youth and to community development. We describe how coalition leadership, collaborative synergy, capacity building, and local community context influence coalitions' ability to successfully implement HIV-related structural change, demonstrating empirical support for many of CCAT's propositions. We discuss implications for how community mobilization efforts might succeed in laying the foundation for an AIDS-competent community. © Society for Community Research and Action 2017.

  4. [Synostosis and tarsal coalitions in children. A study of 68 cases in 47 patients].

    Science.gov (United States)

    Rouvreau, P; Pouliquen, J C; Langlais, J; Glorion, C; de Cerqueira Daltro, G

    1994-01-01

    The authors report their experience with tarsal coalitions in children. The purpose of this study was to discuss the origins of the of the calcaneum, and to propose a simple therapeutic strategy for diagnosis and treatment. The study included 47 children (68 feet), with one or more idiopathic tarsal coalitions. All patients had physical examinations to record symptoms, morphology of the foot, mobility of the foot, gait analysis, standard radiographs, and in some cases CT scans or MRI. The average age of the patients was 11.5 years old, 7 patients had a positive family history for tarsal coalitions. 66 per cent of the patients had mild tarsal pain or a history of repeated ankle sprains. The conservative treatment concerned 28 feet: 3 casts, 2 injections of corticosteroids into the subtalar joint, insole-shoes in 3 cases, and abstention in 20 cases. The operative treatment (40 feet) consisted of resection of calcaneonavicular coalitions (24 feet) resection of talocalcaneal coalitions (3 feet), mediotarsal and subtalar arthrodesis (8 feet), resection of calcaneonavicular coalition combined with the "Cavalier'' procedure described by Judet (3 feet), calcaneal osteotomy (2 feet). The mean follow-up was 42 months. The morphology of the involved foot was normal in 33 cases, flat foot was seen in 24 cases (4 peroneal spastic flat feet), pes cavus in 3 cases, club foot in 2 cases, pes varus in 4 cases, "Z'' shaped feet in 2 cases. The radiological examination was demonstrative of tarsal coalition in 61 feet. 7 tarsal coalitions were seen during operative procedures. The location or the coalition was calcaneonavicular (57), talocalcaneal (16), talo-navicular (8), calcaneo-cuboid (7), naviculo-cuneiform (4). The secondary radiographic signs were studied for each foot. In the conservative group, 2 patients degraded their clinical status, one developed a spastic flat foot. In the surgical group, all except 2 patients had good clinical and functional results. One patient had

  5. An empirical test of new developments in coalition theory for the design of international environmental agreements

    NARCIS (Netherlands)

    Finus, M.; Sáiz Pérez, M.E.; Hendrix, E.M.T.

    2009-01-01

    We consider new developments in coalition theory for the design of international environmental agreements (IEAs). Applying an empirical model on climate change that comprises benefit and cost estimates from abatement for 12 world regions, we analyze how the design of an agreement affects the success

  6. Strongly Essential Coalitions and the Nucleolus of Peer Group Games

    NARCIS (Netherlands)

    Brânzei, R.; Solymosi, T.; Tijs, S.H.

    2003-01-01

    Most of the known efficient algorithms designed to compute the nucleolus for special classes of balanced games are based on two facts: (i) in any balanced game, the coalitions which actually determine the nucleolus are essential; and (ii) all essential coalitions in any of the games in the class

  7. Hospital-Based Coalition to Improve Regional Surge Capacity

    Directory of Open Access Journals (Sweden)

    James M. Learning

    2012-12-01

    Full Text Available Introduction: Surge capacity for optimization of access to hospital beds is a limiting factor in response to catastrophic events. Medical facilities, communication tools, manpower, and resource reserves exist to respond to these events. However, these factors may not be optimally functioning to generate an effective and efficient surge response. The objective was to improve the function of these factors.Methods: Regional healthcare facilities and supporting local emergency response agencies developed a coalition (the Healthcare Facilities Partnership of South Central Pennsylvania; HCFP¬SCPA to increase regional surge capacity and emergency preparedness for healthcare facilities. The coalition focused on 6 objectives: (1 increase awareness of capabilities and assets, (2 develop and pilot test advanced planning and exercising of plans in the region, (3 augment written medical mutual aid agreements, (4 develop and strengthen partnership relationships, (5 ensure National Incident Management System compliance, and (6 develop and test a plan for effective utilization of volunteer healthcare professionals.Results: In comparison to baseline measurements, the coalition improved existing areas covered under all 6 objectives documented during a 24-month evaluation period. Enhanced communications between the hospital coalition, and real-time exercises, were used to provide evidence of improved preparedness for putative mass casualty incidents.Conclusion: The HCFP-SCPA successfully increased preparedness and surge capacity through a partnership of regional healthcare facilities and emergency response agencies.

  8. Can state-supported interprofessional coalitions cure preceptor shortages?

    Science.gov (United States)

    Woodall, Lesli; Smith, Gigi; Garr, David; Hopla, Deborah; Kern, Donna

    2018-06-01

    The shortage of clinical preceptors compromises the current and future supply of healthcare providers and patient access to primary care. This article describes how an interprofessional coalition in South Carolina formed and sought government support to address the preceptor shortage. Some states have legislated preceptor tax credits and/or deductions to support the clinical education of future primary care healthcare providers. As a result of the coalition's work, a bill to establish similar incentives is pending in the South Carolina legislature.

  9. Coalition Formation and Spectrum Sharing of Cooperative Spectrum Sensing Participants.

    Science.gov (United States)

    Zhensheng Jiang; Wei Yuan; Leung, Henry; Xinge You; Qi Zheng

    2017-05-01

    In cognitive radio networks, self-interested secondary users (SUs) desire to maximize their own throughput. They compete with each other for transmit time once the absence of primary users (PUs) is detected. To satisfy the requirement of PU protection, on the other hand, they have to form some coalitions and cooperate to conduct spectrum sensing. Such dilemma of SUs between competition and cooperation motivates us to study two interesting issues: 1) how to appropriately form some coalitions for cooperative spectrum sensing (CSS) and 2) how to share transmit time among SUs. We jointly consider these two issues, and propose a noncooperative game model with 2-D strategies. The first dimension determines coalition formation, and the second indicates transmit time allocation. Considering the complexity of solving this game, we decompose the game into two more tractable ones: one deals with the formation of CSS coalitions, and the other focuses on the allocation of transmit time. We characterize the Nash equilibria (NEs) of both games, and show that the combination of these two NEs corresponds to the NE of the original game. We also develop a distributed algorithm to achieve a desirable NE of the original game. When this NE is achieved, the SUs obtain a Dhp-stable coalition structure and a fair transmit time allocation. Numerical results verify our analyses, and demonstrate the effectiveness of our algorithm.

  10. United we stand : Corporate Monitoring by Shareholder Coalitions in the UK

    NARCIS (Netherlands)

    Crespi, R.; Renneboog, L.D.R.

    2000-01-01

    This paper investigates whether voting coalitions are formed by shareholders in order to discipline incumbent management. Shapley values capturing the relative power of shareholder coalitions by category of owner, outperform models with percentage ownership stakes and models measuring the relative

  11. Marching toward reproductive justice: coalitional (re) framing of the March for Women's Lives.

    Science.gov (United States)

    Luna, Zakiya T

    2010-01-01

    This article examines how coalition frames develop and what happens to that frame after the formal coalition ends. To that end, I analyze the frame shift around the 2004 March for Women's Lives (March). The March initially focused on established ideas of reproductive rights around which the four national mainstream co-sponsors previously organized. However, after a newer reproductive justice organization joined the coalition, material and organizing reflected a shift in framing to reproductive justice. How did this change happen? What are the impacts of this event for the women's movement? Through document analysis and interviews, I trace the negotiations that facilitated this framing shift. I argue that this new coalition frame translated into positive lasting changes in organizing for women's reproductive health even as the coalition dissolved and some of the tensions within the larger women's movement remain.

  12. Competitive Outcomes and Endogenous Coalition Formation in an n-Person Game

    NARCIS (Netherlands)

    Sun, N.; Trockel, W.; Yang, Z.F.

    2004-01-01

    In this paper we study competitive outcomes and endogenous coalition formation in a cooperative n-person transferable utility (TU) game from the viewpoint of general equilibrium theory.For any given game, we construct a competitive exchange coalition production economy corresponding to the game.

  13. KSCO 2002: Second International Conference on Knowledge Systems for Coalition Operations

    Science.gov (United States)

    2002-05-01

    based on selected classic coalition theories is, for example, COALA (Klusch & Vielhak, 1997). 94 unique for any 3-agent game (A,v), assigns...1997) COALA - Simulation Environment for Coalition Formation Among Autonomous Information Agents. http://www.dfki.de/~klusch/ COALA / Kraus, S

  14. Subtalar coalition: usefulness of the C sign on lateral radiographs of the ankle

    International Nuclear Information System (INIS)

    Kim, Seong Hyun; Ahn, Joong Mo; Lee, Min Hee; Yoon, Hye Kyung; Kim, Sung Moon; Shin, Myung Jin; Kang, Heung Sik

    2001-01-01

    To assess the usefulness of the talocalcaneal C sign in the diagnosis of subtalar coalition, as seen on lateral radiographs of the ankle. Lateral radiographs of 12 ankles in 11 patients were included in this study. Twelve subtalar coalitions were confirmed by surgery (n=6), or by CT and/or MR (n=6). The presence of the talocalcaneal C sign on lateral ankle radiographs was determined. The C sign was continuous in six feet and interrupted in the remaining six. Subtalar coalition occurred simultaneously inthe middle and posterior subtalar joints in two cases, the posterior subtalar joint only in six, and in the middle subtalar joint only in four. In six cases confirmed at surgery, subtalar coalitions consisted of both synostosis and non-osseous fusion (synchondrosis and/or syndesmosis) and in one case of middle subtalar coalition, there was a bony bridge. The remaining six cases. confirmed at CT or MRI, involved both synostosis and non-osseous fusion (n=1) or non-osseous fusion only (n=5). In the diagnosis of subtalar coalition, the talocalcaneal C sign, seen on lateral radiographs of the ankle, is a useful indicator

  15. The Fiscal Politics of Big Governments: Do Coalitions Matter?

    OpenAIRE

    Lambertini, Luisa; Azariadis, Costas

    2003-01-01

    This paper uses a closed voting rule to explain how gradual changes in the socio-economic structure of developed societies shift political coalitions and lead to rapid expansions of transfer programs. Equilibria in a lifecycle economy with three homogeneous groups of voters (retirees, skilled young workers, unskilled young workers) have three properties. One, if income inequality is sufficiently high, unskilled workers and retirees will form a dominant coalition which raises both intragenerat...

  16. Two hardness results for core stability in hedonic coalition formation games

    NARCIS (Netherlands)

    Deineko, V.G.; Woeginger, G.J.

    2013-01-01

    We establish NP-completeness of two problems on core stable coalitions in hedonic games. In the first problem every player has only two acceptable coalitions in his preference list, and in the second problem the preference structures arise from the distances in an underlying metric space.

  17. A block chain based architecture for asset management in coalition operations

    Science.gov (United States)

    Verma, Dinesh; Desai, Nirmit; Preece, Alun; Taylor, Ian

    2017-05-01

    To support dynamic communities of interests in coalition operations, new architectures for efficient sharing of ISR assets are needed. The use of blockchain technology in wired business environments, such as digital currency systems, offers an interesting solution by creating a way to maintain a distributed shared ledger without requiring a single trusted authority. In this paper, we discuss how a blockchain-based system can be modified to provide a solution for dynamic asset sharing amongst coalition members, enabling the creation of a logically centralized asset management system by a seamless policy-compliant federation of different coalition systems. We discuss the use of blockchain for three different types of assets in a coalition context, showing how blockchain can offer a suitable solution for sharing assets in those environments. We also discuss the limitations in the current implementations of blockchain which need to be overcome for the technology to become more effective in a decentralized tactical edge environment.

  18. Continued benefits of a technical assistance web site to local tobacco control coalitions during a state budget shortfall.

    Science.gov (United States)

    Buller, David B; Young, Walter F; Bettinghaus, Erwin P; Borland, Ron; Walther, Joseph B; Helme, Donald; Andersen, Peter A; Cutter, Gary R; Maloy, Julie A

    2011-01-01

    A state budget shortfall defunded 10 local tobacco coalitions during a randomized trial but defunded coalitions continued to have access to 2 technical assistance Web sites. To test the ability of Web-based technology to provide technical assistance to local tobacco control coalitions. Randomized 2-group trial with local tobacco control coalitions as the unit of randomization. Local communities (ie, counties) within the State of Colorado. Leaders and members in 34 local tobacco control coalitions funded by the state health department in Colorado. Two technical assistance Web sites: A Basic Web site with text-based information and a multimedia Enhanced Web site containing learning modules, resources, and communication features. Use of the Web sites in minutes, pages, and session and evaluations of coalition functioning on coalition development, conflict resolution, leadership satisfaction, decision-making satisfaction, shared mission, personal involvement, and organization involvement in survey of leaders and members. Coalitions that were defunded but had access to the multimedia Enhanced Web site during the Fully Funded period and after defunding continued to use it (treatment group × funding status × period, F(3,714) = 3.18, P = .0234). Coalitions with access to the Basic Web site had low Web site use throughout and use by defunded coalitions was nearly zero when funding ceased. Members in defunded Basic Web site coalitions reported that their coalitions functioned worse than defunded Enhanced Web site coalitions (coalition development: group × status, F(1,360) = 4.81, P = .029; conflict resolution: group × status, F(1,306) = 5.69, P = .018; leadership satisfaction: group × status, F(1,342) = 5.69, P = .023). The Enhanced Web site may have had a protective effect on defunded coalitions. Defunded coalitions may have increased their capacity by using the Enhanced Web site when fully funded or by continuing to use the available online resources after defunding

  19. Clean air renewable energy (CARE) coalition : a case study

    International Nuclear Information System (INIS)

    Lambert, G.; Pollock, D.

    2002-01-01

    This paper highlights the opportunity for new partnerships between business and non-governmental organizations in the field of sustainable development through the growing convergence of interests. The authors also briefly describe both Suncor Energy and the Pembina Institute for Appropriate Development stances on sustainable development. Since 1990, both organizations have collaborated on the future of the emerging renewable energy industry. Renewable energy represents an energy source diversification through the regional creation of jobs and improved air quality and associated benefits resulting from the reductions in greenhouse gas emissions. The Clean Air Renewable Energy Coalition (Coalition) was established in December 2000 in order to assess the barriers to capital investment in the renewable energy industry. It was revealed that the international community as a whole was further ahead than Canada in terms of renewable support, production and export of technology and services. Some of the challenges facing the industry are: low demand for renewables and low supply. The coalition allowed for the joint identification of desired policy changes, such as new tax incentives for renewable energy supply and demand. Efforts were made in inviting the support of industry, municipalities and environmental non governmental organizations. The list of members that have joined the coalition to date was shown. The coalition is asking for consumer green energy credit, designed for the creation of demand and the education of the general public, and producer incentives to increase supply. The proposals were explained, as well as the strategic principles underlying them. A new tax incentive was announced in the December 2001 Canadian federal budget. The authors concluded by mentioning some future opportunities and the lessons learned on the importance of the right partners, of broad-based advocacy, of targeted and focuses messages, and of evolutionary change

  20. Clean air renewable energy (CARE) coalition : a case study

    Energy Technology Data Exchange (ETDEWEB)

    Lambert, G. [Suncor Energy, Fort McMurray, AB (Canada); Pollock, D. [Pembina Institute for Appropriate Development, Drayton Valley, AB (Canada)

    2002-07-01

    This paper highlights the opportunity for new partnerships between business and non-governmental organizations in the field of sustainable development through the growing convergence of interests. The authors also briefly describe both Suncor Energy and the Pembina Institute for Appropriate Development stances on sustainable development. Since 1990, both organizations have collaborated on the future of the emerging renewable energy industry. Renewable energy represents an energy source diversification through the regional creation of jobs and improved air quality and associated benefits resulting from the reductions in greenhouse gas emissions. The Clean Air Renewable Energy Coalition (Coalition) was established in December 2000 in order to assess the barriers to capital investment in the renewable energy industry. It was revealed that the international community as a whole was further ahead than Canada in terms of renewable support, production and export of technology and services. Some of the challenges facing the industry are: low demand for renewables and low supply. The coalition allowed for the joint identification of desired policy changes, such as new tax incentives for renewable energy supply and demand. Efforts were made in inviting the support of industry, municipalities and environmental non governmental organizations. The list of members that have joined the coalition to date was shown. The coalition is asking for consumer green energy credit, designed for the creation of demand and the education of the general public, and producer incentives to increase supply. The proposals were explained, as well as the strategic principles underlying them. A new tax incentive was announced in the December 2001 Canadian federal budget. The authors concluded by mentioning some future opportunities and the lessons learned on the importance of the right partners, of broad-based advocacy, of targeted and focuses messages, and of evolutionary change.

  1. The C sign: more specific for flatfoot deformity than subtalar coalition

    International Nuclear Information System (INIS)

    Brown, R.R.; Rosenberg, Z.S.; Thornhill, B.A.

    2001-01-01

    Objective. To assess the sensitivity and specificity of the C sign, a C-shaped line created by the outline of the talar dome and the inferior margin of the sustentaculum tali on lateral ankle radiographs, for patients with both flatfoot deformity and specifically talocalcaneal (TC) coalition.Design and patients. All patients in this retrospective study were under 35 years of age and had a lateral ankle radiograph and follow-up CT scan for a non-traumatic indication. Forty-eight cases over the past 5 years fulfilled these criteria. Two masked musculoskeletal radiologists determined the presence or absence of the C sign for each lateral radiograph by consensus. Each CT study was then assessed by a third musculoskeletal radiologist for the presence of tarsal coalition. Observations were correlated with clinical history regarding presence or absence of flatfoot deformity.Results. Ten cases of TC coalition were diagnosed, four of which demonstrated a C sign (40%). Eight cases with a C sign were encountered, four of which had TC coalition (50%) and four did not. All patients with a positive C sign had a flatfoot clinically (100%), while only eight of 24 flatfooted patients had a C sign (33%).Conclusion. The C sign is specific, but not sensitive, for flatfoot deformity, and is neither sensitive nor specific for subtalar coalition. (orig.)

  2. A coalition formation game for transmitter cooperation in OFDMA uplink communications

    KAUST Repository

    Chelli, Ali

    2014-12-01

    The SC-FDMA (single-carrier frequency division multiple access) is the access scheme that has been adopted by 3GPP (3rd generation partnership project) for the LTE (long term evolution) uplink. The SC-FDMA is an attractive alternative to OFDMA (orthogonal frequency-division multiple access) especially on the uplink owing to its low peak-to-average power ratio. This fact increases the power efficiency and reduces the cost of the power amplifiers at the mobile terminals. The use of SC-FDMA on the uplink implies that for highly loaded cells the base station allocates a single subcarrier to each user. This results in the limitation of the achievable rate on the uplink. In this work, we propose a coalition game between mobile terminals that allows them to improve their performance by sharing their subcarriers without creating any interference to each other. The proposed scheme allows a fair use of the subcarriers and leads to a significant capacity gain for each user. The cooperation between the nodes is modelled using coalitional game theory. In this game, each coalition tries to maximize its utility in terms of rate. In the absence of cooperation cost, it can be shown that the grand coalition is sum-rate optimal and stable, i.e., the mobile terminals have no incentive to leave the grand coalition.

  3. The regenerative medicine coalition. Interview with Frank-Roman Lauter.

    Science.gov (United States)

    Lauter, Frank-Roman

    2012-11-01

    Frank-Roman Lauter, Secretary General of the recently launched Regenerative Medicine Coalition, explains how the coalition was formed and what they hope to achieve. Frank-Roman Lauter has served as Secretary General of the Regenerative Medicine Coalition since 2012, and as Head of Business Development at Berlin-Brandenburg Center for Regenerative Therapies since 2007. Frank-Roman Lauter's interest is the organization of academic infrastructures to promote efficient translation of research findings into new therapies. He co-organizes joined strategy development for regenerative medicine clusters from seven European countries (FP7-EU Project) and has initiated cooperation between the California Institute for Regenerative Medicine and the German Federal Ministry for Education & Research, resulting in a joined funding program. Recently, he cofounded the international consortium of Regenerative Medicine translational centers (RMC; www.the-rmc.org ). Trained as a molecular biologist at the Max-Planck Institute in Berlin-Dahlem and at Stanford, he has 16 years of experience as an entrepreneur and life science manager in Germany and the USA.

  4. Coalition Warfare Program Presentation to: 2009 EUCOM/AFRICOM Science and Technology Conference

    Science.gov (United States)

    2009-06-01

    compac an nexpens ve m cro- fluxgate magnetometer for use in multiple COCOMs. To continue T&E with joint services and apply lessons learned to...Partners in EUCOM/AFRICOM FY08 Starts • Advanced Dynamic Magnetometer FY09 Starts • ADNS Coalition Network FY10 New Starts • Clip-on Night Vision...Partner 2008 New Starts Advanced Dynamic Magnetometer for Static and Moving Applications T d l t d i i i US Navy (SPAWAR) Italy, Sweden o eve op a a

  5. Arthroscopic Talocalcaneal Coalition Resection in Children.

    Science.gov (United States)

    Knörr, Jorge; Soldado, Francisco; Menendez, Mariano E; Domenech, Pedro; Sanchez, Mikel; Sales de Gauzy, Jérôme

    2015-12-01

    To present the technique and outcomes of arthroscopic talocalcaneal coalition (TCC) resection in pediatric patients. We performed a prospective study of 16 consecutive feet with persistent symptomatic TCCs in 15 children. The mean age was 11.8 years (range, 8 to 15 years), and the mean follow-up period was 28 months (range, 12 to 44 months). A posterior arthroscopic TCC resection was performed. The plantar footprint, subtalar motion, pain, and the American Orthopaedic Foot & Ankle Society Ankle-Hindfoot scale score were evaluated preoperatively and postoperatively. Preoperative computed tomography (CT) scans were used to classify the coalition according to the Rozansky classification, to measure the percentage of involvement of the surface area, and to determine the degree of hindfoot valgus. Postoperative CT scans at 1 year (n = 15) and 3 years (n = 5) were used to assess recurrences. Patient satisfaction was also evaluated. The TCC distribution according to the Rozansky classification was type I in 7 cases, type II in 3, type III in 3, and type IV in 3. In all cases the arthroscopic approach enabled complete coalition resection. All patients increased by at least 1 stage in the footprint classification and showed clinical subtalar mobility after surgery. All patients showed a statistically significant improvement in pain after surgery except for 1 patient in whom complex regional pain syndrome developed (P < .001). The mean American Orthopaedic Foot & Ankle Society score was 56.8 (range, 45 to 62) preoperatively versus 90.9 (range, 36 to 100) postoperatively, showing a statistically significant increase (P < .001). Preoperative CT scans showed that all TCCs involved the medial subtalar joint facet, with mean involvement of 40.8% of the articular surface. All postoperative CT scans showed complete synostosis resections with no recurrences at final follow-up. At final follow-up, all patients were either satisfied (n = 4 [27%]) or extremely satisfied (n = 10 [67

  6. Joint Real-Time Energy and Demand-Response Management using a Hybrid Coalitional-Noncooperative Game

    Energy Technology Data Exchange (ETDEWEB)

    He, Fulin; Gu, Yi; Hao, Jun; Zhang, Jun Jason; Wei, Jiaolong; Zhang, Yingchen

    2015-11-11

    In order to model the interactions among utility companies, building demands and renewable energy generators (REGs), a hybrid coalitional-noncooperative game framework has been proposed. We formulate a dynamic non-cooperative game to study the energy dispatch within multiple utility companies, while we take a coalitional perspective on REGs and buildings demands through a hedonic coalition formation game approach. In this case, building demands request different power supply from REGs, then the building demands can be organized into an ultimate coalition structure through a distributed hedonic shift algorithm. At the same time, utility companies can also obtain a stable power generation profile. In addition, the interactive progress among the utility companies and building demands which cannot be supplied by REGs is implemented by distributed game theoretic algorithms. Numerical results illustrate that the proposed hybrid coalitional-noncooperative game scheme reduces the cost of both building demands and utility companies compared with the initial scene.

  7. Advancing Immigrant Worker Rights through Labor-Community Coalition: Comparative Case Studies of the CLEAN Carwash Campaign

    OpenAIRE

    Chen, Mindy Minyi

    2017-01-01

    Since 2008, a coalition known as the CLEAN Carwash Campaign has been organizing car wash workers in Los Angeles. How did CLEAN manage the divergent interests of its coalition members and strategize? What is it about CLEAN that led the labor-community coalition to achieve gains for carwasheros when conventional wisdom dictates that low wage immigrant workers were too vulnerable to be unionized? Given the dearth of empirical research into how social movement coalitions strategize and how campai...

  8. Core stability in hedonic coalition formation

    NARCIS (Netherlands)

    Woeginger, G.J.

    2012-01-01

    In many economic, social and political situations individuals carry out activities in groups (coalitions) rather than alone and on their own. Examples range from households and sport clubs to research networks, political parties and trade unions. The underlying game theoretic framework is known as

  9. Improving Organisational Effectiveness of Coalition Operations

    NARCIS (Netherlands)

    Bisig, E.; Ann-Renée; Hof, T.; Seiler, S.; Yanakiev, Y.

    2010-01-01

    Transformation of military operations demands new tools to support the performance of coalition forces in multinational operations. This paper contributes to one of the fundamental objectives of SAS-081/RSY, namely to the objective to share experience from the implementation of methods and tools and

  10. Negotiating Rights : Building Coalitions for Improving Maternal ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Negotiating Rights : Building Coalitions for Improving Maternal Health Services ... the state of maternal health in the country reflects poorly on public health priorities. ... A number of international agencies and civil society organizations are ...

  11. Business Coalitions in the Us and Their Role in Advancing a Regional Agenda

    Directory of Open Access Journals (Sweden)

    Bogdana NEAMTU

    2008-02-01

    Full Text Available The analysis herein explores the topic of business coalitions and focuses on the role they may play in advancing a regional agenda. The structure of the paper is threefold: (1 in the introductory section I briefly explain the meaning of the concept and how it relates to other similar concepts such as public-private partnerships or growth coalitions; (2 the second part focuses on analyzing the characteristics that best define contemporary business coalitions and stresses the implications of these characteristics for the structuring or restructuring of traditional local and regional political entities; (3 the last section focuses on how planners and other public officials could use or partner with business coalitions in order to advance their own regional agenda. In the conclusion section I argue that though business coalitions are important for the development of a regional economy and regional identity, it would be a mistake to think that they alone can determine the success of a region. Regional government should continue to be pursued as it represents the only solution to problems such as social and environmental justice, tax sharing, education, and inner city redevelopment.

  12. Skill improvement among coalition members in the California Healthy Cities and Communities Program.

    Science.gov (United States)

    Kegler, Michelle C; Norton, Barbara L; Aronson, Robert

    2007-06-01

    Community-driven, collaborative approaches to health promotion have the potential to enhance skills among community members and, in turn, increase community capacity. This study uses data from an evaluation of the California Healthy Cities and Communities (CHCC) Program to examine whether, and how, community problem-solving and collaboration skills are improved among coalition members and local coordinators in 20 participating communities. Methods include semi-structured interviews with coordinators and mailed surveys with coalition members (n=330 in planning phase and n=243 in implementation phase). The largest number of coordinators reported skill improvement in defining health broadly and assessing needs and assets. Similarly, coalition members reported greatest skill improvement for defining health broadly, assessing needs and assets and setting priorities and developing action plans. Modest correlations were observed between number of roles played in the local healthy cities and communities project and each skill area assessed. Time committed to the local CHCC coalition and its activities was not meaningfully correlated with any of the skills. Types of skill-building opportunities may be more important than number of hours devoted to meetings and activities in strengthening community problem-solving and collaboration skills among coalition members.

  13. A medium-term coalition-forming model of heterogeneous DERs for a commercial virtual power plant

    International Nuclear Information System (INIS)

    Shabanzadeh, Morteza; Sheikh-El-Eslami, Mohammad-Kazem; Haghifam, Mahmoud-Reza

    2016-01-01

    Highlights: • A medium-term coalition-forming scheme is proposed for commercial VPPs. • Decision making on the optimal selection of VPP coalition members, bilateral and forward contracting, and pool involvement. • VPP acts as an arbitrageur by exercising arbitrage between diverse energy trading floors. • Stochastic programming approach applied to characterize the uncertainty and to derive informed decisions. - Abstract: Within a medium-term market horizon, this research work provides a methodology that allows a commercial virtual power plant (CVPP) to form an optimal coalition of heterogeneous distributed energy resources (DERs) based on weekly bilateral contracting, futures-market involvement, and pool participation. The established model aims at composing an optimal portfolio of available DERs and jointly takes into account the risk associated with the energy trading strategy of the CVPP. Perceiving the fact that pool prices have highly uncertain nature, a framework based on stochastic programming approach is utilized to model this decision-making problem. The proposed framework consists of two stages. The first stage deals with decisions regarding DERs optimal selection for the VPP coalition, the amount of agreed quantity in the bilateral negotiation, and the type and quantity selection of futures-market contracts as well. In the second stage, decisions are made based on the most plausible realizations of the stochastic prices in the day-ahead market. For a given pre-specified risk level on profit volatility, the main objective is to maximize the expected profit for the VPP manager over the planning horizon. The efficiency and applicability of the developed model is illustrated and analyzed by its implementation in a system with few heterogeneous DERs and through different scenarios, and finally thereby meaningful conclusions are duly drawn.

  14. A 2040 Vision for the I-95 Coalition Region : Supporting Economic Growth in a Carbon-Constrained Environment

    Science.gov (United States)

    2008-12-01

    The I-95 Corridor Coalitions Vision project is a departure from the Coalitions historic role that focused primarily on shorter-term operational improvements in the corridor. In the past, most of the day-to-day issues confronting the Coalition m...

  15. Wind energy aggregation: A coalitional game approach

    KAUST Repository

    Baeyens, E.; Bitar, E.Y.; Khargonekar, P.P.; Poolla, K.

    2011-01-01

    power output as single entity into a forward energy market. We prove that wind power generators will always improve their expected profit when they aggregate their generated power and use tools from coalitional game theory to design fair sharing

  16. A CONCEPTUAL TOOL FOR ASSESSING CLIENT PERFORMANCE IN THE CONSTRUCTION PROJECT COALITION

    Directory of Open Access Journals (Sweden)

    Gary D. Holt

    2002-01-01

    Full Text Available Due to the significant impact of client performance on overall project performance and the interdependence of participant%5C%27s performance in the construction project coalition %28i.e. clients%2C designers and constructors%29%2C there is a need to establish client performance measures. Based on data collected from in-depth interviews with nineteen UK architects and nine UK contractors%2C a generic tool for the on-going formal assessment of client performance is presented. It was found that this approach to performance assessment %28i.e. from the view point of other%2C non-client coalition participants%29 should lead to improved project relationships. Data analysis showed that in addition to %5C%27harder%5C%27 measures such as understanding of project requirements and finance%2C other%2C %5C%27softer%5C%27 measures of client performance %28e.g. attitude%29 were worthy of consideration since they determine the quality of participant relationships. It is recommended that the tool be used to promote more effective client performance and thus enhance coalition relationships%2C enabling continuous improvement. The ultimate aim is to develop similar tools for the assessment of all coalition participants based on a culture of openness and trust. Abstract in Bahasa Indonesia : assessment+tool%2C+coalition+participants%2C+client+performance%2C+perceptions%2C+performance+measures%2C+satisfaction.

  17. The coalition of industrialists and environmentalists in the climate change issue

    Energy Technology Data Exchange (ETDEWEB)

    Brandt, U.S.; Tinggaard Svendsen, G.

    2003-07-01

    The political economy idea developed by Ackerman and Hassler (1981) is the starting point of this paper. It suggested that a coalition of environmentalists and industrialists successfully lobbied the US Congress. More strict technology-based standards for new sources than existing sources was the resulting policy outcome serving the common interest of the coalition because it both offered a barrier to entry for new firms and improved environmental quality. Wc focus both on cases from air and water pollution in the US confirming which seem to confirm this suggestion and the case of international climate negotiations and the promotion of wind-based energy. In the line of the Ackerman and Hassler approach wc suggest that the reason for EU eagerness to push forward ambitious reduction target levels (and thereby promote new green industries) is a similar coalition between industrialists and environmentalists. Such a strategy can be seen in the context of the Bootleggers and Baptist theory developed by Yandle (1983), where the Baptists (in our case the environmentalists) demand changes in behaviour on moral reasons. In contrast, the Bootleggers (the producers of renewable energy), who profit from the very regulation, keep a low profile. The actual heavy subsidisation of renewable energy sources, such as wind energy, can be viewed as a successful policy outcome for the coalition of industrialists and environmentalists offering both market protection and improved environmental quality. Solving the current dead-lock in international climate negotiations across the Atlantic may well imply fighting the strong coalition of industrialists and environmentalists. Such a political battle may turn out to be just as tough as fighting windmills if not clearly investigated in future research. (au)

  18. The coalition of industrialists and environmentalists in the climate change issue

    International Nuclear Information System (INIS)

    Brandt, U.S.; Tinggaard Svendsen, G.

    2003-01-01

    The political economy idea developed by Ackerman and Hassler (1981) is the starting point of this paper. It suggested that a coalition of environmentalists and industrialists successfully lobbied the US Congress. More strict technology-based standards for new sources than existing sources was the resulting policy outcome serving the common interest of the coalition because it both offered a barrier to entry for new firms and improved environmental quality. Wc focus both on cases from air and water pollution in the US confirming which seem to confirm this suggestion and the case of international climate negotiations and the promotion of wind-based energy. In the line of the Ackerman and Hassler approach wc suggest that the reason for EU eagerness to push forward ambitious reduction target levels (and thereby promote new green industries) is a similar coalition between industrialists and environmentalists. Such a strategy can be seen in the context of the Bootleggers and Baptist theory developed by Yandle (1983), where the Baptists (in our case the environmentalists) demand changes in behaviour on moral reasons. In contrast, the Bootleggers (the producers of renewable energy), who profit from the very regulation, keep a low profile. The actual heavy subsidisation of renewable energy sources, such as wind energy, can be viewed as a successful policy outcome for the coalition of industrialists and environmentalists offering both market protection and improved environmental quality. Solving the current dead-lock in international climate negotiations across the Atlantic may well imply fighting the strong coalition of industrialists and environmentalists. Such a political battle may turn out to be just as tough as fighting windmills if not clearly investigated in future research. (au)

  19. Extension Professionals and Community Coalitions: Professional Development Opportunities Related to Leadership and Policy, System, and Environment Change

    Science.gov (United States)

    Smathers, Carol A.; Lobb, Jennifer M.

    2015-01-01

    Community coalitions play an important role in community-wide strategies to promote health and wellbeing, and Extension professionals may provide leadership, technical assistance, and other support to coalitions. Extension professionals across a Midwestern state were invited to participate in an online survey about their coalition involvement and…

  20. CADRE Quick-Look: Homeland Security-NORTHCOM's Coalition War

    National Research Council Canada - National Science Library

    Conway, John L

    2005-01-01

    .... Coalition warfare has many facets: it involves the blending of different cultures, multiple languages dialects, and disparate weapon systems, as well as differing perceptions of end states and how to...

  1. 78 FR 69660 - Association of Businesses Advocating Tariff Equity, Coalition of Miso Transmission Customers...

    Science.gov (United States)

    2013-11-20

    ... Businesses Advocating Tariff Equity, Coalition of Miso Transmission Customers, Illinois Industrial Energy... LLC, Duke Energy Business Services, LLC, Entergy Arkansas, Inc., Entergy Gulf States Louisiana, LLC....206 (2013), Association of Businesses Advocating Tariff Equity, Coalition of Miso Transmission...

  2. Growing but not transforming: Fragmented ruling coalitions and economic developments in Uganda

    DEFF Research Database (Denmark)

    Kjær, Anne Mette; Katusiimeh, Mesharch

    been stable enough to maintain macro-economic stability, attract aid and ensure the one-off gains from introducing peace. However, the fact that it has proved so challenging to hold the ruling coalition together has hindered the ruling elite in implementing initiatives to support transformation......In spite of decades of GDP growth, Uganda remains an agricultural economy still awaiting an economic transformation. Sustained state initiatives to promote such a transformation have been lacking. We find that the explanation for this is to be found in the nature of the ruling coalition, which has...... is to use state resources to hold the ruling coalition together. This, however, is not likely to result in an economic transformation and hence in job creation for the poor majority of Ugandans....

  3. Model-Checking an Alternating-time Temporal Logic with Knowledge, Imperfect Information, Perfect Recall and Communicating Coalitions

    Directory of Open Access Journals (Sweden)

    Cătălin Dima

    2010-06-01

    Full Text Available We present a variant of ATL with distributed knowledge operators based on a synchronous and perfect recall semantics. The coalition modalities in this logic are based on partial observation of the full history, and incorporate a form of cooperation between members of the coalition in which agents issue their actions based on the distributed knowledge, for that coalition, of the system history. We show that model-checking is decidable for this logic. The technique utilizes two variants of games with imperfect information and partially observable objectives, as well as a subset construction for identifying states whose histories are indistinguishable to the considered coalition.

  4. Endangered Species Case - Washington Toxics Coalition v. EPA

    Science.gov (United States)

    This Web page provides information on the Washington Toxics Coalition v. EPA case, related to protection of Pacific salmon and steelhead, and links to the biological opinions issued by the NMFS and EPA’s responses.

  5. Institutional Support : Advocates Coalition for Development and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Advocates Coalition for Development and Environment (ACODE) is an independent policy research and advocacy organization based in Kampala, Uganda, with a reputation for producing good quality research to underpin its advocacy work. To date, the organization has relied on project-specific funds for its operation, ...

  6. The coalitional value theory of antigay bias

    NARCIS (Netherlands)

    Winegard, Bo; Reynolds, Tania; Baumeister, Roy F.; Plant, E. Ashby

    2016-01-01

    Research indicates that antigay bias follows a specific pattern (and probably has throughout written history, at least in the West): (a) men evince more antigay bias than women; (b) men who belong to traditionally male coalitions evince more antigay bias than those who do not; (c) antigay bias is

  7. Tarsal tunnel disease and talocalcaneal coalition: MRI features

    Energy Technology Data Exchange (ETDEWEB)

    FitzGerald Alaia, Erin; Rosenberg, Zehava Sadka; Bencardino, Jenny T.; Ciavarra, Gina A.; Petchprapa, Catherine N. [New York University Langone Medical Center, New York, NY (United States); Rossi, Ignacio [New York University Langone Medical Center, New York, NY (United States); Centro de Diagnostico Dr. Enrique Rossi, Buenos Aires (Argentina)

    2016-11-15

    To assess, utilizing MRI, tarsal tunnel disease in patients with talocalcaneal coalitions. To the best of our knowledge, this has only anecdotally been described before. Sixty-seven ankle MRIs with talocalcaneal coalition were retrospectively reviewed for disease of tendons and nerves of the tarsal tunnel. Interobserver variability in diagnosing tendon disease was performed in 30 of the 67 cases. Tarsal tunnel nerves were also evaluated in a control group of 20 consecutive ankle MRIs. Entrapment of the flexor hallucis longus tendon (FHL) by osseous excrescences was seen in 14 of 67 cases (21 %). Attenuation, split tearing, tenosynovitis, or tendinosis of the FHL was present in 26 cases (39 %). Attenuation or tenosynovitis was seen in the flexor digitorum longus tendon (FDL) in 18 cases (27 %). Tenosynovitis or split tearing of the posterior tibial tendon (PT) was present in nine cases (13 %). Interobserver variability ranged from 100 % to slight depending on the tendon and type of disease. Intense increased signal and caliber of the medial plantar nerve (MPN), indicative of neuritis, was seen in 6 of the 67 cases (9 %). Mildly increased T2 signal of the MPN was seen in 15 (22 %) and in 14 (70 %) of the control group. Talocalcaneal coalitions may be associated with tarsal tunnel soft tissue abnormalities affecting, in decreasing order, the FHL, FDL, and PT tendons, as well as the MPN. This information should be provided to the referring physician in order to guide treatment and improve post-surgical outcome. (orig.)

  8. Tarsal tunnel disease and talocalcaneal coalition: MRI features

    International Nuclear Information System (INIS)

    FitzGerald Alaia, Erin; Rosenberg, Zehava Sadka; Bencardino, Jenny T.; Ciavarra, Gina A.; Petchprapa, Catherine N.; Rossi, Ignacio

    2016-01-01

    To assess, utilizing MRI, tarsal tunnel disease in patients with talocalcaneal coalitions. To the best of our knowledge, this has only anecdotally been described before. Sixty-seven ankle MRIs with talocalcaneal coalition were retrospectively reviewed for disease of tendons and nerves of the tarsal tunnel. Interobserver variability in diagnosing tendon disease was performed in 30 of the 67 cases. Tarsal tunnel nerves were also evaluated in a control group of 20 consecutive ankle MRIs. Entrapment of the flexor hallucis longus tendon (FHL) by osseous excrescences was seen in 14 of 67 cases (21 %). Attenuation, split tearing, tenosynovitis, or tendinosis of the FHL was present in 26 cases (39 %). Attenuation or tenosynovitis was seen in the flexor digitorum longus tendon (FDL) in 18 cases (27 %). Tenosynovitis or split tearing of the posterior tibial tendon (PT) was present in nine cases (13 %). Interobserver variability ranged from 100 % to slight depending on the tendon and type of disease. Intense increased signal and caliber of the medial plantar nerve (MPN), indicative of neuritis, was seen in 6 of the 67 cases (9 %). Mildly increased T2 signal of the MPN was seen in 15 (22 %) and in 14 (70 %) of the control group. Talocalcaneal coalitions may be associated with tarsal tunnel soft tissue abnormalities affecting, in decreasing order, the FHL, FDL, and PT tendons, as well as the MPN. This information should be provided to the referring physician in order to guide treatment and improve post-surgical outcome. (orig.)

  9. Assessing Community Coalition Capacity and its Association with Underage Drinking Prevention Effectiveness in the Context of the SPF SIG.

    Science.gov (United States)

    Flewelling, Robert L; Hanley, Sean M

    2016-10-01

    Community coalitions are a prominent organizational structure through which community-based substance abuse prevention efforts are implemented. There is little empirical evidence, however, regarding the association between coalition attributes and success in achieving community-level reductions in substance abuse behaviors. In this study, we assessed the relationship between coalition capacity, based on coalition coordinator responses to 16 survey items, and reductions in underage drinking prevalence rates. The coalitions were funded through the federally sponsored Strategic Prevention Framework State Incentive Grant (SPF SIG). We first examined whether coalition capacity increased over the life of the projects. Mean capacity scores increased for all 16 capacity items examined (N = 318 coalitions), the majority of which were statistically significant. Analysis of the associations between capacity and reductions in underage drinking was limited to coalitions that targeted underage drinking and provided usable outcome measures based on student survey data for either past 30-day alcohol use (N = 129) or binge drinking (N = 100). Bivariate associations between the capacity items and prevalence reductions for each outcome were consistently positive, although many were not statistically significant. Composite measures of correlated items were then created to represent six different capacity constructs, and included in multivariate models to predict reductions in the targeted outcomes. Constructs that significantly predicted reductions in one or both outcome measures included internal organization and structure, community connections and outreach, and funding from multiple sources. The findings provide support for the expectation that high functioning community coalitions can be effective agents for producing desirable community-level changes in targeted substance abuse behaviors.

  10. Talocalcaneal Joint Middle Facet Coalition Resection With Interposition of a Juvenile Hyaline Cartilage Graft.

    Science.gov (United States)

    Tower, Dyane E; Wood, Ryan W; Vaardahl, Michael D

    2015-01-01

    Talocalcaneal joint middle facet coalition is the most common tarsal coalition, occurring in ≤2% of the population. Fewer than 50% of involved feet obtain lasting relief of symptoms after nonoperative treatment, and surgical intervention is commonly used to relieve symptoms, increase the range of motion, improve function, reconstruct concomitant pes planovalgus, and prevent future arthrosis from occurring at the surrounding joints. Several approaches to surgical intervention are available for patients with middle facet coalitions, ranging from resection to hindfoot arthrodesis. We present a series of 4 cases, in 3 adolescent patients, of talocalcaneal joint middle facet coalition resection with interposition of a particulate juvenile hyaline cartilaginous allograft (DeNovo(®) NT Natural Tissue Graft, Zimmer, Inc., Warsaw, IN). With a mean follow-up period of 42.8 ± 2.9 (range 41 to 47) months, the 3 adolescent patients in the present series were doing well with improved subtalar joint motion and decreased pain, and 1 foot showed no bony regrowth on a follow-up computed tomography scan. The use of a particulate juvenile hyaline cartilaginous allograft as interposition material after talocalcaneal middle facet coalition resection combined with adjunct procedures to address concomitant pes planovalgus resulted in good short-term outcomes in 4 feet in 3 adolescent patients. Copyright © 2015 American College of Foot and Ankle Surgeons. Published by Elsevier Inc. All rights reserved.

  11. Halftime - a balance in matters nuclear of the grand coalition

    International Nuclear Information System (INIS)

    Heller, W.

    2007-01-01

    On November 11, 2005, the coalition partners, CDU/CSU and SPD, signed the agreement establishing a coalition in the German federal parliament under the heading of ''Together for Germany''. Among other things, this raised the question of what would happen in the fields of energy policy and nuclear power. After 2 years of a grand coalition, it is time to draw some interim conclusions. The coalition agreement contains statements to the effect that energy policy means fundamental economic, structural and climate policies, and that secure, low-cost, non-polluting energy supplies are elementary prerequisites of a modern, capable national economy. A sustainable overall energy policy concept should be based on a balanced energy mix. This overall concept, one of the results of ''energy summit'' talks with Federal Chancellor Merkel, was announced for the end of 2007. The 3 energy summit discussions with Federal Chancellor Merkel deliberately avoided the subject of nuclear power. There is no debate about the implications of nuclear energy. This in no way improved the status of nuclear power in Germany. What remains is hope for the second half of this government's term of office. The beginning of that term is marked by the McKinsey study, initiated by the Federation of German Industries (BDI), on ''Cost and Potential of Avoiding Greenhouse Gas Emissions in Germany,'' which says that operating German nuclear power plants for 60 or even 45 years would result in a CO2 avoidance potential for 2020 which would be approximately 90 million tons higher, and in avoidance costs lower by 4.5 billion euro per year. (orig.)

  12. Forming Social Justice Projects: Student Activists Reflect on Coalition-Building

    Directory of Open Access Journals (Sweden)

    Darren E. Lund

    2010-05-01

    Full Text Available Student activists share their experiences with racism and more specifically, their attempts to form school diversity initiatives. The author outlines a problematic lack of engagement of student activists in the scholarly literature on social justice, particularly related to their undervalued role as leaders in school-based antiracist coalitions. Excerpts from in-depth interviews with seven student participants in western Canadian schools offer new understandings on the potential of school-based activists. They explain the challenges and successes in building and sustaining activist coalitions and in pursuing their social justice efforts beyond school. Their contributions represent new voices to join the ongoing conversation in educational research and community activism.

  13. Patterns of interventions and the effect of coalitions and sociality on male fitness.

    Science.gov (United States)

    Kulik, Lars; Muniz, Laura; Mundry, Roger; Widdig, Anja

    2012-02-01

    In group living animals, especially among primates, there is consistent evidence that high-ranking males gain a higher reproductive output than low-ranking males. Primate studies have shown that male coalitions and sociality can impact male fitness; however, it remains unclear whether males could potentially increase their fitness by preferentially supporting and socializing with females. Here we investigate patterns of male interventions and the effect of coalitions and sociality on male fitness in rhesus macaques (Macaca mulatta) with particular focus on male-female interactions. We combined behavioural observations collected on Cayo Santiago with genetic data analysed for male reproductive output and relatedness. Our results revealed that the ten top-ranking males provided the majority of all male support observed. In contrast to other primates, male rhesus macaques mainly formed all-down coalitions suggesting that coalitions are less likely used to enhance male dominance. Males supporting females during and before their likely conception were not more likely to fertilize those females. We also found no evidence that males preferably support their offspring or other close kin. Interestingly, the most important predictor of male support was sociality, since opponents sharing a higher sociality index with a given male were more likely to be supported. Furthermore, a high sociality index of a given male-female dyad resulted in a higher probability of paternity. Overall, our results strengthen the evidence that sociality affects fitness in male primates, but also suggest that in species in which males queue for dominance, it is less likely that males derive fitness benefits from coalitions. © 2011 Blackwell Publishing Ltd.

  14. Coalitions and family problem solving with preadolescents in referred, at-risk, and comparison families.

    Science.gov (United States)

    Vuchinich, S; Wood, B; Vuchinich, R

    1994-12-01

    This study tested the hypothesis that the mother-father coalition, parent-child coalitions, and parental warmth expressed toward the child are associated with family problem solving in families with a preadolescent child referred for treatment of behavior problems (n = 30), families with a child at-risk for conduct disorder (n = 68), and a sample of comparison families (n = 90). Referred and at-risk families displayed less effective problem solving. A regression analysis, which controlled for gender of the child, family structure, family income, marital satisfaction, and severity of child problems, showed that strong parental coalitions were linked to low levels of family problem solving in at-risk and referred families. Parent-child coalitions had little apparent impact while parental warmth was highly correlated with better family problem solving. The results may be interpreted as evidence for a tendency for parents in at-risk and referred families to "scapegoat" a preadolescent during family problem-solving sessions. This may undermine progress on family problem solutions and may complicate family-based prevention and treatment programs that use family problem-solving sessions.

  15. Tamarisk coalition - native riparian plant materials program

    Science.gov (United States)

    Stacy Kolegas

    2012-01-01

    The Tamarisk Coalition (TC), a nonprofit organization dedicated to riparian restoration in the western United States, has created a Native Plant Materials Program to address the identified need for native riparian plant species for use in revegetation efforts on the Colorado Plateau. The specific components of the Native Plant Materials Program include: 1) provide seed...

  16. Smart transactive energy framework in grid-connected multiple home microgrids under independent and coalition operations

    DEFF Research Database (Denmark)

    Marzband, Mousa; Azarinejadian, Fatemeh; Savaghebi, Mehdi

    2018-01-01

    This paper presents a smart Transactive energy (TE) framework in which home microgrids (H-MGs) can collaborate with each other in a multiple H-MG system by forming coalitions for gaining competitiveness in the market. Profit allocation due to coalition between H-MGs is an important issue...

  17. Frequency Resource Sharing and Allocation Scheme Based on Coalition Formation Game in Hybrid D2D-Cellular Network

    Directory of Open Access Journals (Sweden)

    Qing Ou

    2015-01-01

    Full Text Available A distributed cooperation scheme on frequency resource sharing is proposed to improve the quality of service (QoS in device-to-device (D2D communications underlaying cellular networks. Specifically, we formulate the resource allocation problem as a coalition formation game with transferable utility, in which all users have the incentive to cooperate with some others and form a competitive group to maximize the probability of obtaining their favorite spectrum resources. Taking the cost for coalition formation into account, such as the path loss for data sharing, we prove that the core of the proposed game is empty, which shows the impossibility of grand coalition. Hence, we propose a distributed merge-and-split based coalition formation algorithm based on a new defined Max-Coalition order to effectively solve the coalition game. Compared with the exhaustive search, our algorithm has much lower computer complexity. In addition, we prove that stability and convergence of the proposed algorithm using the concept of a defection function. Finally, the simulation results show that the proposed scheme achieves a suboptimal performance in terms of network sum rate compared with the centralized optimal resource allocation scheme obtained via exhaustive search.

  18. Fighting Windmills: The Coalition of Industrialists and Environmentalists in the Climate Change Issue

    DEFF Research Database (Denmark)

    Brandt, Urs Steiner; Svendsen, Gert Tinggaard

    2004-01-01

    environmental quality. We focus on the case of international climate negotiations and the promotion of wind-based energy. Along the lines of the Ackerman and Hassler approach, we suggest that one reason for EU eagerness to push forward ambitious reduction target levels (and thereby promote new green industries......) could be a similar coalition between industrialists and environmentalists. Such a strategy can be seen in the context of the Bootleggers and Baptist theory developed by Yandle [‘Bootleggers and Baptists: the Education of a Regulatory Economist,’ Regulation, 7, 12–16], where the Baptists (in our case...... for the coalition of industrialists and environmentalists offering both market protection and improved environmental quality. Solving the current deadlock in international climate negotiations may well imply fighting the strong coalition of industrialists and environmentalists. Such a political battle may turn out...

  19. Air cargo in the Mid-America Freight Coalition region.

    Science.gov (United States)

    2012-08-01

    This report contains a contextual review of air cargo transportation in the 10-state Mid-America Freight Coalition (MAFC) region including the industrys recent history, security implications, and integration within the greater MAFC economy. The re...

  20. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    Directory of Open Access Journals (Sweden)

    Ashraf Al Sharah

    2016-01-01

    Full Text Available Security in mobile ad hoc networks (MANETs is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

  1. Vocational Home Economics Education. Coalition Statement. Second Edition.

    Science.gov (United States)

    Home Economics Education Association, Gainesville, VA.

    This pamphlet contains the statement of the Coalition of the American Home Economics Association, American Vocational Association, and Home Economics Education Association regarding the scope and definition of vocational home economics education. It is intended to serve as a basis for professional action. Sections of this statement address the…

  2. Community Coalitions' Gender-Aware Policy and Systems Changes to Improve the Health of Women and Girls.

    Science.gov (United States)

    Kowalczyk, Shelly; Randolph, Suzanne M; Oravecz, Linda

    2017-10-17

    Addressing environmental barriers and community conditions through policy and systems change provides the foundation for creating sustainable public health change at the population level. In an effort to influence population-level change that is gender aware, the United States Department of Health and Human Services Office on Women's Health funded the Coalition for a Healthier Community initiative supporting 10 grantees in the implementation of gender-based, public health systems approaches to improve women and girls' health. A national evaluation assessed the extent to which these gender-aware public health systems approaches result in programs and policies that are sustainable and cost effective in addressing health disparities in women and girls. For this paper, a review of policies reported on in grantees' quarterly progress reports was conducted, and policies were categorized based on each policy's status, level, sector affected, and whether it was gender aware. The review revealed 77 policies at varying stages of development or implementation intended to facilitate systems-level change at the coalition, school, organizational, local, or state level. Fifty-one percent of these policies were identified as being gender aware, because they were intended to reduce barriers to or increase facilitators of gender equity. Community coalitions, like the Coalition for a Healthier Community coalitions, can be valuable channels for promoting policy change, as demonstrated by the many policies developed and/or supported by the Coalition for a Healthier Community grantees in their attempt to meet the needs of women and girls. Copyright © 2017. Published by Elsevier Inc.

  3. Cohesion and Coalition Formation in the European Parliament: Roll-Call Votes and Twitter Activities.

    Science.gov (United States)

    Cherepnalkoski, Darko; Karpf, Andreas; Mozetič, Igor; Grčar, Miha

    2016-01-01

    We study the cohesion within and the coalitions between political groups in the Eighth European Parliament (2014-2019) by analyzing two entirely different aspects of the behavior of the Members of the European Parliament (MEPs) in the policy-making processes. On one hand, we analyze their co-voting patterns and, on the other, their retweeting behavior. We make use of two diverse datasets in the analysis. The first one is the roll-call vote dataset, where cohesion is regarded as the tendency to co-vote within a group, and a coalition is formed when the members of several groups exhibit a high degree of co-voting agreement on a subject. The second dataset comes from Twitter; it captures the retweeting (i.e., endorsing) behavior of the MEPs and implies cohesion (retweets within the same group) and coalitions (retweets between groups) from a completely different perspective. We employ two different methodologies to analyze the cohesion and coalitions. The first one is based on Krippendorff's Alpha reliability, used to measure the agreement between raters in data-analysis scenarios, and the second one is based on Exponential Random Graph Models, often used in social-network analysis. We give general insights into the cohesion of political groups in the European Parliament, explore whether coalitions are formed in the same way for different policy areas, and examine to what degree the retweeting behavior of MEPs corresponds to their co-voting patterns. A novel and interesting aspect of our work is the relationship between the co-voting and retweeting patterns.

  4. Intercell scheduling: A negotiation approach using multi-agent coalitions

    Science.gov (United States)

    Tian, Yunna; Li, Dongni; Zheng, Dan; Jia, Yunde

    2016-10-01

    Intercell scheduling problems arise as a result of intercell transfers in cellular manufacturing systems. Flexible intercell routes are considered in this article, and a coalition-based scheduling (CBS) approach using distributed multi-agent negotiation is developed. Taking advantage of the extended vision of the coalition agents, the global optimization is improved and the communication cost is reduced. The objective of the addressed problem is to minimize mean tardiness. Computational results show that, compared with the widely used combinatorial rules, CBS provides better performance not only in minimizing the objective, i.e. mean tardiness, but also in minimizing auxiliary measures such as maximum completion time, mean flow time and the ratio of tardy parts. Moreover, CBS is better than the existing intercell scheduling approach for the same problem with respect to the solution quality and computational costs.

  5. Coalition contract management as a systems change strategy for HIV prevention.

    Science.gov (United States)

    Darrow, William W; Montanea, Julie E; Sánchez-Braña, Elizabeth

    2010-11-01

    Racial and Ethnic Approaches to Community Health (REACH) 2010 provided a unique opportunity for minority community-based organizations (CBOs) to work together to eliminate disparities in HIV disease. A coalition was formed in Broward County to respond to the REACH 2010 program announcement, a university was chosen to coordinate efforts, and contracts were negotiated with CBO partners to develop, implement, and evaluate a community action plan. Contract management provided stability, focus, and a mechanism for coalition partners to measure progress toward achieving project objectives. By emphasizing documentation as well as the delivery of services, however, contract conditions also placed a heavy burden on educational outreach workers, restricted the reimbursable activities of member organizations, and created friction between minority agencies and university staff. Although the coalition met many of its objectives, the introduction and enforcement of a mutually agreed on set of rules and obligations as a way of promoting systems change in Broward County failed to make a lasting impact among community partners. CBOs continued to compete with one another for HIV prevention project funding and stopped collaborating as closely with another when federal support for our REACH 2010 community demonstration project ran out.

  6. The Vermont transportation energy report : Vermont Clean Cities Coalition.

    Science.gov (United States)

    2010-08-01

    The mission of the Vermont Clean Cities Coalition (VCCC) is to reduce the states reliance on : fossil fuels for transportation. This annual report provides policy makers with relevant and : timely data on the status of fuel consumption, vehicle pu...

  7. Long-Term Sustainability of Evidence-Based Prevention Interventions and Community Coalitions Survival: a Five and One-Half Year Follow-up Study.

    Science.gov (United States)

    Johnson, Knowlton; Collins, David; Shamblen, Steve; Kenworthy, Tara; Wandersman, Abraham

    2017-07-01

    This study examines (1) coalition survival, (2) prevalence of evidence-based prevention interventions (EBPIs) to reduce substance abuse implemented as part of the Tennessee Strategic Prevention Framework (SPF) State Incentive Grant (SIG), (3) EBPI sustainability, and (4) factors that predict EBPI sustainability. Secondary data were collected on 27 SPF SIG-funded coalitions and 88 EBPI and non-EBPI implementations. Primary data were collected by a telephone interview/web survey five and one-half years after the SPF SIG ended. Results from secondary data show that 25 of the 27 coalitions survived beyond the SPF SIG for one to five and one-half years; 19 coalitions (70%) were still active five and one-half years later. Further, 88 EBPIs and non-EBPIs were implemented by 27 county SPF SIG coalitions. Twenty-one (21) of 27 coalitions (78%) implemented one to three EBPIs, totaling 37 EBPI implementations. Based on primary survey data on 29 of the 37 EBPI implementations, 28 EBPIs (97%) were sustained between two and five and one-half years while 22 EBPI implementations (76%) were sustained for five and one-half years. When controlling for variability among coalitions (nesting of EBPIs in coalitions), increases in data resources (availability of five types of prevention data) was a strong predictor of length of EBPI sustainability. Positive change in extramural funding resources and level of expertise during SPF SIG implementation, as well as level of coalition formalization at the end of the SPF SIG predicted EBPI sustainability length. One intervention attribute (trialability) also predicted length of sustainability. Implications are discussed.

  8. Core of Coalition Games on MV-algebras

    Czech Academy of Sciences Publication Activity Database

    Kroupa, Tomáš

    2011-01-01

    Roč. 21, č. 3 (2011), s. 479-492 ISSN 0955-792X R&D Projects: GA MŠk 1M0572; GA ČR GA102/08/0567 Institutional research plan: CEZ:AV0Z10750506 Keywords : coalition game * core * MV-algebra Subject RIV: BA - General Mathematics Impact factor: 0.611, year: 2011 http://library.utia.cas.cz/separaty/2011/MTR/kroupa-0359839.pdf

  9. 2. Coalition Collapse in the Context of Negotiation and Inter-Party Cooperation Theory

    OpenAIRE

    Biira, Catherine Promise

    2013-01-01

    Although most negotiators are primarily focused on reaching an agreement, the case of the opposition Inter-Party Cooperation coalition in Uganda demonstrates that “getting to yes” is not enough. The IPC collapsed just five months before it could participate in the very election it had been formed to commonly contest. As suggested in the previous section, while disagreement as to whether the coalition should participate in the 2011 election was publicly stated as the cause of the IPC collapse,...

  10. Evaluation of DELTA PREP: A Project Aimed at Integrating Primary Prevention of Intimate Partner Violence Within State Domestic Violence Coalitions

    Science.gov (United States)

    Freire, Kimberley E.; Zakocs, Ronda; Le, Brenda; Hill, Jessica A.; Brown, Pamela; Wheaton, Jocelyn

    2018-01-01

    Background Intimate partner violence (IPV) has been recognized as a public health problem since the late 20th century. To spur IPV prevention efforts nationwide, the DELTA PREP Project selected 19 state domestic violence coalitions to build organizational prevention capacity and catalyze IPV primary prevention strategies within their states. Objective DELTA PREP’s summative evaluation addressed four major questions: (1) Did coalitions improve their prevention capacity during the project period? (2) Did coalitions serve as catalysts for prevention activities within their states during the project period? (3) Was initial prevention capacity associated with the number of prevention activity types initiated by coalitions by the end of the project? (4) Did coalitions sustain their prevention activities 6 months after the end of the project period? Results DELTA PREP achieved its capacity-building goal, with all 19 participant coalitions integrating prevention within their organizations and serving as catalysts for prevention activities in their states. At 6 months follow up, coalitions had sustained almost all prevention activities they initiated during the project. Baseline prevention capacity (Beginner vs. Intermediate) was not associated with the number of prevention activity types coalitions implemented by the end of the project. Conclusion Service and treatment organizations are increasingly asked to integrate a full spectrum of prevention strategies. Selecting organizations that have high levels of general capacity and readiness for an innovation like integrating a public health approach to IPV prevention will likely increase success in building an innovation-specific capacity, and in turn implementing an innovation. PMID:26245932

  11. Actor coalitions and implementation in strategic delta planning: Opening the Haringvliet sluices in the Netherlands

    Science.gov (United States)

    Vermoolen, Myrthe; Hermans, Leon

    2016-04-01

    The sustained development of urbanizing deltas is influenced by natural and societal processes. These processes are characterized by their long time span, in which conflicting interests of different stakeholders have to be reconciled. Reaching consent between actors is a challenge itself, but maintaining this consent throughout different stages of strategic planning - from advocacy and agenda setting to implementation - over these long periods of time is even more difficult. The implementation stage still includes many different actors involved, some of which are different than the ones who agreed before, due to both the long run of the strategic delta planning, and to a shift of tasks and responsibilities. Thus, implementation of strategic plans often features delays, deviations of agreed plans and unintended outcomes. A key question therefore is how coalition dynamics in (pre-)planning stages influence and are influenced by the coalition dynamics during implementation. The different stages in strategic planning are often studied from either a plan formulation or an implementation perspective, but the connection between the two proves an important bottleneck for strategic planning in deltas. For instance, many building with nature solutions are still in their pilot-phase, and their upscaling can profit from lessons concerning past implementation efforts. The proposed contribution will use the case of the management of the Dutch Haringvliet sluices and the decision ('Kierbesluit') in 2000 to put these sluices ajar, to study the link between the different strategic delta planning stages and the role of the formation and change of actor coalitions herein. With the completion of the Haringvliet dam with outlet sluices in 1970, the Haringvliet estuary of the rivers Rhine and Meuse was closed off from the sea, creating a fresh water lake. This was done to make the Dutch Southwest delta safe from flooding, and had positive effects for agricultural water supply and

  12. TTI Phase 2 Institutional Support: Advocates Coalition for ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le financement contribuera à renforcer le rôle de l'Advocates Coalition for Development and Environment (ACODE) en tant qu'organisme crédible de recherche sur les politiques publiques en Ouganda, en améliorant sa capacité à fournir des recherches de qualité supérieure, influentes et utiles en matière de politiques.

  13. Career advancement opportunities and the ACVP/STP Coalition.

    Science.gov (United States)

    Cockerell, Gary

    2014-07-01

    A new service to facilitate career advancement opportunities has been implemented by the American College of Veterinary Pathologists (ACVP)/Society of Toxicologic Pathology (STP) Coalition for Veterinary Pathology Fellows. This service will allow rapid communication of these opportunities between veterinary pathologists in academia, industry, and government, and will be useful to trainees as well as established pathologists. © 2014 by The Author(s).

  14. The role of advocacy coalitions in a project implementation process: the example of the planning phase of the At Home/Chez Soi project dealing with homelessness in Montreal.

    Science.gov (United States)

    Fleury, Marie-Josée; Grenier, Guy; Vallée, Catherine; Hurtubise, Roch; Lévesque, Paul-André

    2014-08-01

    This study analyzed the planning process (summer 2008 to fall 2009) of a Montreal project that offers housing and community follow-up to homeless people with mental disorders, with or without substance abuse disorders. With the help of the Advocacy Coalition Framework (ACF), advocacy groups that were able to navigate a complex intervention implementation process were identified. In all, 25 people involved in the Montreal At Home/Chez Soi project were surveyed through interviews (n=18) and a discussion group (n=7). Participant observations and documentation (minutes and correspondence) were also used for the analysis. The start-up phase of the At Home/Chez may be broken down into three separate periods qualified respectively as "honeymoon;" "clash of cultures;" and "acceptance & commitment". In each of the planning phases of the At Home/Chez Soi project in Montreal, at least two advocacy coalitions were in confrontation about their specific belief systems concerning solutions to address the recurring homelessness social problem, while a third, more moderate one contributed in rallying most key actors under specified secondary aspects. The study confirms the importance of policy brokers in achieving compromises acceptable to all advocacy coalitions. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. Role-Based Access Control for Coalition Partners in Maritime Domain Awareness

    National Research Council Canada - National Science Library

    McDaniel, Christopher R; Tardy, Matthew L

    2005-01-01

    The need for Shared Situational Awareness (SSA) in accomplishing joint missions by coalition militaries, law enforcement, the intelligence community, and the private sector creates a unique challenge to providing access control...

  16. 45 CFR 1370.4 - State domestic violence coalition grants.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false State domestic violence coalition grants. 1370.4 Section 1370.4 Public Welfare Regulations Relating to Public Welfare (Continued) OFFICE OF HUMAN DEVELOPMENT SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES FAMILY VIOLENCE PREVENTION AND SERVICES PROGRAMS FAMILY VIOLENCE PREVENTION AND SERVICES...

  17. An alternative model of the formation of political coalitions

    NARCIS (Netherlands)

    van der Rijt, J.W.

    Most models of the formation of political coalitions use either Euclidean spaces or rely purely on game theory. This limits their applicability. In this article, a single model is presented which is more broadly applicable. In principle any kind of set can be used as a policy space. The model is

  18. Discourse coalitions in Swiss waste management: gridlock or winds of change?

    Science.gov (United States)

    Duygan, Mert; Stauffacher, Michael; Meylan, Grégoire

    2018-02-01

    As a complex socio-technical system, waste management is crucially important for the sustainable management of material and energy flows. Transition to better performing waste management systems requires not only determining what needs to be changed but also finding out how this change can be realized. Without understanding the political context, insights from decision support tools such as life cycle assessment (LCA) are likely to be lost in translation to decision and policy making. This study strives to provide a first insight into the political context and address the opportunities and barriers pertinent to initiating a change in Swiss waste management. For this purpose, the discourses around a major policy process are analysed to uncover the policy beliefs and preferences of actors. Discourse coalitions are delineated by referring to the Advocacy Coalition Framework (Sabatier, 1998) and using the Discourse Network Analysis (Leifeld and Haunss, 2012) method. The results display an incoherent regime (Fuenfschilling and Truffer, 2014) with divergent belief clusters on core issues in waste management. Yet, some actors holding different beliefs appear to have overlapping interests on secondary issues such as the treatment of biogenic waste or plastics. Although the current political context hinders a system-wide disruptive change, transitions can be initiated at local or regional scale by utilizing the shared interest across different discourse coalitions. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. An Incidental Finding of a Talonavicular and Talocalcaneal Joint Coalition After a Tibial Pilon Fracture: A Case Report.

    Science.gov (United States)

    Godoy, Heidi M; Micciche, Mark J

    It has been proposed that patients with talocalcaneal and talonavicular coalitions have decreased ankle joint range of motion. It has also been reported that rotational forces regularly absorbed by the talocalcaneal joint are transferred to the ankle joint in patients with coalitions, increasing the stress on the ankle joint after trauma. To the best of our knowledge, only 1 reported study has detailed the increased stress placed on the ankle joint secondary to a coalition. We present a case study of a 53-year-old female who experienced a traumatic fall and subsequent right ankle fracture. Advanced imaging studies revealed a comminuted tibial pilon fracture and talocalcaneal and talonavicular joint coalitions. She underwent open reduction and internal fixation for treatment of the fracture, and the coalitions were not treated because they were asymptomatic. She was kept non-weightbearing for 6 weeks postoperatively and was returned to a regular sneaker at 10 weeks postoperatively. The postoperative films revealed stable intact fixation and pain-free gait with no increased restriction in her ankle joint range of motion. The hardware was removed at 13 months postoperatively. She had not experienced increased pain or arthritic changes at 15 months postoperatively. Copyright © 2017 American College of Foot and Ankle Surgeons. Published by Elsevier Inc. All rights reserved.

  20. Dynamic and adaptive policy models for coalition operations

    Science.gov (United States)

    Verma, Dinesh; Calo, Seraphin; Chakraborty, Supriyo; Bertino, Elisa; Williams, Chris; Tucker, Jeremy; Rivera, Brian; de Mel, Geeth R.

    2017-05-01

    It is envisioned that the success of future military operations depends on the better integration, organizationally and operationally, among allies, coalition members, inter-agency partners, and so forth. However, this leads to a challenging and complex environment where the heterogeneity and dynamism in the operating environment intertwines with the evolving situational factors that affect the decision-making life cycle of the war fighter. Therefore, the users in such environments need secure, accessible, and resilient information infrastructures where policy-based mechanisms adopt the behaviours of the systems to meet end user goals. By specifying and enforcing a policy based model and framework for operations and security which accommodates heterogeneous coalitions, high levels of agility can be enabled to allow rapid assembly and restructuring of system and information resources. However, current prevalent policy models (e.g., rule based event-condition-action model and its variants) are not sufficient to deal with the highly dynamic and plausibly non-deterministic nature of these environments. Therefore, to address the above challenges, in this paper, we present a new approach for policies which enables managed systems to take more autonomic decisions regarding their operations.

  1. Self-Organizing Coalitions for Conflict Evaluation and Resolution in Femtocells

    DEFF Research Database (Denmark)

    Garcia, Luis Guilherme Uzeda; Da Costa, Gustavo Wagner Oliveira; Cattoni, Andrea Fabio

    2010-01-01

    consists of a set of distributed and scalable rules for building coalitions; these rules essentially resolve the conflicts among avid femtocells competing for a limited amount of resources. The proposed scheme has been designed by targeting localized reconfigurations, thus avoiding reconfiguration storms...

  2. Challenge and threat responses to anger communication in coalition formation

    NARCIS (Netherlands)

    van Beest, I.; Scheepers, D.

    2013-01-01

    Research on multiparty negotiation has investigated how parties form coalitions to secure payoffs but has not assessed the underlying self-regulatory and physiological principles. Integrating insights from research on the social functions of emotions and the bio-psychosocial model as proposed by

  3. Corporate coalitions and policy making in the European Union: how and why British American Tobacco promoted "Better Regulation".

    Science.gov (United States)

    Smith, Katherine Elizabeth; Fooks, Gary; Gilmore, Anna B; Collin, Jeff; Weishaar, Heide

    2015-04-01

    Over the past fifteen years, an interconnected set of regulatory reforms, known as Better Regulation, has been adopted across Europe, marking a significant shift in the way that European Union policies are developed. There has been little exploration of the origins of these reforms, which include mandatory ex ante impact assessment. Drawing on documentary and interview data, this article discusses how and why large corporations, notably British American Tobacco (BAT), worked to influence and promote these reforms. Our analysis highlights (1) how policy entrepreneurs with sufficient resources (such as large corporations) can shape the membership and direction of advocacy coalitions; (2) the extent to which "think tanks" may be prepared to lobby on behalf of commercial clients; and (3) why regulated industries (including tobacco) may favor the use of "evidence tools," such as impact assessments, in policy making. We argue that a key aspect of BAT's ability to shape regulatory reform involved the deliberate construction of a vaguely defined idea that could be strategically adapted to appeal to diverse constituencies. We discuss the theoretical implications of this finding for the Advocacy Coalition Framework, as well as the practical implications of the findings for efforts to promote transparency and public health in the European Union. Copyright © 2015 by Duke University Press.

  4. When’s the Party (or Coalition? Agenda-Setting in a Highly Fragmented, Decentralized Legislature

    Directory of Open Access Journals (Sweden)

    Mónica Pachón

    2016-01-01

    Full Text Available This paper examines committee behavior in Colombia to determine whether parties or coalitions exert agenda-setting powers despite the fact that the formal rules seemingly create little incentive for cooperation. Colombia’s party system is extremely fragmented, electoral volatility is high, and there is a long history of candidate-centered electoral rules, all of which suggests that party and coalition leaders have few tools to control the legislative agenda. Additionally, chairs do not directly control committee reports as in other presidential cases. However, the naming of ponentes (rapporteurs to write ponencias (bill reports for the committee may give leaders the opportunity to set the agendas in committees. Hence, we test whether committee chairs strategically name ponentes to control the agenda and favor their partisan or coalition interests. We test these ideas using a unique dataset covering two complete legislative sessions and thousands of bills. Overall, we find that committee chairs use the ponente process to set the agenda and privilege legislation sponsored by allies, especially the executive.

  5. Friends Indeed? Coalition Burden Sharing and the War In Iraq. Volume 1

    National Research Council Canada - National Science Library

    Baltrusaitis, Daniel F

    2008-01-01

    .... This research examines the conditions that influence state burden sharing behavior for ad hoc security coalitions and examines the decision making model developed by Andrew Bennett, Joseph Lepgold, and Danny...

  6. Power and Politics in the Global Health Landscape: Beliefs, Competition and Negotiation Among Global Advocacy Coalitions in the Policy-Making Process

    Science.gov (United States)

    McDougall, Lori

    2016-01-01

    Background: Advocacy coalitions play an increasingly prominent role within the global health landscape, linking actors and institutions to attract political attention and resources. This paper examines how coalitions negotiate among themselves and exercise hidden forms of power to produce policy on the basis of their beliefs and strategic interests. Methods: This paper examines the beliefs and behaviours of health advocacy coalitions using Sabatier’s Advocacy Coalition Framework (ACF) as an informal theoretical lens. Coalitions are further explored in relation to the concept of transnational advocacy networks (Keck and Sikkink) and of productive power (Shiffman). The ACF focuses on explaining how policy change takes place when there is conflict concerning goals and technical approaches among different actors. This study uses participant observation methods, self-reported survey results and semi-structured qualitative interviews to trace how a major policy project of the Millennium Development Goal (MDG) era, the Global Strategy for Women’s and Children’s Health, was constructed through negotiations among maternal, newborn, and child health (MNCH) and sexual and reproductive health and rights (SRHR) advocacy coalitions. Results: The Global Strategy represented a new opportunity for high-level political attention. Despite differing policy beliefs, MNCH and SRHR actors collaborated to produce this strategy because of anticipated gains in political attention. While core beliefs did not shift fundamentally and collaboration was primarily a short-term tactical response to a time-bound opportunity, MNCH actors began to focus more on human rights perspectives and SRHR actors adopted greater use of quantifiable indicators and economic argumentation. This shift emphasises the inherent importance of SRHR to maternal and child health survival. Conclusion: As opportunities arise, coalitions respond based on principles and policy beliefs, as well as to perceptions of

  7. Power and Politics in the Global Health Landscape: Beliefs, Competition and Negotiation Among Global Advocacy Coalitions in the Policy-Making Process.

    Science.gov (United States)

    McDougall, Lori

    2016-01-30

    Advocacy coalitions play an increasingly prominent role within the global health landscape, linking actors and institutions to attract political attention and resources. This paper examines how coalitions negotiate among themselves and exercise hidden forms of power to produce policy on the basis of their beliefs and strategic interests. This paper examines the beliefs and behaviours of health advocacy coalitions using Sabatier's Advocacy Coalition Framework (ACF) as an informal theoretical lens. Coalitions are further explored in relation to the concept of transnational advocacy networks (Keck and Sikkink) and of productive power (Shiffman). The ACF focuses on explaining how policy change takes place when there is conflict concerning goals and technical approaches among different actors. This study uses participant observation methods, self-reported survey results and semi-structured qualitative interviews to trace how a major policy project of the Millennium Development Goal (MDG) era, the Global Strategy for Women's and Children's Health, was constructed through negotiations among maternal, newborn, and child health (MNCH) and sexual and reproductive health and rights (SRHR) advocacy coalitions. The Global Strategy represented a new opportunity for high-level political attention. Despite differing policy beliefs, MNCH and SRHR actors collaborated to produce this strategy because of anticipated gains in political attention. While core beliefs did not shift fundamentally and collaboration was primarily a short-term tactical response to a time-bound opportunity, MNCH actors began to focus more on human rights perspectives and SRHR actors adopted greater use of quantifiable indicators and economic argumentation. This shift emphasises the inherent importance of SRHR to maternal and child health survival. As opportunities arise, coalitions respond based on principles and policy beliefs, as well as to perceptions of advantage. Global health policy-making is an arena of

  8. Blockchain-based framework for ontology-oriented robots’ coalition formation in cyberphysical systems

    Directory of Open Access Journals (Sweden)

    Teslya Nikolay

    2018-01-01

    Full Text Available The creation and functioning of intelligent robots coalition is impossible without the organization of an information interaction environment between them. To solve this problem, it is proposed to use the concept of cyberphysical framework, which involves the unification of physical and cyber (virtual environments. Intelligent robots can interact with each of the environments. The paper proposes methodology of the cyber physical smart space creation for the intelligent robots’ coalition formation and functioning, based on the concept of the “blackboard” with the support of smart contracts over the blockchain technology. It provides a new approach to the distribution of sensory, computational, information-control and service tasks between intelligent robots, embedded devices, fixed service equipment, cloud computing and information resources.

  9. Denmark’s participation in the coalition against IS reflects the country’s commitment to ‘ethical militarism’

    DEFF Research Database (Denmark)

    Schouenborg, Laust

    2014-01-01

    The United States has put together a coalition of several western and Arab states to support military action against Islamic State (IS) forces in Iraq and Syria. Laust Schouenborg writes on the participation of Denmark in this coalition. He argues that the decision to take part reflects a principle...... of ‘ethical militarism’ which the country has adopted in previous conflicts over the last 25 years....

  10. Modal extensions of Lukasiewicz logic for modelling coalitional power

    Czech Academy of Sciences Publication Activity Database

    Kroupa, Tomáš; Teheux, B.

    2017-01-01

    Roč. 27, č. 1 (2017), s. 129-154 ISSN 0955-792X R&D Projects: GA ČR GAP402/12/1309 Institutional support: RVO:67985556 Keywords : Coalition Logic * Lukasiewicz modal logic * effectivity function Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 0.909, year: 2016 http://library.utia.cas.cz/separaty/2017/MTR/kroupa-0471671.pdf

  11. Sustaining Physics Teacher Education Coalition Programs in Physics Teacher Education

    Science.gov (United States)

    Scherr, Rachel E.; Plisch, Monica; Goertzen, Renee Michelle

    2017-01-01

    Understanding the mechanisms of increasing the number of physics teachers educated per year at institutions with thriving physics teacher preparation programs may inspire and support other institutions in building thriving programs of their own. The Physics Teacher Education Coalition (PhysTEC), led by the American Physical Society (APS) and the…

  12. Optimal sharing of quantity risk for a coalition of wind power producers facing nodal prices

    KAUST Repository

    Bitar, E. Y.; Baeyens, E.; Khargonekar, P. P.; Poolla, K.; Varaiya, P.

    2012-01-01

    It is widely accepted that aggregation of geographically diverse wind energy resources offers compelling potential to mitigate wind power variability, as wind speed at different geographic locations tends to decorrelate with increasing spatial separation. In this paper, we explore the extent to which a coalition of wind power producers can exploit the statistical benefits of aggregation to mitigate the risk of quantity shortfall with respect to forward contract offerings for energy. We propose a simple augmentation of the existing two-settlement market system with nodal pricing to permit quantity risk sharing among wind power producers by affording the group a recourse opportunity to utilize improved forecasts of their ensuing wind energy production to collectively modify their forward contracted positions so as to utilize the projected surplus in generation at certain buses to balance the projected shortfall in generation at complementary buses. Working within this framework, we show that the problem of optimally sizing a set of forward contracts for a group of wind power producers reduces to convex programming and derive closed form expressions for the set of optimal recourse policies. We also asses the willingness of individual wind power producers to form a coalition to cooperatively offer contracts for energy. We first show that the expected profit derived from coalitional contract offerings with recourse is greater than that achievable through independent contract offerings. And, using tools from coalitional game theory, we show that the core for our game is non-empty.

  13. Optimal sharing of quantity risk for a coalition of wind power producers facing nodal prices

    KAUST Repository

    Bitar, E. Y.

    2012-06-01

    It is widely accepted that aggregation of geographically diverse wind energy resources offers compelling potential to mitigate wind power variability, as wind speed at different geographic locations tends to decorrelate with increasing spatial separation. In this paper, we explore the extent to which a coalition of wind power producers can exploit the statistical benefits of aggregation to mitigate the risk of quantity shortfall with respect to forward contract offerings for energy. We propose a simple augmentation of the existing two-settlement market system with nodal pricing to permit quantity risk sharing among wind power producers by affording the group a recourse opportunity to utilize improved forecasts of their ensuing wind energy production to collectively modify their forward contracted positions so as to utilize the projected surplus in generation at certain buses to balance the projected shortfall in generation at complementary buses. Working within this framework, we show that the problem of optimally sizing a set of forward contracts for a group of wind power producers reduces to convex programming and derive closed form expressions for the set of optimal recourse policies. We also asses the willingness of individual wind power producers to form a coalition to cooperatively offer contracts for energy. We first show that the expected profit derived from coalitional contract offerings with recourse is greater than that achievable through independent contract offerings. And, using tools from coalitional game theory, we show that the core for our game is non-empty.

  14. Albert Sabin and the Coalition to Eliminate Polio from the Americas.

    Science.gov (United States)

    Hampton, Lee

    2009-01-01

    Albert B. Sabin, MD, developer of the oral polio vaccine, was also a major proponent of its use in annual vaccination campaigns aimed at the elimination of polio. Sabin argued that administering his vaccine simultaneously to every child in a country would break polio's chains of transmission. Although he was already promoting mass vaccination by the 1960s, Sabin's efforts expanded considerably when he became an adviser to groups fighting polio in the Americas in the 1980s. Sabin's experiences provide a window into both the formation of the coalition that eliminated poliomyelitis from the Western Hemisphere and what can happen when biomedical researchers become public health policy advisers. Although the polio elimination coalition succeeded in part because member groups often accommodated each other's priorities, Sabin was often limited by his indifference to the interests of those he was advising and to the shortcomings of his vaccine.

  15. Implementing change in health professions education: stakeholder analysis and coalition building.

    Science.gov (United States)

    Baum, Karyn D; Resnik, Cheryl D; Wu, Jennifer J; Roey, Steven C

    2007-01-01

    The challenges facing the health sciences education fields are more evident than ever. Professional health sciences educators have more demands on their time, more knowledge to manage, and ever-dwindling sources of financial support. Change is often necessary to either keep programs viable or meet the changing needs of health education. This article outlines a simple but powerful three-step tool to help educators become successful agents of change. Through the application of principles well known and widely used in business management, readers will understand the concepts behind stakeholder analysis and coalition building. These concepts are part of a powerful tool kit that educators need in order to become effective agents of change in the health sciences environment. Using the example of curriculum change at a school of veterinary medicine, we will outline the three steps involved, from stakeholder identification and analysis to building and managing coalitions for change.

  16. Coalitional Games, Excessive Competition and a Lack of Trust: an Experimental Aproach

    Directory of Open Access Journals (Sweden)

    Dawid Ners

    2017-06-01

    Full Text Available The article tackles the issues of the effectiveness and rationality of making choices in the conditions of competition and cooperation. It confronts the economic theory of rational choice with the empirical results from an experiment. The aim of the article is to show that excessive competition and a lack of trust cause limitation of rational choice in coalitional games. In the experiment conducted for this study purposes, a public good was used to construct a situation in which making a huge coalition is the winning strategy. Despite this fact, the research proves that under competition supported by uncertainty, which results from the lack of trust, the decision making entities behave far less rationally than the game theory would suggest. People competing with each other often take decisions irrationally.

  17. Toward Community Research and Coalitional Literacy Practices for Educational Justice

    Science.gov (United States)

    Campano, Gerald; Ghiso, María Paula; Yee, Mary; Pantoja, Alicia

    2013-01-01

    Community-based research can provide an avenue for understanding the complexities of students' and families' lives and working together for educational justice through what we refer to as coalitional literacy practices. In this article, we share a critical incident about a student's absence from school as an illustrative case of the grass-roots…

  18. Intermediary Organizations in Charter School Policy Coalitions: Evidence from New Orleans

    Science.gov (United States)

    DeBray, Elizabeth; Scott, Janelle; Lubienski, Christopher; Jabbar, Huriya

    2014-01-01

    This article develops a framework for investigating research use, using an "advocacy coalition framework" and the concepts of a "supply side" (mainly organizations) and "demand side" (policymakers). Drawing on interview data and documents from New Orleans about the charter school reforms that have developed there…

  19. Adding Reports to Coalition Battle Management Language for NATO MSG-048

    NARCIS (Netherlands)

    Pullen, J.M.; Corner, D.; Singapogo, S.S.; Clarc, N.; Cordonnier, N.; Menane, M.; Khimeche, L.; Mevassvik, O.M.; Alstad, A.; Schad, U.; Frey, M.; Reus, N. M. de; Krom, P.P.J. de; Grand, N.P. le; Brook, A.

    2009-01-01

    The NATO Modeling and Simulation Group Technical Activity 48 (MSG-048) was chartered in 2006 to investigate the potential of a Coalition Battle Management Language for multinational and NATO interoperation of command and control systems with modeling and simulation. Its initial work in defining and

  20. A case study of conflict management in bonobos: how does a bonobo (Pan paniscus) mother manage conflicts between her sons and her female coalition partner?

    Science.gov (United States)

    Legrain, L; Stevens, J; Alegria Iscoa, J; Destrebecqz, A

    2011-01-01

    Female coalitions are an important part of the social organization of bonobos. The strength of the mother-son relationship is another essential part of this social structure. A bonobo mother is therefore facing a dilemma when a conflict arises between her sons and her female coalition partners. Will she take her coalition partner's side and favour the social organization of the group or support her son in order to defend her offspring? In order to address this issue, we performed an observational study of the captive group at Planckendael (Belgium) and used social grooming and proximity to assess the relationship between individuals. As a case study, we focused on the relationships between Hortense, one of the group's mothers, her 3 sons Redi, Vifijo and Zamba, and her coalition partner Hermien. Surprisingly, we observed that Hortense preferentially supported her female coalition partner. For Hortense's social status in the group, it may be more important to maintain the strong relationship with her higher-ranking female coalition partner than to support her sons. Copyright © 2012 S. Karger AG, Basel.

  1. Building and Maintaining an Effective Campus-Wide Coalition for Suicide Prevention

    Science.gov (United States)

    Kaslow, Nadine J.; Garcia-Williams, Amanda; Moffitt, Lauren; McLeod, Mark; Zesiger, Heather; Ammirati, Rachel; Berg, John P.; McIntosh, Belinda J.

    2012-01-01

    Preventing suicide is a commonly shared priority among college administrators, faculty, staff, students, and family members. Coalitions are popular health promotion mechanisms for solving community-wide problems and are valuable in campus-wide suicide prevention efforts. This article provides an example of an effective suicide prevention…

  2. Understanding the outcomes of advocacy coalitions in education: a comparative perspective

    NARCIS (Netherlands)

    Verger, A.; Novelli, M.; Verger, A.; Novelli, M.

    2012-01-01

    In this chapter, we use comparative analysis lenses to better understand the nature of civil society coalitions and their impact in the educational field. The arguments provide a synthesis of core issues that have emerged from the case studies presented in earlier chapters. In particular, this

  3. Power and Politics in the Global Health Landscape: Beliefs, Competition and Negotiation Among Global Advocacy Coalitions in the Policy-Making Process

    Directory of Open Access Journals (Sweden)

    Lori McDougall

    2016-05-01

    Full Text Available Background Advocacy coalitions play an increasingly prominent role within the global health landscape, linking actors and institutions to attract political attention and resources. This paper examines how coalitions negotiate among themselves and exercise hidden forms of power to produce policy on the basis of their beliefs and strategic interests. Methods This paper examines the beliefs and behaviours of health advocacy coalitions using Sabatier’s Advocacy Coalition Framework (ACF as an informal theoretical lens. Coalitions are further explored in relation to the concept of transnational advocacy networks (Keck and Sikkink and of productive power (Shiffman. The ACF focuses on explaining how policy change takes place when there is conflict concerning goals and technical approaches among different actors. This study uses participant observation methods, self-reported survey results and semistructured qualitative interviews to trace how a major policy project of the Millennium Development Goal (MDG era, the Global Strategy for Women’s and Children’s Health, was constructed through negotiations among maternal, newborn, and child health (MNCH and sexual and reproductive health and rights (SRHR advocacy coalitions. Results The Global Strategy represented a new opportunity for high-level political attention. Despite differing policy beliefs, MNCH and SRHR actors collaborated to produce this strategy because of anticipated gains in political attention. While core beliefs did not shift fundamentally and collaboration was primarily a short-term tactical response to a time-bound opportunity, MNCH actors began to focus more on human rights perspectives and SRHR actors adopted greater use of quantifiable indicators and economic argumentation. This shift emphasises the inherent importance of SRHR to maternal and child health survival. Conclusion As opportunities arise, coalitions respond based on principles and policy beliefs, as well as to perceptions

  4. Performance of Differential-Phase-Shift Keying Protocol Applying 1310 nm Up-Conversion Single-Photon Detector

    International Nuclear Information System (INIS)

    Chen-Xu, Feng; Rong-Zhen, Jiao; Wen-Han, Zhang

    2008-01-01

    The performance of the differential-phase-shift keying (DPSK) protocol applying a 1310 nm up-conversion single-photon detector is analysed. The error rate and the communication rate as a function of distance for three quantum key distribution protocols, the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the DPSK, are presented. Then we compare the performance of these three protocols using the 1310nm up-conversion detector. We draw the conclusion that the DPSK protocol applying the detector has significant advantage over the other two protocols. Longer transmission distance and lower error rate can be achieved. (general)

  5. Coalition Logistics: A Case Study in Operation Restore Hope

    Science.gov (United States)

    1994-06-03

    prerequisites forbid the intake of certain foods include Israel (no pork, Kosher prepared), Muslim nations (no pork, Halal prepared), and Hindu nations (no beef...communications. The critical life support supplies, such as food , water, and medicine, were pushed into the theater along with the transportation and...dictates a common sense burden-sharing philosophy.ś In a coalition operation, countries share common resources such as food , water, blood, transportation

  6. Mapping one strong 'Ohana: using network analysis and GIS to enhance the effectiveness of a statewide coalition to prevent child abuse and neglect.

    Science.gov (United States)

    Cardazone, Gina; U Sy, Angela; Chik, Ivan; Corlew, Laura Kate

    2014-06-01

    Network analysis and GIS enable the presentation of meaningful data about organizational relationships and community characteristics, respectively. Together, these tools can provide a concrete representation of the ecological context in which coalitions operate, and may help coalitions identify opportunities for growth and enhanced effectiveness. This study uses network analysis and GIS mapping as part of an evaluation of the One Strong 'Ohana (OSO) campaign. The OSO campaign was launched in 2012 via a partnership between the Hawai'i Children's Trust Fund (HCTF) and the Joyful Heart Foundation. The OSO campaign uses a collaborative approach aimed at increasing public awareness of child maltreatment and protective factors that can prevent maltreatment, as well as enhancing the effectiveness of the HCTF Coalition. This study focuses on three elements of the OSO campaign evaluation: (1) Network analysis exploring the relationships between 24 active Coalition member organizations, (2) GIS mapping of responses to a randomized statewide phone survey (n = 1,450) assessing awareness of factors contributing to child maltreatment, and (3) Combined GIS maps and network data, illustrating opportunities for geographically-targeted coalition building and public awareness activities.

  7. Education Policy and Governance in England under the Coalition Government (2010-15): Academies, the Pupil Premium, and Free Early Education

    Science.gov (United States)

    West, Anne

    2015-01-01

    This paper explores the governance of school-based and early education in England under the Conservative-Liberal Democrat Coalition Government (2010-15). It draws on three prominent Coalition policy areas--the academies programme, the pupil premium, and free part-time early education--and focuses on changes to the role played by central government…

  8. Influencing the political process through coalitions: the Michigan Council for Maternal and Child Health.

    Science.gov (United States)

    Holm, R S; Shaheen, P N

    1995-08-01

    Building a coalition with others is an effective tool for increasing influence at the state level of the political process. It allows for the hiring of a staff who are able to maintain a constant presence in the ever-changing state political arena, which individual physicians and other caregivers simply cannot do. It allows for the development of increased sophistication among its members, which likewise increases the ability to affect the political process. It should be done with a philosophical set of standards that preserves its integrity and focuses on its goals, which must be carefully delineated from the inception. Coalitions are an effective way to deal with public issues of maternal and child health.

  9. Coalitions and the Decision making Process on the Common Flexicurity Principles

    DEFF Research Database (Denmark)

    Simonsen, Mikkel Mailand

    than the regimes and cut to some extent across the usual division of countries, in that Scandinavian and the Anglo-Saxon countries form the core of one of the coalitions, whereas a number of continental countries - Belgium, Luxembourg, Italy, Greece and Spain - are now found in the core of the other...

  10. Multidisciplinary and multisectoral coalitions as catalysts for action against antimicrobial resistance: Implementation experiences at national and regional levels.

    Science.gov (United States)

    Joshi, Mohan P; Chintu, Chifumbe; Mpundu, Mirfin; Kibuule, Dan; Hazemba, Oliver; Andualem, Tenaw; Embrey, Martha; Phulu, Bayobuya; Gerba, Heran

    2018-03-20

    The multi-faceted complexities of antimicrobial resistance (AMR) require consistent action, a multidisciplinary approach, and long-term political commitment. Building coalitions can amplify stakeholder efforts to carry out effective AMR prevention and control strategies. We have developed and implemented an approach to help local stakeholders kick-start the coalition-building process. The five-step process is to (1) mobilise support, (2) understand the local situation, (3) develop an action plan, (4) implement the plan, and (5) monitor and evaluate. We first piloted the approach in Zambia in 2004, then used the lessons learned to expand it for use in Ethiopia and Namibia and to the regional level through the Ecumenical Pharmaceutical Network [EPN]. Call-to-action declarations and workshops helped promote a shared vision, resulting in the development of national AMR action plans, revision of university curricula to incorporate relevant topics, infection control activities, engagement with journalists from various mass media outlets, and strengthening of drug quality assurance systems. Our experience with the coalition-building approach in Ethiopia, Namibia, Zambia, and with the EPN shows that coalitions can form in a variety of ways with many different stakeholders, including government, academia, and faith-based organisations, to organise actions to preserve the effectiveness of existing antimicrobials and contain AMR.

  11. Report on the operation of incineration plant of the Coalite Chemical Works, Bolsover, Derbyshire, from commissioning to closure and the subsequent prosecution of the last operator Coalite Products Ltd by H M Inspectorate of Pollution under Section 5 of the Health and Safety at Work Etc. Act 1974

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-09-01

    In June 1991 elevated concentrations of polychlorinated dibenzo-dioxins (PCDDs) and polychlorinated dibenzofurans (PCDFs) were reported in cows` milk on farms in the Bolsover area in Derbyshire, UK. Monitoring by the HMIP showed that PCDDs and PCDFs were present in flue gases emitted from a chemical waste incinerator at the Coalite Chemical Works and to a lesser extent from the Coalite smokeless fuel works nearby. A soil survey and further sampling of vegetation showed the Coalite Chemical Works to be the major source of PCDDs and PCDFs. Coalite Products Ltd., pleaded guilty to operating the incinerator in breach of the Health and Safety Act in a case brought against then by HMIP on 20 February 1996. This report describes the investigation undertaken to establish the conditions of operation of the incinerator from its commissioning in 1978 to closure in November 1991. 12 refs., 8 figs., 6 tabs., 3 apps.

  12. Coalitions in Primary Triads: Reexamining the Theoretical Constructs From A Feminist Perspective.

    Science.gov (United States)

    Milstein, Kaylene; Baldwin, Cynthia

    1997-01-01

    Examines the theoretical constructs about the effects of coalitions in the father-mother-child triad from a family systems perspective. How this triadic view interacts with the historical patriarchal structure and with issues of power is addressed from a feminist perspective. (Author/MKA)

  13. Severe Hallux Valgus With Coalition of the Hallux Sesamoids Treated With Modified Lapidus Procedure: A Case Report.

    Science.gov (United States)

    Kurashige, Toshinori; Suzuki, Seiichi

    2017-12-01

    Coalition of the hallux sesamoids is an extremely rare condition. To our knowledge, only 1 case report has been published. We report a case of severe hallux valgus deformities with coalitions of the hallux sesamoids. The coalitions themselves were asymptomatic; however, this severe hallux valgus deformity needed to be surgically treated. The hallux sesamoids in both feet appeared to be fused and heart shaped on anteroposterior radiographs and dumbbell shaped on axial radiographs. It is known that postoperative incomplete reduction of the medial sesamoids can be a risk factor for the recurrence of hallux valgus. The computed tomography scan demonstrated a groove in the bottom of the center of the heart-shaped sesamoid. The flexor hallucis longus tendon was located in the groove. Therefore, a modified Lapidus procedure was performed considering the medial half of the heart-shaped sesamoid as the medial sesamoid. Although delayed union occurred, successful correction of the deformity was achieved. Level IV.

  14. Comparative Experience Factors among Black, Asian, and Hispanic Americans: Coalitions or Conflicts?

    Science.gov (United States)

    Anderson, Talmadge

    1992-01-01

    Compares the culture, sociology, politics, and economics of African Americans, Hispanic Americans, and Asian Americans in the United States. Describes increased racial-ethnic national pluralism, the increased possibility of conflict between groups, and the need for dialogue and work toward coalition among these groups. (JB)

  15. Modeling Multi-Mobile Agents System Based on Coalition Signature Mechanism Using UML

    Institute of Scientific and Technical Information of China (English)

    SUNZhixin; HUANGHaiping; WANGRuchuan

    2004-01-01

    With the development of electronic commerce and agent techniques, multi-mobile agents cooperation can not only improve the efficiency of electronic business trade, but more importantly, it has a comprehensive applicative value in solving the security issues of mobile agent system. This paper firstly describes the mechanism of multi-mobile agents coalition signature aiming at the system security. Subsequently it brings forward a basic architecture of Multi-mobile agents system (MMAS) based on the design pattern of multi-mobile agents. The paper uses the diagrs_rn of UML, such as use case diagram, class diagram and sequence diagram to build the detailed model of the coalition signature and multi-mobile agents cooperation results. Through security analysis, we find that multimobile agents cooperation and interaction can solve some security problems of mobile agents in transfer, and also it can improve the efficiency of business trade. These results indicate that MMAS has a high security performance and can be widely used in E-commerce trade.

  16. Advancing Strategies for Agenda Setting by Health Policy Coalitions: A Network Analysis of the Canadian Chronic Disease Prevention Survey.

    Science.gov (United States)

    McGetrick, Jennifer Ann; Raine, Kim D; Wild, T Cameron; Nykiforuk, Candace I J

    2018-06-11

    Health in all policies can address chronic disease morbidity and mortality by increasing population-level physical activity and healthy eating, and reducing tobacco and alcohol use. Both governmental and nongovernmental policy influencers are instrumental for health policy that modifies political, economic, and social environments. Policy influencers are informed and persuaded by coalitions that support or oppose changing the status quo. Empirical research examining policy influencers' contact with coalitions, as a social psychological exposure with health policy outcomes, can benefit from application of health communication theories. Accordingly, we analyzed responses to the 2014 Chronic Disease Prevention Survey for 184 Canadian policy influencers employed in provincial governments, municipalities, large workplaces, school boards, and the media. In addition to contact levels with coalitions, respondents' jurisdiction, organization, and ideology were analyzed as potential moderators. Calculating authority score centrality using network analysis, we determined health policy supporters to be more central in policy influencer networks, and theorized their potential to impact health policy public agenda setting via priming and framing processes. We discuss the implications of our results as presenting opportunities to more effectively promote health policy through priming and framing by coordinating coalitions across risk behaviors to advance a societal imperative for chronic disease prevention.

  17. The Coalition for Sustainable Egg Supply project: An introduction.

    Science.gov (United States)

    Swanson, J C; Mench, J A; Karcher, D

    2015-03-01

    In the United States, empirical information on the sustainability of commercial-scale egg production is lacking. The passage of state regulations specific to hen housing created urgency to better understand the effects of different housing systems on the sustainability of the egg supply, and stimulated the formation of a coalition, the Coalition for a Sustainable Egg Supply (CSES), to conduct research on this topic. The CSES is a multi-stakeholder group with 27 members, including food manufacturers, research institutions, scientists, restaurants, food service, retail food companies, egg suppliers, and nongovernmental organizations. A commercial-scale study was developed to better understand the effect of 3 housing systems (conventional cage, enriched colony, and cage-free aviary) on 5 areas related to a sustainable egg supply. These 5 sustainability areas represent effects on people, animals, and the environment: animal health and well-being, environment, food safety, worker health and safety, and food affordability. Five teams of scientists, each associated with a sustainability area, conducted an integrated field study at a commercial site in the upper Midwest through 2 flock cycles in 3 housing systems. This paper provides a brief overview of the CSES project to serve as an introduction for the papers that follow in this volume of Poultry Science. © The Author 2015. Published by Oxford University Press on behalf of Poultry Science Association.

  18. If we work together, i will have greater power: Coalitions in networked innovation

    NARCIS (Netherlands)

    Sie, Rory; Sloep, Peter; Bitter-Rijpkema, Marlies

    2018-01-01

    The present article uses agent-based social simulation to study rational behaviour in networked innovation. A simulation model that includes network characteristics and network participant’s characteristics is run using parameter sweeping, yielding 1450 simulation cases. The notion of coalitions was

  19. Cyborg Dreams in Asian American Transnationality: Transgression, Myth, Simulation, Coalition

    OpenAIRE

    Song, Mary

    2012-01-01

    By deploying a cyberculture theory of cyborg politics in my literary analyses of Asian American literature, I deconstruct Asian American subjectivity through the trope of transnationality. In the Asian American transnational, I locate four prominent traits of Donna Haraway's socialist feminist cyborg: boundary transgression, the recognition and re-scripting of myth, simulations of identity, and coalitions of affinity. By adopting the language of cyberculture, I envision Asian American literat...

  20. Sustaining Physics Teacher Education Coalition programs in physics teacher education

    OpenAIRE

    Rachel E. Scherr; Monica Plisch; Renee Michelle Goertzen

    2017-01-01

    Understanding the mechanisms of increasing the number of physics teachers educated per year at institutions with thriving physics teacher preparation programs may inspire and support other institutions in building thriving programs of their own. The Physics Teacher Education Coalition (PhysTEC), led by the American Physical Society (APS) and the American Association of Physics Teachers (AAPT), has supported transformation of physics teacher preparation programs at a number of institutions aro...

  1. Introduction to linear programming: Coalitional game experiments

    Energy Technology Data Exchange (ETDEWEB)

    Lucas, W.

    1994-12-31

    Many solution notions in the multiperson cooperative games (in characteristic function form) make use of linear programming (LP). The popular concept of the {open_quotes}core{close_quotes} of a coalitional game is a special type of LP. It can be introduced in a very simple and quite exciting manner by means of a group experiment. A total of fifty dollars will be given to three randomly selected attendees who will take part in an experiment during this talk, presuming they behave in a Pareto optimal manner. Furthermore, the dual of the particular LP for the core gives rise to the idea of {open_quotes}balanced sets{close_quotes} which is an interesting combinatorial structure in its own right.

  2. Online Air-Conditioning Energy Management under Coalitional Game Framework in Smart Community

    Directory of Open Access Journals (Sweden)

    Wei Fan

    2016-08-01

    Full Text Available Motivated by the potential ability of air conditioning (A/C units in demand response, this paper explores how to utilize A/C units to increase the profit of a smart community. A coalitional game between the households and the load serving entity (LSE in a smart community is studied, where the LSE joins by selling renewable energy to householders and providing an energy saving service to them through an A/C controller. The A/C controller is designed to reduce the amount of electricity purchased from the main grid by controlling A/C units. An online A/C energy management algorithm is developed, based on Lyapunov optimization, that considers both the A/C energy consumption and the thermal comfort level of consumers. In order to quantify the contribution of A/C units, the Shapley value is adopted for distribution of the reward among the participating householders and the LSE, based on their contribution. The simulation result verifies the effectiveness of the proposed coalitional game for a smart community and the algorithm for A/C.

  3. Culture and Inter-Group Relations Theory as a Pathway to Improve Decision Making in Coalition Operations

    National Research Council Canada - National Science Library

    O'Mara, William J; Heacox, Nancy J; Gwynne, John W; Smillie, Robert J

    2000-01-01

    The U.S. military frequently participates in coalitions involving foreign military organizations as well as domestic and foreign civilian groups, such as governmental organizations, private volunteer...

  4. The Dynamic VPN Controller. Secure Information Sharing in a Coalition Environment

    Science.gov (United States)

    2005-03-01

    coalitionName=" COALA "> <Security>Class A</Security> <Site siteName="SITE1"> <Remote> <Hostname>dvc.site1.com</Hostname> <IPAddress...34 COALA "> <Security>Class A</Security> <Site siteName="SITE1"> <Remote> <Hostname>dvc.site1.com</Hostname> <IPAddress>10.1.1.1

  5. The political economy of local government in Croatia: winning coalitions, corruption, and taxes

    Directory of Open Access Journals (Sweden)

    Vuk Vukovic

    2017-12-01

    Full Text Available This paper represents the first comprehensive effort to provide a theoretical and empirical explanation of systemic corruption in Croatian local government. It follows the logic of the selectorate theory, according to which staying in power for long periods of time depends on creating a small group of loyal but powerful supporters (the winning coalition. Mayors that exist within such environments not only maximize their chances of staying in power; they also engage in greater corruption and set higher taxes. Its citizens are stuck in a negative spiral of corruption, high taxes, and a politician that regardless of this keeps winning elections. The paper makes two main contributions to the current literature. First it provides a theoretical extension of the selectorate theory to Croatian local government by explicitly modeling the link between corruption and winning coalitions, and second, it empirically verifies the theoretical findings using a novel matching approach called entropy balancing.

  6. Culture and Inter-Group Relations Theory as a Pathway to Improve Decision Making in Coalition Operations

    National Research Council Canada - National Science Library

    O'Mara, William J; Heacox, Nancy J; Gwynne, John W; Smillie, Robert J

    2000-01-01

    ... organizations, and special interest groups. Due to the wide cultural and organizational diversity of the participant groups, coalition operations pose significant challenges to the U.S. military...

  7. 75 FR 56651 - ITS Joint Program Office; Trucking Industry Mobility & Technology Coalition Annual Meeting

    Science.gov (United States)

    2010-09-16

    ... DEPARTMENT OF TRANSPORTATION ITS Joint Program Office; Trucking Industry Mobility & Technology... Transportation. ACTION: Notice. The Trucking Industry Mobility & Technology Coalition (TIMTC) Annual [[Page 56652...: Beating Gridlock with a Smart Grid; U.S. DOT Truck Technology Initiatives; and State and Federal...

  8. Strategies for sustainable regional development and conditions for vital coalitions in the Netherlands

    NARCIS (Netherlands)

    Horlings, L.G.

    2011-01-01

    The question that is addressed in this chapter is how processes can be stimulated in rural–urban areas which contribute to sustainable development? How can capacity to act be realized? Our hypothesis is: Specific informal networks in the form of vital coalitions between private and public actors can

  9. COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks

    NARCIS (Netherlands)

    Sie, Rory

    2012-01-01

    Sie, R. L. L. (2012). COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks (Unpublished doctoral dissertation). September, 28, 2012, Open Universiteit in the Netherlands (CELSTEC), Heerlen, The Netherlands.

  10. IAEA support to the sustainability of nuclear research institutions through networking and coalitions

    International Nuclear Information System (INIS)

    Videnovic, I.R.; Goldman, I.N.; Bradley, E.E.; Ridikas, D.; Adelfang, P.; Acuna, O.E.; )

    2009-01-01

    enhanced international and regional cooperation may be the best prospect not only to assure the survival of the most capable reactors but also as a means of providing high quality research reactor capabilities to individual countries that do not need or cannot afford to maintain and operate a research reactor on their own. The role of the IAEA in this field is thus to provide key support for fledgling coalitions by serving as an honest broker and a forum for enhancing regional cooperation and promoting the formation of partnerships and coalitions. The Agency is best placed to coordinate the formulation of specific ideas for enhanced regional and international cooperation between research reactors and users in order to improve sustainability. The Department of Technical Cooperation, the Department of Nuclear Energy and the Department of Nuclear Sciences and Applications of the IAEA are working together in European regional project entitled 'Enhancing the Sustainability of Research Reactors and Their Safe Operation Through Regional Cooperation, Networking and Coalitions' (RER/4/032) to improve business planning, expand awareness of potential customers and increase contacts between prospective customers and research reactor service providers, and to increase effectiveness of nuclear research and education through sustainable networking. (authors)

  11. Member and Affiliate Contact Directory. Triangle Coalition for Science and Technology Education. Second Edition.

    Science.gov (United States)

    Triangle Coalition for Science and Technology Education, College Park, MD.

    This directory is designed to assist local action groups (existing local alliances; science mathematics, and technology teachers; superintendents, principals, and supervisors; guidance counselors and resource specialists; and university and college professors) in making contact with the local structure of the Triangle Coalition for Science and…

  12. A Coalition on the Public Understanding of Science

    Science.gov (United States)

    Allison, L.; Hehn, J.; Kass, J.; O'Grady, R.; Scotchmoor, J.; Stucky, R.

    2006-12-01

    For many of the problems facing contemporary societies, such as potential impacts of climate change, coastal degradation, reductions of fisheries stocks, volcanic and earthquake hazards in densely populated areas, quality and availability of water, and exploitation of hydrocarbon resources and development of alternative energy sources, formulation of wise public policy depends on evaluation of the state of geoscientific research in the relevant areas. In a democratic society, public discourse about and input to policy decisions on key issues affecting the public welfare requires a public that understands the scientific research process, values the contribution of science to society, and has a working knowledge of what science can and cannot yet say about specific issues. Arguably, that ideal falls short in contemporary American society. Disturbing trends in science education, low public scientific literacy, and increasing alarms about U.S. competitiveness have all been prominent national news topics in recent years. (1) A recent National Science Board report indicated that two-thirds of Americans do not understand what science is, how it is conducted, and what one can expect from it. (2) A recent Gallup poll reports widespread and increasingly prevalent belief in pseudoscience. (3) There is a growing public complacency about and disengagement from science at the very moment when the impact of science on public life is greater than ever. (4) The Business Roundtable of major U.S. companies notes that the scientific and technical building blocks of our economic leadership are eroding at a time when many other nations are gathering strength. In response, a Coalition on the Public Understanding of Science COPUS has been initiated. Essential to COPUS is the premise that public understanding of science and the scientific process and an awareness of the impacts of scientific advancements on our quality of life are necessary to increase student interest in science as a

  13. Bringing Psychological Science to the Forefront of Educational Policy: Collaborative Efforts of the American Psychological Association's Coalition for Psychology in the Schools and Education

    Science.gov (United States)

    Rollin, Stephen A.; Subotnik, Rena F.; Bassford, Maya; Smulson, Jennifer

    2008-01-01

    The following article details the work of the American Psychological Association's (APA's) Coalition for Psychology in the Schools and Education (CPSE). First, a brief history of the background and creation of the coalition is described. The article then details the projects, completed and ongoing, of the CPSE. Those projects include a Teacher…

  14. Smart transactive energy framework in grid-connected multiple home microgrids under independent and coalition operations

    DEFF Research Database (Denmark)

    Marzband, Mousa; Azarinejadian, Fatemeh; Savaghebi, Mehdi

    2018-01-01

    This paper presents a smart Transactive energy (TE) framework in which home microgrids (H-MGs) can collaborate with each other in a multiple H-MG system by forming coalitions for gaining competitiveness in the market. Profit allocation due to coalition between H-MGs is an important issue...... for ensuring the optimal use of installed resources in the whole multiple H-MG system. In addition, considering demand fluctuations, energy production based on renewable resources in the multiple H-MG can be accomplished by demand-side management strategies that try to establish mechanisms to allow...... for a flatter demand curve. In this regard, demand shifting potential can be tapped through shifting certain amounts of energy demand from some time periods to others with lower expected demand, typically to match price values and to ensure that existing generation will be economically sufficient. It is also...

  15. Captive-housed male cheetahs (Acinonyx jubatus soemmeringii) form naturalistic coalitions: measuring associations and calculating chance encounters.

    Science.gov (United States)

    Chadwick, Carly L; Rees, Paul A; Stevens-Wood, Barry

    2013-01-01

    Cheetahs are known to reproduce poorly in captivity and research suggests that the reasons for this are behavioral, rather than physiological. In the wild, male cheetahs remain in stable groups, or coalitions, throughout their lifetime. Appropriate social group housing is important in enhancing welfare and reproductive success in captivity and this study examined the effect of changes in social group composition on the behavior of four male cheetahs: two siblings and two half siblings. During the study, the cheetahs were housed both in pairs and as a group of four, before one male was relocated. The remaining cheetahs were then housed in a trio. Affiliative behaviors were frequently shown within pairs and overt aggression was seldom observed. Association indices were calculated for each cheetah pair and corrected for chance encounters based on data generated from a Monte Carlo simulation. The indices showed that two coalitions existed before the relocated male departed. Following the relocation of one of the half siblings, the remaining cheetahs appeared to form a coalition of three, as the indices of association between the unrelated male and the siblings increased and allogrooming between unrelated individuals was observed. The findings of this study indicate that natural social groupings of male cheetahs can be successfully replicated in captivity, which could potentially improve the chances of reproductive success when they are introduced to female cheetahs. © 2013 Wiley Periodicals, Inc.

  16. Halftime - a balance in matters nuclear of the grand coalition; Halbzeit - Bilanz der Grossen Koalition in Sachen Kernenergie

    Energy Technology Data Exchange (ETDEWEB)

    Heller, W.

    2007-10-15

    On November 11, 2005, the coalition partners, CDU/CSU and SPD, signed the agreement establishing a coalition in the German federal parliament under the heading of ''Together for Germany''. Among other things, this raised the question of what would happen in the fields of energy policy and nuclear power. After 2 years of a grand coalition, it is time to draw some interim conclusions. The coalition agreement contains statements to the effect that energy policy means fundamental economic, structural and climate policies, and that secure, low-cost, non-polluting energy supplies are elementary prerequisites of a modern, capable national economy. A sustainable overall energy policy concept should be based on a balanced energy mix. This overall concept, one of the results of ''energy summit'' talks with Federal Chancellor Merkel, was announced for the end of 2007. The 3 energy summit discussions with Federal Chancellor Merkel deliberately avoided the subject of nuclear power. There is no debate about the implications of nuclear energy. This in no way improved the status of nuclear power in Germany. What remains is hope for the second half of this government's term of office. The beginning of that term is marked by the McKinsey study, initiated by the Federation of German Industries (BDI), on ''Cost and Potential of Avoiding Greenhouse Gas Emissions in Germany,'' which says that operating German nuclear power plants for 60 or even 45 years would result in a CO2 avoidance potential for 2020 which would be approximately 90 million tons higher, and in avoidance costs lower by 4.5 billion euro per year. (orig.)

  17. Research Reactors Coalitions

    International Nuclear Information System (INIS)

    Borio, Andrea; Bradley, E.; Vyshniauskas, Judy; Ridikas, Danas

    2013-01-01

    When considering the potential role of an existing RR or possibly the construction of a new RR, it is clear that a nuclear science and technology programme (including nuclear power) could benefit provided the RR is safely and competently managed, well utilised and adequately funded. Based on MSs experience, a domestic RR may not be required to develop a nuclear power programme, provided the decision takes advantage of foreign expertise, including access to foreign RRs facilities and RRs regional/international networks. If a country decides to gain access to a foreign research reactor, it may need considering the potential risk of change in the political relationship with the host country that could compromise the achievement of its national relevant objectives. This risk may be offset by availability of many options within one or more regional/international RRs networks and coalitions. Examples include the use of existing RRs in vendor, non-vendor countries and, in some cases non-nuclear power countries, to develop human resources in support of the introduction of nuclear power elsewhere. International RR networking trends are most evident with high flux, higher capability, and more complex fuel and material testing RRs being shared through international partnerships. However, networks involving low-medium power RRs for education and training purposes are also gaining a more prominent role to support nuclear capacity building in newcomer MSs. Networking through the internet seems also to be a promising way to support, as complementary offer to direct access to RRs facilities, MSs nuclear capacity building objectives (e.g. the IRL project)

  18. Underlying Motives, Moral Agendas and Unlikely Partnerships: The Formulation of the U.S. Trafficking in Victims Protection Act Through the Data and Voices of Key Policy Players

    Directory of Open Access Journals (Sweden)

    Nicole Footen Bromfield

    2012-08-01

    Full Text Available In response to the overwhelming amount of attention to human trafficking, the debates surrounding its definition, and its focus on the sex industry, the purpose of this study was to understand the motivations behind the formation of the Trafficking in Victims Protection Act (TVPA. Using the Advocacy Coalition Framework (ACF as a model, data was collected and analyzed in order to examine the coalition identities of key players and their positions. Through the presentation of in-depth interview data with key policy players involved in the making of the TVPA, this article illustrates how and why the TVPA was formulated, the implications of its development, and the necessity for critical analysis of its effects. The use of alternative frameworks of labor and migration for understanding trafficking is proposed. Further consideration is given to legislative changes to eliminate anti-prostitution ideology and to support anti-oppressive approaches to addressing forced or deceptive working conditions.

  19. Excellent Companies and Coalition-Building among the Fortune 500: A Value- and Relationship-Based Theory.

    Science.gov (United States)

    Wilson, Laurie J.

    1994-01-01

    Discusses ways a revolution in business management emphasizing people, values, integrity, and communication should also change the approach to public relations. Reviews research to demonstrate that coalition companies possess the characteristics of excellent companies. Argues that perhaps this community relations function will lead from the…

  20. 78 FR 21928 - Demand Response Coalition v. PJM Interconnection, L.L.C.; Notice of Complaint

    Science.gov (United States)

    2013-04-12

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. EL13-57-000] Demand Response... Demand Response Coalition \\1\\ (Complainant) filed a formal complaint against the PJM Interconnection, L.L... Plan Enhancements'') violate section 205 of the FPA and are therefore unenforceable. \\1\\ The Demand...

  1. Three-body interactions in sociophysics and their role in coalition forming

    Science.gov (United States)

    Naumis, Gerardo G.; Samaniego-Steta, F.; del Castillo-Mussot, M.; Vázquez, G. J.

    2007-06-01

    An study of the effects of three-body interactions in the process of coalition formation is presented. In particular, we modify a spin glass model of bimodal propensities and also a Potts model in order to include a particular three-body Hamiltonian that reproduces the main features of the required interactions. The model can be used to study conflicts, political struggles, political parties, social networks, wars and organizational structures. As an application, we analyze a simplified model of the Iraq war.

  2. More Fragmented, and yet More Networked: Analysing the Responses of Two Local Authorities in England to the Coalition's "Self-Improving School-Led System" Reforms

    Science.gov (United States)

    Greany, Toby

    2015-01-01

    This paper explores school reform in England under the Conservative-led Coalition government, elected in 2010, through a focus on the changing roles and status of Local Authorities (LAs). The Coalition's stated aim was the development of a "self-improving, school-led" system in which LAs should become "champions for children."…

  3. California: Environmental Health Coalition Clean Ports, Healthy Communities in San Diego (A Former EPA CARE Project)

    Science.gov (United States)

    The Environmental Health Coalition (EHC) is a recipient of a CARE Level II cooperative agreement grant. The Clean Ports, Healthy Communities in San Diego targets the Barrio Logan and Old Town National City areas located along San Diego Bay.

  4. 77 FR 42738 - Patient Safety Organizations: Voluntary Relinquishment From the Coalition for Quality and Patient...

    Science.gov (United States)

    2012-07-20

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Agency for Healthcare Research and Quality Patient Safety Organizations: Voluntary Relinquishment From the Coalition for Quality and Patient Safety of Chicagoland (CQPS.... SUMMARY: The Patient Safety and Quality Improvement Act of 2005 (Patient Safety Act), Public Law 109-41,42...

  5. Coalitions and Competition in Malaysia – Incremental Transformation of a Strong-party System

    Directory of Open Access Journals (Sweden)

    Meredith L. Weiss

    2013-01-01

    Full Text Available The seeming entrenchment of a two-coalition system in Malaysia solidifies the centrality of strongly institutionalised parties in the polity. The primary parties in Malaysia reach deeply into society and nest within dense networks of both intra-party and external organisations. Given this order – which differentiates Malaysia from its neighbours in the region – political liberalisation, if it happens, should be expected largely via electoral politics, and, specifically, through inter-party challenges. Indeed, the ideological and material premises of the emergent Pakatan Rakyat (People’s Alliance differ substantially from those of the long-standing Barisan Nasional (National Front, even as both pursue the same broad swathe of voters. This distinction reflects and furthers transformation in Malaysian politics, including not just a shift in the salience of communal identities and in policy proposals and issues, but also in patterns of political engagement both within and outside of parties, regardless of which coalition controls parliament.

  6. Democracy in Brazil: presidentialism, party coalitions and the decision making process

    Directory of Open Access Journals (Sweden)

    Fernando Limongi

    Full Text Available There is no reason to treat the Brazilian political system as singular. Coalitions obey and are governed by party principles. The president, whose institutional power was enhanced by the 1988 Constitution, has a monopoly over legislative initiative, which approximates the Brazilian system to the European parliamentary democracies. Even though it is based upon empirical data, this essay formulates theoretical problems, such as the importance of institutional choices and how these impact on relations between the majority and minority in democratic governments.

  7. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  8. When culture does not matter: Experimental evidence from coalition formation ultimatum games in Austria and Japan

    NARCIS (Netherlands)

    Okada, A.; Riedl, A.M.

    1999-01-01

    This paper reports the results of a cross-country comparison between Austria andJapan for an experimental 3-personcoalition formation ultimatum game. The experimental design allows thecomparison with respect to three decisions. (i)The coalition decision, (ii) proposers' demand behavior in 2- and

  9. Political Appointments and Coalition Management in Brazil, 2007-2010 Nominaciones Partidárias e Coaliciones en Brasil, 2007-2010

    Directory of Open Access Journals (Sweden)

    Sérgio Praça

    2011-01-01

    Full Text Available Studies on coalition management in presidential systems usually focus on two types of goods used by the president and formateur party to hold together coalitions: exchange goods (such as individual budget amendments and coalition goods (such as ministries. This research note analyzes, with an original dataset of party members and political appointees in Brazil, a different type of good: presidential political appointments. Our study shows that partisan political appointees vary greatly among Brazilian ministries and within them. We also found that there is a disconnect between how many seats a political party holds in Congress and the number of political appointment offices it controls. This has implications for the literature on bureaucracy and politics and the literature on coalition management.La investigación sobre el manejo de coaliciones en sistemas presidenciales normalmente se concentra en dos tipos de bienes utilizados por el presidente y su partido para formar coaliciones: intercambio de bienes (a modo de enmiendas presupuestarias individuales y los bienes propios de la coalición (a través de gabinetes ministeriales. En base a un banco de datos original sobre afiliación y nombramientos partidários para cargos de confianza en el poder ejecutivo brasileño, este artículo analiza un tipo diferente de bien de intercambio: los nombramientos presidenciales. Nuestro estudio demuestra que los patrones de nombramientos partidarios varían horizontalmente (de ministerio a ministerio y verticalmente (dentro de un ministerio específico. El análisis también muestra que no hay relación entre el número de legisladores que pertenecen a un partido y la capacidad de este de efectuar nombramientos políticos.

  10. Grassroots Responsiveness to Human Rights Abuse: History of the Washtenaw Interfaith Coalition for Immigrant Rights

    Science.gov (United States)

    Sanders, Laura; Martinez, Ramiro; Harner, Margaret; Harner, Melanie; Horner, Pilar; Delva, Jorge

    2013-01-01

    The purpose of this article is to discuss how a community agency based in Washtenaw County, the Washtenaw Interfaith Coalition for Immigration Rights (WICIR), emerged in response to increasing punitive immigration practices and human rights abuses toward the Latino community. The article discusses how WICIR is engaged in advocacy, community…

  11. Practical Child Safety Education in England: A National Survey of the Child Safety Education Coalition

    Science.gov (United States)

    Mulvaney, Caroline A.; Watson, Michael C.; Walsh, Patrick

    2013-01-01

    Objective: To examine the provision of practical safety education by Child Safety Education Coalition (CSEC) organizations in England. Design: A postal survey. Setting: Providers of child practical safety education who were also part of CSEC. Methods: In February 2010 all CSEC organizations were sent a self-completion postal questionnaire which…

  12. Feasible climate targets. The roles of economic growth, coalition development and expectations

    International Nuclear Information System (INIS)

    Blanford, Geoffrey J.; Richels, Richard G.; Rutherford, Thomas F.

    2009-01-01

    The analysis presented here follows the design specified by the Energy Modeling Forum (EMF) Transition Scenarios study on achieving climate stabilization goals with delayed participation by developing countries. We use the MERGE model to evaluate the core EMF scenarios for both the international and the US-specific studies. Our results indicate that a radiative forcing target equivalent to 450 ppmv CO 2 -e cannot be met even allowing for full participation and overshoot during the entire 21st century. With delayed participation of developing countries, a target of 550 ppmv CO 2 -e is only attainable with pessimistic assumptions about economic growth, and even then only at very high cost. A target of 650 ppmv CO 2 -e can be met with delayed participation for a more affordable cost. We highlight sensitivities to the core scenarios in two key dimensions: (1) the effect of the unfolding global financial crisis on the rate of economic growth and (2) the willingness of initially non-participating countries to agree at the beginning of the next commitment period (i.e. 2012) to join the coalition at a pre-specified date in the future. We find that while the recession does not fundamentally change the crucial role of developing country involvement, advance agreement on their part to future targets could substantially reduce costs for all countries. (author)

  13. Coalitions and Competition in Malaysia – Incremental Transformation of a Strong-party System

    OpenAIRE

    Meredith L. WEISS

    2013-01-01

    "The seeming entrenchment of a two-coalition system in Malaysia solidifies the centrality of strongly institutionalised parties in the polity. The primary parties in Malaysia reach deeply into society and nest within dense networks of both intra-party and external organisations. Given this order - which differentiates Malaysia from its neighbours in the region - political liberalisation, if it happens, should be expected largely via electoral politics, and, specifically, through inter-party c...

  14. POLITICAL MONETARY CYCLES IN COALITION AND SINGLE PARTY GOVERNMENT PERIODS: A CASE STUDY ON TURKEY

    Directory of Open Access Journals (Sweden)

    AHMET EMRAH TAYYAR

    2017-12-01

    Full Text Available According to the theory of political monetary cycles, the government manipulates monetary policy during election periods in order to be re-elected. According to the said theory, expansionary monetary policies are implemented before the elections with opportunistic objective, while the contractionary monetary policies are implemented to stabilize the economy immediately after the elections. The use of monetary policy instruments for political purposes depends on the presence of a non-autonomous central bank, flexible exchange rate regime in the country, and the coordination between fiscal and monetary policies. Thus, the changes in the monetary policy indicators in election periods during coalition and single party governments in Turkey between 1990 and 2016 were examined in the present study. The money in circulation (M0, M1 money supply, domestic loans and inflation series were analyzed with the seasonal Box-Jenkins method for the above mentioned periods. Based on the findings of the study, political monetary cycles were not observed during the 1990-2000 coalition governments. It was determined that there were political monetary cycles during the single party government period between 2000 and 2016.Furthermore, although it could be expected that the political monetary cycles would be removed with the liberalization of the Turkish central bank on 25 April 2001, the existence of political monetary cycles during the period of 2000-2016 indicates that central bank independence was not fully achieved in Turkey. Based on another finding of the present study, the lack of political monetary cycles during the coalition government periods could lead to the failure in financing the budget deficit that increase due to political reasons with monetary policies. However, due to the existence of political monetary cycles during the single party government period, it could be argued that politically induced budget deficits changed in consistence with the

  15. Diplomasi Publik Organisasi Nonpemerintah dalam Membangun Citra Indonesia: Studi Kegiatan 'Koalisi untuk Kebebasan Informasi'

    Directory of Open Access Journals (Sweden)

    Asep Saefudin

    2008-06-01

    Full Text Available The research is aimed to find out the “Coalition for Freedom of Information” activity, or Coalition, that can be categorized public diplomacy, its relationship with implementing thegovernment as the requirement to realize the good governance, and to get to know the relationship between good governance and the image building of Indonesia. The principles of public relations are used as the approach in analyzing the phenomenon of public diplomacy used by Coalition. This research was conducted by using the qualitative approach through constructivist paradigm toward the Coalition attitude in applying the public diplomacy. This research used both the key and supporting informa collecting was conducted by interview, observation, participation, and documentary study about the Coalition activity as well as the delphi technique. The data analysis was carried out as long as the research went on through the intersubjective commitment to focus being researched. The research gained some findings which involved: (a The “Coalition for Freedom of Information” activity in public diplomacy can be done by the public relations approach using some activity categories, (b The “Coalition for freedom of information” performance is focused on the efforts to uphold the law concerning freedom of access to public information in supporting the realization of good governance, (c The public diplomacy activity applied by the Coalition through its advocacy was considered successful which can be seen by the local government rules concerning the implementation of participative and transparent government, (d The model with the integrated public diplomacy potency and the synergy between the state actor and the non-state actor possessing their own structural authority and legality in the information service system for all public elements can build the positive image of Indonesia.

  16. [Contribution of the Peruvian Multisectorial Coalition against Cancer].

    Science.gov (United States)

    Pinillos-Ashton, Luis; Limache-García, Abel

    2013-03-01

    Cancer is a public health problem due to its high incidence and mortality, its high social and economic cost, and the lack of intra and intersectorial strategies resulting in failure to access information and screening tests. For this reason, it is necessary to address this problem with a comprehensive and sustainable approach. After performing a diagnosis of the human and material resources at the national level, and after having observed the attitude of healthcare decisors, the Multisector Coalition against Cancer was created with the participation of the public and nonpublic sector. A strategic plan was developed, followed by a national plan for strengthening cancer prevention and control. As a result, intersectorial work and health promotion oriented to cancer prevention through information, education and communication were strengthened. Service supply was improved and optimized through decentralization of oncological care.

  17. Connecting and Reconnecting: Outfitting the Figure of the Cyborg for Transnational Coalition-building

    OpenAIRE

    Jessica E. Brophy

    2016-01-01

    This work attempts to rehabilitate Donna Haraway’s (1991) figure of the cyborg to increase the possibilities of alliances between transnational feminism and cyborg or technoscience feminism. Haraway’s cyborg offers little impetus for political investment and coalition building. This work develops an optional prosthesis of responseability for the cyborg figuration, one that enables the cyborg to invest locally. This ethic of response-ability is developed via the work of Mary Strine (1989), Ad...

  18. The anti-human trafficking collaboration model and serving victims: Providers' perspectives on the impact and experience.

    Science.gov (United States)

    Kim, Hea-Won; Park, Taekyung; Quiring, Stephanie; Barrett, Diana

    2018-01-01

    A coalition model is often used to serve victims of human trafficking but little is known about whether the model is adequately meeting the needs of the victims. The purpose of this study was to examine anti-human trafficking collaboration model in terms of its impact and the collaborative experience, including challenges and lessons learned from the service providers' perspective. Mixed methods study was conducted to evaluate the impact of a citywide anti-trafficking coalition model from the providers' perspectives. Web-based survey was administered with service providers (n = 32) and focus groups were conducted with Core Group members (n = 10). Providers reported the coalition model has made important impacts in the community by increasing coordination among the key agencies, law enforcement, and service providers and improving quality of service provision. Providers identified the improved and expanded partnerships among coalition members as the key contributing factor to the success of the coalition model. Several key strategies were suggested to improve the coalition model: improved referral tracking, key partner and protocol development, and information sharing.

  19. The Social Construction of Young People within Education Policy: Evidence from the UK's Coalition Government

    Science.gov (United States)

    Brooks, Rachel

    2013-01-01

    Since assuming power in May 2010, the UK's Coalition government has devoted considerable energy to formulating its policies with respect to young people. Evidence of this can be found in "Positive for youth: a new approach to cross-government policy for young people aged 13-19", a policy text that outlines a wide range of measures to be…

  20. Advocating for schools to provide effective HIV and sexuality education: a case study in how social service organizations working in coalition can (and should) affect sustained policy change.

    Science.gov (United States)

    Ogusky, Jeremy; Tenner, Adam

    2010-05-01

    Advocates believed that to slow an expanding HIV/ AIDS epidemic in Washington, D.C., a local effort could ensure that HIV prevention was brought to scale. Schools were chosen as the focus and a new coalition advocated for the city government to pass new academic standards for health education. HIV and sex education policies had not been revised in more than 12 years and HIV education in D.C. public schools varied greatly in quality. Metro TeenAIDS (MTA), a traditional social service organization with no real history of advocacy work, reached only 10% of D.C. adolescents with critical HIV/AIDS prevention information. Clearly, to make a sustained impact, system change was necessary. After deciding to pursue a campaign focused on updating health education policy and creating standards, MTA convened a variety of reproductive health, adolescent medicine, and other organizations to establish the DC Healthy Youth Coalition. The Coalition used three complementary strategies to achieve campaign goals: mobilizing grassroots community support, involving parents in the discussion, and educating city leaders. By building an alliance of social service organizations and influencing critical public policy, the coalition ensured that new educational standards were passed.

  1. Influencing organizations to promote health: applying stakeholder theory.

    Science.gov (United States)

    Kok, Gerjo; Gurabardhi, Zamira; Gottlieb, Nell H; Zijlstra, Fred R H

    2015-04-01

    Stakeholder theory may help health promoters to make changes at the organizational and policy level to promote health. A stakeholder is any individual, group, or organization that can influence an organization. The organization that is the focus for influence attempts is called the focal organization. The more salient a stakeholder is and the more central in the network, the stronger the influence. As stakeholders, health promoters may use communicative, compromise, deinstitutionalization, or coercive methods through an ally or a coalition. A hypothetical case study, involving adolescent use of harmful legal products, illustrates the process of applying stakeholder theory to strategic decision making. © 2015 Society for Public Health Education.

  2. An Analysis of the United States-Led Coalition Air Campaign Conducted During the 1991 War with IRAQ: Desert Storm

    National Research Council Canada - National Science Library

    Murphy, John

    2002-01-01

    Evaluation of the 1991 United States led coalition Persian Gulf War (DESERT STORM) Air Campaign is performed to measure its adherence to basic principles of war and to determine the potential implications for the future conduct of war...

  3. Rise and Fall of a Coalition: The Supreme War Council and Marshal Foch, 1917-1919

    Science.gov (United States)

    2017-05-26

    Britain and France During the First World War ( Cambridge : Cambridge University Press, 2009), 169. 5 World Peace Foundation, “The Supreme War Council...Second World War conflict. It illustrated how unified policies as a coalition from the First World War served a reminder for strategists and operational...France During the First World War ( Cambridge : Cambridge University Press, 2009); Elizabeth Greenhalgh, Foch in Command: The Forging of a First World

  4. Coalition of distributed generation units to virtual power players - a game theory approach

    DEFF Research Database (Denmark)

    Morais, Hugo; Sousa, Tiago M; Santos, Gabriel

    2015-01-01

    and the existence of new management players such as several types of aggregators. This paper proposes a methodology to facilitate the coalition between distributed generation units originating Virtual Power Players (VPP) considering a game theory approach. The proposed approach consists in the analysis...... strategies, size and goals, each parameter has different importance. VPP can also manage other type of energy resources, like storage units, electric vehicles, demand response programs or even parts of the MV and LV distribution network. A case study with twelve VPPs with different characteristics and one...

  5. Stable structures of coalitions in competitive and altruistic military teams

    Science.gov (United States)

    Aurangzeb, M.; Mikulski, D.; Hudas, G.; Lewis, F. L.; Gu, Edward

    2013-05-01

    In heterogeneous battlefield teams, the balance between team and individual objectives forms the basis for the internal topological structure of teams. The stability of team structure is studied by presenting a graphical coalitional game (GCG) with Positional Advantage (PA). PA is Shapley value strengthened by the Axioms of value. The notion of team and individual objectives is studied by defining altruistic and competitive contribution made by an individual; altruistic and competitive contributions made by an agent are components of its total or marginal contribution. Moreover, the paper examines dynamic team effects by defining three online sequential decision games based on marginal, competitive and altruistic contributions of the individuals towards team. The stable graphs under these sequential decision games are studied and found to be structurally connected, complete, or tree respectively.

  6. Advocating for Change? How a Civil Society-led Coalition Influences the Implementation of the Forest Rights Act in India

    NARCIS (Netherlands)

    Barnes, Clare; van Laerhoven, Frank; Driessen, Peter P J

    2016-01-01

    Forest policy implementation is a political endeavor involving both state and non-state actors. We observe that civil society organizations (CSOs) often federate into civil society-led coalitions (CSCs) in order to shape forest policies in their favor. They appear to be successful in doing this

  7. A surgical intervention for the body politic: Generation Squeeze applies the Advocacy Coalition Framework to social determinants of health knowledge translation.

    Science.gov (United States)

    Kershaw, Paul; Swanson, Eric; Stucchi, Andrea

    2017-06-16

    The World Health Organization Commission on the Social Determinants of Health (SDoH) observes that building political will is central to all its recommendations, because governments respond to those who organize and show up. Since younger Canadians are less likely to vote or to organize in between elections, they are less effective at building political will than their older counterparts. This results in an age gap between SDoH research and government budget priorities. Whereas Global AgeWatch ranks Canada among the top countries for aging, UNICEF ranks Canada among the least generous OECD (Organisation for Economic Co-operation and Development) countries for the generations raising young children. A surgical intervention into the body politic. Guided by the "health political science" literature, the intervention builds a non-profit coalition to perform science-based, non-partisan democratic engagement to increase incentives for policy-makers to translate SDoH research about younger generations into government budget investments. All four national parties integrated policy recommendations from the intervention into their 2015 election platforms. Three referred to, or consulted with, the intervention during the election. The intervention coincided with all parties committing to the single largest annual increase in spending on families with children in over a decade. Since many population-level decisions are made in political venues, the concept of population health interventions should be broadened to include activities designed to mobilize SDoH science in the world of politics. Such interventions must engage with the power dynamics, values, interests and institutional factors that mediate the path by which science shapes government budgets.

  8. Normative Bias and Adaptive Challenges: A Relational Approach to Coalitional Psychology and a Critique of Terror Management Theory

    Directory of Open Access Journals (Sweden)

    Carlos David Navarrete

    2005-01-01

    Full Text Available Adherence to ingroup ideology increases after exposure to death-related stimuli, a reaction that proponents of terror management theory (TMT explain as a psychological defense against the uniquely human existential fear of death. We argue that existential concerns are not the relevant issue; rather, such concepts can be subsumed under a larger category of adaptive challenges that prime coalitional thinking. We suggest that increases in adherence to ingroup ideology in response to adaptive challenges are manifestations of normative mental representations emanating from psychological systems designed to enhance coordination and membership in social groups. In providing an alternative to TMT, we (1 explain why the theory is inconsistent with contemporary evolutionary biology, (2 demonstrate that mortality-salience does not have the unique evocative powers ascribed to it by TMT advocates, and (3 discuss our approach to coalitional psychology, a framework consistent with modern evolutionary theory and informed by a broad understanding of cultural variation, can be employed to help account for both the corpus of results in TMT research and the growing body of findings inconsistent with TMT's predictions.

  9. Strategies to prevent and reduce diabetes and obesity in Sacramento, California: the African American Leadership Coalition and University of California, Davis.

    Science.gov (United States)

    Ziegahn, Linda; Styne, Dennis; Askia, Joyce; Roberts, Tina; Lewis, Edward T; Edwards, Whitney

    2013-11-14

    Diabetes is one of the leading causes of illness and death for African Americans and people of African descent throughout the United States and in the city and county of Sacramento, California. The involvement of families and communities in developing prevention strategies can increase the likelihood that behavioral changes will be sustained. Three member organizations of the African American Leadership Coalition (AALC) entered into a partnership with the University of California, Davis (UC Davis) to engage families in developing a process to identify barriers to diabetes and obesity prevention and reduction, exchange strategies, and create action plans for prevention. The intervention comprised 3 phases: 1) coalition formation and training; 2) data collection, analysis, and dissemination of results; and 3) development of family and community action plans. Academic and community partners planned and implemented all project phases together. Sources of information about diabetes and obesity were primarily doctors and the Internet; barriers were related to lack of time needed to prepare healthy meals, high food costs, transportation to fresh markets, motivation around healthy habits, and unsafe environments. Action plans addressed behavioral change and family cohesion. The group discussion format encouraged mutual support and suggestions for better eating and physical exercise habits. This collaborative partnership model can strengthen existing group relationships or promote new affiliations that form the basis for future action coalitions. Participants worked both within and across groups to exchange information, stories of success and challenges, and specific health improvement strategies.

  10. The Effectiveness of the Multilateral Coalition to Develop a Green Agricultural Products Market in China Based on a TU Cooperative Game Analysis

    Directory of Open Access Journals (Sweden)

    Mingjun Deng

    2018-05-01

    Full Text Available Green agriculture can improve biodiversity, increase farmers’ income, reduce agricultural non-point source pollution, solve food safety issues, and will be an important way to promote sustainable development in China. At present, the green transformation of China’s agriculture has encountered a bottleneck in the development of a green agricultural product market. How to develop a green agricultural product market has become an issue worthy of in-depth study in the academia. Previous studies have already given persuasive explanations for the inability to form a green agricultural product market, but few have explored its development path from the angle of cooperation. By employing the method of a Transferable Utilities (TU cooperative game, and based on theoretical analyses and hypothetical data, this thesis aims to prove the effectiveness of the multilateral coalition to develop the green agricultural product market in China. The results show the effectiveness of the developed model of the green agricultural product market in which producers, consumers, food safety inspection departments, and e-commerce platforms cooperate with each other. This model meets the objective needs of the times and that of the market economy. According to the marginal contribution value of participants in different coalition orders, this thesis finds 6 kinds of coalition orders. When producers and consumers of green agricultural products enter the coalition in the last place, the marginal contribution value is maximized, which reflects the importance of the supply side and demand side of green agricultural products. In other words, the development of the green agricultural product market is a dynamic process—determined by consumers and promoted by producers—in which both sides promote and restrict each other. Finally, this article presents two policy recommendations: at the national level, to clearly proposes a strategy to build a green agricultural product e

  11. Human dynamics of spending: Longitudinal study of a coalition loyalty program

    Science.gov (United States)

    Yi, Il Gu; Jeong, Hyang Min; Choi, Woosuk; Jang, Seungkwon; Lee, Heejin; Kim, Beom Jun

    2014-09-01

    Large-scale data of a coalition loyalty program is analyzed in terms of the temporal dynamics of customers' behaviors. We report that the two main activities of a loyalty program, earning and redemption of points, exhibit very different behaviors. It is also found that as customers become older from their early 20's, both male and female customers increase their earning and redemption activities until they arrive at the turning points, beyond which both activities decrease. The positions of turning points as well as the maximum earned and redeemed points are found to differ for males and females. On top of these temporal behaviors, we identify that there exists a learning effect and customers learn how to earn and redeem points as their experiences accumulate in time.

  12. Connecting and Reconnecting: Outfitting the Figure of the Cyborg for Transnational Coalition-building

    Directory of Open Access Journals (Sweden)

    Jessica E. Brophy

    2016-12-01

    Full Text Available This work attempts to rehabilitate Donna Haraway’s (1991 figure of the cyborg to increase the possibilities of alliances between transnational feminism and cyborg or technoscience feminism. Haraway’s cyborg offers little impetus for political investment and coalition building. This work develops an optional prosthesis of responseability for the cyborg figuration, one that enables the cyborg to invest locally. This ethic of response-ability is developed via the work of Mary Strine (1989, Adrienne Rich (1984 and Aimee Carillo Rowe (2005. This supplementary ethic grafts a “collectivist conscience” onto the permeable being of the cyborg, encouraging alliance- and coalitionbuilding.

  13. The Content of Our Cooperation, Not the Color of Our Skin: An Alliance Detection System Regulates Categorization by Coalition and Race, but Not Sex

    Science.gov (United States)

    Pietraszewski, David; Cosmides, Leda; Tooby, John

    2014-01-01

    Humans in all societies form and participate in cooperative alliances. To successfully navigate an alliance-laced world, the human mind needs to detect new coalitions and alliances as they emerge, and predict which of many potential alliance categories are currently organizing an interaction. We propose that evolution has equipped the mind with cognitive machinery that is specialized for performing these functions: an alliance detection system. In this view, racial categories do not exist because skin color is perceptually salient; they are constructed and regulated by the alliance system in environments where race predicts social alliances and divisions. Early tests using adversarial alliances showed that the mind spontaneously detects which individuals are cooperating against a common enemy, implicitly assigning people to rival alliance categories based on patterns of cooperation and competition. But is social antagonism necessary to trigger the categorization of people by alliance—that is, do we cognitively link A and B into an alliance category only because they are jointly in conflict with C and D? We report new studies demonstrating that peaceful cooperation can trigger the detection of new coalitional alliances and make race fade in relevance. Alliances did not need to be marked by team colors or other perceptually salient cues. When race did not predict the ongoing alliance structure, behavioral cues about cooperative activities up-regulated categorization by coalition and down-regulated categorization by race, sometimes eliminating it. Alliance cues that sensitively regulated categorization by coalition and race had no effect on categorization by sex, eliminating many alternative explanations for the results. The results support the hypothesis that categorizing people by their race is a reversible product of a cognitive system specialized for detecting alliance categories and regulating their use. Common enemies are not necessary to erase important

  14. Fresh whole blood transfusions in coalition military, foreign national, and enemy combatant patients during Operation Iraqi Freedom at a U.S. combat support hospital.

    Science.gov (United States)

    Spinella, Philip C; Perkins, Jeremy G; Grathwohl, Kurt W; Repine, Thomas; Beekley, Alec C; Sebesta, James; Jenkins, Donald; Azarow, Kenneth; Holcomb, John B

    2008-01-01

    United States military doctrine permits the use of fresh whole blood (FWB), donated by U.S. military personnel on site, for casualties with life-threatening injuries at combat support hospitals. U.S. Military Medical Department policy dictates that all patients treated at military facilities during combat (coalition military personnel, foreign nationals, and enemy combatants) are to be treated equally. The objectives of this study were to describe admission vital signs and laboratory values and injury location for patients transfused with FWB, and to determine if FWB was employed equally among all patient personnel categories at a combat support hospital. This retrospective cohort study evaluated admission vital signs and laboratory values, injury location, and personnel category for all patients receiving FWB at a U.S. Army combat support hospital in Baghdad, Iraq, between January and December 2004. Eighty-seven patients received 545 units of FWB. Upon admission, the average (+/-S.D.) heart rate was 144 bpm (+/-25); systolic blood pressure, 106 mmHg (+/-33); base deficit, 9 (+/-6.5); hemoglobin, 9.0 g/dl (+/-2.6); platelet concentration, 81.9 x 10(3)/mm(3) (+/-81); international normalized ratio (INR), 2.0 (+/-1.1); and temperature 95.7 degrees F (+/-2.6). The percentages of intensive care patients who received FWB by personnel category were as follows: coalition soldiers, 51/592 (8.6%); foreign nationals, 25/347 (7.2%); and enemy combatants, 11/128 (8.5% (p = 0.38). The amount of FWB transfused by personnel category was as follows: coalition soldier, 4 units (1-35); foreign national, 4 units (1-36); and enemy combatant, 4 units (1-11) (p = 0.9). Fresh whole blood was used for anemic, acidemic, hypothermic, coagulopathic patients with life-threatening traumatic injuries in hemorrhagic shock, and it was transfused in equal percentages and amounts for coalition soldiers, foreign nationals, and enemy combatants.

  15. The content of our cooperation, not the color of our skin: an alliance detection system regulates categorization by coalition and race, but not sex.

    Directory of Open Access Journals (Sweden)

    David Pietraszewski

    Full Text Available Humans in all societies form and participate in cooperative alliances. To successfully navigate an alliance-laced world, the human mind needs to detect new coalitions and alliances as they emerge, and predict which of many potential alliance categories are currently organizing an interaction. We propose that evolution has equipped the mind with cognitive machinery that is specialized for performing these functions: an alliance detection system. In this view, racial categories do not exist because skin color is perceptually salient; they are constructed and regulated by the alliance system in environments where race predicts social alliances and divisions. Early tests using adversarial alliances showed that the mind spontaneously detects which individuals are cooperating against a common enemy, implicitly assigning people to rival alliance categories based on patterns of cooperation and competition. But is social antagonism necessary to trigger the categorization of people by alliance--that is, do we cognitively link A and B into an alliance category only because they are jointly in conflict with C and D? We report new studies demonstrating that peaceful cooperation can trigger the detection of new coalitional alliances and make race fade in relevance. Alliances did not need to be marked by team colors or other perceptually salient cues. When race did not predict the ongoing alliance structure, behavioral cues about cooperative activities up-regulated categorization by coalition and down-regulated categorization by race, sometimes eliminating it. Alliance cues that sensitively regulated categorization by coalition and race had no effect on categorization by sex, eliminating many alternative explanations for the results. The results support the hypothesis that categorizing people by their race is a reversible product of a cognitive system specialized for detecting alliance categories and regulating their use. Common enemies are not necessary to

  16. The content of our cooperation, not the color of our skin: an alliance detection system regulates categorization by coalition and race, but not sex.

    Science.gov (United States)

    Pietraszewski, David; Cosmides, Leda; Tooby, John

    2014-01-01

    Humans in all societies form and participate in cooperative alliances. To successfully navigate an alliance-laced world, the human mind needs to detect new coalitions and alliances as they emerge, and predict which of many potential alliance categories are currently organizing an interaction. We propose that evolution has equipped the mind with cognitive machinery that is specialized for performing these functions: an alliance detection system. In this view, racial categories do not exist because skin color is perceptually salient; they are constructed and regulated by the alliance system in environments where race predicts social alliances and divisions. Early tests using adversarial alliances showed that the mind spontaneously detects which individuals are cooperating against a common enemy, implicitly assigning people to rival alliance categories based on patterns of cooperation and competition. But is social antagonism necessary to trigger the categorization of people by alliance--that is, do we cognitively link A and B into an alliance category only because they are jointly in conflict with C and D? We report new studies demonstrating that peaceful cooperation can trigger the detection of new coalitional alliances and make race fade in relevance. Alliances did not need to be marked by team colors or other perceptually salient cues. When race did not predict the ongoing alliance structure, behavioral cues about cooperative activities up-regulated categorization by coalition and down-regulated categorization by race, sometimes eliminating it. Alliance cues that sensitively regulated categorization by coalition and race had no effect on categorization by sex, eliminating many alternative explanations for the results. The results support the hypothesis that categorizing people by their race is a reversible product of a cognitive system specialized for detecting alliance categories and regulating their use. Common enemies are not necessary to erase important social

  17. Beyond Brazilian Coalition Presidentialism: the Appropriation of the Legislative Agenda

    Directory of Open Access Journals (Sweden)

    Rafael Silveira e Silva

    2014-12-01

    Full Text Available Even though they possess several power resources, Brazilian Presidents also elaborate their legislative proposals based upon bills already being processed in Congress through a phenomenon called Appropriation of the legislative agenda. In this paper I examine the conditions under which this phenomenon occurs by means of a typology and a qualitative comparative analysis (QCA. I conclude that Appropriation provides the President with the expansion of the formal support base by controlling the agenda of allied and opposition parties as well as obtaining the "paternity" of several policies already in motion in Congress, thus enabling a public association of the President's actions and his or her party with the possibility of social benefits. Be it in the pursuit of promising agendas or for the maintenance of their own dominance, Appropriation shows that Brazilian Presidents must go beyond coalition presidentialism.

  18. Epidemiology of modern battlefield colorectal trauma: a review of 977 coalition casualties.

    Science.gov (United States)

    Glasgow, Sean C; Steele, Scott R; Duncan, James E; Rasmussen, Todd E

    2012-12-01

    Traumatic injuries to the lower gastrointestinal tract occur in up to 15% of all injured combatants, with significant morbidity (up to 75%) and mortality. The incidence, etiology, associated injuries, and overall mortality related to modern battlefield colorectal trauma are poorly characterized. Using data from the Joint Theater Trauma Registry and other Department of Defense electronic health records, the ongoing Joint Surgical Transcolonic Injury or Ostomy Multi-theater Assessment project quantifies epidemiologic trends in colon injury, risk factors for prolonged or perhaps unnecessary fecal diversion, and quality of life in US military personnel requiring colostomies. In the current study, all coalition troops with colon or rectal injuries as classified by DRG International Classification of Diseases-9th Rev. diagnosis and Abbreviated Injury Scale (AIS) codes in the Joint Theater Trauma Registry were included. During 8 years, 977 coalition military personnel with colorectal injury were identified, with a mean (SD) Injury Severity Score (ISS) of 22.2 (13.2). Gunshot wounds remain the primary mechanism of injury (57.6%). Compared with personnel with colon injuries, those with rectal trauma sustained greater injury to face and extremities but fewer severe thoracic and abdominal injuries (p colon trauma. There was little difference in diversion rates between theaters for rectal injuries (59.6% vs. 50%, p colon or rectal trauma continue to have elevated mortality rates, even after reaching surgical treatment facilities. Furthermore, associated serious injuries are commonly encountered. Fecal diversion in these patients may lead to reduced mortality, although prospective selection criteria for diversion do not currently exist. Future research into risk factors for colostomy creation, timing of diversion in relation to damage-control laparotomy, and quality of life in veterans with stomas will produce useful insights and help guide therapy. Epidemiologic study, level

  19. The Intermediate Set and Limiting Superdi erential for Coalition Games: Between the Core and the Weber Set

    Czech Academy of Sciences Publication Activity Database

    Adam, Lukáš; Kroupa, T.

    2017-01-01

    Roč. 46, č. 4 (2017), s. 891-918 ISSN 0020-7276 R&D Projects: GA ČR GA15-00735S Institutional support: RVO:67985556 Keywords : coalition game * limiting superdi erential * intermediate set * core * Weber set Subject RIV: BA - General Mathematics OBOR OECD: Statistics and probability Impact factor: 0.713, year: 2016 http://library.utia.cas.cz/separaty/2016/MTR/adam-0467365.pdf

  20. From local development policies to strategic planning-Assessing continuity in institutional coalitions.

    Science.gov (United States)

    Mazzeo Rinaldi, Francesco

    2016-06-01

    In the last two decades, EU policies have had a fundamental role in orienting regional/local development. The objective of this work is set in this context as it intends to analyze the local development programs activated in Sicily in the last three programming periods. The main aim is to explore whether the EU partnership principle influenced cooperation among local actors, assessing the continuity of local institutional coalition in managing different local development programs within the regional development policy system. We focus, in particular, on Strategic Plans (SP) promoted in Sicily in the transition phase between the 2000-2006 and the 2007-2013 periods. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Taking a Regional Healthcare Coalition Approach to Mitigating Surge Capacity Needs of Mass Casualty or Pandemic Events

    Science.gov (United States)

    2012-06-01

    gaining motivation for employees or, as exemplified in this case, coalition participants.59 The theory posits that there are two factors that... Motivation -Hygiene/Satisfiers Two-Factor Theory outline from the 1959 book; The Motivation to Work by Frederick Hertzberg; NetMBA web search 2/24/12; http...www.netmba.com/mgmt/ob/ motivation / herzberg / 43 of the work of the group, individual responsibility given to members, achievements of the

  2. Subsonic Transonic Applied Refinements By Using Key Strategies - STARBUKS In the NASA Langley Research Center National Transonic Facility

    Science.gov (United States)

    Paryz, Roman W.

    2014-01-01

    Several upgrade projects have been completed at the NASA Langley Research Center National Transonic Facility over the last 1.5 years in an effort defined as STARBUKS - Subsonic Transonic Applied Refinements By Using Key Strategies. This multi-year effort was undertaken to improve NTF's overall capabilities by addressing Accuracy and Validation, Productivity, and Reliability areas at the NTF. This presentation will give a brief synopsis of each of these efforts.

  3. Evaluation of DELTA PREP: A Project Aimed at Integrating Primary Prevention of Intimate Partner Violence within State Domestic Violence Coalitions

    Science.gov (United States)

    Freire, Kimberley E.; Zakocs, Ronda; Le, Brenda; Hill, Jessica A.; Brown, Pamela; Wheaton, Jocelyn

    2015-01-01

    Background: Intimate partner violence (IPV) has been recognized as a public health problem since the late 20th century. To spur IPV prevention efforts nationwide, the DELTA PREP Project selected 19 state domestic violence coalitions to build organizational prevention capacity and catalyze IPV primary prevention strategies within their states.…

  4. Domestic coalitions in the FTAA negotiations: the Brazilian case

    Directory of Open Access Journals (Sweden)

    Daniel Castelan

    2016-01-01

    Full Text Available Abstract This paper proposes an explanation to the domestic coalitions organised in Brazil around the FTAA negotiations, which stand as a hard case for the existing theories on political cleavages: industrialists and trade unions, albeit having shared common interests in the negotiations, did not adopt a joint strategy to foster their positions. The hypothesis to explain the political alignments in the FTAA is that the opening of the Brazilian market, which had advanced a lot in the years of negotiations, altered the priorities of workers and employers, as well as their preferences in foreign trade policy, hindering the reconciliation of class interests. Both agreed that the U.S. proposal for the FTAA was undesirable, but they completely disagreed on other issues that emerged in the political agenda during the reforms period, such as the role of the State in an open economy, the scope of labour and social rights and the social security system, the structure of taxation, etc. Some of the controversial issues were not new, but the international trade liberalisation intensified the dispute over them.

  5. Band of Brothers or Dysfunctional Family? A Military Perspective on Coalition Challenges During Stability Operations

    Science.gov (United States)

    2011-01-01

    the army, there were lots of examples of NGOs [that] were quite happy on a working level to meet for coffee in Pristina and sit over a map and...coalition units for a visit and found that the units would have the coffee brewing . . . and we’d lay out where we are going . . . and they’d go off and...our obsession with this curious taxonomy, in a world of our own, where we talk about “supporting effects” and “end states”—it just isn’t how these

  6. Advocacy Coalition for Safer Sex in the Adult Film Industry: The Case of Los Angeles County's Measure B.

    Science.gov (United States)

    Cohen, Adam Carl; Tavrow, Paula; McGrath, Mark Roy

    2018-05-01

    Performers in the adult film industry are routinely exposed to bloodborne pathogens. In 2012, public health advocates in Los Angeles County convinced voters to pass a ballot initiative-Measure B-to mandate condom use on adult film sets. This article presents a case study of the advocacy coalition's strategies used to achieve greater workplace safety using the advocacy coalition framework. The authors were given access to all memoranda, market research, and campaign tools used to promote Measure B. To reconstruct adult film industry counterefforts, the authors reviewed trade publications, social media, and blog posts. When legislative efforts failed, advocates engaged in a step-by-step strategy built around voters to achieve passage of a ballot initiative mandating condom use for all adult films produced in Los Angeles County. Although the industry immediately filed a lawsuit after passage of Measure B, its constitutionality has been upheld. Measure B passed because public health advocates were able to assemble scientific evidence, build public support, counter false claims, and maintain consistent messages throughout the campaign. The adult film industry lacked social capital, cohesion, and nimbleness. To bolster regulatory efforts, appealing to voters to favor safe workplaces may be an effective advocacy strategy for other industries.

  7. Grassroots responsiveness to human rights abuse: history of the Washtenaw Interfaith Coalition for Immigrant Rights.

    Science.gov (United States)

    Sanders, Laura; Martinez, Ramiro; Harner, Margaret; Harner, Melanie; Horner, Pilar; Delva, Jorge

    2013-04-01

    The purpose of this article is to discuss how a community agency based in Washtenaw County, the Washtenaw Interfaith Coalition for Immigration Rights (WICIR), emerged in response to increasing punitive immigration practices and human rights abuses toward the Latino community. The article discusses how WICIR is engaged in advocacy, community education on immigration issues, and political action toward a more humane immigration reform. Detailed examples of human rights abuses and the WICIR activities described in response to the abuses serve as illustrations of social work advocacy, education, and policy formulation that affect the general public, policymakers, and law enforcement officials.

  8. The value of Network Neutrality for the Internet of Tomorrow : Report of the Dynamic Coalition on Network Neutrality

    OpenAIRE

    Belli , Luca; De Filippi , Primavera

    2013-01-01

    The report explores some of the most crucial facets of Network Neutrality, underscoring its close relationship with the full enjoyment of end-users fundamental rights. The report also includes a proposal for a Model Framework on Network Neutrality that has been elaborated by the Dynamic Coalition through an open, inclusive and multi-stakeholder effort, in order to promote an efficient safeguard of the Net Neutrality principle in accordance with international human rights standards.

  9. Defining Requirements and Applying Information Modeling for Protecting Enterprise Assets

    Science.gov (United States)

    Fortier, Stephen C.; Volk, Jennifer H.

    The advent of terrorist threats has heightened local, regional, and national governments' interest in emergency response and disaster preparedness. The threat of natural disasters also challenges emergency responders to act swiftly and in a coordinated fashion. When a disaster occurs, an ad hoc coalition of pre-planned groups usually forms to respond to the incident. History has shown that these “system of systems” do not interoperate very well. Communications between fire, police and rescue components either do not work or are inefficient. Government agencies, non-governmental organizations (NGOs), and private industry use a wide array of software platforms for managing data about emergency conditions, resources and response activities. Most of these are stand-alone systems with very limited capability for data sharing with other agencies or other levels of government. Information technology advances have facilitated the movement towards an integrated and coordinated approach to emergency management. Other communication mechanisms, such as video teleconferencing, digital television and radio broadcasting, are being utilized to combat the challenges of emergency information exchange. Recent disasters, such as Hurricane Katrina and the tsunami in Indonesia, have illuminated the weaknesses in emergency response. This paper will discuss the need for defining requirements for components of ad hoc coalitions which are formed to respond to disasters. A goal of our effort was to develop a proof of concept that applying information modeling to the business processes used to protect and mitigate potential loss of an enterprise was feasible. These activities would be modeled both pre- and post-incident.

  10. Particle swarm optimization with random keys applied to the nuclear reactor reload problem

    Energy Technology Data Exchange (ETDEWEB)

    Meneses, Anderson Alvarenga de Moura [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil). Coordenacao dos Programas de Pos-graduacao de Engenharia (COPPE). Programa de Engenharia Nuclear; Fundacao Educacional de Macae (FUNEMAC), RJ (Brazil). Faculdade Professor Miguel Angelo da Silva Santos; Machado, Marcelo Dornellas; Medeiros, Jose Antonio Carlos Canedo; Schirru, Roberto [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil). Coordenacao dos Programas de Pos-graduacao de Engenharia (COPPE). Programa de Engenharia Nuclear]. E-mails: ameneses@con.ufrj.br; marcelo@lmp.ufrj.br; canedo@lmp.ufrj.br; schirru@lmp.ufrj.br

    2007-07-01

    In 1995, Kennedy and Eberhart presented the Particle Swarm Optimization (PSO), an Artificial Intelligence metaheuristic technique to optimize non-linear continuous functions. The concept of Swarm Intelligence is based on the socials aspects of intelligence, it means, the ability of individuals to learn with their own experience in a group as well as to take advantage of the performance of other individuals. Some PSO models for discrete search spaces have been developed for combinatorial optimization, although none of them presented satisfactory results to optimize a combinatorial problem as the nuclear reactor fuel reloading problem (NRFRP). In this sense, we developed the Particle Swarm Optimization with Random Keys (PSORK) in previous research to solve Combinatorial Problems. Experiences demonstrated that PSORK performed comparable to or better than other techniques. Thus, PSORK metaheuristic is being applied in optimization studies of the NRFRP for Angra 1 Nuclear Power Plant. Results will be compared with Genetic Algorithms and the manual method provided by a specialist. In this experience, the problem is being modeled for an eight-core symmetry and three-dimensional geometry, aiming at the minimization of the Nuclear Enthalpy Power Peaking Factor as well as the maximization of the cycle length. (author)

  11. Particle swarm optimization with random keys applied to the nuclear reactor reload problem

    International Nuclear Information System (INIS)

    Meneses, Anderson Alvarenga de Moura; Fundacao Educacional de Macae; Machado, Marcelo Dornellas; Medeiros, Jose Antonio Carlos Canedo; Schirru, Roberto

    2007-01-01

    In 1995, Kennedy and Eberhart presented the Particle Swarm Optimization (PSO), an Artificial Intelligence metaheuristic technique to optimize non-linear continuous functions. The concept of Swarm Intelligence is based on the socials aspects of intelligence, it means, the ability of individuals to learn with their own experience in a group as well as to take advantage of the performance of other individuals. Some PSO models for discrete search spaces have been developed for combinatorial optimization, although none of them presented satisfactory results to optimize a combinatorial problem as the nuclear reactor fuel reloading problem (NRFRP). In this sense, we developed the Particle Swarm Optimization with Random Keys (PSORK) in previous research to solve Combinatorial Problems. Experiences demonstrated that PSORK performed comparable to or better than other techniques. Thus, PSORK metaheuristic is being applied in optimization studies of the NRFRP for Angra 1 Nuclear Power Plant. Results will be compared with Genetic Algorithms and the manual method provided by a specialist. In this experience, the problem is being modeled for an eight-core symmetry and three-dimensional geometry, aiming at the minimization of the Nuclear Enthalpy Power Peaking Factor as well as the maximization of the cycle length. (author)

  12. Steel syndrome: dislocated hips and radial heads, carpal coalition, scoliosis, short stature, and characteristic facial features.

    Science.gov (United States)

    Flynn, John M; Ramirez, Norman; Betz, Randal; Mulcahey, Mary Jane; Pino, Franz; Herrera-Soto, Jose A; Carlo, Simon; Cornier, Alberto S

    2010-01-01

    A syndrome of children with short stature, bilateral hip dislocations, radial head dislocations, carpal coalitions, scoliosis, and cavus feet in Puerto Rican children, was reported by Steel et al in 1993. The syndrome was described as a unique entity with dismal results after conventional treatment of dislocated hips. The purpose of this study is to reevaluate this patient population with a longer follow-up and delineate the clinical and radiologic features, treatment outcomes, and the genetic characteristics. This is a retrospective cohort study of 32 patients in whom we evaluated the clinical, imaging data, and genetic characteristics. We compare the findings and quality of life in patients with this syndrome who have had attempts at reduction of the hips versus those who did not have the treatment. Congenital hip dislocations were present in 100% of the patients. There was no attempt at reduction in 39% (25/64) of the hips. In the remaining 61% (39/64), the hips were treated with a variety of modalities fraught with complications. Of those treated, 85% (33/39) remain dislocated, the rest of the hips continue subluxated with acetabular dysplasia and pain. The group of hips that were not treated reported fewer complaints and limitation in daily activities compared with the hips that had attempts at reduction. Steel syndrome is a distinct clinical entity characterized by short stature, bilateral hip and radial head dislocation, carpal coalition, scoliosis, cavus feet, and characteristic facial features with dismal results for attempts at reduction of the hips. Prognostic Study Level II.

  13. Cooperation or Localization in European Capacity Markets? A Coalitional Game over Graph Approach

    Directory of Open Access Journals (Sweden)

    Giorgos Stamtsis

    2018-06-01

    Full Text Available Capacity markets, as a means to address the capacity adequacy issue, are constantly becoming an important part of the European internal electricity market. The debate focuses on how the capacity markets will be smoothly integrated in one Pan-European power market, without resulting in multiple national fragmentations and consequently in economic efficiency losses. Cross-border participation and regional cooperation are considered as two sine qua non conditions in this respect. The present paper provides a coalitional game theoretical approach aiming to facilitate the cooperation of neighboring countries, when it comes to the security of electricity supply and the necessity of establishing a capacity market. Such an approach can support respective decisions about capacity markets cooperation as well as stress-test the benefits considering all cooperation possibilities.

  14. A brief history of Forging New Frontiers, the annual conference of the Injury Free Coalition for Kids.

    Science.gov (United States)

    Johnson, Estell Lenita; Barlow, Barbara

    2016-10-01

    The Injury Free Coalition for Kids Annual Conference has contributed to the dissemination of information pertaining to the development of the field of injury prevention. A content analysis was completed using conference agendas used during the span of 2005-2015, finding that more than 398 presentations covering a wide variety of injuries have taken place. Published work has appeared in the Journal of Trauma and there has been recognition of people who have contributed to the development of the field. Forging New Frontiers is a valuable tool for attendees to exchange information about injury prevention.

  15. Combating Youth Violence Through Anti-Violence Coalitions in Three West Virginia Counties

    Directory of Open Access Journals (Sweden)

    Ronda Sturgill

    2011-03-01

    Full Text Available Kids Win was funded by SAMHSA (Substance Abuse and Mental Health Services Administration for Cabell, Mason and Wayne Counties in West Virginia. The goal of the project was to develop anti-violence coalitions in the three counties and to develop a strategic plan for a pilot program combating youth violence. The pilot program was designed to use the Second Step and Hazelden Anti-Bullying curricula at the three middle schools. Evaluation methods included a survey of teachers, a survey of students, and a comparison of results of a state mandated school discipline report. All three data sources support the conclusion that violence was reduced significantly because of the Kids Win Program. Kids Win has demonstrated what can be accomplished by teaching students the behavioral skills needed to resolve problems without escalating violence. This program merits replication and expansion and can serve as a model for other programs.

  16. Tactical Wireless Networking in Coalition Environments: Implementing an IEEE 802.20 Wireless End-User Network Utilizing FLASH-OFDM to Provide a Secure Mobile Extension to Existing WAN

    National Research Council Canada - National Science Library

    Parrish, William J; Tovar, Daniel R

    2005-01-01

    This thesis will focus on the area of 802.20 wireless networking as a feasible "last mile" solution to wireless access in a tactical coalition environment and will be implemented into a series of experiments...

  17. Innovative tools for business coalitions in B2B applications how negotiation, auction and game theory can support small- and medium-sized business in e-business

    CERN Document Server

    Argoneto, Pierluigi

    2011-01-01

    Discussion of how to implement innovative tools makes the book relevant to both researchers and managers The simulation environment allows the reader to evaluate the performance of the approaches proposed Includes methodologies to improve e-marketplace performances through coalition

  18. ‘Who Said It Was Simple!’ Third-Wave Feminist Coalition and Audre Lorde's Intersectionalist Hybrid Poetics of Difference

    OpenAIRE

    Yomna Saber

    2015-01-01

    Third-Wave Feminism digs its roots in intersectionality and coalition, which were not fully realised in Second-Wave Feminism. However, the movement is usually under attack for lacking a clear agenda. Recent scholarship strongly suggests that third wavers get back to third-world writers, like Audre Lorde, to realise an anti-racist and inclusive feminism.  Lorde occupies a distinctive position in feminist literature; a poet who resides in too many margins being black, female and lesbian. This e...

  19. Engaging Afghans KLE Keys to Success

    OpenAIRE

    Moss, Don

    2009-01-01

    This article was published in Culture and Conflict Review (Fall 2009), v.3 no.3 "A pillar of Coalition Force/United States Government (USG) efforts in Afghanistan is to separate the people of the Islamic Republic of Afghanistan from insurgent groups such as the Taliban, Haqqani Network and Hezb-e-Islami Gulbuddin (HiG) and unite the same populace with their fledgling government. In order to do this, the men and women undertaking this effort have access to the latest in information, trainin...

  20. Political Parties and Government Coalitions in the Americas Partidos políticos y gobiernos de coalición en las Américas

    Directory of Open Access Journals (Sweden)

    Eduardo Alemán

    2011-01-01

    Full Text Available This paper focuses on the process of coalition formation in presidential systems. It shows that party positions and institutions influence the formation of government coalitions. We argue that presidents will tend to include parties positioned close to their policy positions in their cabinets, and will be more inclined to do it when relative institutional authority is more advantageous to congress. We corroborate our arguments with data from 13 presidential countries in the Americas.Este artículo se centra en el proceso de formación de coaliciones en sistemas presidenciales. El artículo demuestra que las posiciones de los partidos y las instituciones influencian la formación de coaliciones gubernamentales. Argumentamos que los presidentes tienden a incluir dentro del gabinete a aquellos partidos que tienen posiciones cercanas, y que esta tendencia es más fuerte cuando la autoridad institucional es relativamente más favorable al congreso. Corroboramos nuestros argumentos con data de 13 países con sistemas presidenciales en las Américas.

  1. International Fisheries Agreements

    DEFF Research Database (Denmark)

    Pintassilgo, Pedro; Kronbak, Lone Grønbæk; Lindroos, Marko

    2015-01-01

    This paper surveys the application of game theory to the economic analysis of international fisheries agreements. The relevance of this study comes not only from the existence of a vast literature on the topic but especially from the specific features of these agreements. The emphasis of the survey...... is on coalition games, an approach that has become prominent in the fisheries economics literature over the last decade. It is shown that coalition games were first applied to international fisheries agreements in the late 1990s addressing cooperative issues under the framework of characteristic function games...... and stability of international fisheries agreements. A key message that emerges from this literature strand is that self-enforcing cooperative management of internationally shared fish stocks is generally difficult to achieve. Hence, the international legal framework and regulations play a decisive role...

  2. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  3. Solving the Upper Valley's housing needs: how a coalition of public and private organizations joined forces to develop housing in a region with inadequate stock and prohibitive prices

    OpenAIRE

    Dan French

    2004-01-01

    Like many communities, New Hampshire and Vermont's Upper Valley region is facing a serious housing shortage. Dan French reveals how an innovative housing coalition is working to find solutions that provide housing and protect the area's quality of life.

  4. Canadian Coalition for Responsible Environmental Solutions statement of principles for a made in Canada solution

    International Nuclear Information System (INIS)

    2002-01-01

    The Canadian Coalition for Responsible Environmental Solutions has come up with a plan to reduce greenhouse gas emissions that includes immediate actions with a realistic time frame. The plan addresses air quality as a whole and is not limited to greenhouse gases alone. The plan keeps capital in Canada to invest in new environmental technologies. It also negotiates agreements with economic sectors on emissions performance targets, and it implements energy conservation awareness campaigns that promote the reduction of energy consumption.The plan considers trade relationships with the United Sates and recognizes Canada's role as an important energy exporter. Under the proposed plan, both generators and consumers of renewable energy would receive incentives for their efforts in addressing the climate change challenge

  5. Cooperation between Counterparts in Parliament from an Agenda-Setting Perspective: Legislative Coalitions as a Trade of Criticism and Policy

    DEFF Research Database (Denmark)

    Christiansen, Flemming Juul; Seeberg, Henrik Bech

    2016-01-01

    Governments may bargain with parties in parliament to silence them. This insight follows from the agenda-setting literature, which emphasises the power of the opposition to criticise the government. The literature on legislatures points to the fear of loss of future voter support as a motivation....... By offering the opposition noteworthy policy influence in legislative coalitions, governments avoid opposition criticism in return, in addition to having initiatives passed. In order to test this argument, a large dataset is compiled on opposition criticism in parliament and the media before and after the 325...

  6. Impact of the formation of coalitions and fairly challenges on the international negotiations: an analysis of the economical and ethical fundaments. Final report january 2003

    International Nuclear Information System (INIS)

    Salles, J.M.

    2003-01-01

    The project concerned two objectives: the analysis of the impact of the formation of coalitions on the possible equilibrium and the dynamic of the international negotiations in the framework of the climatic change; and the challenges bond to the fairly engagement decided by the countries during the negotiations in the framework of the Climate convention

  7. Blockchain-Oriented Coalition Formation by CPS Resources: Ontological Approach and Case Study

    Directory of Open Access Journals (Sweden)

    Alexey Kashevnik

    2018-05-01

    Full Text Available Cyber-physical systems (CPS, robotics, Internet of Things, information and communication technologies have become more and more popular over the last several years. These topics open new perspectives and scenarios that can automate processes in human life. CPS are aimed at interaction support in information space for physical entities communicated in physical space in real time. At the same time the blockchain technology that becomes popular last years allows to organize immutable distributed database that store all significant information and provide access for CPS participants. The paper proposes an approach that is based on ontology-based context management, publish/subscribe semantic interoperability support, and blockchain techniques. Utilization of these techniques provide possibilities to develop CPS that supports dynamic, distributed, and stable coalition formation of the resources. The case study presented has been implemented for the scenario of heterogeneous mobile robots’ collaboration for the overcoming of obstacles. There are two types of robots and an information service participating in the scenario. Evaluation shows that the proposed approach is applicable for the presented class of scenarios.

  8. Advancing Evidence-Based Assessment in School Mental Health: Key Priorities for an Applied Research Agenda.

    Science.gov (United States)

    Arora, Prerna G; Connors, Elizabeth H; George, Melissa W; Lyon, Aaron R; Wolk, Courtney B; Weist, Mark D

    2016-12-01

    Evidence-based assessment (EBA) is a critically important aspect of delivering high-quality, school-based mental health care for youth. However, research in this area is limited and additional applied research on how best to support the implementation of EBA in school mental health (SMH) is needed. Accordingly, this manuscript seeks to facilitate the advancement of research on EBA in SMH by reviewing relevant literature on EBA implementation in schools and providing recommendations for key research priorities. Given the limited number of published studies available, findings from child and adolescent mental health and implementation science research are also included to inform a robust and comprehensive research agenda on this topic. Based on this literature review, five priorities for research on EBA in SMH are outlined: (1) effective identification of assessment targets, (2) appropriate selection of assessment measures, (3) investigation of organizational readiness for EBA, (4) study of implementation support for EBA, and (5) promotion of EBA data integration and use. Each priority area includes recommended directions for future research. A comprehensive and robust research agenda is warranted to build the science and practice of implementing EBA in SMH. Specific directions for this agenda are offered.

  9. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  10. Analysis of the environmental and nature impacts of 'Building Bridges'. Coalition VVD-PvdA, October 29, 2012. A quick scan; Analyse van de milieu- en natuureffecten van 'Bruggen slaan'. Regeerakkoord VVD-PvdA d.d. 29 oktober 2012. Een quick-scan

    Energy Technology Data Exchange (ETDEWEB)

    Dietz, F. (ed.)

    2012-11-15

    The coalition between the political parties VVD (liberals) and PvdA (socialists) connects the transition to a sustainable economy and green growth to strengthening the competitive capacity of the Dutch economy. The role of the Dutch government in the coalition aims at creating a framework and to provide facilities to realize the transition. In this memo the results of an analysis of the impacts of the coalition are given for the themes Energy and Climate, Nature, Transport and Traffic, and Green Growth [Dutch] Het Regeerakkoord VVD-PvdA koppelt de transitie naar een duurzame economie en groene groei aan het versterken van het concurrentievermogen van de Nederlandse economie. De rol van de rijksoverheid wordt in het regeerakkoord met name ingevuld als kaderstellend en faciliterend. De PBL-notitie analyseert de effecten van het regeringsakkoord voor de thema's Energie en Klimaat, Natuur, Verkeer en Vervoer, en Groene groei.

  11. Operation Iraqi Freedom 04 - 06: Opportunities to Apply Quantitative Methods to Intelligence Analysis

    National Research Council Canada - National Science Library

    Hansen, Eric C

    2005-01-01

    The purpose of this presentation is to illustrate the need for a quantitative analytical capability within organizations and staffs that provide intelligence analysis to Army, Joint, and Coalition Force headquarters...

  12. Farklı Koalisyon Senaryolarına Bağlı Olarak Türkiye’nin Üyeliği Sonrası Avrupa Birliği’nde Oylama Gücü Dağılımı(Depending On Different Coalition Scenarios Voting Power Distribution In The European Union After Turkey’s Membership

    Directory of Open Access Journals (Sweden)

    Hatice Burcu ESKİCİ

    2013-01-01

    Full Text Available It is taken into consideration of the influence on voting power distribution of candidate countries’ European Union membership enlargement is one of the most important issue the for European Union. In this study, the impact of Turkey’s membership on voting power distribution is evaluated for coalition formation determined with hierarchical clustering methods, according to the acts adopted by the Council of the European Union and voting system brought by the Treaty of Lisbon. In the analysis, the effect of Turkey’s membership on voting power distribution is evaluated for four coalition formation determined with hierarchical clustering methods and Banzhaf power index, one of the most frequently used voting power measurement, is used for voting power analysis. Based on the results of the analysis, voting power distribution is affected by Turkey’s European Union membership for four coalition formation. When the Council does not act on a proposal from the Commission or the High Representative of the Union for Foreign Affairs and Security Policy, voting power distribution is not affected by Turkey’s membership for four coalition formation.

  13. What Is Applied Linguistics?

    Science.gov (United States)

    James, Carl

    1993-01-01

    Ostensive and expository definitions of applied linguistics are assessed. It is suggested that the key to a meaningful definition lies in the dual articulation of applied linguistics: it is an interface between linguistics and practicality. Its role as an "expert system" is suggested. (45 references) (Author/LB)

  14. The influence of interdisciplinary collaboration on decision making: a framework to analyse stakeholder coalitions, evolution and learning in strategic delta planning

    Science.gov (United States)

    Vermoolen, Myrthe; Hermans, Leon

    2015-04-01

    The sustained development of urbanizing deltas requires that conflicting interests are reconciled, in an environment characterized by technical complexity and knowledge limitations. However, integrating ideas and establishing cooperation between actors with different backgrounds and roles still proves a challenge. Agreeing on strategic choices is difficult and implementation of agreed plans may lead to unanticipated and unintended outcomes. How can individual disciplinary perspectives come together and establish a broadly-supported and well-informed plan, the implementation of which contributes to sustainable delta development? The growing recognition of this need to bring together different stakeholders and different disciplinary perspectives runs parallel to a paradigm shift from 'hard' hydrological engineering to multi-functional and more 'soft' hydrological engineering in water management. As a result, there is now more attention for interdisciplinary collaboration that not only takes the physical characteristics of water systems into account, but also the interaction between physical and societal components of these systems. Thus, it is important to study interdisciplinary collaboration and how this influences decision-making. Our research looks into this connection, using a case in delta planning in the Netherlands, where there have been several (attempts for) integration of spatial planning and flood risk/ water management, e.g. in the case of the Dutch Delta Programme. This means that spatial designers and their designs play an important role in the strategic delta planning process as well, next to civil engineers, etc. This study explores the roles of stakeholders, experts and policy makers in interdisciplinary decision-making in dynamic delta planning processes, using theories and methods that focus on coalitions, learning and changes over time in policy and planning processes. This requires an expansion of the existing frameworks to study

  15. A coalition partnership of vision health through a health-promoting school program for primary school students in Taiwan.

    Science.gov (United States)

    Chang, Li-Chun; Guo, Jong-Long; Liao, Li-Ling; Peng, Hsiu-Ying; Hsieh, Pei-Lin

    2017-09-01

    Myopia, the most common refractive error, is the most common cause of avoidable visual impairment among children and has reached epidemic proportions among children and young adults in urban areas of East and Southeast Asia that contain populations of Chinese ancestry. Moreover, vision health is an important theme of the health-promoting school program issued by the Ministry of Education in Taiwan. The aim of this study is to assess the impact of pre- and post-intervention proposed by the health-promoting school (HPS) model. The objectives are to understand whether the HPS model influenced the vision screening results and the attitude, knowledge level, and vision care behavior of the students involved. A prospective cohort study design was used to evaluate a vision health program. Four elementary schools, local education authorities, and one university in northern Taiwan established a coalition partnership to design a six-month program to combat myopia among students. The target population was 6668 school children from local elementary schools. For the purpose of this study, the outcome of visual acuity testing (in logMAR) was analyzed with a sampling of 373 school children (aged 11-12 years old) who were chosen from high prevalence of poor vision classes. After the HPS program, the attitudes, behaviors, and knowledge levels of the school children regarding vision health were significantly improved. The pre-intervention mean logMAR of all participating students ( N = 373) was -.10, which increased to -.19 after the intervention. Analysis using the Wilcoxon signed-rank test showed that the logMAR value was significantly improved after the intervention ( t = 2.13, p < 0.05). Our findings highlight the relevance and effectiveness of the coalition's efforts, which reinforces the usefulness of co-operatively implementing the HPS program.

  16. Building alliances in unlikely places: progressive allies and the Tobacco Institute's coalition strategy on cigarette excise taxes.

    Science.gov (United States)

    Campbell, Richard B; Balbach, Edith D

    2009-07-01

    The tobacco industry often utilizes third parties to advance its policy agenda. One such utilization occurred when the industry identified organized labor and progressive groups as potential allies whose advocacy could undermine public support for excise tax increases. To attract such collaboration, the industry framed the issue as one of tax fairness, creating a labor management committee to provide distance from tobacco companies and furthering progressive allies' interests through financial and logistical support. Internal industry documents indicate that this strategic use of ideas, institutions, and interests facilitated the recruitment of leading progressive organizations as allies. By placing excise taxes within a strategic policy nexus that promotes mutual public interest goals, public health advocates may use a similar strategy in forging their own excise tax coalitions.

  17. Applied mathematics

    CERN Document Server

    Logan, J David

    2013-01-01

    Praise for the Third Edition"Future mathematicians, scientists, and engineers should find the book to be an excellent introductory text for coursework or self-study as well as worth its shelf space for reference." -MAA Reviews Applied Mathematics, Fourth Edition is a thoroughly updated and revised edition on the applications of modeling and analyzing natural, social, and technological processes. The book covers a wide range of key topics in mathematical methods and modeling and highlights the connections between mathematics and the applied and nat

  18. Establishing and evaluating the key functions of an interactive systems framework using an assets-getting to outcomes intervention.

    Science.gov (United States)

    Chinman, Matthew; Acosta, Joie; Ebener, Patricia; Q Burkhart; Clifford, Michael; Corsello, Maryann; Duffey, Tim; Hunter, Sarah; Jones, Margaret; Lahti, Michel; Malone, Patrick S; Paddock, Susan; Phillips, Andrea; Savell, Susan; Scales, Peter C; Tellett-Royce, Nancy

    2012-12-01

    Community practitioners can face difficulty in achieving outcomes demonstrated by prevention science. Building a community practitioner's prevention capacity-the knowledge and skills needed to conduct critical prevention practices-could improve the quality of prevention and its outcomes. The purpose of this article is to: (1) describe how an intervention called Assets-Getting To Outcomes (AGTO) was used to establish the key functions of the ISF and present early lessons learned from that intervention's first 6 months and (2) examine whether there is an empirical relationship between practitioner capacity at the individual level and the performance of prevention at the program level-a relationship predicted by the ISF but untested. The article describes an operationalization of the ISF in the context of a five-year randomized controlled efficacy trial that combines two complementary models designed to build capacity: Getting To Outcomes (GTO) and Developmental Assets. The trial compares programs and individual practitioners from six community-based coalitions using AGTO with programs and practitioners from six similar coalitions that are not. In this article, we primarily focus on what the ISF calls innovation specific capacity and discuss how the combined AGTO innovation structures and uses feedback about its capacity-building activities, which can serve as a model for implementing the ISF. Focus group discussions used to gather lessons learned from the first 6 months of the AGTO intervention suggest that while the ISF may have been conceptualized as three distinct systems, in practice they are less distinct. Findings from the baseline wave of data collection of individual capacity and program performance suggest that practitioner capacity predicts, in part, performance of prevention programs. Empirically linking practitioner capacity and performance of prevention provides empirical support for both the ISF and AGTO.

  19. The effect of membership rules and voting schemes on the success of international climate agreements

    NARCIS (Netherlands)

    Finus, M.; Altamirano-Cabrera, J.C.; Ierland, van E.C.

    2005-01-01

    We empirically test the role of membership rules and voting schemes for climate change coalitions with the STAbility of COalitions model (STACO). The model comprises twelve world regions and captures long-run effects of greenhouse gas accumulation. We apply three stability concepts that capture the

  20. Sustaining Physics Teacher Education Coalition programs in physics teacher education

    Directory of Open Access Journals (Sweden)

    Rachel E. Scherr

    2017-02-01

    Full Text Available Understanding the mechanisms of increasing the number of physics teachers educated per year at institutions with thriving physics teacher preparation programs may inspire and support other institutions in building thriving programs of their own. The Physics Teacher Education Coalition (PhysTEC, led by the American Physical Society (APS and the American Association of Physics Teachers (AAPT, has supported transformation of physics teacher preparation programs at a number of institutions around the country for over a decade. In 2012–2013, PhysTEC supported an independent study on the sustainability of its sites after project funding ends. The study sought to measure the extent to which programs have been sustained and to identify what features should be prioritized for building sustainable physics teacher preparation programs. Most of the studied sites have sustained increases in the number of physics teachers educated per year as well as funding for physics teacher preparation. About half of the programs are thriving, in that in the post-award period, they have further increased both the number of physics teachers educated per year and funding for physics teacher preparation. All studied sites that sustained increases in the number of physics teachers educated per year have two features in common: a champion of physics teacher education and institutional commitment. The thriving physics teacher preparation programs in this study implemented different elements of physics teacher preparation according to diverse local priorities and opportunities, including the unique expertise of local personnel.

  1. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  2. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  3. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  4. Buy coal. Deposit markets prevent carbon leakage

    Energy Technology Data Exchange (ETDEWEB)

    Harstad, Baard [Northwestern Univ., Evanston, IL (United States). Kellogg School of Management

    2010-03-15

    If a coalition of countries implements climate policies, nonparticipants tend to consume more, pollute more, and invest too little in renewable energy sources. In response, the coalition's equilibrium policy distorts trade and it is not time consistent. By adding a market for the right to exploit fossil fuel deposits, I show that these problems vanish and the first best is implemented. When the market for deposits clears, the coalition relies entirely on supply-side policies, which is simple to implement in practice. The result illustrates that efficiency can be obtained without Coasian negotiations ex post, if key inputs are tradable ex ante. (orig.)

  5. A Game-Theoretical Approach for Spectrum Efficiency Improvement in Cloud-RAN

    Directory of Open Access Journals (Sweden)

    Zhuofu Zhou

    2016-01-01

    Full Text Available As tremendous mobile devices access to the Internet in the future, the cells which can provide high data rate and more capacity are expected to be deployed. Specifically, in the next generation of mobile communication 5G, cloud computing is supposed to be applied to radio access network. In cloud radio access network (Cloud-RAN, the traditional base station is divided into two parts, that is, remote radio heads (RRHs and base band units (BBUs. RRHs are geographically distributed and densely deployed, so as to achieve high data rate and low latency. However, the ultradense deployment inevitably deteriorates spectrum efficiency due to the severer intercell interference among RRHs. In this paper, the downlink spectrum efficiency can be improved through the cooperative transmission based on forming the coalitions of RRHs. We formulate the problem as a coalition formation game in partition form. In the process of coalition formation, each RRH can join or leave one coalition to maximize its own individual utility while taking into account the coalition utility at the same time. Moreover, the convergence and stability of the resulting coalition structure are studied. The numeric simulation result demonstrates that the proposed approach based on coalition formation game is superior to the noncooperative method in terms of the aggregate coalition utility.

  6. Unconditional security of quantum key distribution and the uncertainty principle

    International Nuclear Information System (INIS)

    Koashi, Masato

    2006-01-01

    An approach to the unconditional security of quantum key distribution protocols is presented, which is based on the uncertainty principle. The approach applies to every case that has been treated via the argument by Shor and Preskill, but it is not necessary to find quantum error correcting codes. It can also treat the cases with uncharacterized apparatuses. The proof can be applied to cases where the secret key rate is larger than the distillable entanglement

  7. The Collective Impact Model and Its Potential for Health Promotion: Overview and Case Study of a Healthy Retail Initiative in San Francisco.

    Science.gov (United States)

    Flood, Johnna; Minkler, Meredith; Hennessey Lavery, Susana; Estrada, Jessica; Falbe, Jennifer

    2015-10-01

    As resources for health promotion become more constricted, it is increasingly important to collaborate across sectors, including the private sector. Although many excellent models for cross-sector collaboration have shown promise in the health field, collective impact (CI), an emerging model for creating larger scale change, has yet to receive much study. Complementing earlier collaboration approaches, CI has five core tenets: a shared agenda, shared measurement systems, mutually reinforcing activities, continuous communication, and a central infrastructure. In this article, we describe the CI model and its key dimensions and constructs. We briefly compare CI to community coalition action theory and discuss our use of the latter to provide needed detail as we apply CI in a critical case study analysis of the Tenderloin Healthy Corner Store Coalition in San Francisco, California. Using Yin's multimethod approach, we illustrate how CI strategies, augmented by the community coalition action theory, are being used, and with what successes or challenges, to help affect community- and policy-level change to reduce tobacco and alcohol advertising and sales, while improving healthy, affordable, and sustainable food access. We discuss the strengths and weaknesses of CI as a framework for health promotion, as well as the benefits, challenges, and initial outcomes of the healthy retail project and its opportunities for scale-up. Implications for health promotion practice and research also are discussed. © 2015 Society for Public Health Education.

  8. Embodied carbon dioxide emission at supra-national scale: A coalition analysis for G7, BRIC, and the rest of the world

    International Nuclear Information System (INIS)

    Chen, Z.M.; Chen, G.Q.

    2011-01-01

    Presented in this study is an empirical analysis of embodied carbon dioxide emissions induced by fossil fuel combustion for the world divided into three supra-national coalitions, i.e., G7, BRIC, and the rest of the world (ROW), via the application of a multi-region input-output modeling for 2004. Embodied emission intensities for the three coalitions are calculated and compared, with market exchange rate and purchase power parity separately used to investigate the difference between nominal and real production efficiencies. Emissions embodied in different economic activities such as production, consumption, import, and export are calculated and analyzed accordingly, and remarkable carbon trade imbalances associated with G7 (surplus of 1.53 billion tons, or 36% its traded emissions) and BRIC (deficit of 1.37 billion tons, or 51% its traded emissions) and approximate balance with ROW (deficit of 0.16 billion tons, or 3% its traded emissions) are concretely revealed. Carbon leakages associated with industry transfer and international trades are illustrated in terms of impacts on global climate policies. The last but not least, per capita consumption based emissions for G7, BRIC, and ROW are determined as 12.95, 1.53, and 2.22 tons, respectively, and flexible abatement policies as well as equity on per capita entitlement are discussed. - Research highlights: → We compare the embodied CO 2 emissions in 2004 for G7, BRIC, and ROW. → Emissions embodied in production, consumption, import, and export are investigated. → Considerable CO 2 trade surplus and deficit are obtained by G7 and BRIC, respectively. → Per head embodied emissions are 13, 1.5, and 2.2 tons for G7, BRIC, and ROW, respectively.

  9. Applying theories to better understand socio-political challenges in implementing evidence-based work disability prevention strategies.

    Science.gov (United States)

    Ståhl, Christian; Costa-Black, Katia; Loisel, Patrick

    2018-04-01

    This article explores and applies theories for analyzing socio-political aspects of implementation of work disability prevention (WDP) strategies. For the analysis, theories from political science are explained and discussed in relation to case examples from three jurisdictions (Sweden, Brazil and Québec). Implementation of WDP strategies may be studied through a conceptual framework that targets: (1) the institutional system in which policy-makers and other stakeholders reside; (2) the ambiguity and conflicts regarding what to do and how to do it; (3) the bounded rationality, path dependency and social systems of different stakeholders; and (4) coalitions formed by different stakeholders and power relations between them. In the case examples, the design of social insurance systems, the access to and infrastructure of healthcare systems, labor market policies, employers' level of responsibility, the regulatory environment, and the general knowledge of WDP issues among stakeholders played different roles in the implementation of policies based on scientific evidence. Future research may involve participatory approaches focusing on building coalitions and communities of practice with policy-makers and stakeholders, in order to build trust, facilitate cooperation, and to better promote evidence utilization. Implications for Rehabilitation Implementation of work disability prevention policies are subject to contextual influences from the socio-political setting and from relationships between stakeholders Stakeholders involved in implementing strategies are bound to act based on their interests and previous courses of action To promote research uptake on the policy level, stakeholders and researchers need to engage in collaboration and translational activities Political stakeholders at the government and community levels need to be more directly involved as partners in the production and utilization of evidence.

  10. The Coalition for Publishing Data in the Earth and Space Sciences

    Science.gov (United States)

    Lehnert, Kerstin; Hanson, Brooks; Cutcher-Gershenfeld, Joel

    2015-04-01

    Scholarly publishing remains a key high-value point in making data available and will for the foreseeable future be tied to the availability of science data. Data need to be included in or released as part of publications to make the science presented in an article reproducible, and most publishers have statements related to the inclusion of data, recognizing that such release enhances the value and is part of the integrity of the research. Unfortunately, practices for reporting and documenting data in the scientific literature are inconsistent and inadequate, and the vast majority of data submitted along with publications is still in formats and forms of storage that make discovery and reuse difficult or impossible. Leading earth and space science repositories on the other hand are eager and set up to provide persistent homes for these data, and also ensure quality, enhancing their value, access, and reusability. Unfortunately only a small fraction of the data associated with scientific publications makes it to these data facilities. Connecting scholarly publication more firmly with data facilities is essential in meeting the expectations of open, accessible and useful data as aspired by all stakeholders and expressed in position statements, policies, and guidelines. To strengthen these connections, a new initiative was launched in Fall 2014 at a conference that brought together major publishers, data facilities, and consortia in the Earth and space sciences, as well as governmental, association, and foundation funders. The aim of this initiative is to foster consensus and consistency among publishers, editors, funders, and data repositories on how data that are part of scholarly publications should be curated and published, and guide the development of practical resources based on those guidelines that will help authors and publishers support open data policies, facilitate proper data archiving, and support the linking of data to publications. The most relevant

  11. Partnership capacity for community health improvement plan implementation: findings from a social network analysis.

    Science.gov (United States)

    McCullough, J Mac; Eisen-Cohen, Eileen; Salas, S Bianca

    2016-07-13

    degree centralization-meaning key organizations link organizations otherwise not tightly partnering. Coalition members rated each other highly on trust, a positive sign for future partnership development efforts. Examination of network maps reveal key organizations that can be targeted for future partnership facilitation and expansion. Future network data collection will enable exploration of longitudinal trends and exploration of network characteristics versus health behavior, status, and outcome changes.

  12. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  13. Authentication for Bulk Data Dissemination in Sensor Networks Using Symmetric Keys

    National Research Council Canada - National Science Library

    Wang, Limin; Kulkarni, Sandeep

    2007-01-01

    .... Our protocol uses the secret instantiation algorithm for distributing the keys. We apply the symmetric key signatures at the segment/group level and use hashed verification at the packet level...

  14. In Preparation or Response: Examining Health Care Coalitions Amid a Changing Economic and Political Landscape.

    Science.gov (United States)

    Dornauer, Mark E

    2015-12-01

    The Office of the Assistant Secretary for Preparedness and Response within the US Department of Health and Human Services leads the nation in preparing for, responding to, and recovering from the adverse health effects of public health emergencies, in part through formal collaborations between hospitals, health systems, community health centers, public health departments, and community organizations via health care coalitions (HCCs). HCCs endeavor to meet the medical surge demands inherent to disasters and to improve health outcomes before, during, and after public health emergencies. Nevertheless, significant changes in health economics and policy can impact the operations, capabilities, and scope of HCCs. Specifically, hospital consolidation and the Affordable Care Act (ACA) are altering the national health care landscape, as well as the emergency preparedness sector, and are challenging HCCs to adapt to large-scale, industry-wide transformations. This article examines HCCs in the context of the developments of hospital consolidation and the ACA in order to facilitate future discourse regarding the strategy and policy of HCCs amid a changing economic and political landscape.

  15. Architectural Building A Public Key Infrastructure Integrated Information Space

    Directory of Open Access Journals (Sweden)

    Vadim Ivanovich Korolev

    2015-10-01

    Full Text Available The article keeps under consideration the mattersto apply the cryptographic system having a public key to provide information security and to implya digital signature. It performs the analysis of trust models at the formation of certificates and their use. The article describes the relationships between the trust model and the architecture public key infrastructure. It contains conclusions in respect of the options for building the public key infrastructure for integrated informationspace.

  16. Strange bedfellows: the Bundestag’s free vote on pre-implantation genetic diagnosis (PGD reveals how Germany’s restrictive bioethics legislation is shaped by a Christian Democratic/New Left issue-coalition

    Directory of Open Access Journals (Sweden)

    Kai Arzheimer

    2015-08-01

    Full Text Available Germany’s bioethical legislation presents a puzzle: given structural factors, the country should be at the forefront of reproductive medicine, but its embryology regime remains one of the strictest in Western Europe. Past research has linked this fact to an unusual coalition of Christian and New Left groups, which both draw a connection from modern embryology to eugenics under the Nazis. In this article, the workings of this alleged alliance are demonstrated at the micro-level for the first time. The behaviour of individual MPs in a crucial free vote on pre-implantation genetic diagnosis (PGD is modelled using data on their political, sectoral and religious affiliations. Identifying as a Catholic and membership in Christian organisations are strong predictors of resistance to PGD. Even more importantly, net of religious and professional ties, affiliation with either the Christian Democrats or the left-libertarian Green party is closely linked to restrictive bioethical preferences. The modest liberalisation in 2011 was contingent on external factors and the overwhelming support of the historically unusually large FDP delegation. With the FDP no longer represented in parliament and the Christian Democratic/New Left issue coalition even stronger than before, further liberalisation is unlikely.

  17. Applied Physics Modules: Notes, Instructions, Data Sheets, Tests, and Test Answer Keys.

    Science.gov (United States)

    Southeast Community Coll., Lincoln, NE.

    These user instructions and related materials are designed to accompany a series of twenty-three applied physics modules which have been developed for postsecondary students in electrical, electronics, machine tool, metals, manufacturing, automotive, diesel, architecture, and civil drafting occupational programs. The instructions include an…

  18. Applied research on glucansucrases

    Science.gov (United States)

    Although glycansucrases have been known for over 70 years, they remain relatively unknown except to a small group of researchers. Practical, applied research on glycansucrases has been focused on certain key areas. The earliest of these was the development of blood plasma extenders from dextran, d...

  19. How Do Communities Use a Participatory Public Health Approach to Build Resilience? The Los Angeles County Community Disaster Resilience Project.

    Science.gov (United States)

    Bromley, Elizabeth; Eisenman, David P; Magana, Aizita; Williams, Malcolm; Kim, Biblia; McCreary, Michael; Chandra, Anita; Wells, Kenneth B

    2017-10-21

    Community resilience is a key concept in the National Health Security Strategy that emphasizes development of multi-sector partnerships and equity through community engagement. Here, we describe the advancement of CR principles through community participatory methods in the Los Angeles County Community Disaster Resilience (LACCDR) initiative. LACCDR, an initiative led by the Los Angeles County Department of Public Health with academic partners, randomized 16 community coalitions to implement either an Enhanced Standard Preparedness or Community Resilience approach over 24 months. Facilitated by a public health nurse or community educator, coalitions comprised government agencies, community-focused organizations and community members. We used thematic analysis of data from focus groups ( n = 5) and interviews ( n = 6 coalition members; n = 16 facilitators) to compare coalitions' strategies for operationalizing community resilience levers of change (engagement, partnership, self-sufficiency, education). We find that strategies that included bidirectional learning helped coalitions understand and adopt resilience principles. Strategies that operationalized community resilience levers in mutually reinforcing ways (e.g., disseminating information while strengthening partnerships) also secured commitment to resilience principles. We review additional challenges and successes in achieving cross-sector collaboration and engaging at-risk groups in the resilience versus preparedness coalitions. The LACCDR example can inform strategies for uptake and implementation of community resilience and uptake of the resilience concept and methods.

  20. Mapping key antecedents of employee-driven innovations

    DEFF Research Database (Denmark)

    Smith, Pernille; Ulhøi, John Parm; Kesting, Peter

    2012-01-01

    Research on employee-driven innovation (EDI) is still in its infancy, and as yet there is no independent body of literature on the topic. The aim of this paper is to review existing insights into the key antecedents of EDI in other research contexts. In particular, we focus on: leader support......, autonomy, collaboration, and organisational norms of exploration. The main contribution of this paper is to discuss how these key antecedents apply to the specific case of EDI and to identify an agenda for new research....

  1. ELIMINATION OF THE DISADVANTAGES OF SCHEDULING-NETWORK PLANNING BY APPLYING THE MATRIX OF KEY PROJECT EVENTS

    Directory of Open Access Journals (Sweden)

    Morozenko Andrey Aleksandrovich

    2017-07-01

    Full Text Available The article discusses the current disadvantages of the scheduling-network planning in the management of the terms of investment-construction project. Problems associated with the construction of the schedule and the definitions of the duration of the construction project are being studied. The problems of project management for the management apparatus are shown, which consists in the absence of mechanisms for prompt response to deviations in the parameters of the scheduling-network diagram. A new approach to planning the implementation of an investment-construction project based on a matrix of key events and a rejection of the current practice of determining the duration based on inauthentic regulatory data. An algorithm for determining the key events of the project is presented. For increase the reliability of the organizational structure, the load factor of the functional block in the process of achieving the key event is proposed. Recommendations for improving the interaction of the participants in the investment-construction project are given.

  2. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  3. New opportunities for the enhanced NAA services through the research reactor coalitions and networks

    International Nuclear Information System (INIS)

    Danas Ridikas; Pablo Adelfang; Kevin Alldred; Marta Ferrari

    2012-01-01

    Although the number of research reactors (RRs) is steadily decreasing, more than half of the operational RRs are still heavily underutilized, and in most cases, underfunded. The decreasing and rather old fleet of RRs needs to ensure the provision of useful services to the community, in some cases with adequate revenue generation for reliable, safe and secure facility management and operations. Enhancement of low and medium power research reactor (RR) utilization is often pursued by increasing the neutron activation analysis (NAA) activities. In this paper we will present the strategy and concrete actions how NAA as one of the most popular RR applications can contribute to the above goals in particular through (a) RR coalitions and networks, (b) implementation of automation in different stages of NAA, (c) QA/QC, including skills improvement of involved personnel, (d) dedicated proficiency tests performed by a number of targeted analytical laboratories. We also show that despite the IAEA's efforts, some of the NAA laboratories still perform badly in proficiency tests, do not have formal QA/QC procedures implemented, have not implemented automation to process large number of samples or lack of clear marketing strategies. Some concrete actions are proposed and outlined to address these issues in the near future. (author)

  4. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  5. Measurement errors in voice-key naming latency for Hiragana.

    Science.gov (United States)

    Yamada, Jun; Tamaoka, Katsuo

    2003-12-01

    This study makes explicit the limitations and possibilities of voice-key naming latency research on single hiragana symbols (a Japanese syllabic script) by examining three sets of voice-key naming data against Sakuma, Fushimi, and Tatsumi's 1997 speech-analyzer voice-waveform data. Analysis showed that voice-key measurement errors can be substantial in standard procedures as they may conceal the true effects of significant variables involved in hiragana-naming behavior. While one can avoid voice-key measurement errors to some extent by applying Sakuma, et al.'s deltas and by excluding initial phonemes which induce measurement errors, such errors may be ignored when test items are words and other higher-level linguistic materials.

  6. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  7. Context-rich semantic framework for effective data-to-decisions in coalition networks

    Science.gov (United States)

    Grueneberg, Keith; de Mel, Geeth; Braines, Dave; Wang, Xiping; Calo, Seraphin; Pham, Tien

    2013-05-01

    In a coalition context, data fusion involves combining of soft (e.g., field reports, intelligence reports) and hard (e.g., acoustic, imagery) sensory data such that the resulting output is better than what it would have been if the data are taken individually. However, due to the lack of explicit semantics attached with such data, it is difficult to automatically disseminate and put the right contextual data in the hands of the decision makers. In order to understand the data, explicit meaning needs to be added by means of categorizing and/or classifying the data in relationship to each other from base reference sources. In this paper, we present a semantic framework that provides automated mechanisms to expose real-time raw data effectively by presenting appropriate information needed for a given situation so that an informed decision could be made effectively. The system utilizes controlled natural language capabilities provided by the ITA (International Technology Alliance) Controlled English (CE) toolkit to provide a human-friendly semantic representation of messages so that the messages can be directly processed in human/machine hybrid environments. The Real-time Semantic Enrichment (RTSE) service adds relevant contextual information to raw data streams from domain knowledge bases using declarative rules. The rules define how the added semantics and context information are derived and stored in a semantic knowledge base. The software framework exposes contextual information from a variety of hard and soft data sources in a fast, reliable manner so that an informed decision can be made using semantic queries in intelligent software systems.

  8. Petition for Reconsideration from Biogenic CO2 Coalition to Gina McCarthy, U.S. EPA, for the Finding that Greenhouse Gas Emissions from Aircraft Cause or Contribute to Air Pollution that May Reasonably be Anticipated to Endanger Public Health and Welfare

    Science.gov (United States)

    This page contains a Petition for Reconsideration From Biogenic CO2 Coalition to Gina McCarthy, U.S. EPA, for the finding that greenhouse gas emissions from aircraft cause or contribute to air pollution that may reasonably be anticipated to endanger public

  9. Kenya’s Grand Coalition Government – Another Obstacle to Urgent Constitutional Reform? Die Große Koalition in Kenia – ein weiteres Hindernis für die drängende Verfassungsreform?

    Directory of Open Access Journals (Sweden)

    Henry Amadi

    2009-01-01

    Full Text Available Kenya’s Grand Coalition Government was formed in the aftermath of a serious post-electoral crisis including widespread violence. No political progress has been recorded; in striking contrast to all expectations for more moderation and consensual preparation of a constitutional reform. Based on secondary data from textbooks, newspapers, journals, and documents from both governmental and non-governmental organisations, the author finds that the continuing wrangles within the Grand Coalition Government, the fear of the debilitating effects of a constitutional referendum and the hard-line positions on the contentious issues pose a big threat to the achievement of a new constitution before the 2012 Elections. Die Große Koalition in Kenia wurde im Anschluss an eine heftige, gewaltsam ausgetragene Nachwahlkrise gebildet. Entgegen aller Erwartung, jetzt werde eine moderate und gemeinsam abgestimmte Vorbereitung der Verfassungsreform möglich, wurden keine politischen Fortschritte erzielt. Der Autor analysiert Sekundärdaten aus Monografien, Zeitungs- und Zeitschriftenartikeln sowie Dokumenten von Regierungs- und Nichtregierungsorganisationen und kommt zu dem Schluss, dass der fortgesetzte Streit innerhalb der Koalitionsregierung, die Furcht vor den Unwegsamkeiten eines Verfassungsreferendums und die verhärteten Positionen zu den umstrittenen Fragen die Realisierung einer neuen Verfassung vor den Wahlen 2012 wenig wahrscheinlich machen.

  10. Aliens in the promised land? Keynote address for the 1986 National Gathering of the United Church of Christ's Coalition for Lesbian/Gay Concerns.

    Science.gov (United States)

    Comstock, G D

    The following article is a condensed version of the keynote address given at the 1986 National Gathering of the Lesbian/Gay Coalition of the United Church of Christ (UCC). Problems encountered by lesbians and gay men in organized religion, especially within the liberal tradition, are identified by a method of inquiry developed by Christian educator John Westerhoff for assessing egalitarianism within institutions. The story of Queen Vashti from the Book of Esther in Hebrew scripture, and the emerging tradition of coming-out experiences by lesbians and gay men; provide the norm and model for declaring independence from denominations that neglect the concerns of lesbians and gay men and for constructing religious alternatives.

  11. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  12. ICT for AQA applied as single award

    CERN Document Server

    Wilson, Barbara

    2007-01-01

    This book has been written specifically for teachers and students following AQA's Applied AS ICT specification and covers the key elements of the units of the course, including the coursework requirements.

  13. Impact of metal ions in porphyrin-based applied materials for visible-light photocatalysis: Key information from ultrafast electronic spectroscopy

    KAUST Repository

    Kar, Prasenjit; Sardar, Samim; Alarousu, Erkki; Sun, Jingya; Seddigi, Zaki Shakir Abdullah; Ahmed, Saleh Abdel Mgeed; Danish, Ekram Yousif; Mohammed, Omar F.; Pal, Samir Kumar

    2014-01-01

    ProtoporphyrinIX-zinc oxide (PP-ZnO) nanohybrids have been synthesized for applications in photocatalytic devices. High-resolution transmission electron microscopy (HRTEM), X-ray diffraction (XRD), and steady-state infrared, absorption, and emission spectroscopies have been used to analyze the structural details and optical properties of these nanohybrids. Time-resolved fluorescence and transient absorption techniques have been applied to study the ultrafast dynamic events that are key to photocatalytic activities. The photocatalytic efficiency under visible-light irradiation in the presence of naturally abundant iron(III) and copper(II) ions has been found to be significantly retarded in the former case, but enhanced in the latter case. More importantly, femtosecond (fs) transient absorption data have clearly demonstrated that the residence of photoexcited electrons from the sensitizer PP in the centrally located iron moiety hinders ground-state bleach recovery of the sensitizer, affecting the overall photocatalytic rate of the nanohybrid. The presence of copper(II) ions, on the other hand, offers additional stability against photobleaching and eventually enhances the efficiency of photocatalysis. In addition, we have also explored the role of UV light in the efficiency of photocatalysis and have rationalized our observations from femtosecond- to picosecond-resolved studies. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Impact of metal ions in porphyrin-based applied materials for visible-light photocatalysis: Key information from ultrafast electronic spectroscopy

    KAUST Repository

    Kar, Prasenjit

    2014-07-10

    ProtoporphyrinIX-zinc oxide (PP-ZnO) nanohybrids have been synthesized for applications in photocatalytic devices. High-resolution transmission electron microscopy (HRTEM), X-ray diffraction (XRD), and steady-state infrared, absorption, and emission spectroscopies have been used to analyze the structural details and optical properties of these nanohybrids. Time-resolved fluorescence and transient absorption techniques have been applied to study the ultrafast dynamic events that are key to photocatalytic activities. The photocatalytic efficiency under visible-light irradiation in the presence of naturally abundant iron(III) and copper(II) ions has been found to be significantly retarded in the former case, but enhanced in the latter case. More importantly, femtosecond (fs) transient absorption data have clearly demonstrated that the residence of photoexcited electrons from the sensitizer PP in the centrally located iron moiety hinders ground-state bleach recovery of the sensitizer, affecting the overall photocatalytic rate of the nanohybrid. The presence of copper(II) ions, on the other hand, offers additional stability against photobleaching and eventually enhances the efficiency of photocatalysis. In addition, we have also explored the role of UV light in the efficiency of photocatalysis and have rationalized our observations from femtosecond- to picosecond-resolved studies. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. Applying Statistical and Complex Network Methods to Explore the Key Signaling Molecules of Acupuncture Regulating Neuroendocrine-Immune Network

    Directory of Open Access Journals (Sweden)

    Kuo Zhang

    2018-01-01

    Full Text Available The mechanisms of acupuncture are still unclear. In order to reveal the regulatory effect of manual acupuncture (MA on the neuroendocrine-immune (NEI network and identify the key signaling molecules during MA modulating NEI network, we used a rat complete Freund’s adjuvant (CFA model to observe the analgesic and anti-inflammatory effect of MA, and, what is more, we used statistical and complex network methods to analyze the data about the expression of 55 common signaling molecules of NEI network in ST36 (Zusanli acupoint, and serum and hind foot pad tissue. The results indicate that MA had significant analgesic, anti-inflammatory effects on CFA rats; the key signaling molecules may play a key role during MA regulating NEI network, but further research is needed.

  16. Increasing Parents' Awareness of Social Host Laws: A Pilot Study of Coalition Efforts.

    Science.gov (United States)

    Paschall, Mallie J; Friese, Bettina; Law, Kristen; Lebedeff, Anna

    2018-02-01

    States and municipalities across the U.S. are adopting social host ordinances (SHOs) to reduce alcohol use by underage youth in private settings. SHOs are most likely to be effective if parents and other adults are aware of them and they are enforced. We examined the association between a multi-media SHO awareness campaign in northern California municipalities and parents' awareness of SHOs and SHO enforcement. We collected survey data from 1798 parents in a northern California county in fall 2014; all municipalities within the county had SHOs. We conducted descriptive and logistic regression analyses to determine whether parents living in municipalities with a SHO awareness campaign were more likely to be aware of SHOs and SHO enforcement than parents in municipalities without such a campaign. Findings showed that 55.6% of parents in municipalities with a SHO awareness campaign were aware of SHOs compared to 35.7% in municipalities without a campaign. Parents in municipalities with a SHO awareness campaign were also more likely to be aware of SHO enforcement activities (16.3 vs. 8.7%). Regression analyses indicated significant positive associations between the SHO awareness campaign and parental awareness of SHOs and SHO enforcement when controlling for parents' attitudes related to youth drinking, parenting characteristics, normative beliefs regarding other parents' awareness and youth drinking, and demographic characteristics. These findings suggest that a multi-media awareness campaign implemented by coalitions was positively associated with parental awareness of SHOs and perceived SHO enforcement, which may help to prevent or reduce underage drinking.

  17. How Do Communities Use a Participatory Public Health Approach to Build Resilience? The Los Angeles County Community Disaster Resilience Project

    Directory of Open Access Journals (Sweden)

    Elizabeth Bromley

    2017-10-01

    Full Text Available Community resilience is a key concept in the National Health Security Strategy that emphasizes development of multi-sector partnerships and equity through community engagement. Here, we describe the advancement of CR principles through community participatory methods in the Los Angeles County Community Disaster Resilience (LACCDR initiative. LACCDR, an initiative led by the Los Angeles County Department of Public Health with academic partners, randomized 16 community coalitions to implement either an Enhanced Standard Preparedness or Community Resilience approach over 24 months. Facilitated by a public health nurse or community educator, coalitions comprised government agencies, community-focused organizations and community members. We used thematic analysis of data from focus groups (n = 5 and interviews (n = 6 coalition members; n = 16 facilitators to compare coalitions’ strategies for operationalizing community resilience levers of change (engagement, partnership, self-sufficiency, education. We find that strategies that included bidirectional learning helped coalitions understand and adopt resilience principles. Strategies that operationalized community resilience levers in mutually reinforcing ways (e.g., disseminating information while strengthening partnerships also secured commitment to resilience principles. We review additional challenges and successes in achieving cross-sector collaboration and engaging at-risk groups in the resilience versus preparedness coalitions. The LACCDR example can inform strategies for uptake and implementation of community resilience and uptake of the resilience concept and methods.

  18. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  19. New hematological key for bovine leukemia virus-infected Japanese Black cattle.

    Science.gov (United States)

    Mekata, Hirohisa; Yamamoto, Mari; Kirino, Yumi; Sekiguchi, Satoshi; Konnai, Satoru; Horii, Yoichiro; Norimine, Junzo

    2018-02-20

    The European Community's (EC) Key, which is also called Bendixen's Key, is a well-established bovine leukemia virus (BLV) diagnostic method that classifies cattle according to the absolute lymphocyte count and age. The EC Key was originally designed for dairy cattle and is not necessarily suitable for Japanese Black (JB) beef cattle. This study revealed the lymphocyte counts in the BLV-free and -infected JB cattle were significantly lower than those in the Holstein cattle. Therefore, applying the EC Key to JB cattle could result in a large number of undetected BLV-infected cattle. Our proposed hematological key, which was designed for JB cattle, improves the detection of BLV-infected cattle by approximately 20%. We believe that this study could help promote BLV control.

  20. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  1. Small Private Key PKS on an Embedded Microprocessor

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  2. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  3. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  4. A Queer Theorist's Critique of Online Domestic Violence Advocacy: Critically Responding to the National Coalition Against Domestic Violence Web Site.

    Science.gov (United States)

    Shelton, Samuel Z

    2018-01-01

    Since the foundations of the contemporary anti-violence movement in the 1960s and 1970s, advocates have sought to establish a critical understanding of domestic violence that we can use to direct our efforts for social change. Yet many advocates and advocacy organizations continue to rely on a problematic narrative of sameness that marginalizes and erases diverse victims' experiences and needs. In this article, I conduct a critical discourse analysis of the National Coalition Against Domestic Violence Web site to identify outcomes of this narrative for the inclusivity of advocacy efforts. I argue that despite the organization's numerous claims to represent diverse victims' experiences, Web site content reveals that its purportedly general account of domestic violence normalizes the experiences of a small group of victims-namely, heterosexual, cisgender women. Further, the Web site's content greatly limits the potential for thinking about and discussing violence across difference. I conclude with recommendations for changes in advocacy practices.

  5. 41 CFR Appendix A to Subpart C of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart C of Part 102 Public Contracts and Property Management Federal Property... 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied to situations not...

  6. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Science.gov (United States)

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  7. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  8. Psycholinguistics in Applied Linguistics: Trends and Perspectives.

    Science.gov (United States)

    de Bot, Kees

    2000-01-01

    Discusses the relationship between the terms psycholinguistics and applied linguistics, and in the process explores key issues in multilingual processing, such as the structure of the bilingual lexicon, language choice in production and perception, and the language mode. (Author/VWL)

  9. Small Private Key MQPKS on an Embedded Microprocessor

    Directory of Open Access Journals (Sweden)

    Hwajeong Seo

    2014-03-01

    Full Text Available Multivariate quadratic (MQ cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011, a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  10. Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-method

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2016-01-01

    We show that the XOR-method based on linear error-correcting codes can be applied to achieve the secret-key capacity of binary-symmetric SRAM-PUFs. Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where

  11. Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2016-01-01

    We show that the XOR-method based on linear error-correcting codes can be applied to achieve the secret-key capacity of binary-symmetric SRAM-PUFs. Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where

  12. Discovering New Variable Stars at Key Stage 3

    Science.gov (United States)

    Chubb, Katy; Hood, Rosie; Wilson, Thomas; Holdship, Jonathan; Hutton, Sarah

    2017-01-01

    Details of the London pilot of the "Discovery Project" are presented, where university-based astronomers were given the chance to pass on some real and applied knowledge of astronomy to a group of selected secondary school pupils. It was aimed at students in Key Stage 3 of their education, allowing them to be involved in real…

  13. KDiamend: a package for detecting key drivers in a molecular ecological network of disease.

    Science.gov (United States)

    Lyu, Mengxuan; Chen, Jiaxing; Jiang, Yiqi; Dong, Wei; Fang, Zhou; Li, Shuaicheng

    2018-04-11

    Microbial abundance profiles are applied widely to understand diseases from the aspect of microbial communities. By investigating the abundance associations of species or genes, we can construct molecular ecological networks (MENs). The MENs are often constructed by calculating the Pearson correlation coefficient (PCC) between genes. In this work, we also applied multimodal mutual information (MMI) to construct MENs. The members which drive the concerned MENs are referred to as key drivers. We proposed a novel method to detect the key drivers. First, we partitioned the MEN into subnetworks. Then we identified the most pertinent subnetworks to the disease by measuring the correlation between the abundance pattern and the delegated phenotype-the variable representing the disease phenotypes. Last, for each identified subnetwork, we detected the key driver by PageRank. We developed a package named KDiamend and applied it to the gut and oral microbial data to detect key drivers for Type 2 diabetes (T2D) and Rheumatoid Arthritis (RA). We detected six T2D-relevant subnetworks and three key drivers of them are related to the carbohydrate metabolic process. In addition, we detected nine subnetworks related to RA, a disease caused by compromised immune systems. The extracted subnetworks include InterPro matches (IPRs) concerned with immunoglobulin, Sporulation, biofilm, Flaviviruses, bacteriophage, etc., while the development of biofilms is regarded as one of the drivers of persistent infections. KDiamend is feasible to detect key drivers and offers insights to uncover the development of diseases. The package is freely available at http://www.deepomics.org/pipelines/3DCD6955FEF2E64A/ .

  14. 41 CFR Appendix A to Subpart D of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart D of Part 102 Public Contracts and Property Management Federal Property... Subpart D of Part 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied...

  15. Some Key Principles for Developing Grammar Skills

    Institute of Scientific and Technical Information of China (English)

    张威

    2008-01-01

    Grammar is sometimes defined aft"the way words are put together to make correct sentences"(Ur,2004,P.75).The aim of teaching grammar is to raise the rates of the correctness of language use and help the students transfer the isolated language points to apply language.In this essay,the author introduces two kinds of Conlnlon methods in English grammar class. And there are some key principles in grammar teaching.

  16. Institutional Data Management in Higher Education. ECAR Key Findings

    Science.gov (United States)

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  17. Domestic Violence and Pregnancy: A CBPR Coalition Approach to Identifying Needs and Informing Policy.

    Science.gov (United States)

    Bright, Candace Forbes; Bagley, Braden; Pulliam, Ivie; Newton, Amy Swetha

    2018-01-01

    Community engagement-the collaborative process of addressing issues that impact the well-being of a community-is a strategic effort to address community issues. The Gulf States Health Policy Center (GS-HPC) formed the Hattiesburg Area Health Coalition (HAHC) in November 2014 for the purpose of addressing policies impacting the health of Forrest and Lamar counties in Mississippi. To chronicle the community-based participatory research (CBPR) process used by HAHC's identification of infant and maternal health as a policy area, domestic violence in pregnancy as a priority area within infant and maternal health, and a community action plan (CAP) regarding this priority area. HAHC reviewed data and identified infant and maternal health as a priority area. They then conducted a policy scan of local prenatal health care to determine the policy area of domestic violence in pregnancy. HAHC developed a CAP identifying three goals with regard to domestic violence and pregnancy that together informed policy. Changes included the development of materials specific to resources available in the area. The materials and recommended changes will first be implemented by Southeast Mississippi Rural Health Initiative (SeMRHI) through a screening question for all pregnant patients, and the adoption of policies for providing information and referrals. The lack of community-level data was a challenge to HAHC in identifying focus and priority areas, but this was overcome by shared leadership and community engagement. After completion of the CAP, 100% of expecting mothers receiving prenatal care in the area will be screened for domestic violence.

  18. From art to applied science.

    Science.gov (United States)

    Schatzberg, Eric

    2012-09-01

    Before "applied science" and "technology" became keywords, the concept of art was central to discourse about material culture and its connections to natural knowledge. By the late nineteenth century, a new discourse of applied science had replaced the older discourse of art. This older discourse of art, especially as presented in Enlightenment encyclopedias, addressed the relationship between art and science in depth. But during the nineteenth century the concept of fine art gradually displaced the broader meanings of "art," thus undermining the utility of the term for discourse on the relationship between knowledge and practice. This narrowed meaning of "art" obscured key aspects of the industrial world. In effect, middle-class agents of industrialism, including "men of science," used the rhetoric of "applied science" and, later, "technology" to cement the exclusion of artisanal knowledge from the discourse of industrial modernity.

  19. Forensic steganalysis: determining the stego key in spatial domain steganography

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Soukal, David; Holotyak, Taras

    2005-03-01

    This paper is an extension of our work on stego key search for JPEG images published at EI SPIE in 2004. We provide a more general theoretical description of the methodology, apply our approach to the spatial domain, and add a method that determines the stego key from multiple images. We show that in the spatial domain the stego key search can be made significantly more efficient by working with the noise component of the image obtained using a denoising filter. The technique is tested on the LSB embedding paradigm and on a special case of embedding by noise adding (the +/-1 embedding). The stego key search can be performed for a wide class of steganographic techniques even for sizes of secret message well below those detectable using known methods. The proposed strategy may prove useful to forensic analysts and law enforcement.

  20. Utilization of Health Care Coalitions and Resiliency Forums in the United States and United Kingdom: Different Approaches to Strengthen Emergency Preparedness.

    Science.gov (United States)

    Walsh, John; Swan, Allan Graeme

    2016-02-01

    The process for developing national emergency management strategies for both the United States and the United Kingdom has led to the formulation of differing approaches to meet similar desired outcomes. Historically, the pathways for each are the result of the enactment of legislation in response to a significant event or a series of events. The resulting laws attempt to revise practices and policies leading to more effective and efficient management in preparing, responding, and mitigating all types of natural, manmade, and technological hazards. Following the turn of the 21st century, each country has experienced significant advancements in emergency management including the formation and utilization of 2 distinct models: health care coalitions in the United States and resiliency forums in the United Kingdom. Both models have evolved from circumstances and governance unique to each country. Further in-depth study of both approaches will identify strengths, weaknesses, and existing gaps to meet continued and future challenges of our respective disaster health care systems.

  1. 41 CFR Appendix A to Subpart B of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart B of Part 102 Public Contracts and Property Management Federal Property.... B, App. A Appendix A to Subpart B of Part 102-3—Key Points and Principles This appendix provides... principles that may be applied to situations not covered elsewhere in this subpart. The guidance follows: Key...

  2. 41 CFR Appendix A to Subpart A of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart A of Part 102 Public Contracts and Property Management Federal Property..., Subpt. A, App. A Appendix A to Subpart A of Part 102-3—Key Points and Principles This appendix provides... principles that may be applied to situations not covered elsewhere in this subpart. The guidance follows: Key...

  3. The economics of violence in natural states

    NARCIS (Netherlands)

    van Besouw, B.; Ansink, Erik; van Bavel, B.

    2016-01-01

    Violence is key to understanding human interaction and societal development. The natural state of societal organization is that a subset of the population, capable of mustering organized large-scale violence, forms an elite coalition that restrains both violence and coercive appropriation. We

  4. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  5. Utilizing a Pediatric Disaster Coalition Model to Increase Pediatric Critical Care Surge Capacity in New York City.

    Science.gov (United States)

    Frogel, Michael; Flamm, Avram; Sagy, Mayer; Uraneck, Katharine; Conway, Edward; Ushay, Michael; Greenwald, Bruce M; Pierre, Louisdon; Shah, Vikas; Gaffoor, Mohamed; Cooper, Arthur; Foltin, George

    2017-08-01

    A mass casualty event can result in an overwhelming number of critically injured pediatric victims that exceeds the available capacity of pediatric critical care (PCC) units, both locally and regionally. To address these gaps, the New York City (NYC) Pediatric Disaster Coalition (PDC) was established. The PDC includes experts in emergency preparedness, critical care, surgery, and emergency medicine from 18 of 25 major NYC PCC-capable hospitals. A PCC surge committee created recommendations for making additional PCC beds available with an emphasis on space, staff, stuff (equipment), and systems. The PDC assisted 15 hospitals in creating PCC surge plans by utilizing template plans and site visits. These plans created an additional 153 potential PCC surge beds. Seven hospitals tested their plans through drills. The purpose of this article was to demonstrate the need for planning for disasters involving children and to provide a stepwise, replicable model for establishing a PDC, with one of its primary goals focused on facilitating PCC surge planning. The process we describe for developing a PDC can be replicated to communities of any size, setting, or location. We offer our model as an example for other cities. (Disaster Med Public Health Preparedness. 2017;11:473-478).

  6. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  7. DNA based random key generation and management for OTP encryption.

    Science.gov (United States)

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  8. Security of differential-phase-shift quantum key distribution against individual attacks

    International Nuclear Information System (INIS)

    Waks, Edo; Takesue, Hiroki; Yamamoto, Yoshihisa

    2006-01-01

    We derive a proof of security for the differential-phase-shift quantum key distribution protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful

  9. Applying principles from safety science to improve child protection.

    Science.gov (United States)

    Cull, Michael J; Rzepnicki, Tina L; O'Day, Kathryn; Epstein, Richard A

    2013-01-01

    Child Protective Services Agencies (CPSAs) share many characteristics with other organizations operating in high-risk, high-profile industries. Over the past 50 years, industries as diverse as aviation, nuclear power, and healthcare have applied principles from safety science to improve practice. The current paper describes the rationale, characteristics, and challenges of applying concepts from the safety culture literature to CPSAs. Preliminary efforts to apply key principles aimed at improving child safety and well-being in two states are also presented.

  10. Virtual-optical information security system based on public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  11. Space, place and body: temporary coalitions, nodes in a network

    Directory of Open Access Journals (Sweden)

    Kerith Power

    2012-12-01

    Full Text Available The articles in this collection share a concern for place, space and bodies as frameworks for thinking about and conducting educational research. The authors range in experience from senior academics, independent educators, beginning and emerging new researchers spanning a range of educational sectors. The articles originate from connections forged within and between Australia and northern countries with visits back and forth between 2004 and 2010. Some of the writers have met each other in these travels and others have not. All have encountered and participated in some way in the work of the space place and body research group, which originated in 2007 as a named research ‘node’ at Monash University.   The space place and body group formed as a result of a process designed to re-imagine research in the Faculty of Education at Monash University in order to address ‘the big questions of our time’. As a leading global university with campuses in Asia and Europe as well as several in Australia, the Dean of the Faculty cited recent evidence that the field of educational research had become too narrowly focused and that new approaches were needed to enliven the field and move it forward. Individualistic research was no longer supported and groups were formed organically around coalitions of interest. The purpose of the space place and body group was to come together to generate new conceptual, theoretical and methodological resources within the core concepts of space, place and body by collaborating across our differences. In the early phase of our development we focused on linked identity (ontological and knowledge (epistemological work, at the intersection of postcolonial and poststructural approaches to place in educational research. A specific interest in alternative and creative methodologies emerged from these onto-epistemological activities.   As part of our process we initiated temporary definitions of space, place and body, to

  12. Randomness determines practical security of BB84 quantum key distribution

    Science.gov (United States)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  13. Quantum key distribution with entangled photon sources

    International Nuclear Information System (INIS)

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-01-01

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses

  14. Benchmarking Organisational Capability using The 20 Keys

    Directory of Open Access Journals (Sweden)

    Dino Petrarolo

    2012-01-01

    Full Text Available Organisations have over the years implemented many improvement initiatives, many of which were applied individually with no real, lasting improvement. Approaches such as quality control, team activities, setup reduction and many more seldom changed the fundamental constitution or capability of an organisation. Leading companies in the world have come to realise that an integrated approach is required which focuses on improving more than one factor at the same time - by recognising the importance of synergy between different improvement efforts and the need for commitment at all levels of the company to achieve total system-wide improvement.

    The 20 Keys approach offers a way to look at the strenqth of organisations and to systemically improve it, one step at a time by focusing on 20 different but interrelated aspects. One feature of the approach is the benchmarking system which forms the main focus of this paper. The benchmarking system is introduced as an important part of the 20 Keys philosophy in measuring organisational strength. Benchmarking results from selected South African companies are provided, as well as one company's results achieved through the adoption of the 20 Keys philosophy.

  15. Time–energy high-dimensional one-side device-independent quantum key distribution

    International Nuclear Information System (INIS)

    Bao Hai-Ze; Bao Wan-Su; Wang Yang; Chen Rui-Ke; Ma Hong-Xin; Zhou Chun; Li Hong-Wei

    2017-01-01

    Compared with full device-independent quantum key distribution (DI-QKD), one-side device-independent QKD (1sDI-QKD) needs fewer requirements, which is much easier to meet. In this paper, by applying recently developed novel time–energy entropic uncertainty relations, we present a time–energy high-dimensional one-side device-independent quantum key distribution (HD-QKD) and provide the security proof against coherent attacks. Besides, we connect the security with the quantum steering. By numerical simulation, we obtain the secret key rate for Alice’s different detection efficiencies. The results show that our protocol can performance much better than the original 1sDI-QKD. Furthermore, we clarify the relation among the secret key rate, Alice’s detection efficiency, and the dispersion coefficient. Finally, we simply analyze its performance in the optical fiber channel. (paper)

  16. Securing quantum key distribution systems using fewer states

    Science.gov (United States)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  17. Information security system based on virtual-optics imaging methodology and public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  18. "Big Society" in the UK: A Policy Review

    Science.gov (United States)

    Evans, Kathy

    2011-01-01

    Alongside the UK Coalition Government's historic public spending cuts, the "Big Society" has become a major narrative in UK political discourse. This article reviews key features of Big Society policies against their aims of rebalancing the economy and mending "Broken Britain", with particular reference to their implications…

  19. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  20. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  1. Trade Unions as Organisations: Key Issues and Problems of Internal ...

    African Journals Online (AJOL)

    The paper critically examines and evaluates inter alia Trade Unions as. Organisations and the key issues and problems of Internal Democracy within them. It transcends this analysis to assert that these core issues apply equally well to Political Organisations. Thus, from an ideological standpoint, Trade Unions play a great ...

  2. Interactive simulations for quantum key distribution

    Science.gov (United States)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  3. Interactive simulations for quantum key distribution

    International Nuclear Information System (INIS)

    Kohnle, Antje; Rizzoli, Aluna

    2017-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels. (paper)

  4. Modern applied U-statistics

    CERN Document Server

    Kowalski, Jeanne

    2008-01-01

    A timely and applied approach to the newly discovered methods and applications of U-statisticsBuilt on years of collaborative research and academic experience, Modern Applied U-Statistics successfully presents a thorough introduction to the theory of U-statistics using in-depth examples and applications that address contemporary areas of study including biomedical and psychosocial research. Utilizing a "learn by example" approach, this book provides an accessible, yet in-depth, treatment of U-statistics, as well as addresses key concepts in asymptotic theory by integrating translational and cross-disciplinary research.The authors begin with an introduction of the essential and theoretical foundations of U-statistics such as the notion of convergence in probability and distribution, basic convergence results, stochastic Os, inference theory, generalized estimating equations, as well as the definition and asymptotic properties of U-statistics. With an emphasis on nonparametric applications when and where applic...

  5. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  6. Assessment: The Alternative

    Science.gov (United States)

    FORUM: for promoting 3-19 comprehensive education, 2017

    2017-01-01

    This position statement presents a summative argument against current structures and practices of assessment in England's primary schools, and some key principles for its replacement. The text was agreed by More Than A Score, a broad coalition of professional, curriculum, research and campaigning organisations opposed to the current assessment…

  7. Plan, Save, Succeed! Financial Literacy Poster/Teaching Guide. Expect the Unexpected with Math[R

    Science.gov (United States)

    Actuarial Foundation, 2013

    2013-01-01

    "Plan, Save, Succeed!" is a new program aligned with Jumpstart Coalition National Standards in K-12 Personal Finance Education, National Council of Teachers of Mathematics (NCTM) Standards, and Common Core Standards for Mathematical Practice. "Plan, Save, Succeed!" is designed to help students understand key financial literacy topics including…

  8. Characteristics of "Tween" Participants and Non-Participants in the VERB[TM] Summer Scorecard Physical Activity Promotion Program

    Science.gov (United States)

    Nickelson, Jen; Alfonso, Moya L.; McDermott, Robert J.; Bumpus, Elizabeth C.; Bryant, Carol A.; Baldwin, Julie A.

    2011-01-01

    Creating community-based opportunities for youth to be physically active is challenging for many municipalities. A Lexington, Kentucky community coalition designed and piloted a physical activity program, "VERB[TM] summer scorecard (VSS)", leveraging the brand equity of the national VERB[TM]--It's What You Do! campaign. Key elements of…

  9. Practical round-robin differential-phase-shift quantum key distribution

    International Nuclear Information System (INIS)

    Zhang, Zhen; Yuan, Xiao; Cao, Zhu; Ma, Xiongfeng

    2017-01-01

    The security of quantum key distribution (QKD) relies on the Heisenberg uncertainty principle, with which legitimate users are able to estimate information leakage by monitoring the disturbance of the transmitted quantum signals. Normally, the disturbance is reflected as bit flip errors in the sifted key; thus, privacy amplification, which removes any leaked information from the key, generally depends on the bit error rate. Recently, a round-robin differential-phase-shift QKD protocol for which privacy amplification does not rely on the bit error rate (Sasaki et al 2014 Nature 509 475) was proposed. The amount of leaked information can be bounded by the sender during the state-preparation stage and hence, is independent of the behavior of the unreliable quantum channel. In our work, we apply the tagging technique to the protocol and present a tight bound on the key rate and employ a decoy-state method. The effects of background noise and misalignment are taken into account under practical conditions. Our simulation results show that the protocol can tolerate channel error rates close to 50% within a typical experiment setting. That is, there is a negligible restriction on the error rate in practice. (paper)

  10. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  11. Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices

    Directory of Open Access Journals (Sweden)

    Jae Dong Lee

    2014-01-01

    Full Text Available As intelligent ubiquitous devices become more popular, security threats targeting them are increasing; security is seen as one of the major challenges of the ubiquitous computing. Now a days, applying ubiquitous computing in number of fields for human safety and convenience was immensely increased in recent years. The popularity of the technology is rising day by day, and hence the security is becoming the main focused point with the advent and rising popularity of the applications. In particular, the number of wireless networks based on ubiquitous devices has increased rapidly; these devices support transmission for many types of data traffic. The convenient portability of ubiquitous devices makes them vulnerable to security threats, such as loss, theft, data modification, and wiretapping. Developers and users should seriously consider employing data encryption to protect data from such vulnerabilities. In this paper, we propose a Rhythm Key based Encryption scheme for ubiquitous devices (Ubi-RKE. The concept of Rhythm Key based Encryption has been applied to numerous real world applications in different domains. It provides key memorability and secure encryption through user touching rhythm on ubiquitous devices. Our proposed scheme is more efficient for users than existing schemes, by providing a strong cipher.

  12. Negotiating a regime to control global warming

    International Nuclear Information System (INIS)

    Sebenius, J.K.

    1991-01-01

    For purposes of analysis, this paper has uncritically maintained that the prospect of a serious climate problem exists and has only lightly examined the broader advantages and drawbacks of various proposed policy and institutional responses. Crucial as they are to a full treatment of the issues, these underlying substantive and policy questions enter the analysis primarily insofar as they affect the likely outcomes of pending and potential negotiations. To an advocate of a new greenhouse control regime, the fundamental negotiating task is to craft and sustain a meaningful winning coalition of countries backing such a regime. Two centrally necessary conditions for the fundamental task are: (1) that each member of the coalition see enough gain in the regime relative to the alternatives to adhere and (2) the potential and actual blocking coalitions of interests opposed to the regime be prevented from forming and from being acceptably accommodated or otherwise neutralized. The analysis of this paper is organized around key questions whose answers will influence whether and how these two necessary conditions might (or might not) be met

  13. Not quite a win-win: the corporate agenda of the stay at work/return to work project.

    Science.gov (United States)

    Lax, Michael

    2015-05-01

    The idea that efforts are necessary to transform the dominant framework of workplace safety and health in the United States, from one of compensation and disability to one of stay at work/return to work (SAW/RTW) for workers injured or made ill on the job, has become increasingly widespread. SAW/RTW advocates argue that everyone "wins" when unnecessary disability is reduced. Toward this end, advocates have put forward a program and implemented a strategy with strong proponents among a coalition of corporate-connected professionals. The seemingly obvious conclusions of their arguments bear closer critical scrutiny, however. Addressing key questions-why injured workers do not SAW/RTW, who the coalition of SAW/RTW proponents includes, and what the coalition proposes-reveals that the SAW/RTW approach mainly benefits employers and the corporate-connected advocates. These assertions are detailed, and principles of an alternative approach that will serve the needs of injured workers are outlined. © The Author(s) 2015 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  14. Vested Interests in addiction research and policy. Alliance between tobacco and alcohol industries to shape public policy.

    Science.gov (United States)

    Jiang, Nan; Ling, Pamela

    2013-05-01

    The tobacco and alcohol industries share common policy goals when facing regulation, opposing policies such as tax increases and advertising restrictions. The collaboration between these two industries in the tobacco policy arena is unknown. This study explored if tobacco and alcohol companies built alliances to influence tobacco legislation and, if so, how those alliances worked. Analysis of previously secret tobacco industry documents. In the early 1980s, tobacco companies started efforts to build coalitions with alcohol and other industries to oppose cigarette excise taxes, clean indoor air policies and tobacco advertising and promotion constraints. Alcohol companies were often identified as a key partner and source of financial support for the coalitions. These coalitions had variable success interfering with tobacco control policy-making. The combined resources of tobacco and alcohol companies may have affected tobacco control legislation. These alliances helped to create the perception that there is a broader base of opposition to tobacco control. Advocates should be aware of the covert alliances between tobacco, alcohol and other industries and expose them to correct this misperception. © 2013 Society for the Study of Addiction.

  15. Alliance between tobacco and alcohol industries to shape public policy

    Science.gov (United States)

    Jiang, Nan

    2013-01-01

    Aims The tobacco and alcohol industries share common policy goals when facing regulation, opposing policies such as tax increases and advertising restrictions. The collaboration between these two industries in the tobacco policy arena is unknown. This study explored if tobacco and alcohol companies built alliances to influence tobacco legislation, and if so, how those alliances worked. Methods Analysis of previously secret tobacco industry documents. Findings In the early 1980s, tobacco companies started efforts to build coalitions with alcohol and other industries to oppose cigarette excise taxes, clean indoor air policies, and tobacco advertising and promotion constraints. Alcohol companies were often identified as a key partner and source of financial support for the coalitions. These coalitions had variable success interfering with tobacco control policymaking. Conclusions The combined resources of tobacco and alcohol companies may have affected tobacco control legislation. These alliances helped to create the perception that there is a broader base of opposition to tobacco control. Advocates should be aware of the covert alliances between tobacco, alcohol, and other industries and expose them to correct this misperception. PMID:23587076

  16. Conflicts in Coalitions: A Stability Analysis of Robust Multi-City Regional Water Supply Portfolios

    Science.gov (United States)

    Gold, D.; Trindade, B. C.; Reed, P. M.; Characklis, G. W.

    2017-12-01

    Regional cooperation among water utilities can improve the robustness of urban water supply portfolios to deeply uncertain future conditions such as those caused by climate change or population growth. Coordination mechanisms such as water transfers, coordinated demand management, and shared infrastructure, can improve the efficiency of resource allocation and delay the need for new infrastructure investments. Regionalization does however come at a cost. Regionally coordinated water supply plans may be vulnerable to any emerging instabilities in the regional coalition. If one or more regional actors does not cooperate or follow the required regional actions in a time of crisis, the overall system performance may degrade. Furthermore, when crafting regional water supply portfolios, decision makers must choose a framework for measuring the performance of regional policies based on the evaluation of the objective values for each individual actor. Regional evaluations may inherently favor one actor's interests over those of another. This work focuses on four interconnected water utilities in the Research Triangle region of North Carolina for which robust regional water supply portfolios have previously been designed using multi-objective optimization to maximize the robustness of the worst performing utility across several objectives. This study 1) examines the sensitivity of portfolio performance to deviations from prescribed actions by individual utilities, 2) quantifies the implications of the regional formulation used to evaluate robustness for the portfolio performance of each individual utility and 3) elucidates the inherent regional tensions and conflicts that exist between utilities under this regionalization scheme through visual diagnostics of the system under simulated drought scenarios. Results of this analysis will help inform the creation of future regional water supply portfolios and provide insight into the nature of multi-actor water supply systems.

  17. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  18. Teachers' Explanations of a Key Developmental Understanding of Multiplicative Reasoning

    Science.gov (United States)

    Rhee, Katherine L.

    2012-01-01

    This qualitative research study explores teachers' understandings of multiplicative reasoning as a key developmental understanding (KDU). A KDU entails knowingly applying the same mathematical concepts within different contexts. A KDU supports an individual to build a connected understanding of mathematics as opposed to only understanding…

  19. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting.

    Science.gov (United States)

    Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo

    2017-12-03

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  20. Banning shisha smoking in public places in Iran: an advocacy coalition framework perspective on policy process and change.

    Science.gov (United States)

    Khayatzadeh-Mahani, Akram; Breton, Eric; Ruckert, Arne; Labonté, Ronald

    2017-07-01

    Shisha smoking is a widespread custom in Iran with a rapidly growing prevalence especially among the youth. In this article, we analyze the policy process of enforcing a federal/state ban on shisha smoking in all public places in Kerman Province, Iran. Guided by the Advocacy Coalition Framework (ACF), we investigate how a shisha smoking ban reached the political agenda in 2011, how it was framed by different policy actors, and why no significant breakthrough took place despite its inclusion on the agenda. We conducted a qualitative study using a case study approach. Two main sources of data were employed: face-to-face in-depth interviews and document analysis of key policy texts. We interviewed 24 policy actors from diverse sectors. A qualitative thematic framework, incorporating both inductive and deductive analyses, was employed to analyze our data. We found that the health sector was the main actor pushing the issue of shisha smoking onto the political agenda by framing it as a public health risk. The health sector and its allies advocated enforcement of a federal law to ban shisha smoking in all public places including teahouses and traditional restaurants whereas another group of actors opposed the ban. The pro-ban group was unable to neutralize the strategies of the anti-ban group and to steer the debate towards the health harms of shisha smoking. Our analysis uncovers three main reasons behind the policy stasis: lack of policy learning due to lack of agreement over evidence and related analytical conflicts between the two groups linked to differences in core and policy beliefs; the inability of the pro-ban group to exploit opportunities in the external policy subsystem through generating stronger public support for enforcement of the shisha smoking ban; and the nature of the institutional setting, in particular the autocratic governance of CHFS which contributed to a lack of policy learning within the policy subsystem. Our research demonstrated the utility

  1. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    Coslovi, S.; Zulian, A.

    1992-01-01

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  2. Quantum key distribution over multicore fiber based on silicon photonics

    DEFF Research Database (Denmark)

    Ding, Yunhong; Bacco, Davide; Dalgaard, Kjeld

    on quantum physics. In order to exchange secure information between users, quantum key distribution (QKD), a branch of Quantum Communications (QCs), provides good prospects for ultimate security based on the laws of quantum mechanics [2–7]. Most of QKD systems are implemented in a point-to-point link using...... generations, to HD-entanglement distribution. Furthermore, MCFs are expected as a good candidate for overcoming the capacity limit of a current optical communication system, as example the record capacity of 661 Tbits/s was obtained last year with a 30-cores fiber [8]. Proof of concept experiment has already...... requirements in terms of key generation are needed. A solution may be represented by new technologies applied to quantum world. In particular multicore fiber (MCF) open a new scenario for quantum communications, from high-dimensional (HD) spatial entanglement generation, to HD QKD and multi-user key...

  3. Review of key concepts in magnetic resonance physics

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Michael M. [Penn State Hershey Children' s Hospital, Department of Radiology, The Pennsylvania State College of Medicine, Hershey, PA (United States); Chung, Taylor [UCSF Benioff Children' s Hospital Oakland, Department of Diagnostic Imaging, Oakland, CA (United States)

    2017-05-15

    MR physics can be a challenging subject for practicing pediatric radiologists. Although many excellent texts provide very comprehensive reviews of the field of MR physics at various levels of understanding, the authors of this paper explain several key concepts in MR physics that are germane to clinical practice in a non-rigorous but practical fashion. With the basic understanding of these key concepts, practicing pediatric radiologists can build on their knowledge of current clinical MR techniques and future advances in MR applications. Given the challenges of both the increased need for rapid imaging in non-sedated children and the rapid physiological cardiovascular and respiratory motion in pediatric patients, many advances in complex MR techniques are being applied to imaging these children. The key concepts are as follows: (1) structure of a pulse sequence, (2) k-space, (3) ''trade-off triangle'' and (4) fat suppression. This review is the first of five manuscripts in a minisymposium on pediatric MR. The authors' goal for this review is to aid in understanding the MR techniques described in the subsequent manuscripts on brain imaging and body imaging in this minisymposium. (orig.)

  4. Review of key concepts in magnetic resonance physics.

    Science.gov (United States)

    Moore, Michael M; Chung, Taylor

    2017-05-01

    MR physics can be a challenging subject for practicing pediatric radiologists. Although many excellent texts provide very comprehensive reviews of the field of MR physics at various levels of understanding, the authors of this paper explain several key concepts in MR physics that are germane to clinical practice in a non-rigorous but practical fashion. With the basic understanding of these key concepts, practicing pediatric radiologists can build on their knowledge of current clinical MR techniques and future advances in MR applications. Given the challenges of both the increased need for rapid imaging in non-sedated children and the rapid physiological cardiovascular and respiratory motion in pediatric patients, many advances in complex MR techniques are being applied to imaging these children. The key concepts are as follows: (1) structure of a pulse sequence, (2) k-space, (3) "trade-off triangle" and (4) fat suppression. This review is the first of five manuscripts in a minisymposium on pediatric MR. The authors' goal for this review is to aid in understanding the MR techniques described in the subsequent manuscripts on brain imaging and body imaging in this minisymposium.

  5. Analysis of Secret Key Randomness Exploiting the Radio Channel Variability

    Directory of Open Access Journals (Sweden)

    Taghrid Mazloum

    2015-01-01

    Full Text Available A few years ago, physical layer based techniques have started to be considered as a way to improve security in wireless communications. A well known problem is the management of ciphering keys, both regarding the generation and distribution of these keys. A way to alleviate such difficulties is to use a common source of randomness for the legitimate terminals, not accessible to an eavesdropper. This is the case of the fading propagation channel, when exact or approximate reciprocity applies. Although this principle has been known for long, not so many works have evaluated the effect of radio channel properties in practical environments on the degree of randomness of the generated keys. To this end, we here investigate indoor radio channel measurements in different environments and settings at either 2.4625 GHz or 5.4 GHz band, of particular interest for WIFI related standards. Key bits are extracted by quantizing the complex channel coefficients and their randomness is evaluated using the NIST test suite. We then look at the impact of the carrier frequency, the channel variability in the space, time, and frequency degrees of freedom used to construct a long secret key, in relation to the nature of the radio environment such as the LOS/NLOS character.

  6. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    Science.gov (United States)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  7. Industrial Design: Applied Arts Component as a Factor in Design ...

    African Journals Online (AJOL)

    DrNneka

    Key Words: Algorithmic/ Heuristic Approaches, Industrial Plasticine, Play dough, .... engineering for instance, is also applicable in the actualization of the applied arts .... It is made of wax which has a chemical make-up that contains sulphur,.

  8. Improving Depression Care for Adults With Serious Mental Illness in Underresourced Areas: Community Coalitions Versus Technical Support.

    Science.gov (United States)

    Castillo, Enrico G; Shaner, Roderick; Tang, Lingqi; Chung, Bowen; Jones, Felica; Whittington, Yolanda; Miranda, Jeanne; Wells, Kenneth B

    2018-02-01

    Community Partners in Care (CPIC) was a group-randomized study of two approaches to implementing expanded collaborative depression care: Community Engagement and Planning (CEP), a coalition approach, and Resources for Services (RS), a technical assistance approach. Collaborative care networks in both arms involved health care and other agencies in five service sectors. This study examined six- and 12-month outcomes for CPIC participants with serious mental illness. This secondary analysis focused on low-income CPIC participants from racial-ethnic minority groups with serious mental illness in underresourced Los Angeles communities (N=504). Serious mental illness was defined as self-reported severe depression (≥20 on the Patient Health Questionnaire-8) at baseline or a lifetime history of bipolar disorder or psychosis. Logistic and Poisson regression with multiple imputation and response weights, controlling for covariates, was used to model intervention effects. Among CPIC participants, 50% had serious mental illness. Among those with serious mental illness, CEP relative to RS reduced the likelihood of poor mental health-related quality of life (OR=.62, 95% CI=.41-.95) but not depression (primary outcomes); reduced the likelihood of having homelessness risk factors and behavioral health hospitalizations; increased the likelihood of mental wellness; reduced specialty mental health medication and counseling visits; and increased faith-based depression visits (each pmental health-related quality of life and some social outcomes for adults with serious mental illness, although no evidence was found for long-term effects in this subsample.

  9. A Study on the Key Management Strategy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon KO

    2015-05-01

    Full Text Available Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.

  10. MULTI-PERSON DECISION FOR SUSTAINABLE DESIGN ON IBS FLOOR SYSTEM SELECTION

    Directory of Open Access Journals (Sweden)

    Christiono Utomo

    2013-05-01

    Full Text Available Selecting a design solution (choice problem is one of the natures of design decision. If the problem is more complex and involves multi participants, decision aid is necessary. This paper discusses the nature of group judgment and negotiation on multi-criteria decision-making methodologies. It presents a conceptual model of negotiation support in a multi-person decision on building floor system selection. Decision technique (AHP was applied for decision process in a satisfying options and game theory for coalition formation. An n-person cooperative game is represented by a set of all players. The proposed coalition formation model enables each agent to select individually or coalition. It improves the value of building system decision. It further emphasizes the importance of performance evaluation in the design process and value-based decision. The support model can be extended to an automated negotiation and in different building system selection with proper  modification. Keywords: Multi-person, design decision, IBS, floor system selection.

  11. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  12. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting

    Directory of Open Access Journals (Sweden)

    Tsung-Hung Lin

    2017-12-01

    Full Text Available The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA. PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  13. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  14. DISTANCE AS KEY FACTOR IN MODELLING STUDENTS’ RECRUITMENT BY UNIVERSITIES

    Directory of Open Access Journals (Sweden)

    SIMONA MĂLĂESCU

    2015-10-01

    Full Text Available Distance as Key Factor in Modelling Students’ Recruitment by Universities. In a previous paper analysing the challenge of keeping up with the current methodologies in the analysis and modelling of students’ recruitment by universities in the case of some ECE countries which still don’t register or develop key data to take advantage from the state of the art knowledge on the domain, we have promised to approach the factor distance in a future work due to the extent of the topic. This paper fulfill that promise bringing a review of the literature especially dealing with modelling the geographical area of recruiting students of an university, where combining distance with the proximate key factors previously reviewed, complete the meta-analysis of existing literature we have started a year ago. Beyond the theoretical benefit from a practical perspective, the metaanalysis aimed at synthesizing elements of good practice that can be applied to the local university system.

  15. Information Systems Management: an Australian view of the key issues

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  16. Mobilization Potential and Democratization Processes of the Coalition for Clean and Fair Elections (Bersih in Malaysia: An Interview With Hishamuddin Rais

    Directory of Open Access Journals (Sweden)

    Ying Hooi Khoo

    2014-06-01

    Full Text Available In recent years, protests and popular mobilization have become pronounced elements in Malaysian politics. Bersih (clean demonstrations are notably the most outstanding protest events in Malaysian history. Bersih is a group of 89 non-governmental organizations (NGOs pushing for a thorough reform of the electoral process in Malaysia through rallies and demonstrations. Five opposition parties initiated the idea of Bersih in 2005 and included several NGOs in the ‘project’ later on. After the first Bersih street protests in November 2007 (Bersih 1.0, the political parties and the NGOs reached the ‘compromise pact’ that led to the formation of Bersih 2.0 in 2010 as a non-partisan movement free from any political interference. This interview explores the linkages to the broader democratization process in Malaysia from the perspective of Hishamuddin Rais (Isham, a prominent grassroots activist. Isham spent 20 years in political exile after the Baling student protest of 1974. He became active again in 1998 after the ouster of then Deputy Prime Minister Anwar Ibrahim, the current leader of the opposition coalition. Isham was a member of the Bersih Steering Committee for two years until he stepped down in 2012.

  17. Analysis of 3gpp-MAC and two-key 3gpp-MAC

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Mitchell, C.J.

    2003-01-01

    Forgery and key-recovery attacks are described on the 3gpp-MAC scheme, proposed for inclusion in the 3gpp specification. Three main classes of attack are given, all of which operate whether or not truncation is applied to the MAC value. Attacks in the first class use a large number of 'chosen MAC...

  18. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  19. Stress in hospital medicine: a problem for key hospital staff.

    Science.gov (United States)

    Allen, I

    2001-08-01

    Many factors which contribute to stress in the workplace apply to both consultants and ward sisters. Both groups find that their roles have become more complex while they have increasingly lost control of their own clinical and professional territory in a managerial culture. The erosion of the key relationship between consultants and ward sisters is of concern and the need for teamworking is insufficiently recognized.

  20. Who Is a Stream? Epistemic Communities, Instrument Constituencies and Advocacy Coalitions in Public Policy-Making

    Directory of Open Access Journals (Sweden)

    Ishani Mukherjee

    2015-08-01

    Full Text Available John Kingdon’s Multiple Streams Framework (MSF was articulated in order to better understand how issues entered onto policy agendas, using the concept of policy actors interacting over the course of sequences of events in what he referred to as the “problem”, “policy” and “politics” “streams”. However, it is not a priori certain who the agents are in this process and how they interact with each other. As was common at the time, in his study Kingdon used an undifferentiated concept of a “policy subsystem” to group together and capture the activities of various policy actors involved in this process. However, this article argues that the policy world Kingdon envisioned can be better visualized as one composed of distinct subsets of actors who engage in one specific type of interaction involved in the definition of policy problems: either the articulation of problems, the development of solutions, or their enactment. Rather than involve all subsystem actors, this article argues that three separate sets of actors are involved in these tasks: epistemic communities are engaged in discourses about policy problems; instrument constituencies define policy alternatives and instruments; and advocacy coalitions compete to have their choice of policy alternatives adopted. Using this lens, the article focuses on actor interactions involved both in the agenda-setting activities Kingdon examined as well as in the policy formulation activities following the agenda setting stage upon which Kingdon originally worked. This activity involves the definition of policy goals (both broad and specific, the creation of the means and mechanisms to realize these goals, and the set of bureaucratic, partisan, electoral and other political struggles involved in their acceptance and transformation into action. Like agenda-setting, these activities can best be modeled using a differentiated subsystem approach.

  1. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  2. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  3. FEVER AS KEY SYMPTOM OF ACUTE RESPIRATORY INFECTIONS AND MODERN METHODS OF THERAPY FOR HIGH TEMPERATURE IN CHILDREN

    Directory of Open Access Journals (Sweden)

    O.A. Solntseva

    2010-01-01

    Full Text Available Hyperthermia is the key symptom of acute respiratory infections (ARI. An increase in the body temperature is accompanied with phagocytosis activation, increased interferon synthesis, antibody genesis stimulation, lymphocytes activation and differentiation. Nevertheless, significant hyperthermia may result in my unfavourable consequences. It may particularly cause an exacerbation of chronic diseases. Modern therapy for hyperthermia is, therefore, an important aspect of treating children with ARI. The article outlines the modern approach to treating fever in children, identifies key criteria for selecting a medication. It also contains a case study of applying ibuprofen and data from various trials which verify the rationale for applying ibuprofen in children with hyperthermia that developed in conjunction with ARI.Key words: children, acute respiratory infections, hyperthermia, ibuprofen.(Voprosy sovremennoi pediatrii — Current Pediatrics. 2010;9(5:80-84

  4. Individual Difference Theory and Research: Application to Multinational Coalition Teamwork

    Science.gov (United States)

    2008-04-01

    and negatively related to perfectionism, rigidity, dogmatism, and ethnocentrism (see [15; 16] Hannigan, 1990; see also Ward & Kennedy, 1994). There...was not the key to success here. The personnel that staffed the C3IC were selected to understand and communicate with personnel from a different

  5. COPDESS (Coalition for Publishing Data in the Earth & Space Sciences): An Update on Progress and Next Steps

    Science.gov (United States)

    Lehnert, Kerstin; Hanson, Brooks; Sallans, Andrew; Elger, Kirsten

    2016-04-01

    The Coalition for Publishing Data in the Earth and Space Sciences (http://www.copdess.org/) formed in October 2014 to provide an organizational framework for Earth and space science publishers and data facilities to jointly implement and promote common policies and procedures for the publication and citation of data across Earth Science journals. Since inception, it has worked to develop and promote adoption of data citation standards (e.g. FORCE11 Joint Declaration of Data Citation Principles), integrate community tools and services for greater discovery and adoption (e.g. COPDESS Directory of Repositories, https://copdessdirectory.osf.io/), and connect with related community efforts for greater transparency in research community (e.g. the Transparency and Openness Promotion Guidelines, http://cos.io/top). Following a second COPDESS workshop in Fall 2015, COPDESS is undertaking several concrete steps to increase participation and integration of efforts more deeply into the publishing and data facility workflows and to expand international participation. This talk will focus on details of specific initiatives, collection of feedback, and a call for new members. Specifically, we will present progress on the development of guidelines that aim to standardize publishers' recommended best practices by establishing "Best practices for best practices" that will allow a journal or data facility to tailor these practices to the sub-disciplines that they serve. COPDESS will further work to advance implementation of these best practices through increased outreach to and education of editors and authors. COPDESS plans to offer a Town Hall meeting at the EGU General Assembly as a forum for further information and discussion.

  6. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  7. The coalition to reduce racial and ethnic disparities in cardiovascular disease outcomes (credo): why credo matters to cardiologists.

    Science.gov (United States)

    Yancy, Clyde W; Wang, Tracy Y; Ventura, Hector O; Piña, Ileana L; Vijayaraghavan, Krishnaswami; Ferdinand, Keith C; Hall, Laura Lee

    2011-01-18

    This report reviews the rationale for the American College of Cardiology's Coalition to Reduce Racial and Ethnic Disparities in Cardiovascular Disease Outcomes (credo) and the tools that will be made available to cardiologists and others treating cardiovascular disease (CVD) to better meet the needs of their diverse patient populations. Even as the patient population with CVD grows increasingly diverse in terms of race, ethnicity, age, and sex, many cardiologists and other health care providers are unaware of the negative influence of disparate care on CVD outcomes and do not have the tools needed to improve care and outcomes for patients from different demographic and socioeconomic backgrounds. Reviewed published reports assessed the need for redressing CVD disparities and the evidence concerning interventions that can assist cardiology care providers in improving care and outcomes for diverse CVD patient populations. Evidence points to the effectiveness of performance measure-based quality improvement, provider cultural competency training, team-based care, and patient education as strategies to promote the elimination of disparate CVD care and in turn might lead to better outcomes. credo has launched several initiatives built on these evidence-based principles and will be expanding these tools along with research. credo will provide the CVD treatment community with greater awareness of disparities and tools to help close the gap in care and outcomes for all patient subpopulations. Copyright © 2011 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  8. Improving the validity of quantitative measures in applied linguistics research

    NARCIS (Netherlands)

    Purpura, J.E.; Brown, J.D.; Schoonen, R.

    2015-01-01

    In empirical applied linguistics research it is essential that the key variables are operationalized in a valid and reliable way, and that the scores are treated appropriately, allowing for a proper testing of the hypotheses under investigation. The current article addresses several theoretical and

  9. North Carolina's direct care workforce development journey: the case of the North Carolina New Organizational Vision Award Partner Team.

    Science.gov (United States)

    Brannon, S Diane; Kemper, Peter; Barry, Theresa

    2009-01-01

    Better Jobs Better Care was a five-state direct care workforce demonstration designed to change policy and management practices that influence recruitment and retention of direct care workers, problems that continue to challenge providers. One of the projects, the North Carolina Partner Team, developed a unified approach in which skilled nursing, home care, and assisted living providers could be rewarded for meeting standards of workplace excellence. This case study documents the complex adaptive system agents and processes that coalesced to result in legislation recognizing the North Carolina New Organizational Vision Award. We used a holistic, single-case study design. Qualitative data from project work plans and progress reports as well as notes from interviews with key stakeholders and observation of meetings were coded into a simple rubric consisting of characteristics of complex adaptive systems. Key system agents in the state set the stage for the successful multistakeholder coalition. These included leadership by the North Carolina Department of Health and Human Services and a several year effort to develop a unifying vision for workforce development. Grant resources were used to facilitate both content and process work. Structure was allowed to emerge as needed. The coalition's own development is shown to have changed the context from which it was derived. An inclusive and iterative process produced detailed standards and measures for the voluntary recognition process. With effective facilitation, the interests of the multiple stakeholders coalesced into a policy response that encourages practice changes. Implications for managing change-oriented coalitions are discussed.

  10. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  11. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  12. Applying Landscape Science to Natural Resource Management

    Directory of Open Access Journals (Sweden)

    Guy M. Robinson

    2013-03-01

    Full Text Available This is the introduction to the Ecology and Society special feature on "Applying Landscape Science to Natural Resource Management". Primarily drawing upon examples from Australia, the nine papers in the feature illustrate how landscape science seeks to integrate information from diverse sources to generate management solutions for implementation by individual land managers, communities, and governments at different levels. This introduction refers to the genesis of the feature, briefly outlines the nature and content of landscape science, and then summarizes key features of the nine papers. These are organized into two sections: one deals with inputs from human agents in the landscape, and one with the development of models enabling different management scenarios and environmental changes to be envisaged, understood, and applied to policy development.

  13. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  14. Fuzzification methods of coalitional games with transferable utility

    Czech Academy of Sciences Publication Activity Database

    Mareš, Milan; Vlach, Milan

    2003-01-01

    Roč. 10, č. 18 (2003), s. 81-90 ISSN 1212-074X R&D Projects: GA AV ČR IAA1075301; GA AV ČR KSK1019101; GA AV ČR IAA1075106 Institutional research plan: CEZ:AV0Z1075907 Keywords : cooperative game * fuzzy set * fuzzy quantity Subject RIV: BB - Applied Statistics, Operational Research

  15. Conceptual framework for holistic dialysis management based on key performance indicators.

    Science.gov (United States)

    Liu, Hu-Chen; Itoh, Kenji

    2013-10-01

    This paper develops a theoretical framework of holistic hospital management based on performance indicators that can be applied to dialysis hospitals, clinics or departments in Japan. Selection of a key indicator set and its validity tests were performed primarily by a questionnaire survey to dialysis experts as well as their statements obtained through interviews. The expert questionnaire asked respondents to rate the degree of "usefulness" for each of 66 indicators on a three-point scale (19 responses collected). Applying the theoretical framework, we selected a minimum set of key performance indicators for dialysis management that can be used in the Japanese context. The indicator set comprised 27 indicators and items that will be collected through three surveys: patient satisfaction, employee satisfaction, and safety culture. The indicators were confirmed by expert judgment from viewpoints of face, content and construct validity as well as their usefulness. This paper established a theoretical framework of performance measurement for holistic dialysis management from primary healthcare stakeholders' perspectives. In this framework, performance indicators were largely divided into healthcare outcomes and performance shaping factors. Indicators of the former type may be applied for the detection of operational problems or weaknesses in a dialysis hospital, clinic or department, while latent causes of each problem can be more effectively addressed by the latter type of indicators in terms of process, structure and culture/climate within the organization. © 2013 The Authors. Therapeutic Apheresis and Dialysis © 2013 International Society for Apheresis.

  16. Parametric Human Body Reconstruction Based on Sparse Key Points.

    Science.gov (United States)

    Cheng, Ke-Li; Tong, Ruo-Feng; Tang, Min; Qian, Jing-Ye; Sarkis, Michel

    2016-11-01

    We propose an automatic parametric human body reconstruction algorithm which can efficiently construct a model using a single Kinect sensor. A user needs to stand still in front of the sensor for a couple of seconds to measure the range data. The user's body shape and pose will then be automatically constructed in several seconds. Traditional methods optimize dense correspondences between range data and meshes. In contrast, our proposed scheme relies on sparse key points for the reconstruction. It employs regression to find the corresponding key points between the scanned range data and some annotated training data. We design two kinds of feature descriptors as well as corresponding regression stages to make the regression robust and accurate. Our scheme follows with dense refinement where a pre-factorization method is applied to improve the computational efficiency. Compared with other methods, our scheme achieves similar reconstruction accuracy but significantly reduces runtime.

  17. Libraries and key performance indicators a framework for practitioners

    CERN Document Server

    Appleton, Leo

    2017-01-01

    Libraries and Key Performance Indicators: A Framework for Practitioners explores ways by which libraries across all sectors can demonstrate their value and impact to stakeholders through quality assurance and performance measurement platforms, including library assessment, evaluation methodologies, surveys, and annual reporting. Whilst several different performance measurement tools are considered, the book's main focus is on one tool in particular: Key Performance Indicators (KPIs). KPIs are increasingly being used to measure the performance of library and information services, however, linking KPIs to quality outcomes, such as impact and value can prove very difficult. This book discusses, in detail, the concept of KPIs in the broader context of library assessment and performance measurement. Through reviewing some of the applied theory around using KPIs, along with harvesting examples of current best practices in KPI usage from a variety of different libraries, the book demystifies library KPIs, providing ...

  18. Fuzzy TU games and their classes

    Czech Academy of Sciences Publication Activity Database

    Mareš, Milan

    2001-01-01

    Roč. 7, č. 13 (2001), s. 83-88 ISSN 1212-074X R&D Projects: GA ČR GA402/99/0032 Institutional research plan: AV0Z1075907 Keywords : fuzzy set * coalitional gam * fuzzification of game Subject RIV: BB - Applied Statistics, Operational Research

  19. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.; Ferreira, Luciana C.; Sequeira, Ana M.M.; Meekan, Mark G.; Duarte, Carlos M.; Bailey, Helen; Bailleul, Fred; Bowen, W. Don; Caley, M. Julian; Costa, Daniel P.; Eguí luz, Victor M.; Fossette, Sabrina; Friedlaender, Ari S.; Gales, Nick; Gleiss, Adrian C.; Gunn, John; Harcourt, Rob; Hazen, Elliott L.; Heithaus, Michael R.; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L.; Lowe, Christopher G.; Madsen, Peter T.; Marsh, Helene; Phillips, Richard A.; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A.; Simpfendorfer, Colin A.; Sims, David W.; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N.; Wikelski, Martin; Womble, Jamie N.; Thums, Michele

    2016-01-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  20. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  1. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  2. Towards an Analysis of Review Article in Applied Linguistics: Its Classes, Purposes and Characteristics

    Science.gov (United States)

    Azar, Ali Sorayyaei; Hashim, Azirah

    2014-01-01

    The classes, purposes and characteristics associated with the review article in the field of applied linguistics were analyzed. The data were collected from a randomly selected corpus of thirty two review articles from a discipline-related key journal in applied linguistics. The findings revealed that different sub-genres can be identified within…

  3. Application of the WHO five keys of food safety to improve food ...

    African Journals Online (AJOL)

    Aim: To apply the WHO five keys of food safety in evidence based training programme for food vendors to improve the handling of street food. Methods: A total of 127 food vendors in Accra, the capital city of Ghana were sampled for interviews. Data collection from the vendors focused on (i) food handling practices (ii) ...

  4. Departure into the 21st century

    International Nuclear Information System (INIS)

    Wolf, R.

    1998-01-01

    At its 51st annual meeting, the Association of Industrial Power Companies (VIK) commented upon the items relating to energy and to the environment contained in the coalition agreement of the Social Democratic Party (SPD) and Alliance 90/The Greens, expressing the point of view of industry and trade. In the opinion of the VIK the plans to opt out of nuclear power have not been fully thought out as far as repercussions on the labor market and on energy policy are concerned. Nuclear power must not be given up at the expense of industry engaged in international competition and the jobs provided by industry. Opting out of nuclear power quickly and without indemnification is unacceptable. The VIK regards the labor market effects of any measure planned as the yardstick to be applied to the coalition agreement. Any decision about energy policy must be seen in connection with the deregulation of the electricity and gas markets. The VIK also holds a critical view of the coalition's intention to amend the Power Economy Act adopted only recently. (orig.) [de

  5. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  6. Game Theoretic Analysis of Cooperative Message Forwarding in Opportunistic Mobile Networks.

    Science.gov (United States)

    Pal, Sujata; Saha, Barun Kumar; Misra, Sudip

    2017-12-01

    In cooperative communication, a set of players forming a coalition ensures communal behavior among themselves by helping one another in message forwarding. Opportunistic mobile networks (OMNs) require multihop communications for transferring messages from the source to the destination nodes. However, noncooperative nodes only forward their own messages to others, and drop others' messages upon receiving them. So, the message delivery overhead increases in OMN. For minimizing the overhead and maximizing the delivery rate, we propose two coalition-based cooperative schemes: 1) simple coalition formation (SCF) and 2) overlapping coalition formation (OCF) game. In SCF, we consider the presence of a central information center, whereas OCF is a fully distributed scheme. In SCF, coalitions are disjoint, whereas in OCF, a node may be the member of multiple coalitions at the same time. All nodes in a coalition help each other cooperatively by forwarding group messages to the intermediate or destination nodes. The goal of the nodes is to achieve high success rate in delivering messages. The proposed SCF scheme is cohesive, in which disjoint coalitions always combine to form grand coalition. In OCF, a node reaches a stable grand coalition when all the nodes of the OMN are members of overlapping coalition of the node. No node gains by deviating from the grand coalition in SCF and OCF. Simulation results based on synthetic mobility model and real-life traces show that the message delivery ratio of OMNs increase by up to 67%, as compared to the noncooperative scenario. Moreover, the message overhead ratio using the proposed coalition-based schemes reduces by up to about (1/3)rd of that of the noncooperative communication scheme.

  7. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.

    Science.gov (United States)

    Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B

    2014-09-15

    Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

  8. Key Technologies of the Hydraulic Structures of the Three Gorges Project

    Directory of Open Access Journals (Sweden)

    Xinqiang Niu

    2016-09-01

    Full Text Available To date, the Three Gorges Project is the largest hydro junction in the world. It is the key project for the integrated water resource management and development of the Changjiang River. The technology of the project, with its huge scale and comprehensive benefits, is extremely complicated, and the design difficulty is greater than that of any other hydro project in the world. A series of new design theories and methods have been proposed and applied in the design and research process. Many key technological problems regarding hydraulic structures have been overcome, such as a gravity dam with multi-layer large discharge orifices, a hydropower station of giant generating units, and a giant continual multi-step ship lock with a high water head.

  9. Alternative IT Sourcing Strategies: From the Campus to the Cloud. ECAR Key Findings

    Science.gov (United States)

    Goldstein, Philip J.

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study, "Alternative IT Sourcing Strategies: From the Campus to the Cloud," by Philip J. Goldstein. The study explores a multitude of strategies used by colleges and university information technology organizations to deliver the breadth of technologies…

  10. Improving the Validity of Quantitative Measures in Applied Linguistics Research

    Science.gov (United States)

    Purpura, James E.; Brown, James Dean; Schoonen, Rob

    2015-01-01

    In empirical applied linguistics research it is essential that the key variables are operationalized in a valid and reliable way, and that the scores are treated appropriately, allowing for a proper testing of the hypotheses under investigation. The current article addresses several theoretical and practical issues regarding the use of measurement…

  11. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  12. A brief review on key technologies in the battery management system of electric vehicles

    Science.gov (United States)

    Liu, Kailong; Li, Kang; Peng, Qiao; Zhang, Cheng

    2018-04-01

    Batteries have been widely applied in many high-power applications, such as electric vehicles (EVs) and hybrid electric vehicles, where a suitable battery management system (BMS) is vital in ensuring safe and reliable operation of batteries. This paper aims to give a brief review on several key technologies of BMS, including battery modelling, state estimation and battery charging. First, popular battery types used in EVs are surveyed, followed by the introduction of key technologies used in BMS. Various battery models, including the electric model, thermal model and coupled electro-thermal model are reviewed. Then, battery state estimations for the state of charge, state of health and internal temperature are comprehensively surveyed. Finally, several key and traditional battery charging approaches with associated optimization methods are discussed.

  13. Claims to success: advocacy for the protocol on the rights of women in Africa – solidarity for African women’s rights and the use of information and communication technologies

    NARCIS (Netherlands)

    K. Kemp (Karoline)

    2010-01-01

    textabstractThe goal of this particular research has been to examine the role of information and communication technologies (ICTs) in policy advocacy as applied by civil society. Taking the Solidarity for African Women’s Rights coalition and their work towards the ratification of the Protocol on

  14. Information-theoretic security proof for quantum-key-distribution protocols

    International Nuclear Information System (INIS)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-01-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel

  15. Information-theoretic security proof for quantum-key-distribution protocols

    Science.gov (United States)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-07-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  16. Lethal coalitionary aggression and long-term alliance formation among Yanomamö men.

    Science.gov (United States)

    Macfarlan, Shane J; Walker, Robert S; Flinn, Mark V; Chagnon, Napoleon A

    2014-11-25

    Some cross-cultural evidence suggests lethal coalitionary aggression in humans is the product of residence and descent rules that promote fraternal interest groups, i.e., power groups of coresident males bonded by kinship. As such, human lethal coalitions are hypothesized to be homologous to chimpanzee (Pan troglodytes) border patrols. However, humans demonstrate a unique metagroup social structure in which strategic alliances allow individuals to form coalitions transcending local community boundaries. We test predictions derived from the fraternal interest group and strategic alliance models using lethal coalition data from a lowland South American population, the Yanomamö. Yanomamö men who kill an enemy acquire a special status, termed unokai. We examine the social characteristics of co-unokais or men who jointly kill others. Analyses indicate co-unokais generally are (i) from the same population but from different villages and patrilines, (ii) close age mates, and (iii) maternal half-first cousins. Furthermore, the incident rate for co-unokai killings increases if men are similar in age, from the same population, and from different natal communities. Co-unokais who have killed more times in the past and who are more genetically related to each other have a higher probability of coresidence in adulthood. Last, a relationship exists between lethal coalition formation and marriage exchange. In this population, internal warfare unites multiple communities, and co-unokais strategically form new residential groups and marriage alliances. These results support the strategic alliance model of coalitionary aggression, demonstrate the complexities of human alliance formation, and illuminate key differences in social structure distinguishing humans from other primates.

  17. Applying a realistic evaluation model to occupational safety interventions

    DEFF Research Database (Denmark)

    Pedersen, Louise Møller

    2018-01-01

    Background: Recent literature characterizes occupational safety interventions as complex social activities, applied in complex and dynamic social systems. Hence, the actual outcomes of an intervention will vary, depending on the intervention, the implementation process, context, personal characte......Background: Recent literature characterizes occupational safety interventions as complex social activities, applied in complex and dynamic social systems. Hence, the actual outcomes of an intervention will vary, depending on the intervention, the implementation process, context, personal...... and qualitative methods. This revised model has, however, not been applied in a real life context. Method: The model is applied in a controlled, four-component, integrated behaviour-based and safety culture-based safety intervention study (2008-2010) in a medium-sized wood manufacturing company. The interventions...... involve the company’s safety committee, safety manager, safety groups and 130 workers. Results: The model provides a framework for more valid evidence of what works within injury prevention. Affective commitment and role behaviour among key actors are identified as crucial for the implementation...

  18. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  19. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  20. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  1. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources

    International Nuclear Information System (INIS)

    Li, Hong-Wei; Wang, Shuang; Huang, Jing-Zheng; Chen, Wei; Yin, Zhen-Qiang; Li, Fang-Yi; Zhou, Zheng; Liu, Dong; Zhang, Yang; Guo, Guang-Can; Han, Zheng-Fu; Bao, Wan-Su

    2011-01-01

    It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost of only increasing the quantum bit error rate from 1.3 to 1.4%.

  2. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  3. Productivity through Innovation: Applied Research at Canada's Colleges and Institutes

    Science.gov (United States)

    Association of Canadian Community Colleges, 2011

    2011-01-01

    Applied research at Canada's colleges and institutes has expanded rapidly over the last five years. This report provides an overview of the current context and positions colleges and institutes as key players in Canada's innovation system. The report builds upon findings of previous research and reports on the results of the 2009-2010…

  4. Principles of Logistics Applied to Railway Passenger Transport

    Directory of Open Access Journals (Sweden)

    Vojtek Martin

    2017-01-01

    Full Text Available Main challenge of logistics is delivering right assortment of products in exact amount, to exact place, in exact time, ecologically and for exact price. Logistics deals with freight transport but when the word ‘products’ is changed to ‘passengers’, then many principles can be applied to passenger transport. Railway passenger transport is the key part of passenger transport system, so it is necessary to optimize it on logistics philosophy at first.

  5. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Science.gov (United States)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  6. A model for website analysis and\tconception: the Website Canvas Model applied to\tEldiario.es

    Directory of Open Access Journals (Sweden)

    Carles Sanabre Vives

    2015-11-01

    Full Text Available This article presents the model of ideation and analysis called Website CanvasModel. It allows identifying the key aspects for a website to be successful, and shows how ithas been applied to Eldiario.es. As a result, the key factors prompting the success of thisdigital newspaper have been identified.

  7. Characterizations of the Beta and the Degree Network Power Measure

    NARCIS (Netherlands)

    van den Brink, J.R.; Borm, P.; Hendrickx, R.; Owen, G.

    2008-01-01

    A symmetric network consists of a set of positions and a set of bilateral links between these positions. For every symmetric network we define a cooperative transferable utility game that measures the "power" of each coalition of positions in the network. Applying the Shapley value to this game

  8. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  9. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  10. Multi-party Semi-quantum Key Agreement with Delegating Quantum Computation

    Science.gov (United States)

    Liu, Wen-Jie; Chen, Zhen-Yu; Ji, Sai; Wang, Hai-Bin; Zhang, Jun

    2017-10-01

    A multi-party semi-quantum key agreement (SQKA) protocol based on delegating quantum computation (DQC) model is proposed by taking Bell states as quantum resources. In the proposed protocol, the participants only need the ability of accessing quantum channel and preparing single photons {|0〉, |1〉, |+〉, |-〉}, while the complicated quantum operations, such as the unitary operations and Bell measurement, will be delegated to the remote quantum center. Compared with previous quantum key agreement protocols, this client-server model is more feasible in the early days of the emergence of quantum computers. In order to prevent the attacks from outside eavesdroppers, inner participants and quantum center, two single photon sequences are randomly inserted into Bell states: the first sequence is used to perform the quantum channel detection, while the second is applied to disorder the positions of message qubits, which guarantees the security of the protocol.

  11. Understanding the Key Tenets of Heidegger’s Philosophy for Interpretive Phenomenological Research

    OpenAIRE

    Marcella Horrigan-Kelly; Michelle Millar; Maura Dowling

    2016-01-01

    Martin Heidegger’s phenomenology provides methodological guidance for qualitative researchers seeking to explicate the lived experience of study participants. However, most phenomenological researchers apply his philosophy loosely. This is not surprising because Heidegger’s phenomenological philosophy is challenging and the influence of his philosophy in shaping the conduct of interpretive phenomenological research is broadly debated. This article presents an exploration of Dasein, a key tene...

  12. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  13. Clean Cities Fact Sheet

    Energy Technology Data Exchange (ETDEWEB)

    2004-01-01

    This fact sheet explains the Clean Cities Program and provides contact information for all coalitions and regional offices. It answers key questions such as: What is the Clean Cities Program? What are alternative fuels? How does the Clean Cities Program work? What sort of assistance does Clean Cities offer? What has Clean Cities accomplished? What is Clean Cities International? and Where can I find more information?

  14. Engineering success: Persistence factors of African American doctoral recipients in engineering and applied science

    Science.gov (United States)

    Simon, Tiffany Monique

    The purpose of this qualitative study was to identify factors that influence African Americans to pursue and complete doctoral degrees in engineering and applied science disciplines. Critical race theory (CRT), two models of doctoral student persistence, and graduate student persistence literature guided the conceptual framework of this study. In-depth and focus group interviews were conducted to learn the key factors that positively impacted the persistence of 19 African Americans who earned doctoral degrees in engineering and applied science. The following two factors were found to significantly contribute to the decision to pursue the doctorate: encouragement from others and participation in a research or internship program. Key factors impacting doctoral degree completion included: peer support, faculty adviser support, support from university administrators, and family support. In addition to identifying factors that influenced 19 African Americans to pursue and complete doctoral degrees in engineering and applied science, this study was about the importance of diversity and inclusion of multiple perspectives in education research and scholarship. To this end, the study served to promote and include the expert knowledge of African American doctoral degree recipients in engineering and applied science in the scholarly discourse on the issue of low participation rates of African Americans in engineering and applied science disciplines. Such knowledge will challenge traditional views on this issue and hopefully inspire new ways of addressing and remedying this issue. With African Americans and other minority populations growing at an exponential rate, people of color are quickly becoming the majority in key states across the nation. Therefore, it is imperative that all Americans have an opportunity to develop skills necessary to compete for professional positions in the science and engineering workforce. This mandate is required for the United States to maintain

  15. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  16. Sensitivity analysis approaches applied to systems biology models.

    Science.gov (United States)

    Zi, Z

    2011-11-01

    With the rising application of systems biology, sensitivity analysis methods have been widely applied to study the biological systems, including metabolic networks, signalling pathways and genetic circuits. Sensitivity analysis can provide valuable insights about how robust the biological responses are with respect to the changes of biological parameters and which model inputs are the key factors that affect the model outputs. In addition, sensitivity analysis is valuable for guiding experimental analysis, model reduction and parameter estimation. Local and global sensitivity analysis approaches are the two types of sensitivity analysis that are commonly applied in systems biology. Local sensitivity analysis is a classic method that studies the impact of small perturbations on the model outputs. On the other hand, global sensitivity analysis approaches have been applied to understand how the model outputs are affected by large variations of the model input parameters. In this review, the author introduces the basic concepts of sensitivity analysis approaches applied to systems biology models. Moreover, the author discusses the advantages and disadvantages of different sensitivity analysis methods, how to choose a proper sensitivity analysis approach, the available sensitivity analysis tools for systems biology models and the caveats in the interpretation of sensitivity analysis results.

  17. Trimodernism and Social Sciences: A Note

    Science.gov (United States)

    Snell, Joel C.

    2012-01-01

    The issues of premodern, modern, and postmodern can often confuse the social scientists because so much is drawn from modernism as the foundation of the social methodologies. Briefly, the author would like to differentiate the three modernism philosophies and indicate how a coalition of the three may apply to social sciences.

  18. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  19. Revised and updated recommendations for the establishment of primary stroke centers: a summary statement from the brain attack coalition.

    Science.gov (United States)

    Alberts, Mark J; Latchaw, Richard E; Jagoda, Andy; Wechsler, Lawrence R; Crocco, Todd; George, Mary G; Connolly, E S; Mancini, Barbara; Prudhomme, Stephen; Gress, Daryl; Jensen, Mary E; Bass, Robert; Ruff, Robert; Foell, Kathy; Armonda, Rocco A; Emr, Marian; Warren, Margo; Baranski, Jim; Walker, Michael D

    2011-09-01

    The formation and certification of Primary Stroke Centers has progressed rapidly since the Brain Attack Coalition's original recommendations in 2000. The purpose of this article is to revise and update our recommendations for Primary Stroke Centers to reflect the latest data and experience. We conducted a literature review using MEDLINE and PubMed from March 2000 to January 2011. The review focused on studies that were relevant for acute stroke diagnosis, treatment, and care. Original references as well as meta-analyses and other care guidelines were also reviewed and included if found to be valid and relevant. Levels of evidence were added to reflect current guideline development practices. Based on the literature review and experience at Primary Stroke Centers, the importance of some elements has been further strengthened, and several new areas have been added. These include (1) the importance of acute stroke teams; (2) the importance of Stroke Units with telemetry monitoring; (3) performance of brain imaging with MRI and diffusion-weighted sequences; (4) assessment of cerebral vasculature with MR angiography or CT angiography; (5) cardiac imaging; (6) early initiation of rehabilitation therapies; and (7) certification by an independent body, including a site visit and disease performance measures. Based on the evidence, several elements of Primary Stroke Centers are particularly important for improving the care of patients with an acute stroke. Additional elements focus on imaging of the brain, the cerebral vasculature, and the heart. These new elements may improve the care and outcomes for patients with stroke cared for at a Primary Stroke Center.

  20. Cast Metals Coalition Technology Transfer and Program Management Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Gwyn, Mike

    2009-03-31

    The Cast Metals Coalition (CMC) partnership program was funded to ensure that the results of the Department of Energy's (DOE) metalcasting research and development (R&D) projects are successfully deployed into industry. Specifically, the CMC program coordinated the transfer and deployment of energy saving technologies and process improvements developed under separately funded DOE programs and projects into industry. The transition of these technologies and process improvements is a critical step in the path to realizing actual energy savings. At full deployment, DOE funded metalcasting R&D results are projected to save 55% of the energy used by the industry in 1998. This closely aligns with DOE's current goal of driving a 25% reduction in industrial energy intensity by 2017. In addition to benefiting DOE, these energy savings provide metalcasters with a significant economic advantage. Deployment of already completed R&D project results and those still underway is estimated to return over 500% of the original DOE and industry investment. Energy savings estimates through December 2008 from the Energy-Saving Melting and Revert Reduction Technology (E-SMARRT) portfolio of projects alone are 12 x 1012 BTUs, with a projection of over 50 x 1012 BTUs ten years after program completion. These energy savings and process improvements have been made possible through the unique collaborative structure of the CMC partnership. The CMC team consists of DOE's Office of Industrial Technology, the three leading metalcasting technical societies in the U.S: the American Foundry Society; the North American Die Casting Association; and the Steel Founders Society of America; and the Advanced Technology Institute (ATI), a recognized leader in distributed technology management. CMC provides collaborative leadership to a complex industry composed of approximately 2,100 companies, 80% of which employ less than 100 people, and only 4% of which employ more than 250 people

  1. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  2. Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques

    Directory of Open Access Journals (Sweden)

    Zhihui Chu

    2018-01-01

    Full Text Available Dynamic key-guessing techniques, which exploit the property of AND operation, could improve the differential and linear cryptanalytic results by reducing the number of guessed subkey bits and lead to good cryptanalytic results for SIMON. They have only been applied in differential and linear attacks as far as we know. In this paper, dynamic key-guessing techniques are first introduced in integral cryptanalysis. According to the features of integral cryptanalysis, we extend dynamic key-guessing techniques and get better integral cryptanalysis results than before. As a result, we present integral attacks on 24-round SIMON32, 24-round SIMON48/72, and 25-round SIMON48/96. In terms of the number of attacked rounds, our attack on SIMON32 is better than any previously known attacks, and our attacks on SIMON48 are the same as the best attacks.

  3. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  4. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  5. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  6. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  7. Water security for productive economies : Applying an assessment framework in southern Africa

    NARCIS (Netherlands)

    Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian

    2017-01-01

    Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook

  8. Applied Statistics Using SPSS, STATISTICA, MATLAB and R

    CERN Document Server

    De Sá, Joaquim P Marques

    2007-01-01

    This practical reference provides a comprehensive introduction and tutorial on the main statistical analysis topics, demonstrating their solution with the most common software package. Intended for anyone needing to apply statistical analysis to a large variety of science and enigineering problems, the book explains and shows how to use SPSS, MATLAB, STATISTICA and R for analysis such as data description, statistical inference, classification and regression, factor analysis, survival data and directional statistics. It concisely explains key concepts and methods, illustrated by practical examp

  9. New York State's COSH Movement: A Brief History.

    Science.gov (United States)

    Lax, Michael

    2018-01-01

    Unions, health and safety activists, and professionals came together to create Coalitions for Occupational Safety and Health (COSH groups) in a number of cities across the United States beginning in the 1970s. The COSHes have played an important and unique role in advocating worker health and safety since that time, through activities including technical assistance, training and education, and campaigns on workplace and public policies. In New York State, activist coalitions created eight COSH groups distributed around the state. This paper presents a history of New York's COSHes based on interviews with key participants. The interviews shed light on the origins of the COSH movement in New York, the development and activities of the COSHes, and the organizational trajectory of individual New York COSHes in response to both extra and intraorganizational challenges. Participants' accounts of these issues may be useful for those seeking to sustain the COSH movement.

  10. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  11. 基于网络商盟的信任交易管理机制研究%Research of Trust Transaction Management Mechanism Based on Online Marketing Coalition

    Institute of Scientific and Technical Information of China (English)

    胡润波; 杨德礼; 刁新军

    2009-01-01

    How to build an effective trust transaction mechanism is one of the most important problems in online trading management. Based on analyzing limitations of the existing online trust transaction mechanism, and according to characteristics of online transaction trust problem and business coalition in traditional commerce field, the article proposes a new trust transaction management mechanism on the basis of online marketing coalition. The mechanism makes the online transaction safe by way of prevention beforehand, coordination during the process and punishment afterwards. Three problems can be solved effectively; 1) putting an end to the phenomenon that no one wants to transact with newly registered users; 2) preventing members from changing identity to cheat; 3) reducing the workload of online business platform arbitration. By the behavior analysis between buyers and sellers with the above mechanism, we prove that the strategy of honest trade is the Sub-game Perfect Nash E-quilibrium in repeated game.%如何建立有效的信任交易管理机制是网络交易信任管理中的一个重要问题.在分析现有网络信任交易机制局限性的基础上,根据网络交易信任问题的特点和现实社会中商业联盟的特性,提出一种基于网络商盟的信任交易管理机制,建立事前防范,事中协调,事后惩罚三位一体的欺诈约束机制,保障网络交易的安全性.本研究有效解决三方面问题:1)解决新注册用户难以开展业务的问题;2)有效防止会员通过变换身份进行欺诈;3)降低网络交易平台仲裁的工作量.采用博弈理论分析该机制下的交易方行为,可以证明诚信交易是长期博弈的子博弈完美纳什均衡策略.

  12. Enhancing the tourist attraction visiting process with gamification: key concepts

    Directory of Open Access Journals (Sweden)

    Swacha Jakub

    2017-12-01

    Full Text Available The main purpose of this paper is to describe key gamification techniques that can be applied to enhance the tourist attraction visiting process. The paper is based on the methodology of design patterns; particularly it adopts the definition and classification schemes originally proposed and developed in the context of gamification of work to specify gamification techniques related to various aspects of the tourist attraction visiting process. The main result is the selection of twelve gamification techniques for enhancing the tourist attraction visiting process, four for each of the three phases of the visiting process (before, during and after the visit. The paper shows that gamification techniques can be applied to enhance the tourist attraction visiting process. Implementation of the proposed gamification techniques is supposed to both improve visitor experience and give the tourist attraction managers a tool for boosting interest in less popular exhibitions and events.

  13. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  14. Collaborative testing for key-term definitions under representative conditions: Efficiency costs and no learning benefits.

    Science.gov (United States)

    Wissman, Kathryn T; Rawson, Katherine A

    2018-01-01

    Students are expected to learn key-term definitions across many different grade levels and academic disciplines. Thus, investigating ways to promote understanding of key-term definitions is of critical importance for applied purposes. A recent survey showed that learners report engaging in collaborative practice testing when learning key-term definitions, with outcomes also shedding light on the way in which learners report engaging in collaborative testing in real-world contexts (Wissman & Rawson, 2016, Memory, 24, 223-239). However, no research has directly explored the effectiveness of engaging in collaborative testing under representative conditions. Accordingly, the current research evaluates the costs (with respect to efficiency) and the benefits (with respect to learning) of collaborative testing for key-term definitions under representative conditions. In three experiments (ns = 94, 74, 95), learners individually studied key-term definitions and then completed retrieval practice, which occurred either individually or collaboratively (in dyads). Two days later, all learners completed a final individual test. Results from Experiments 1-2 showed a cost (with respect to efficiency) and no benefit (with respect to learning) of engaging in collaborative testing for key-term definitions. Experiment 3 evaluated a theoretical explanation for why collaborative benefits do not emerge under representative conditions. Collectively, outcomes indicate that collaborative testing versus individual testing is less effective and less efficient when learning key-term definitions under representative conditions.

  15. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  16. Ireland; Second Post-Program Monitoring Discussions; Staff Report; and Press Release

    OpenAIRE

    International Monetary Fund

    2015-01-01

    Ireland’s recovery has strengthened yet political challenges to adjustment appear to have increased. The recovery is led by job creation and investment financed by retained earnings rather than lending. But uncertainties around medium-term prospects are wide given external risks and domestic crisis legacies. Sustaining recovery and rebuilding space for policy maneuver are therefore key policy priorities. However, weak polls for the governing coalition and adjustment fatigue—reflected in wides...

  17. Bringing ideas back in to historical institutionalism to explain endogenous institutional change

    DEFF Research Database (Denmark)

    Carstensen, Martin B.; Schmidt, Vivien

    The problem of how to theorize endogenous institutional change remains the ‘holy grail’ of historical institutionalism. Particularly important advances have been made within scholarship on gradual institutional transformation th at has deployed concepts like institutional ambiguity and interpreta...... in relation to two key issues: Interpretive battles over compliance and enforcement; and the role of ideas in forming, maintaining and changing the coalitions of actors that support a specific institutional setup....

  18. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  19. Can Link Analysis Be Applied to Identify Behavioral Patterns in Train Recorder Data?

    Science.gov (United States)

    Strathie, Ailsa; Walker, Guy H

    2016-03-01

    A proof-of-concept analysis was conducted to establish whether link analysis could be applied to data from on-train recorders to detect patterns of behavior that could act as leading indicators of potential safety issues. On-train data recorders capture data about driving behavior on thousands of routine journeys every day and offer a source of untapped data that could be used to offer insights into human behavior. Data from 17 journeys undertaken by six drivers on the same route over a 16-hr period were analyzed using link analysis, and four key metrics were examined: number of links, network density, diameter, and sociometric status. The results established that link analysis can be usefully applied to data captured from on-vehicle recorders. The four metrics revealed key differences in normal driver behavior. These differences have promising construct validity as leading indicators. Link analysis is one method that could be usefully applied to exploit data routinely gathered by on-vehicle data recorders. It facilitates a proactive approach to safety based on leading indicators, offers a clearer understanding of what constitutes normal driving behavior, and identifies trends at the interface of people and systems, which is currently a key area of strategic risk. These research findings have direct applications in the field of transport data monitoring. They offer a means of automatically detecting patterns in driver behavior that could act as leading indicators of problems during operation and that could be used in the proactive monitoring of driver competence, risk management, and even infrastructure design. © 2015, Human Factors and Ergonomics Society.

  20. The grand coalition's climate policy: retrospective and perspectives

    International Nuclear Information System (INIS)

    Bausch, C.; Gorlach, B.

    2008-01-01

    2007 was a year of exceptional importance for Germany, due to the dual presidency and the decision to declare climate change as one of the key issues for both the G8 and the EU Presidency. Supported by public and media interest, climate change was pushed to the top of the international political agenda, at a critical time in the development of the international climate regime. Germany was able to show profile and leadership in international climate policy and Europe was able to set a political agenda and decide on targets, which have shaped European policies and legislative proposals since then, and will continue to do so into the future. In Germany, the Meseberg programme is the main initiative aiming at the implementation of climate policy, while at the European level the heads of states have been able to agree on the widely discussed climate - energy package. The authors provide an overview of the measures taken and assess them in light of the EU self-imposed political targets