WorldWideScience

Sample records for cryptographic construct called

  1. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  2. Enhanced Matrix Power Function for Cryptographic Primitive Construction

    Directory of Open Access Journals (Sweden)

    Eligijus Sakalauskas

    2018-02-01

    Full Text Available A new enhanced matrix power function (MPF is presented for the construction of cryptographic primitives. According to the definition in previously published papers, an MPF is an action of two matrices powering some base matrix on the left and right. The MPF inversion equations, corresponding to the MPF problem, are derived and have some structural similarity with classical multivariate quadratic (MQ problem equations. Unlike the MQ problem, the MPF problem seems to be more complicated, since its equations are not defined over the field, but are represented as left–right action of two matrices defined over the infinite near-semiring on the matrix defined over the certain infinite, additive, noncommuting semigroup. The main results are the following: (1 the proposition of infinite, nonsymmetric, and noncommuting algebraic structures for the construction of the enhanced MPF, satisfying associativity conditions, which are necessary for cryptographic applications; (2 the proof that MPF inversion is polynomially equivalent to the solution of a certain kind of generalized multivariate quadratic (MQ problem which can be reckoned as hard; (3 the estimation of the effectiveness of direct MPF value computation; and (4 the presentation of preliminary security analysis, the determination of the security parameter, and specification of its secure value. These results allow us to make a conjecture that enhanced MPF can be a candidate one-way function (OWF, since the effective (polynomial-time inversion algorithm for it is not yet known. An example of the application of the proposed MPF for the Key Agreement Protocol (KAP is presented. Since the direct MPF value is computed effectively, the proposed MPF is suitable for the realization of cryptographic protocols in devices with restricted computation resources.

  3. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  4. Lightweight Cryptographic Techniques

    National Research Council Canada - National Science Library

    Yuen, Horace

    2004-01-01

    The objective of this project was to develop new cryptographic techniques, and to modify the important existing ones, for applications to encryption and authentication in energy-constrained sensors...

  5. Cryptographic quantum hashing

    Science.gov (United States)

    Ablayev, F. M.; Vasiliev, A. V.

    2014-02-01

    We present a version of quantum hash functions based on non-binary discrete functions. The proposed quantum procedure is ‘classical-quantum’, that is, it takes a classical bit string as an input and produces a quantum state. The resulting function has the property of a one-way function (pre-image resistance); in addition it has properties analogous to classical cryptographic hash second pre-image resistance and collision resistance. We also show that the proposed function can be naturally used in a quantum digital signature protocol.

  6. Cryptographic quantum hashing

    International Nuclear Information System (INIS)

    Ablayev, F M; Vasiliev, A V

    2014-01-01

    We present a version of quantum hash functions based on non-binary discrete functions. The proposed quantum procedure is ‘classical-quantum’, that is, it takes a classical bit string as an input and produces a quantum state. The resulting function has the property of a one-way function (pre-image resistance); in addition it has properties analogous to classical cryptographic hash second pre-image resistance and collision resistance. We also show that the proposed function can be naturally used in a quantum digital signature protocol. (letter)

  7. Cryptographic Boolean functions and applications

    CERN Document Server

    Cusick, Thomas W

    2009-01-01

    Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles and other sources). This book compiles the key essential information in one easy to use, step-by-step reference. Beginning with the basics of the necessary theory the book goes on to examine more technical topics, some of which are at the frontier of current research.-Serves as a complete resource for the successful design or implementation of cryptographic algorithms or protocols using Boolean functions -Provides engineers and scient...

  8. Elliptic net and its cryptographic application

    Science.gov (United States)

    Muslim, Norliana; Said, Mohamad Rushdan Md

    2017-11-01

    Elliptic net is a generalization of elliptic divisibility sequence and in cryptography field, most cryptographic pairings that are based on elliptic curve such as Tate pairing can be improved by applying elliptic nets algorithm. The elliptic net is constructed by using n dimensional array of values in rational number satisfying nonlinear recurrence relations that arise from elliptic divisibility sequences. The two main properties hold in the recurrence relations are for all positive integers m>n, hm +nhm -n=hm +1hm -1hn2-hn +1hn -1hm2 and hn divides hm whenever n divides m. In this research, we discuss elliptic divisibility sequence associated with elliptic nets based on cryptographic perspective and its possible research direction.

  9. Rationality in the Cryptographic Model

    DEFF Research Database (Denmark)

    Hubacek, Pavel

    This thesis presents results in the field of rational cryptography. In the first part we study the use of cryptographic protocols to avoid mediation and binding commitment when implementing game theoretic equilibrium concepts. First, we concentrate on the limits of cryptographic cheap talk...... to implement correlated equilibria of two-player strategic games in a sequentially rational way. We show that there exist two-player games for which no cryptographic protocol can implement the mediator in a sequentially rational way; that is, without introducing empty threats. In the context of computational...... with appealing economic applications. Our implementation puts forward a notion of cryptographically blinded games that exploits the power of encryption to selectively restrict the information available to players about sampled action profiles, such that these desirable equilibria can be stably achieved...

  10. MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

    DEFF Research Database (Denmark)

    Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian

    2016-01-01

    and cryptographic hash functions is to reconsider and simplify the round function of the Knudsen-Nyberg cipher from 1995. The mapping F(x) := x3 is used as the main component there and is also the main component of our family of proposals called “MiMC”. We study various attack vectors for this construction and give...... a new attack vector that outperforms others in relevant settings. Due to its very low number of multiplications, the design lends itself well to a large class of applications, especially when the depth does not matter but the total number of multiplications in the circuit dominates all aspects...

  11. Cryptographic Primitives with Quasigroup Transformations

    OpenAIRE

    Mileva, Aleksandra

    2010-01-01

    Cryptology is the science of secret communication, which consists of two complementary disciplines: cryptography and cryptanalysis. Cryptography is dealing with design and development of new primitives, algorithms and schemas for data enciphering and deciphering. For many centuries cryptographic technics have been applied in protection of secrecy and authentication in diplomatic, political and military correspondences and communications. Cryptanalysis is dealing with different attacks on c...

  12. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2010-01-01

    functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle...

  13. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  14. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  15. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  16. On another two cryptographic identities in universal Osborn loops

    Directory of Open Access Journals (Sweden)

    T. G. Jaiyéolá

    2010-03-01

    Full Text Available In this study, by establishing an identity for universal Osborn loops, two other identities (of degrees 4 and 6 are deduced from it and they are recognized and recommended for cryptography in a similar spirit in which the cross inverse property (of degree 2 has been used by Keedwell following the fact that it was observed that universal Osborn loops that do not have the 3-power associative property or weaker forms of; inverse property, power associativity and diassociativity to mention a few, will have cycles (even long ones. These identities are found to be cryptographic in nature for universal Osborn loops and thereby called cryptographic identities. They were also found applicable to security patterns, arrangements and networks which the CIP may not be applicable to.

  17. Desirable and undesirable future thoughts call for different scene construction processes.

    Science.gov (United States)

    de Vito, S; Neroni, M A; Gamboz, N; Della Sala, S; Brandimonte, M A

    2015-01-01

    Despite the growing interest in the ability of foreseeing (episodic future thinking), it is still unclear how healthy people construct possible future scenarios. We suggest that different future thoughts require different processes of scene construction. Thirty-five participants were asked to imagine desirable and less desirable future events. Imagining desirable events increased the ease of scene construction, the frequency of life scripts, the number of internal details, and the clarity of sensorial and spatial temporal information. The initial description of general personal knowledge lasted longer in undesirable than in desirable anticipations. Finally, participants were more prone to explicitly indicate autobiographical memory as the main source of their simulations of undesirable episodes, whereas they equally related the simulations of desirable events to autobiographical events or semantic knowledge. These findings show that desirable and undesirable scenarios call for different mechanisms of scene construction. The present study emphasizes that future thinking cannot be considered as a monolithic entity.

  18. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  19. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  20. On Boolean functions with generalized cryptographic properties

    NARCIS (Netherlands)

    Braeken, A.; Nikov, V.S.; Nikova, S.I.; Preneel, B.; Canteaut, A.; Viswanathan, K.

    2004-01-01

    By considering a new metric, we generalize cryptographic properties of Boolean functions such as resiliency and propagation characteristics. These new definitions result in a better understanding of the properties of Boolean functions and provide a better insight in the space defined by this metric.

  1. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  2. Quantum Security of Cryptographic Primitives

    OpenAIRE

    Gagliardoni, Tommaso

    2017-01-01

    We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be natively run on a quantum infrastructure, such as quantum key distribution). Moreover, there exist also hybrid models, where traditional crypto...

  3. A Construction System for CALL Materials from TV News with Captions

    Science.gov (United States)

    Kobayashi, Satoshi; Tanaka, Takashi; Mori, Kazumasa; Nakagawa, Seiichi

    Many language learning materials have been published. In language learning, although repetition training is obviously necessary, it is difficult to maintain the learner's interest/motivation using existing learning materials, because those materials are limited in their scope and contents. In addition, we doubt whether the speech sounds used in most materials are natural in various situations. Nowadays, some TV news programs (CNN, ABC, PBS, NHK, etc.) have closed/open captions corresponding to the announcer's speech. We have developed a system that makes Computer Assisted Language Learning (CALL) materials for both English learning by Japanese and Japanese learning by foreign students from such captioned newscasts. This system computes the synchronization between captions and speech by using HMMs and a forced alignment algorithm. Materials made by the system have following functions: full/partial text caption display, repetition listening, consulting an electronic dictionary, display of the user's/announcer's sound waveform and pitch contour, and automatic construction of a dictation test. Materials have following advantages: materials present polite and natural speech, various and timely topics. Furthermore, the materials have the following possibility: automatic creation of listening/understanding tests, and storage/retrieval of the many materials. In this paper, firstly, we present the organization of the system. Then, we describe results of questionnaires on trial use of the materials. As the result, we got enough accuracy on the synchronization between captions and speech. Speaking totally, we encouraged to research this system.

  4. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... complexity of root extraction, even if the algorithm can choose the "public exponent'' itself. In other words, both the standard and the strong RSA assumption are provably true w.r.t. generic algorithms. The results hold for arbitrary groups, so security w.r.t. generic attacks follows for any cryptographic...... groups. In all cases, security follows from a well de ned complexity assumption (the strong root assumption), without relying on random oracles. A smooth natural number has no big prime factors. The probability, that a random natural number not greater than x has all prime factors smaller than x1/u...

  5. Using Compilers to Enhance Cryptographic Product Development

    Science.gov (United States)

    Bangerter, E.; Barbosa, M.; Bernstein, D.; Damgård, I.; Page, D.; Pagter, J. I.; Sadeghi, A.-R.; Sovio, S.

    Developing high-quality software is hard in the general case, and it is significantly more challenging in the case of cryptographic software. A high degree of new skill and understanding must be learnt and applied without error to avoid vulnerability and inefficiency. This is often beyond the financial, manpower or intellectual resources avail-able. In this paper we present the motivation for the European funded CACE (Computer Aided Cryptography Engineering) project The main objective of CACE is to provide engineers (with limited or no expertise in cryptography) with a toolbox that allows them to generate robust and efficient implementations of cryptographic primitives. We also present some preliminary results already obtained in the early stages of this project, and discuss the relevance of the project as perceived by stakeholders in the mobile device arena.

  6. Cryptographic key generation using handwritten signature

    OpenAIRE

    Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier

    2006-01-01

    M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...

  7. Generating cryptographic keys by radioactive decays

    International Nuclear Information System (INIS)

    Grupen, Claus; Maurer, Ingo; Schmidt, Dieter; Smolik, Ludek

    2001-01-01

    We are presenting a new method for the generation of statistically genuine random bitstream with very high frequency which can be employed for cryptographic purposes. The method uses the feature of statistically unpredictable radioactive decays as the source of randomness. The measured quantity is the time distance between the responses of a small ionisation chamber due to the recording of ionising decay products. This time measurement is converted into states representing 0o r 1. The data generated in our experiment successfully passed FIPS PUB 140-1 and die hard statistical tests. For the simulation of systematic effects Monte Carlo techniques were used

  8. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  9. The Work Calls for Men: The Social Construction of Professionalism and Professional Education for Librarianship

    Science.gov (United States)

    Stauffer, Suzanne M.

    2016-01-01

    The leaders of the library profession in the United States in the 19th century were white, middle-class, college-educated men. They attempted to construct librarianship in the United States as an equivalent profession to the other white, masculine professions of their day. They also created education for librarianship in the same mold. They…

  10. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  11. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  12. Cryptographic Trust Management Requirements Specification: Version 1.1

    Energy Technology Data Exchange (ETDEWEB)

    Edgar, Thomas W.

    2009-09-30

    The Cryptographic Trust Management (CTM) Project is being developed for Department of Energy, OE-10 by the Pacific Northwest National Laboratory (PNNL). It is a component project of the NSTB Control Systems Security R&D Program.

  13. Multi-biometrics based cryptographic key regeneration scheme

    OpenAIRE

    Kanade , Sanjay Ganesh; Petrovska-Delacrétaz , Dijana; Dorizzi , Bernadette

    2009-01-01

    International audience; Biometrics lack revocability and privacy while cryptography cannot detect the user's identity. By obtaining cryptographic keys using biometrics, one can achieve the properties such as revocability, assurance about user's identity, and privacy. In this paper, we propose a multi-biometric based cryptographic key regeneration scheme. Since left and right irises of a person are uncorrelated, we treat them as two independent biometrics and combine in our system. We propose ...

  14. Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.

    Science.gov (United States)

    Alharbi, Abdullah; Armstrong, Darren; Alharbi, Somayah; Shahrjerdi, Davood

    2017-12-26

    Physically unclonable cryptographic primitives are promising for securing the rapidly growing number of electronic devices. Here, we introduce physically unclonable primitives from layered molybdenum disulfide (MoS 2 ) by leveraging the natural randomness of their island growth during chemical vapor deposition (CVD). We synthesize a MoS 2 monolayer film covered with speckles of multilayer islands, where the growth process is engineered for an optimal speckle density. Using the Clark-Evans test, we confirm that the distribution of islands on the film exhibits complete spatial randomness, hence indicating the growth of multilayer speckles is a spatial Poisson process. Such a property is highly desirable for constructing unpredictable cryptographic primitives. The security primitive is an array of 2048 pixels fabricated from this film. The complex structure of the pixels makes the physical duplication of the array impossible (i.e., physically unclonable). A unique optical response is generated by applying an optical stimulus to the structure. The basis for this unique response is the dependence of the photoemission on the number of MoS 2 layers, which by design is random throughout the film. Using a threshold value for the photoemission, we convert the optical response into binary cryptographic keys. We show that the proper selection of this threshold is crucial for maximizing combination randomness and that the optimal value of the threshold is linked directly to the growth process. This study reveals an opportunity for generating robust and versatile security primitives from layered transition metal dichalcogenides.

  15. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes

    Science.gov (United States)

    Hu, Zhaoying; Comeras, Jose Miguel M. Lobez; Park, Hongsik; Tang, Jianshi; Afzali, Ali; Tulevski, George S.; Hannon, James B.; Liehr, Michael; Han, Shu-Jen

    2016-06-01

    Information security underpins many aspects of modern society. However, silicon chips are vulnerable to hazards such as counterfeiting, tampering and information leakage through side-channel attacks (for example, by measuring power consumption, timing or electromagnetic radiation). Single-walled carbon nanotubes are a potential replacement for silicon as the channel material of transistors due to their superb electrical properties and intrinsic ultrathin body, but problems such as limited semiconducting purity and non-ideal assembly still need to be addressed before they can deliver high-performance electronics. Here, we show that by using these inherent imperfections, an unclonable electronic random structure can be constructed at low cost from carbon nanotubes. The nanotubes are self-assembled into patterned HfO2 trenches using ion-exchange chemistry, and the width of the trench is optimized to maximize the randomness of the nanotube placement. With this approach, two-dimensional (2D) random bit arrays are created that can offer ternary-bit architecture by determining the connection yield and switching type of the nanotube devices. As a result, our cryptographic keys provide a significantly higher level of security than conventional binary-bit architecture with the same key size.

  16. Affine Equivalence and Constructions of Cryptographically Strong Boolean Functions

    Science.gov (United States)

    2013-09-01

    Math. Dissertation Supervisor Jon T. Butler Distinguished Professor Department of Elec. and Comp. Eng. David R. Canright Associate Professor...Linear structures in blockciphers,” in Advances in Cryptology, EU- ROCRYPT’87, ser. Lecture Notes in Computer Science, D. Chaum and W. L. Price, Eds

  17. A Construction of Boolean Functions with Good Cryptographic Properties

    Science.gov (United States)

    2014-01-01

    be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT...2008, LNCS 5350, Springer–Verlag, 2008, pp. 425–440. [10] C. Carlet and K. Feng, “An Infinite Class of Balanced Vectorial Boolean Functions with Optimum

  18. On Cryptographic Information Security in Cloud Infrastructures: PKI and IBE Methods

    Directory of Open Access Journals (Sweden)

    Konstantin Grigorevich Kogos

    2014-05-01

    Full Text Available The application of cryptographic security methods in cloud infrastructure information security is analyzed. The cryptographic problems in cloudy infrastructures are chosen; the appropriate protocols are investigated; the appropriate mathematical problems are examined.

  19. Memory and the Construction of Perseption toward Magic Call in the novel The First Phone Call From Heaven by Mitch Albom

    Directory of Open Access Journals (Sweden)

    Rosmah Tami

    2016-06-01

    Full Text Available Artikel ini bertujuan untuk mengungkapkan persepsi penerima telepon magis dari surga tentang kebenaran sebuah peristiwa magis dalam novel The First Phone Call from Heaven karya Mitch Albom. Novel ini dianggap menggunakan format realisme magis yang mencampurkan antara kenyataan dan fantasi. Pergerakan persepsi karakter novel dari tidak mempercayainya sebagai kebenaran menjadi sebagai kebenaran yang mutlak menjadi fokus penelitian ini. Permasalahan yang diangkat dalam penelitian ini ditelusuri dengan menggunakan kerangka teori yang dikemukakan oleh Linda Hutcheon tentang representasikan masa lalu dalam narasi. Penelitian ini menemukan bahwa penerimaan tokoh dalam novel terhadap kejadian magis yang tidak dapat dipercaya menjadi sebuah kemutlakan yang tak terbantahkan melalui proses dialektika yang logis melalui ingatan masa lalu yang kemudian membangkitkan perasaan tokoh. Ketidakrasionalan suatu peristiwa dapat dirasionalkan dan diterima oleh akal dengan menampilkan masa lalu melalui ingatan tokoh. Ingatan memancing sentimental sehingga peristiwa yang rasional dapat diterima karena dukungan dari domain rasa bukan nalar. Sentimentalitas adalah strategi dalam narasi untuk mengaburkan antara real dan yang tidak real.

  20. Modelling Cryptographic Keys in Dynamic Epistemic Logic with DEMO

    NARCIS (Netherlands)

    H. van Ditmarsch (Hans); D.J.N. van Eijck (Jan); F.A.G. Sietsma (Floor); S.E. Simon (Sunil); not CWI et al; J.B. Perez; not CWI et al

    2012-01-01

    textabstractIt is far from obvious to find logical counterparts to cryptographic protocol primitives. In logic, a common assumption is that agents are perfectly rational and have no computational limitations. This creates a dilemma. If one merely abstracts from computational aspects, protocols

  1. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  2. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  3. 75 FR 52798 - State-07, Cryptographic Clearance Records

    Science.gov (United States)

    2010-08-27

    ... Information Programs and Services, A/GIS/ IPS, Department of State, SA-2, 515 22nd Street, NW., Washington, DC... Department of State and Agency for International Development who have applied for cryptographic clearances as... that apply to all of its Privacy Act systems of records. These notices appear in the form of a...

  4. The Cryptographic Implications of the LinkedIn Data Breach

    OpenAIRE

    Gune, Aditya

    2017-01-01

    Data security and personal privacy are difficult to maintain in the Internet age. In 2012, professional networking site LinkedIn suffered a breach, compromising the login of over 100 million accounts. The passwords were cracked and sold online, exposing the authentication credentials millions of users. This manuscript dissects the cryptographic failures implicated in the breach, and explores more secure methods of storing passwords.

  5. SPONGENT: The Design Space of Lightweight Cryptographic Hashing

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knezevic, Miroslav; Leander, Gregor

    2013-01-01

    construction instantiated with present-type permutations. The resulting family of hash functions is called spongent. We propose 13 spongent variants--or different levels of collision and (second) preimage resistance as well as for various implementation constraints. For each of them, we provide several ASIC...

  6. Multi-operation cryptographic engine: VLSI design and implementation

    International Nuclear Information System (INIS)

    Selimis, George; Koufopavlou, Odysseas

    2005-01-01

    The environment of smart card lacks of system resources but the commercial and economic transactions via smart cards demand the use of certificated and secure cryptographic methods. In this paper a cryptographic approach in hardware for smart cards is proposed. The proposed system supports two basic operations of cryptography, authentication and encryption. The basic component of system is the one round of DES algorithm which supports the DES, Triple DES and the ANSI X9.17 standards. The proposed system is efficient in terms of area resources and techniques for low power consumption have applied. Due to the fact that the system is for smart card applications the overall throughput outperforms the typical smart card throughput standards

  7. NESSIE: A European Approach to Evaluate Cryptographic Algorithms

    OpenAIRE

    Preneel, Bart

    2002-01-01

    The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. These primitives will offer a higher security level than existing primitives, and/or will offer a higher confidence level, built up by an open evaluation process. Moreover, they should be better suited for the constraints of future hardware and software environments. In order to reach this goal, the project has launche...

  8. Analysis and improvement for the performance of Baptista's cryptographic scheme

    International Nuclear Information System (INIS)

    Wei Jun; Liao Xiaofeng; Wong, K.W.; Zhou Tsing; Deng Yigui

    2006-01-01

    Based on Baptista's chaotic cryptosystem, we propose a secure and robust chaotic cryptographic scheme after investigating the problems found in this cryptosystem as well as its variants. In this proposed scheme, a subkey array generated from the key and the plaintext is adopted to enhance the security. Some methods are introduced to increase the efficiency. Theoretical analyses and numerical simulations indicate that the proposed scheme is secure and efficient for practical use

  9. Constructing a psychological coping profile in the call centre environment: Wellness-related dispositions in relation to resiliency-related behavioural capacities

    Directory of Open Access Journals (Sweden)

    Nisha Harry

    2015-08-01

    Full Text Available Orientation: The context of this research is the coping and wellness of call centre agents in a characteristically high-stress work environment. Research purpose: The purpose of the study was to construct a psychological coping profile by investigating the overall relationship between individuals’ wellness-related dispositional attributes and their resiliency-related behavioural capacities. Motivation of the study: It is important that coping in the call centre environment be understood in light of the complexity of the challenges that call centre agents experience in terms of their wellbeing. Research design, approach and method: A quantitative cross-sectional survey approach was followed, using a non-probability purposive sample (N = 409 comprising predominantly early career, permanently employed black females in call centres in Africa. Main findings: A canonical correlation analysis indicated a significant overall relationship between the wellness-related constructs (sense of coherence, emotional intelligence and burnout and the resiliency-related constructs (career adaptability and hardiness. Structural equation modelling indicated that managing own emotions and cynicism contributed significantly to explaining the participants’ resiliency-related behavioural capacities (hardicommitment and hardi-control. Practical/managerial implications: Enhancing call centre agents’ emotional intelligence and lowering cynicism will increase resiliency-related capacities, such as sense of control and commitment, and will significantly increase the resiliency and capacity of call centre agents to cope with pressure, which can lead to positive work attitudes. Contribution/value-add: The findings may provide valuable pointers for the design of wellness intervention practices and could potentially add to the body of knowledge concerned with employee wellness in call centres.

  10. IMPLEMENTATION OF NEURAL - CRYPTOGRAPHIC SYSTEM USING FPGA

    Directory of Open Access Journals (Sweden)

    KARAM M. Z. OTHMAN

    2011-08-01

    Full Text Available Modern cryptography techniques are virtually unbreakable. As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. The design of the cryptography system is a conventional cryptography that uses one key for encryption and decryption process. The chosen cryptography algorithm is stream cipher algorithm that encrypt one bit at a time. The central problem in the stream-cipher cryptography is the difficulty of generating a long unpredictable sequence of binary signals from short and random key. Pseudo random number generators (PRNG have been widely used to construct this key sequence. The pseudo random number generator was designed using the Artificial Neural Networks (ANN. The Artificial Neural Networks (ANN providing the required nonlinearity properties that increases the randomness statistical properties of the pseudo random generator. The learning algorithm of this neural network is backpropagation learning algorithm. The learning process was done by software program in Matlab (software implementation to get the efficient weights. Then, the learned neural network was implemented using field programmable gate array (FPGA.

  11. The construction of work-life balance: the experience of black employees in a call-centre environment

    OpenAIRE

    Potgieter, Sónia C.B.; Barnard, Antoni

    2010-01-01

    ORIENTATION: Work-life balance, as a crucial aspect of employee and organisational wellness, remains an interesting field of research, especially due to the changing demographic employee profile. RESEARCH PURPOSE: The objective of the study was to explore Black employees' construction of work-life balance in a customer care environment. MOTIVATION FOR THE STUDY: The conceptual debate regarding the construct of work-life balance in general as well as limited qualitative research with regard to...

  12. An adaptive cryptographic accelerator for network storage security on dynamically reconfigurable platform

    Science.gov (United States)

    Tang, Li; Liu, Jing-Ning; Feng, Dan; Tong, Wei

    2008-12-01

    Existing security solutions in network storage environment perform poorly because cryptographic operations (encryption and decryption) implemented in software can dramatically reduce system performance. In this paper we propose a cryptographic hardware accelerator on dynamically reconfigurable platform for the security of high performance network storage system. We employ a dynamic reconfigurable platform based on a FPGA to implement a PowerPCbased embedded system, which executes cryptographic algorithms. To reduce the reconfiguration latency, we apply prefetch scheduling. Moreover, the processing elements could be dynamically configured to support different cryptographic algorithms according to the request received by the accelerator. In the experiment, we have implemented AES (Rijndael) and 3DES cryptographic algorithms in the reconfigurable accelerator. Our proposed reconfigurable cryptographic accelerator could dramatically increase the performance comparing with the traditional software-based network storage systems.

  13. The construction of work–life balance: The experience of Black employees in a call-centre environment

    Directory of Open Access Journals (Sweden)

    Sonia C.B. Potgieter

    2010-08-01

    Research purpose: The objective of the study was to explore Black employees’ construction of work–life balance in a customer care environment. Motivation for the study: The conceptual debate regarding the construct of work–life balance in general as well as limited qualitative research with regard to Black employees’ experience of work–life balance in a South African context motivated the study. Research design, approach and method: This qualitative study was designed from an interpretivist perspective. Ten employees, selected through purposeful sampling, participated in the study. Data was gathered through in-depth interviews and grounded theory was applied during data analysis. Main findings: The grounded theory analysis of the data yielded six themes central to participants’ construction of work–life balance. The findings suggest that work–life balance is conceptualised as a continuous, subjective and holistic valuation of satisfaction derived from multiple roles in relation to the importance to the individual at a given point in time. Practical/managerial implications: Findings provide valuable managerial information to guide suitable strategies enhancing the work–life balance experience and by implication employees’ general wellbeing, job satisfaction and commitment. Contributions/value-add: This study contributes to the evolving body of knowledge with regard to work–life balance and provides a unique context-specific perspective to the conceptual understanding of the construct.

  14. A brief history of cryptology and cryptographic algorithms

    CERN Document Server

    Dooley, John F

    2013-01-01

    The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to final

  15. Cryptographic pseudo-random sequence from the spatial chaotic map

    International Nuclear Information System (INIS)

    Sun Fuyan; Liu Shutang

    2009-01-01

    A scheme for pseudo-random binary sequence generation based on the spatial chaotic map is proposed. In order to face the challenge of using the proposed PRBS in cryptography, the proposed PRBS is subjected to statistical tests which are the well-known FIPS-140-1 in the area of cryptography, and correlation properties of the proposed sequences are investigated. The proposed PRBS successfully passes all these tests. Results of statistical testing of the sequences are found encouraging. The results of statistical tests suggest strong candidature for cryptographic applications.

  16. The construction of work–life balance: The experience of Black employees in a call-centre environment

    Directory of Open Access Journals (Sweden)

    Sonia C.B. Potgieter

    2010-03-01

    Full Text Available Orientation: Work–life balance, as a crucial aspect of employee and organisational wellness, remains an interesting field of research, especially due to the changing demographic employee profile.Research purpose: The objective of the study was to explore Black employees’ construction of work–life balance in a customer care environment.Motivation for the study: The conceptual debate regarding the construct of work–life balance in general as well as limited qualitative research with regard to Black employees’ experience of work–life balance in a South African context motivated the study.Research design, approach and method: This qualitative study was designed from an interpretivist perspective. Ten employees, selected through purposeful sampling, participated in the study. Data was gathered through in-depth interviews and grounded theory was applied during data analysis.Main findings: The grounded theory analysis of the data yielded six themes central to participants’ construction of work–life balance. The findings suggest that work–life balance is conceptualised as a continuous, subjective and holistic valuation of satisfaction derived from multiple roles in relation to the importance to the individual at a given point in time.Practical/managerial implications: Findings provide valuable managerial information to guide suitable strategies enhancing the work–life balance experience and by implication employees’ general wellbeing, job satisfaction and commitment.Contributions/value-add: This study contributes to the evolving body of knowledge with regard to work–life balance and provides a unique context-specific perspective to the conceptual understanding of the construct.

  17. Designing an ASIP for cryptographic pairings over Barreto-Naehrig curves

    NARCIS (Netherlands)

    Kammler, D.; Zhang, D.; Schwabe, P.; Scharwaechter, H.; Langenberg, M.; Auras, D.; Ascheid, G.; Mathar, R.; Clavier, C.; Gaj, K.

    2009-01-01

    This paper presents a design-space exploration of an application-specific instruction-set processor (ASIP) for the computation of various cryptographic pairings over Barreto-Naehrig curves (BN curves). Cryptographic pairings are based on elliptic curves over finite fields—in the case of BN curves a

  18. sPECTRA: a Precise framEwork for analyzing CrypTographic vulneRabilities in Android apps

    OpenAIRE

    Gajrani, J.; Tripathi, M.; Laxmi, V.; Gaur, M. S.; Conti, M.; Rajarajan, M.

    2017-01-01

    The majority of Android applications (apps) deals with user's personal data. Users trust these apps and allow them to access all sensitive data. Cryptography, when employed in an appropriate way, can be used to prevent misuse of data. Unfortunately, cryptographic libraries also include vulnerable cryptographic services. Since Android app developers may not be cryptographic experts, this makes apps become the target of various attacks due to cryptographic vulnerabilities. In this work, we pres...

  19. Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives

    Directory of Open Access Journals (Sweden)

    S. Sree Vivek

    2016-11-01

    Full Text Available Signcryption is a cryptographic primitive which offers the functionality of both digital signature and encryption with lower combined computational cost. On the other hand, commitment scheme allows an entity to commit to a value, where the entity reveals the committed value later during a decommit phase. In this paper, we explore the connection between commitment schemes, public key encryption, digital signatures and signcryption. We establish formal relationship between commitment and the other primitives. Our main result is that we show signcryption can be used as a commitment scheme with appropriate security notions. We show that if the underlying signcryption scheme is IND-CCA2 secure, then the hiding property of the commitment scheme is satisfied. Similarly, we show that if the underlying signcryption scheme is unforgeable, then the relaxed biding property of the commitment scheme is satisfied. Moreover, we prove that if the underlying signcryption scheme is NM-CCA2, then the commitment scheme is non-malleable.

  20. Cryptographic Key Management in Delay Tolerant Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Sofia Anna Menesidou

    2017-06-01

    Full Text Available Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a security initialization, (b key establishment, and (c key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research.

  1. Analysis and Implementation of Cryptographic Hash Functions in Programmable Logic Devices

    Directory of Open Access Journals (Sweden)

    Tautvydas Brukštus

    2016-06-01

    Full Text Available In this day’s world, more and more focused on data pro-tection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryp-tographic hash function. In this article has been selected the SHA-256 cryptographic hash function to implement and explore, based on fact that it is now a popular and safe. SHA-256 cryp-tographic function did not find any theoretical gaps or conflict situations. Also SHA-256 cryptographic hash function used cryptographic currencies. Currently cryptographic currency is popular and their value is high. For the measurements have been chosen programmable logic integrated circuits as they less effi-ciency then ASIC. We chose Altera Corporation produced prog-rammable logic integrated circuits. Counting speed will be inves-tigated by three programmable logic integrated circuit. We will use programmable logic integrated circuits belong to the same family, but different generations. Each programmable logic integ-rated circuit made using different dimension technology. Choo-sing these programmable logic integrated circuits: EP3C16, EP4CE115 and 5CSEMA5F31. To compare calculations perfor-mances parameters are provided in the tables and graphs. Re-search show the calculation speed and stability of different prog-rammable logic circuits.

  2. “Robots in Space” Multiagent Problem: Complexity, Information and Cryptographic Aspects

    Directory of Open Access Journals (Sweden)

    A. Yu. Bernstein

    2013-01-01

    Full Text Available We study a multiagent algorithmic problem that we call Robot in Space (RinS: There are n ≥ 2 autonomous robots, that need to agree without outside interference on distribution of shelters, so that straight pathes to the shelters will not intersect. The problem is closely related to the assignment problem in Graph Theory, to the convex hull problem in Combinatorial Geometry, or to the path-planning problem in Artificial Intelligence. Our algorithm grew up from a local search solution of the problem suggested by E.W. Dijkstra. We present a multiagent anonymous and scalable algorithm (protocol solving the problem, give an upper bound for the algorithm, prove (manually its correctness, and examine two communication aspects of the RinS problem — the informational and cryptographic. We proved that (1 there is no protocol that solves the RinS, which transfers a bounded number of bits, and (2 suggested the protocol that allows robots to check whether their paths intersect, without revealing additional information about their relative positions (with respect to shelters. The present paper continues the research presented in Mars Robot Puzzle (a Multiagent Approach to the Dijkstra Problem (by E.V. Bodin, N.O. Garanina, and N.V. Shilov, published in Modeling and analysis of information systems, 18(2, 2011.

  3. BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-12-01

    Full Text Available With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI as a distributed public ledger is also briefly described.

  4. A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-Box Matrix

    OpenAIRE

    Subhranil Som; Soumasree Banerjee

    2014-01-01

    In this paper a symmetric key cryptographic algorithm named as “A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-box Matrix“ is proposed. Secret sharing is a technique by which any information can be break down into small pieces. The secret can be reconstructed only when a sufficient number of pieces of shares are combined together; individual shares are of no use on their own. Traditional secret sharing scheme possesses high computational ...

  5. Automated detection and classification of cryptographic algorithms in binary programs through machine learning

    OpenAIRE

    Hosfelt, Diane Duros

    2015-01-01

    Threats from the internet, particularly malicious software (i.e., malware) often use cryptographic algorithms to disguise their actions and even to take control of a victim's system (as in the case of ransomware). Malware and other threats proliferate too quickly for the time-consuming traditional methods of binary analysis to be effective. By automating detection and classification of cryptographic algorithms, we can speed program analysis and more efficiently combat malware. This thesis wil...

  6. Low-power cryptographic coprocessor for autonomous wireless sensor networks

    Science.gov (United States)

    Olszyna, Jakub; Winiecki, Wiesław

    2013-10-01

    The concept of autonomous wireless sensor networks involves energy harvesting, as well as effective management of system resources. Public-key cryptography (PKC) offers the advantage of elegant key agreement schemes with which a secret key can be securely established over unsecure channels. In addition to solving the key management problem, the other major application of PKC is digital signatures, with which non-repudiation of messages exchanges can be achieved. The motivation for studying low-power and area efficient modular arithmetic algorithms comes from enabling public-key security for low-power devices that can perform under constrained environment like autonomous wireless sensor networks. This paper presents a cryptographic coprocessor tailored to the autonomous wireless sensor networks constraints. Such hardware circuit is aimed to support the implementation of different public-key cryptosystems based on modular arithmetic in GF(p) and GF(2m). Key components of the coprocessor are described as GEZEL models and can be easily transformed to VHDL and implemented in hardware.

  7. Cryptographically supported NFC tags in medication for better inpatient safety.

    Science.gov (United States)

    Özcanhan, Mehmet Hilal; Dalkılıç, Gökhan; Utku, Semih

    2014-08-01

    Reliable sources report that errors in drug administration are increasing the number of harmed or killed inpatients, during healthcare. This development is in contradiction to patient safety norms. A correctly designed hospital-wide ubiquitous system, using advanced inpatient identification and matching techniques, should provide correct medicine and dosage at the right time. Researchers are still making grouping proof protocol proposals based on the EPC Global Class 1 Generation 2 ver. 1.2 standard tags, for drug administration. Analyses show that such protocols make medication unsecure and hence fail to guarantee inpatient safety. Thus, the original goal of patient safety still remains. In this paper, a very recent proposal (EKATE) upgraded by a cryptographic function is shown to fall short of expectations. Then, an alternative proposal IMS-NFC which uses a more suitable and newer technology; namely Near Field Communication (NFC), is described. The proposed protocol has the additional support of stronger security primitives and it is compliant to ISO communication and security standards. Unlike previous works, the proposal is a complete ubiquitous system that guarantees full patient safety; and it is based on off-the-shelf, new technology products available in every corner of the world. To prove the claims the performance, cost, security and scope of IMS-NFC are compared with previous proposals. Evaluation shows that the proposed system has stronger security, increased patient safety and equal efficiency, at little extra cost.

  8. Cryptographically Secure Multiparty Computation and Distributed Auctions Using Homomorphic Encryption

    Directory of Open Access Journals (Sweden)

    Anunay Kulshrestha

    2017-12-01

    Full Text Available We introduce a robust framework that allows for cryptographically secure multiparty computations, such as distributed private value auctions. The security is guaranteed by two-sided authentication of all network connections, homomorphically encrypted bids, and the publication of zero-knowledge proofs of every computation. This also allows a non-participant verifier to verify the result of any such computation using only the information broadcasted on the network by each individual bidder. Building on previous work on such systems, we design and implement an extensible framework that puts the described ideas to practice. Apart from the actual implementation of the framework, our biggest contribution is the level of protection we are able to guarantee from attacks described in previous work. In order to provide guidance to users of the library, we analyze the use of zero knowledge proofs in ensuring the correct behavior of each node in a computation. We also describe the usage of the library to perform a private-value distributed auction, as well as the other challenges in implementing the protocol, such as auction registration and certificate distribution. Finally, we provide performance statistics on our implementation of the auction.

  9. Construction of a combinatorial pipeline using two somatic variant  calling  methods  for whole exome sequence data of gastric cancer.

    Science.gov (United States)

    Kohmoto, Tomohiro; Masuda, Kiyoshi; Naruto, Takuya; Tange, Shoichiro; Shoda, Katsutoshi; Hamada, Junichi; Saito, Masako; Ichikawa, Daisuke; Tajima, Atsushi; Otsuji, Eigo; Imoto, Issei

    2017-01-01

    High-throughput next-generation sequencing is a powerful tool to identify the genotypic landscapes of somatic variants and therapeutic targets in various cancers including gastric cancer, forming the basis for personalized medicine in the clinical setting. Although the advent of many computational algorithms leads to higher accuracy in somatic variant calling, no standard method exists due to the limitations of each method. Here, we constructed a new pipeline. We combined two different somatic variant callers with different algorithms, Strelka and VarScan 2, and evaluated performance using whole exome sequencing data obtained from 19 Japanese cases with gastric cancer (GC); then, we characterized these tumors based on identified driver molecular alterations. More single nucleotide variants (SNVs) and small insertions/deletions were detected by Strelka and VarScan 2, respectively. SNVs detected by both tools showed higher accuracy for estimating somatic variants compared with those detected by only one of the two tools and accurately showed the mutation signature and mutations of driver genes reported for GC. Our combinatorial pipeline may have an advantage in detection of somatic mutations in GC and may be useful for further genomic characterization of Japanese patients with GC to improve the efficacy of GC treatments. J. Med. Invest. 64: 233-240, August, 2017.

  10. Secure method for biometric-based recognition with integrated cryptographic functions.

    Science.gov (United States)

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  11. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  12. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    Science.gov (United States)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  13. Calle Blanco

    Directory of Open Access Journals (Sweden)

    Gonzalo Cerda Brintrup

    1988-06-01

    Full Text Available Importante arteria, que comunica el sector del puerto con la plaza. Las más imponentes construcciones se sucedían de un modo continuo, encaramándose a ambos lados de la empinada calle. Antes del gran incendio de 1936 grandes casonas de madera destacaban en calle Irarrázabal y en la esquina de ésta con calle Blanco, la más hermosa construcción pertenecía a don Alberto Oyarzún y la casa vecina hacia Blanco era de don Mateo Miserda, limitada por arriba con la casa de don Augusto Van Der Steldt y ésta era seguida de la casa de don David Barrientos provista de cuatro cúpulas en las esquinas y de un amplio corredor en el frontis. Todas estas construcciones de madera fueron destruidas en el gran incendio de 1936.

  14. Analysis of cryptographic mechanisms used in ransomware CryptXXX v3

    Directory of Open Access Journals (Sweden)

    Michał Glet

    2016-12-01

    Full Text Available The main purpose of this paper was to analysis how malicious software is using cryptographic mechanisms. Reverse engineering were applied in order to discover mechanisms used in ransomware CryptXXX v3. At the end were given some useful advices how to improve CryptXXX.[b]Keyword:[/b] ransomware, software engineering, reverse engineering, RC4, RSA, malicious software

  15. A novel, privacy-preserving cryptographic approach for sharing sequencing data

    Science.gov (United States)

    Cassa, Christopher A; Miller, Rachel A; Mandl, Kenneth D

    2013-01-01

    Objective DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords. Materials and methods This novel encryption scheme cryptographically protects participant sequence data using a shared secret key that is derived from a unique subset of an individual’s genetic sequence. This scheme requires access to a subset of an individual’s genetic sequence to acquire full access to the transmitted sequence data, which helps to prevent sample mismatch. Results We validate that the proposed encryption scheme is robust to sequencing errors, population uniqueness, and sibling disambiguation, and provides sufficient cryptographic key space. Discussion Access to a set of an individual’s genotypes and a mutually agreed cryptographic seed is needed to unlock the full sequence, which provides additional sample authentication and authorization security. We present modest fixed and marginal costs to implement this transmission architecture. Conclusions It is possible for genomics researchers who sequence participant samples externally to protect the transmission of sequence data using unique features of an individual’s genetic sequence. PMID:23125421

  16. CWI cryptanalyst discovers new cryptographic attack variant in Flame spy malware

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); R.J.F. Cramer (Ronald)

    2012-01-01

    htmlabstractCryptanalyst Marc Stevens from the Centrum Wiskunde & Informatica (CWI) in Amsterdam, known for breaking the https security in 2008 using a cryptanalytic attack on MD5, analyzed the recent Flame virus this week. He discovered that for this spy malware an as yet unknown cryptographic

  17. EMERGENCY CALLS

    CERN Multimedia

    Medical Service

    2001-01-01

    IN URGENT NEED OF A DOCTOR GENEVA EMERGENCY SERVICES GENEVA AND VAUD 144 FIRE BRIGADE 118 POLICE 117 CERN FIREMEN 767-44-44 ANTI-POISONS CENTRE Open 24h/24h 01-251-51-51 Patient not fit to be moved, call family doctor, or: GP AT HOME, open 24h/24h 748-49-50 Association Of Geneva Doctors Emergency Doctors at home 07h-23h 322 20 20 Patient fit to be moved: HOPITAL CANTONAL CENTRAL 24 Micheli-du-Crest 372-33-11 ou 382-33-11 EMERGENCIES 382-33-11 ou 372-33-11 CHILDREN'S HOSPITAL 6 rue Willy-Donzé 372-33-11 MATERNITY 32 bvd.de la Cluse 382-68-16 ou 382-33-11 OPHTHALMOLOGY 22 Alcide Jentzer 382-33-11 ou 372-33-11 MEDICAL CENTRE CORNAVIN 1-3 rue du Jura 345 45 50 HOPITAL DE LA TOUR Meyrin EMERGENCIES 719-61-11 URGENCES PEDIATRIQUES 719-61-00 LA TOUR MEDICAL CENTRE 719-74-00 European Emergency Call 112 FRANCE EMERGENCY SERVICES 15 FIRE BRIGADE 18 POLICE 17 CERN FIREMEN AT HOME 00-41-22-767-44-44 ANTI-POISONS CENTRE Open 24h/24h 04-72-11-69-11 All doctors ...

  18. The construction of work–life balance: The experience of Black employees in a call-centre environment

    OpenAIRE

    Sonia C.B. Potgieter; Antoni Barnard

    2010-01-01

    Orientation: Work–life balance, as a crucial aspect of employee and organisational wellness, remains an interesting field of research, especially due to the changing demographic employee profile.Research purpose: The objective of the study was to explore Black employees’ construction of work–life balance in a customer care environment.Motivation for the study: The conceptual debate regarding the construct of work–life balance in general as well as limited qualitative research with regard to B...

  19. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault

    Directory of Open Access Journals (Sweden)

    Amioy Kumar

    2009-01-01

    Full Text Available The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of both symmetric and asymmetric approach for the encryption. The ciphertext of any document is generated by symmetric cryptosystem; the symmetric key is then encrypted by asymmetric approach. Further, Reed and Solomon codes are used on the generated asymmetric key to provide some error tolerance while decryption. The experimental results from the proposed approach on the palmprint images suggest its possible usage in an automated palmprint-based key generation system.

  20. Techniques for Performance Improvement of Integer Multiplication in Cryptographic Applications

    Directory of Open Access Journals (Sweden)

    Robert Brumnik

    2014-01-01

    Full Text Available The problem of arithmetic operations performance in number fields is actively researched by many scientists, as evidenced by significant publications in this field. In this work, we offer some techniques to increase performance of software implementation of finite field multiplication algorithm, for both 32-bit and 64-bit platforms. The developed technique, called “delayed carry mechanism,” allows to preventing necessity to consider a significant bit carry at each iteration of the sum accumulation loop. This mechanism enables reducing the total number of additions and applies the modern parallelization technologies effectively.

  1. Efficiency of two constructs called "fear of disease" and "perceived severity of disease" on the prevention of gastric cancer: Application of protection motivation theory.

    Science.gov (United States)

    Baghiani-Moghadam, Mohamad Hosein; Seyedi-Andi, Seyed Jalil; Shokri-Shirvani, Javad; Khafri, Sorayya; Ghadimi, Reza; Parsian, Hadi

    2015-01-01

    Among all cancers, malignancies of gastrointestinal tract are the most common cancer among Iranian population. Dietary behavior is thought to be the most important risk factor in gastric cancer. Fear and perceived severity are two important constructs of the protection motivation theory (PMT). Despite the evidence of the impact of these two constructs in modifying dietary habits against gastric cancer, their efficiency is not well established. Therefore, the present study was designed to determine the efficiency of the mentioned constructs. This cross-sectional study was performed on 360 participants (180 males and 180 females) aged over 30 years old who presented to health centers in Babol, Iran in 2014. They were selected by a cluster sampling method in a population covered by health centers in Babol. Data collection was done using a questionnaire with acceptable reliability and validity, designed by a researcher based on two constructs of protection motivation theory. The data were analyzed by SPSS Version 20 using descriptive and analytical statistics such as ANOVA, linear and logistic regression analysis. The participants who entered in the study achieved 38.6 and 69.7% of the scores of fear and perceived severity, respectively. There was a significant difference between perceived severity with level of education (pprotection motivation theory with predicting 38% of the variance of nutritional high risk behaviors had an effective role against gastric cancer and may help in the design and implementation of educational programs for the prevention of gastric cancer.

  2. Securing ad hoc wireless sensor networks under Byzantine attacks by implementing non-cryptographic method

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad Sofi

    2017-05-01

    Full Text Available Ad Hoc wireless sensor network (WSN is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited resources in WSN, cryptographic methods for securing the network against attacks is not feasible. Byzantine attacks disrupt the communication between nodes in the network without regard to its own resource consumption. This paper discusses the performance of cluster based WSN comparing LEACH with Advanced node based clusters under byzantine attacks. This paper also proposes an algorithm for detection and isolation of the compromised nodes to mitigate the attacks by non-cryptographic means. The throughput increases after using the algorithm for isolation of the malicious nodes, 33% in case of Gray Hole attack and 62% in case of Black Hole attack.

  3. Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current

    Science.gov (United States)

    Hayashi, Yu-Ichi; Homma, Naofumi; Mizuki, Takaaki; Sugawara, Takeshi; Kayano, Yoshiki; Aoki, Takafumi; Minegishi, Shigeki; Satoh, Akashi; Sone, Hideaki; Inoue, Hiroshi

    This paper presents a possibility of Electromagnetic (EM) analysis against cryptographic modules outside their security boundaries. The mechanism behind the information leakage is explained from the view point of Electromagnetic Compatibility: electric fluctuation released from cryptographic modules can conduct to peripheral circuits based on ground bounce, resulting in radiation. We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. Correlation Electromagnetic Analysis (CEMA) is conducted in order to evaluate the information leakage. The experimental results show that secret keys are revealed even though there are various disturbing factors such as voltage regulators and AC/DC converters between the target module and the measurement points. We also discuss information-suppression techniques as electrical-level countermeasures against such CEMAs.

  4. Cryptographic applications of analytic number theory complexity lower bounds and pseudorandomness

    CERN Document Server

    2003-01-01

    The book introduces new ways of using analytic number theory in cryptography and related areas, such as complexity theory and pseudorandom number generation. Key topics and features: - various lower bounds on the complexity of some number theoretic and cryptographic problems, associated with classical schemes such as RSA, Diffie-Hellman, DSA as well as with relatively new schemes like XTR and NTRU - a series of very recent results about certain important characteristics (period, distribution, linear complexity) of several commonly used pseudorandom number generators, such as the RSA generator, Blum-Blum-Shub generator, Naor-Reingold generator, inversive generator, and others - one of the principal tools is bounds of exponential sums, which are combined with other number theoretic methods such as lattice reduction and sieving - a number of open problems of different level of difficulty and proposals for further research - an extensive and up-to-date bibliography Cryptographers and number theorists will find th...

  5. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    Energy Technology Data Exchange (ETDEWEB)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  6. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...... type annotations or explicit type casts. We have implemented a protocol verifier SpiCa based on the algorithm, and confirmed its effectiveness....

  7. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    OpenAIRE

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to c...

  8. Chaos-based hash function (CBHF) for cryptographic applications

    International Nuclear Information System (INIS)

    Amin, Mohamed; Faragallah, Osama S.; Abd El-Latif, Ahmed A.

    2009-01-01

    As the core of cryptography, hash is the basic technique for information security. Many of the hash functions generate the message digest through a randomizing process of the original message. Subsequently, a chaos system also generates a random behavior, but at the same time a chaos system is completely deterministic. In this paper, an algorithm for one-way hash function construction based on chaos theory is introduced. Theoretical analysis and computer simulation indicate that the algorithm can satisfy all performance requirements of hash function in an efficient and flexible manner and secure against birthday attacks or meet-in-the-middle attacks, which is good choice for data integrity or authentication.

  9. Chaos-based hash function (CBHF) for cryptographic applications

    Energy Technology Data Exchange (ETDEWEB)

    Amin, Mohamed [Dept. of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511 (Egypt)], E-mail: mamin04@yahoo.com; Faragallah, Osama S. [Dept. of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952 (Egypt)], E-mail: osam_sal@yahoo.com; Abd El-Latif, Ahmed A. [Dept. of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511 (Egypt)], E-mail: ahmed_rahiem@yahoo.com

    2009-10-30

    As the core of cryptography, hash is the basic technique for information security. Many of the hash functions generate the message digest through a randomizing process of the original message. Subsequently, a chaos system also generates a random behavior, but at the same time a chaos system is completely deterministic. In this paper, an algorithm for one-way hash function construction based on chaos theory is introduced. Theoretical analysis and computer simulation indicate that the algorithm can satisfy all performance requirements of hash function in an efficient and flexible manner and secure against birthday attacks or meet-in-the-middle attacks, which is good choice for data integrity or authentication.

  10. A Threshold Pseudorandom Function Construction and Its Applications

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    2002-01-01

    We give the first construction of a practical threshold pseudo- random function.The protocol for evaluating the function is efficient enough that it can be used to replace random oracles in some protocols relying on such oracles. In particular, we show how to transform the efficient...... cryptographically secure Byzantine agreement protocol by Cachin, Kursawe and Shoup for the random oracle model into a cryptographically secure protocol for the complexity theoretic model without loosing efficiency or resilience,thereby constructing an efficient and optimally resilient Byzantine agreement protocol...

  11. Aufforderung zum Kampf. Geschlechterkonstruktionen und Antisemitismus zum Tanzen bringen! A Call to Arms. Bringing Gender Constructions and Anti-Semitism to Dance!

    Directory of Open Access Journals (Sweden)

    Iris Homann

    2006-07-01

    Full Text Available Der Band Antisemitismus und Geschlecht der Gruppe A.G.Gender-Killer versammelt Untersuchungen über die Bedeutung der Kategorie Geschlecht in antisemitischen Diskursen seit dem 19. Jahrhundert. Ihnen gemeinsam ist die These einer konstitutiven Verknüpfung von Antisemitismus und Geschlechterkonstruktionen. Von der Notwendigkeit eines antifaschistischen gesellschaftlichen Engagements ausgehend, versuchen die Beiträger/-innen einen Brückenschlag zwischen Universität und Politik, Theorie und Praxis. Ihre Ergebnisse belegen die Abrufbarkeit und damit auch die Wirkungsmacht antisemitischer Sexualphantasien und Geschlechterbilder bis heute.The volume Anti-Semitism and Gender (Antisemitismus und Geschlecht published by the group A.G. Gender-Killer collects studies about the meaning of the category of gender in anti-Semitic discourses since the nineteenth century. They share the thesis that sees a constitutive connection between anti-Semitism and gender constructs. The studies attempt to bridge university and politics, theory and practice by beginning with the necessity of an anti-fascist engagement in society. Their results prove that anti-Semitic sexual fantasies and gender images are both immediately recallable and potent today.

  12. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation.

    Science.gov (United States)

    Sadat, Md Nazmus; Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-03-05

    Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. ©Md Nazmus Sadat, Xiaoqian Jiang, Md Momin Al Aziz, Shuang Wang, Noman Mohammed. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 05.03.2018.

  13. Correlation Immunity, Avalanche Features, and Other Cryptographic Properties of Generalized Boolean Functions

    Science.gov (United States)

    2017-09-01

    satisfying the strict avalanche criterion,” Discrete Math ., vol. 185, pp. 29–39, 1998. [2] R.C. Bose, “On some connections between the design of... Discrete Appl. Math ., vol. 149, pp. 73–86, 2005. [11] T.W. Cusick and P. Stănică, Cryptographic Boolean Functions and Applications, 2nd ed., San Diego...Stănică, “Bisecting binomial coefficients,” Discrete Appl. Math ., vol. 227, pp. 70–83, 2017. [28] T. Martinsen, W. Meidl, and P. Stănică, “Generalized

  14. Detection of beamsplitting attack in a quantum cryptographic channel based on photon number statistics monitoring

    International Nuclear Information System (INIS)

    Gaidash, A A; Egorov, V I; Gleim, A V

    2014-01-01

    Quantum cryptography in theory allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source. In order to overcome this possibility, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. We present an alternative method based on monitoring photon number statistics after detection. This method can therefore be used with any existing protocol

  15. The FPGA realization of the general cellular automata based cryptographic hash functions: Performance and effectiveness

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2014-01-01

    Full Text Available In the paper the author considers hardware implementation of the GRACE-H family general cellular automata based cryptographic hash functions. VHDL is used as a language and Altera FPGA as a platform for hardware implementation. Performance and effectiveness of the FPGA implementations of GRACE-H hash functions were compared with Keccak (SHA-3, SHA-256, BLAKE, Groestl, JH, Skein hash functions. According to the performed tests, performance of the hardware implementation of GRACE-H family hash functions significantly (up to 12 times exceeded performance of the hardware implementation of previously known hash functions, and effectiveness of that hardware implementation was also better (up to 4 times.

  16. MEANING OF THE BITCOIN CRYPTOGRAPHIC CURRENCY AS A MEDIUM OF EXCHANGE

    Directory of Open Access Journals (Sweden)

    Łukasz Dopierała

    2014-06-01

    Full Text Available This article presents one of the new elements of virtual reality, which is the Bitcoin cryptocurrency. This thesis focuses on the condition and perspectives on development of the trading function of this instrument. The authors discuss the legal aspects of functioning of the Bitcoin, conduct a SWOT analysis of this cryptocurrency as a medium of exchange, and examin the scale of use of Bitcoin in transaction purposes. As of March 1, 2014 the trading system gradually develops and the strengths of this cryptographic currency outweigh its weaknesses, but the future of Bitcoin as a medium of exchange is difficult to determine.

  17. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  18. Research on the Maritime Communication Cryptographic Chip’s Compiler Optimization

    Directory of Open Access Journals (Sweden)

    Sheng Li

    2017-08-01

    Full Text Available In the process of ocean development, the technology for maritime communication system is a hot research field, of which information security is vital for the normal operation of the whole system, and that is also one of the difficulties in the research of maritime communication system. In this paper, a kind of maritime communication cryptographic SOC(system on chip is introduced, and its compiler framework is put forward through analysis of working mode and problems faced by compiler front end. Then, a loop unrolling factor calculating algorithm based on queue theory, named UFBOQ (unrolling factor based on queue, is proposed to make parallel optimization in the compiler frontend with consideration of the instruction memory capacity limit. Finally, the scalar replacement method is used to optimize unrolled code to solve the memory access latency on the parallel computing efficiency, for continuous data storage characteristics of cryptographic algorithm. The UFBOQ algorithm and scalar replacement prove effective and appropriate, of which the effect achieves the linear speedup.

  19. The construction of a Concept called Regulation

    Directory of Open Access Journals (Sweden)

    María José Campanelli Espíndola

    2014-12-01

    Full Text Available The following analysis is directed to study “regulation” from the legal, economic and social aspects of compared law minding diverse legal systems and regimes. The methodology of investigation for this exercise begins by comparing the different thesis and main propositions on the concept of regulation in different legal orders and systems.

  20. Call Forecasting for Inbound Call Center

    Directory of Open Access Journals (Sweden)

    Peter Vinje

    2009-01-01

    Full Text Available In a scenario of inbound call center customer service, the ability to forecast calls is a key element and advantage. By forecasting the correct number of calls a company can predict staffing needs, meet service level requirements, improve customer satisfaction, and benefit from many other optimizations. This project will show how elementary statistics can be used to predict calls for a specific company, forecast the rate at which calls are increasing/decreasing, and determine if the calls may stop at some point.

  1. Investigation of Current State of Crytpography and Theoretical Implementation of a Cryptographic System for the Combat Service Support Control System.

    Science.gov (United States)

    1987-05-01

    34 Advances in Crypt g: Proceedings of CRYPTO 84,r o ... .. .. _ __...o ... .. ... ....... ed. by G.R. Blakely and D. Chaum . [Wagn84b] Wagner, Neal R...in Distributed Computer Systems," IEEE Trans. on Computers, Vol. C-35, No. 7, Jul. 86, pp. 583-590. Gifford, David K., "Cryptographic Sealing for

  2. An adaptive secret key-directed cryptographic scheme for secure transmission in wireless sensor networks

    International Nuclear Information System (INIS)

    Muhammad, K.; Jan, Z.; Khan, Z

    2015-01-01

    Wireless Sensor Networks (WSNs) are memory and bandwidth limited networks whose main goals are to maximize the network lifetime and minimize the energy consumption and transmission cost. To achieve these goals, different techniques of compression and clustering have been used. However, security is an open and major issue in WSNs for which different approaches are used, both in centralized and distributed WSNs' environments. This paper presents an adaptive cryptographic scheme for secure transmission of various sensitive parameters, sensed by wireless sensors to the fusion center for further processing in WSNs such as military networks. The proposed method encrypts the sensitive captured data of sensor nodes using various encryption procedures (bitxor operation, bits shuffling, and secret key based encryption) and then sends it to the fusion center. At the fusion center, the received encrypted data is decrypted for taking further necessary actions. The experimental results with complexity analysis, validate the effectiveness and feasibility of the proposed method in terms of security in WSNs. (author)

  3. Cryptographic robustness of a quantum cryptography system using phase-time coding

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2008-01-01

    A cryptographic analysis is presented of a new quantum key distribution protocol using phase-time coding. An upper bound is obtained for the error rate that guarantees secure key distribution. It is shown that the maximum tolerable error rate for this protocol depends on the counting rate in the control time slot. When no counts are detected in the control time slot, the protocol guarantees secure key distribution if the bit error rate in the sifted key does not exceed 50%. This protocol partially discriminates between errors due to system defects (e.g., imbalance of a fiber-optic interferometer) and eavesdropping. In the absence of eavesdropping, the counts detected in the control time slot are not caused by interferometer imbalance, which reduces the requirements for interferometer stability.

  4. Energy efficient security in MANETs: a comparison of cryptographic and artificial immune systems

    International Nuclear Information System (INIS)

    Mazhar, N.

    2010-01-01

    MANET is characterized by a set of mobile nodes in an inherently insecure environment, having limited battery capacities. Provisioning of energy efficient security in MANETs is, therefore, an open problem for which a number of solutions have been proposed. In this paper, we present an overview and comparison of the MANET security at routing layer by using the cryptographic and Artificial Immune System (AIS) approaches. The BeeAdHoc protocol, which is a Bio-inspired MANET routing protocol based on the foraging principles of honey bee colony, is taken as case study. We carry out an analysis of the three security frameworks that we have proposed earlier for securing BeeAdHoc protocol; one based on asymmetric key encryption, i.e BeeSec, and the other two using the AIS approach, i.e BeeAIS based on self non-self discrimination from adaptive immune system and BeeAIS-DC based on Dendritic Cell (DC) behavior from innate immune system. We extensively evaluate the performance of the three protocols through network simulations in ns-2 and compare with BeeAdHoc, the base protocol, as well as with state-of-the-art MANET routing protocols DSR and AODV. Our results clearly indicate that AIS based systems provide security at much lower cost to energy as compared with the cryptographic systems. Moreover, the use of dendritic cells and danger signals instead of the classical self non-self discrimination allows to detect the non-self antigens with greater accuracy. Based on the results of this investigation, we also propose a composite AIS model for BeeAdHoc security by combining the concepts from both the adaptive and the innate immune systems by modelling the attributes and behavior of the B-cells and DCs. (author)

  5. Embedded Platform for Automatic Testing and Optimizing of FPGA Based Cryptographic True Random Number Generators

    Directory of Open Access Journals (Sweden)

    M. Varchola

    2009-12-01

    Full Text Available This paper deals with an evaluation platform for cryptographic True Random Number Generators (TRNGs based on the hardware implementation of statistical tests for FPGAs. It was developed in order to provide an automatic tool that helps to speed up the TRNG design process and can provide new insights on the TRNG behavior as it will be shown on a particular example in the paper. It enables to test sufficient statistical properties of various TRNG designs under various working conditions on the fly. Moreover, the tests are suitable to be embedded into cryptographic hardware products in order to recognize TRNG output of weak quality and thus increase its robustness and reliability. Tests are fully compatible with the FIPS 140 standard and are implemented by the VHDL language as an IP-Core for vendor independent FPGAs. A recent Flash based Actel Fusion FPGA was chosen for preliminary experiments. The Actel version of the tests possesses an interface to the Actel’s CoreMP7 softcore processor that is fully compatible with the industry standard ARM7TDMI. Moreover, identical tests suite was implemented to the Xilinx Virtex 2 and 5 in order to compare the performance of the proposed solution with the performance of already published one based on the same FPGAs. It was achieved 25% and 65% greater clock frequency respectively while consuming almost equal resources of the Xilinx FPGAs. On the top of it, the proposed FIPS 140 architecture is capable of processing one random bit per one clock cycle which results in 311.5 Mbps throughput for Virtex 5 FPGA.

  6. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  7. A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems

    Science.gov (United States)

    Lee, Sanghan; Yang, Hae-Yong; Yeom, Yongjin; Park, Jongsik

    The security level of an internet protocol television (IPTV) digital right management (DRM) system ultimately relies on protection of secret keys. Well known devices for the key protection include smartcards and battery backup SRAMs (BB-SRAMs); however, these devices could be vulnerable to various physical attacks. In this paper, we propose a secure and cost-effective design of a cryptographic system on chip (SoC) that integrates the BB-SRAM with a cell-based design technique. The proposed SoC provides robust safeguard against the physical attacks, and satisfies high-speed and low-price requirements of IPTV set-top boxes. Our implementation results show that the maximum encryption rate of the SoC is 633Mb/s. In order to verify the data retention capabilities, we made a prototype chip using 0.18µm standard cell technology. The experimental results show that the integrated BB-SRAM can reliably retain data with a 1.4µA leakage current.

  8. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    Science.gov (United States)

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  9. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    Science.gov (United States)

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.

  10. Call Center Capacity Planning

    DEFF Research Database (Denmark)

    Nielsen, Thomas Bang

    in order to relate the results to the service levels used in call centers. Furthermore, the generic nature of the approximation is demonstrated by applying it to a system incorporating a dynamic priority scheme. In the last paper Optimization of overflow policies in call centers, overflows between agent......The main topics of the thesis are theoretical and applied queueing theory within a call center setting. Call centers have in recent years become the main means of communication between customers and companies, and between citizens and public institutions. The extensively computerized infrastructure...... in modern call centers allows for a high level of customization, but also induces complicated operational processes. The size of the industry together with the complex and labor intensive nature of large call centers motivates the research carried out to understand the underlying processes. The customizable...

  11. Callings and Organizational Behavior

    Science.gov (United States)

    Elangovan, A. R.; Pinder, Craig C.; McLean, Murdith

    2010-01-01

    Current literature on careers, social identity and meaning in work tends to understate the multiplicity, historical significance, and nuances of the concept of calling(s). In this article, we trace the evolution of the concept from its religious roots into secular realms and develop a typology of interpretations using occupation and religious…

  12. Assessing call centers’ success:

    Directory of Open Access Journals (Sweden)

    Hesham A. Baraka

    2013-07-01

    This paper introduces a model to evaluate the performance of call centers based on the Delone and McLean Information Systems success model. A number of indicators are identified to track the call center’s performance. Mapping of the proposed indicators to the six dimensions of the D&M model is presented. A Weighted Call Center Performance Index is proposed to assess the call center performance; the index is used to analyze the effect of the identified indicators. Policy-Weighted approach was used to assume the weights with an analysis of different weights for each dimension. The analysis of the different weights cases gave priority to the User satisfaction and net Benefits dimension as the two outcomes from the system. For the input dimensions, higher priority was given to the system quality and the service quality dimension. Call centers decision makers can use the tool to tune the different weights in order to reach the objectives set by the organization. Multiple linear regression analysis was used in order to provide a linear formula for the User Satisfaction dimension and the Net Benefits dimension in order to be able to forecast the values for these two dimensions as function of the other dimensions

  13. Care and calls

    DEFF Research Database (Denmark)

    Paasch, Bettina Sletten

    -centred care through the use of tactile resources and embodied orientations while they attend to the phone call. Experienced nurses Thus perform multiactivity by distributing attention towards both the patient and the phone, and the analysis shows that their concrete ways of doing so depend on the complex...... they are telephoned during interactions with patients are not universal. Indeed different strategies have evolved in other hospital departments. Not only does this thesis contribute insights into the way nurses manage phone calls during interactions with patients, but by subscribing to a growing body of embodied...... of human interaction....

  14. Partitioning a call graph

    NARCIS (Netherlands)

    Bisseling, R.H.; Byrka, J.; Cerav-Erbas, S.; Gvozdenovic, N.; Lorenz, M.; Pendavingh, R.A.; Reeves, C.; Röger, M.; Verhoeven, A.; Berg, van den J.B.; Bhulai, S.; Hulshof, J.; Koole, G.; Quant, C.; Williams, J.F.

    2006-01-01

    Splitting a large software system into smaller and more manageable units has become an important problem for many organizations. The basic structure of a software system is given by a directed graph with vertices representing the programs of the system and arcs representing calls from one program to

  15. CALLING AQUARIUM LOVERS...

    CERN Multimedia

    2002-01-01

    CERN's anemones will soon be orphans. We are looking for someone willing to look after the aquarium in the main building, for one year. If you are interested, or if you would like more information, please call 73830. (The anemones living in the aquarium thank you in anticipation.)

  16. A call for surveys

    DEFF Research Database (Denmark)

    Bernstein, Philip A.; Jensen, Christian S.; Tan, Kian-Lee

    2012-01-01

    The database field is experiencing an increasing need for survey papers. We call on more researchers to set aside time for this important writing activity. The database field is growing in population, scope of topics covered, and the number of papers published. Each year, thousands of new papers ...

  17. Call for Research

    International Development Research Centre (IDRC) Digital Library (Canada)

    Marie-Isabelle Beyer

    2014-10-03

    Oct 3, 2014 ... 5.Submission process. 6.Eligibility criteria. 7.Selection Process. 8. Format and requirements. 9.Evaluation criteria. 10.Country clearance requirements. 11. .... It is envisaged that through this call a single consortium will undertake 6-8 projects within a total budget of up to ... principle qualify for IDRC's support.

  18. Too close to call

    DEFF Research Database (Denmark)

    Kurrild-Klitgaard, Peter

    2012-01-01

    a number of other frequent explanations and is found to be quite robust. When augmented with approval ratings for incumbent presidents, the explanatory power increases to 83 pct. and only incorrectly calls one of the last 15 US presidential elections. Applied to the 2012 election as a forecasting model...

  19. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, R. K. [ORNL; Peters, Scott [Sypris Electronics, LLC

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  20. Care and Calls

    DEFF Research Database (Denmark)

    Paasch, Bettina Sletten

    on the enactment of care but also on patient safety. Nurses working in various hospital departments have developed different strategies for handling mobile phone calls when with a patient. Additional research into the ways nurses successfully or unsuccessfully enact care and ensure patient safety when they answer......In Danish hospitals, nurses have been equipped with a mobile work phone to improve their availability and efficiency. On the phones nurses receive internal and external phone conversations, patient calls, and alarms from electronic surveillance equipment. For safety reasons the phones cannot...... be switched off or silenced; they consequently ring during all activities and also during interactions with patients. A possible tension thus arises when nurses have to be both caring and sensitive towards the patient and simultaneously be efficient and available and answer their phone. The present paper...

  1. Flight calls and orientation

    DEFF Research Database (Denmark)

    Larsen, Ole Næsbye; Andersen, Bent Bach; Kropp, Wibke

    2008-01-01

    flight calls was simulated by sequential computer controlled activation of five loudspeakers placed in a linear array perpendicular to the bird's migration course. The bird responded to this stimulation by changing its migratory course in the direction of that of the ‘flying conspecifics' but after about......  In a pilot experiment a European Robin, Erithacus rubecula, expressing migratory restlessness with a stable orientation, was video filmed in the dark with an infrared camera and its directional migratory activity was recorded. The flight overhead of migrating conspecifics uttering nocturnal...... 30 minutes it drifted back to its original migration course. The results suggest that songbirds migrating alone at night can use the flight calls from conspecifics as additional cues for orientation and that they may compare this information with other cues to decide what course to keep....

  2. Evaluating privacy-preserving record linkage using cryptographic long-term keys and multibit trees on large medical datasets.

    Science.gov (United States)

    Brown, Adrian P; Borgs, Christian; Randall, Sean M; Schnell, Rainer

    2017-06-08

    Integrating medical data using databases from different sources by record linkage is a powerful technique increasingly used in medical research. Under many jurisdictions, unique personal identifiers needed for linking the records are unavailable. Since sensitive attributes, such as names, have to be used instead, privacy regulations usually demand encrypting these identifiers. The corresponding set of techniques for privacy-preserving record linkage (PPRL) has received widespread attention. One recent method is based on Bloom filters. Due to superior resilience against cryptographic attacks, composite Bloom filters (cryptographic long-term keys, CLKs) are considered best practice for privacy in PPRL. Real-world performance of these techniques using large-scale data is unknown up to now. Using a large subset of Australian hospital admission data, we tested the performance of an innovative PPRL technique (CLKs using multibit trees) against a gold-standard derived from clear-text probabilistic record linkage. Linkage time and linkage quality (recall, precision and F-measure) were evaluated. Clear text probabilistic linkage resulted in marginally higher precision and recall than CLKs. PPRL required more computing time but 5 million records could still be de-duplicated within one day. However, the PPRL approach required fine tuning of parameters. We argue that increased privacy of PPRL comes with the price of small losses in precision and recall and a large increase in computational burden and setup time. These costs seem to be acceptable in most applied settings, but they have to be considered in the decision to apply PPRL. Further research on the optimal automatic choice of parameters is needed.

  3. Call 1 FAQ (ENG)

    International Development Research Centre (IDRC) Digital Library (Canada)

    Francine Sinzinkayo

    and testing, e.g. construction protein or nucleic acid scaffolds and other state of the art approaches that ... methods and a significant gain in time to proof of concept. ... demonstrates an accelerated vaccine R&D pathway to proof of concept.

  4. FERMILAB: Call for physics

    International Nuclear Information System (INIS)

    Anon.

    1994-01-01

    Several hundred physicists attended a special Fermilab 'All Experimenter's Meeting' on November 20 to hear Director John Peoples call for new Tevatron Collider proposals for the years 2000-2005, when the new Main Injector will be complete. At the Tevatron proton-antiproton collider, the CDF and DO experiments are currently completing improvements for Run II to use the Tevatron when the Main Injector is complete later in this decade. New proposals would be aimed at a Collider Run III to follow these CDF and DO efforts

  5. To be called upon

    DEFF Research Database (Denmark)

    Kublitz, Anja

    2015-01-01

    When Danish Muslims explain what made them decide to travel to the Middle East and take up arms in the wake of the Arab Spring, they say that they were called upon. Displayed on videos on social media, women and sometimes children begged them to come to their rescue. In light of some...... to the mass if it is no longer a causal phenomenon that expands from small to big, but rather a simultaneous multitude of one to one relations that are neither local nor global? How are the one and the many related in this specific setting? Furthermore, many of the videos display dead bodies. How can we...

  6. MEDICAL SERVICE - URGENT CALLS

    CERN Multimedia

    Service Médical

    2000-01-01

    IN URGENT NEED OF A DOCTOR GENEVA: EMERGENCY SERVICES GENEVA AND VAUD 144 FIRE BRIGADE 118 POLICE 117 CERN FIREMEN 767-44-44 ANTI-POISONS CENTRE Open 24h/24h 01-251-51-51 Patient not fit to be moved, call family doctor, or: GP AT HOME: Open 24h/24h 748-49-50 AMG- Association Of Geneva Doctors: Emergency Doctors at home 07h-23h 322 20 20 Patient fit to be moved: HOPITAL CANTONAL CENTRAL 24 Micheli-du-Crest 372-33-11 ou 382-33-11 EMERGENCIES 382-33-11 ou 372-33-11 CHILDREN'S HOSPITAL 6 rue Willy-Donzé 372-33-11 MATERNITY 32 bvd.de la Cluse 382-68-16 ou 382-33-11 OPHTHALMOLOGY 22 Alcide Jentzer 382-33-11 ou 372-33-11 MEDICAL CENTRE CORNAVIN 1-3 rue du Jura 345 45 50 HOPITAL DE LA TOUR Meyrin 719-61-11 EMERGENCIES 719-61-11 CHILDREN'S EMERGENCIES 719-61-00 LA TOUR MEDICAL CENTRE 719-74-00 European Emergency Call 112   FRANCE: EMERGENCY SERVICES 15 FIRE BRIGADE 18 POLICE 17 CERN FIREMEN AT HOME 00-41-22-767-44-44 ...

  7. An Island Called Cuba

    Directory of Open Access Journals (Sweden)

    Jean Stubbs

    2011-06-01

    Full Text Available Review of: An Island Called Home: Returning to Jewish Cuba. Ruth Behar, photographs by Humberto Mayol. New Brunswick NJ: Rutgers University Press, 2007. xiii + 297 pp. (Cloth US$ 29.95 Fidel Castro: My Life: A Spoken Autobiography. Fidel Castro & Ignacio Ramonet. New York: Scribner/Simon & Schuster, 2008. vii + 724 pp. (Paper US$ 22.00, e-book US$ 14.99 Cuba: What Everyone Needs to Know. Julia E. Sweig. New York: Oxford University Press, 2009. xiv + 279 pp. (Paper US$ 16.95 [First paragraph] These three ostensibly very different books tell a compelling story of each author’s approach, as much as the subject matter itself. Fidel Castro: My Life: A Spoken Autobiography is based on a series of long interviews granted by the then-president of Cuba, Fidel Castro, to Spanish-Franco journalist Ignacio Ramonet. Cuba: What Everyone Needs to Know, by U.S. political analyst Julia Sweig, is one of a set country series, and, like Ramonet’s, presented in question/answer format. An Island Called Home: Returning to Jewish Cuba, with a narrative by Cuban-American anthropologist Ruth Behar and photographs by Cuban photographer Humberto Mayol, is a retrospective/introspective account of the Jewish presence in Cuba. While from Ramonet and Sweig we learn much about the revolutionary project, Behar and Mayol convey the lived experience of the small Jewish community against that backdrop.

  8. Call for volunteers

    CERN Document Server

    2008-01-01

    CERN is calling for volunteers from all members of the Laboratory for organizing the two exceptional Open days.CERN is calling for volunteers from all members of the Laboratory’s personnel to help with the organisation of these two exceptional Open Days, for the visits of CERN personnel and their families on the Saturday and above all for the major public Open Day on the Sunday. As for the 50th anniversary in 2004, the success of the Open Days will depend on a large number of volunteers. All those working for CERN as well as retired members of the personnel can contribute to making this event a success. Many guides will be needed at the LHC points, for the activities at the surface and to man the reception and information points. The aim of these major Open Days is to give the local populations the opportunity to discover the fruits of almost 20 years of work carried out at CERN. We are hoping for some 2000 volunteers for the two Open Days, on the Saturday from 9 a.m. to ...

  9. Blended call center with idling times during the call service

    NARCIS (Netherlands)

    Legros, Benjamin; Jouini, Oualid; Koole, Ger

    We consider a blended call center with calls arriving over time and an infinitely backlogged amount of outbound jobs. Inbound calls have a non-preemptive priority over outbound jobs. The inbound call service is characterized by three successive stages where the second one is a break; i.e., there is

  10. An update on the side channel cryptanalysis of MACs based on cryptographic hash functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Okeya, Katsuyuki

    2007-01-01

    Okeya has established that HMAC/NMAC implementations based on only Matyas-Meyer-Oseas (MMO) PGV scheme and his two refined PGV schemes are secure against side channel DPA attacks when the block cipher in these constructions is secure against these attacks. The significant result of Okeya's analys...

  11. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications

    Science.gov (United States)

    Rafi Ahamed, Shaik

    2016-01-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA2) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA2 based S-Box have comparatively better performance than that of conventional LUT based S-Box. PMID:27733924

  12. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.

    Science.gov (United States)

    Gangadari, Bhoopal Rao; Rafi Ahamed, Shaik

    2016-09-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA 2 ) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA 2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA 2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA 2 based S-Box have comparatively better performance than that of conventional LUT based S-Box.

  13. On cryptographic security of end-to-end encrypted connections in WhatsApp and Telegram messengers

    Directory of Open Access Journals (Sweden)

    Sergey V. Zapechnikov

    2017-11-01

    Full Text Available The aim of this work is to analyze the available possibilities for improving secure messaging with end-to-end connections under conditions of external violator actions and distrusted service provider. We made a comparative analysis of cryptographic security mechanisms for two widely used messengers: Telegram and WhatsApp. It was found that Telegram is based on MTProto protocol, while WhatsApp is based on the alternative Signal protocol. We examine the specific features of messengers implementation associated with random number generation on the most popular Android mobile platform. It was shown that Signal has better security properties. It is used in several other popular messengers such as TextSecure, RedPhone, GoogleAllo, FacebookMessenger, Signal along with WhatsApp. A number of possible attacks on both messengers were analyzed in details. In particular, we demonstrate that the metadata are poorly protected in both messengers. Metadata security may be one of the goals for further studies.

  14. Call Centre- Computer Telephone Integration

    Directory of Open Access Journals (Sweden)

    Dražen Kovačević

    2012-10-01

    Full Text Available Call centre largely came into being as a result of consumerneeds converging with enabling technology- and by the companiesrecognising the revenue opportunities generated by meetingthose needs thereby increasing customer satisfaction. Regardlessof the specific application or activity of a Call centre, customersatisfaction with the interaction is critical to the revenuegenerated or protected by the Call centre. Physical(v, Call centreset up is a place that includes computer, telephone and supervisorstation. Call centre can be available 24 hours a day - whenthe customer wants to make a purchase, needs information, orsimply wishes to register a complaint.

  15. Efficient Approximate JavaScript Call Graph Construction

    NARCIS (Netherlands)

    S. Benschop

    2014-01-01

    htmlabstractJavaScript has seen an increase in popularity in the last few years, both in the browser as well as on other platforms such as Node.js. However, the tools to help developers reason about JavaScript code remain fairly barebone in comparison with tooling for static languages such as Java.

  16. The difficult medical emergency call

    DEFF Research Database (Denmark)

    Møller, Thea Palsgaard; Kjærulff, Thora Majlund; Viereck, Søren

    2017-01-01

    BACKGROUND: Pre-hospital emergency care requires proper categorization of emergency calls and assessment of emergency priority levels by the medical dispatchers. We investigated predictors for emergency call categorization as "unclear problem" in contrast to "symptom-specific" categories and the ......BACKGROUND: Pre-hospital emergency care requires proper categorization of emergency calls and assessment of emergency priority levels by the medical dispatchers. We investigated predictors for emergency call categorization as "unclear problem" in contrast to "symptom-specific" categories...... and the effect of categorization on mortality. METHODS: Register-based study in a 2-year period based on emergency call data from the emergency medical dispatch center in Copenhagen combined with nationwide register data. Logistic regression analysis (N = 78,040 individuals) was used for identification...

  17. Eight Leadership Emergency Codes Worth Calling.

    Science.gov (United States)

    Freed, David H

    Hospitals have a contemporary opportunity to change themselves before attempting to transform the larger US health care system. However, actually implementing change is much more easily described than accomplished in practice. This article calls out 8 dysfunctional behaviors that compromise professional standards at the ground level of the hospital. The construct of calling a code when one witnesses such behaviors is intended to make it safe for leaders to "See something, say something" and confront them in real time. The coordinated continuum of services that health care reform seeks to attain will not emerge until individual hospital organizations prepare themselves to operate better in their own spaces and the ones that immediately surround them.

  18. Cryptographic Combinatorial Securities Exchanges

    Science.gov (United States)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  19. House Calls in Private Practice.

    Science.gov (United States)

    Whittington, Ronaele

    1985-01-01

    Relates the experiences of a social worker in private practice who offered house calls as an ongoing setting for counseling and psychotherapy to individuals and families. Describes advantages and disadvantages, liability, and target populations. (JAC)

  20. The Wireless Nursing Call System

    DEFF Research Database (Denmark)

    Jensen, Casper Bruun

    2006-01-01

    This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight into the cha......This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight...

  1. Perpetual Cancellable American Call Option

    OpenAIRE

    Emmerling, Thomas J.

    2010-01-01

    This paper examines the valuation of a generalized American-style option known as a Game-style call option in an infinite time horizon setting. The specifications of this contract allow the writer to terminate the call option at any point in time for a fixed penalty amount paid directly to the holder. Valuation of a perpetual Game-style put option was addressed by Kyprianou (2004) in a Black-Scholes setting on a non-dividend paying asset. Here, we undertake a similar analysis for the perpetua...

  2. Integrating heterogeneous healthcare call centers.

    Science.gov (United States)

    Peschel, K M; Reed, W C; Salter, K

    1998-01-01

    In a relatively short period, OHS has absorbed multiple call centers supporting different LOBs from various acquisitions, functioning with diverse standards, processes, and technologies. However, customer and employee satisfaction is predicated on OHS's ability to thoroughly integrate these heterogeneous call centers. The integration was initiated and has successfully progressed through a balanced program of focused leadership and a defined strategy which includes site consolidation, sound performance management philosophies, and enabling technology. Benefits have already been achieved with even more substantive ones to occur as the integration continues to evolve.

  3. Calling to Nursing: Concept Analysis.

    Science.gov (United States)

    Emerson, Christie

    The aims of this article are (a) to analyze the concept of a calling as it relates nursing and (b) to develop a definition of calling to nursing with the detail and clarity needed to guide reliable and valid research. The classic steps described by Walker and Avant are used for the analysis. Literature from several disciplines is reviewed including vocational psychology, Christian career counseling, sociology, organizational management, and nursing. The analysis provides an operational definition of a calling to nursing and establishes 3 defining attributes of the concept: (a) a passionate intrinsic motivation or desire (perhaps with a religious component), (b) an aspiration to engage in nursing practice, as a means of fulfilling one's purpose in life, and (c) the desire to help others as one's purpose in life. Antecedents to the concept are personal introspection and cognitive awareness. Positive consequences to the concept are improved work meaningfulness, work engagement, career commitment, personal well-being, and satisfaction. Negative consequences of having a calling might include willingness to sacrifice well-being for work and problems with work-life balance. Following the concept analysis, philosophical assumptions, contextual factors, interdisciplinary work, research opportunities, and practice implications are discussed.

  4. An Evaluation Framework for CALL

    Science.gov (United States)

    McMurry, Benjamin L.; Williams, David Dwayne; Rich, Peter J.; Hartshorn, K. James

    2016-01-01

    Searching prestigious Computer-assisted Language Learning (CALL) journals for references to key publications and authors in the field of evaluation yields a short list. The "American Journal of Evaluation"--the flagship journal of the American Evaluation Association--is only cited once in both the "CALICO Journal and Language…

  5. Uncertain call likelihood negatively affects sleep and next-day cognitive performance while on-call in a laboratory environment.

    Science.gov (United States)

    Sprajcer, Madeline; Jay, Sarah M; Vincent, Grace E; Vakulin, Andrew; Lack, Leon; Ferguson, Sally A

    2018-05-11

    On-call working arrangements are employed in a number of industries to manage unpredictable events, and often involve tasks that are safety- or time-critical. This study investigated the effects of call likelihood during an overnight on-call shift on self-reported pre-bed anxiety, sleep and next-day cognitive performance. A four-night laboratory-based protocol was employed, with an adaptation, a control and two counterbalanced on-call nights. On one on-call night, participants were instructed that they would definitely be called during the night, while on the other on-call night they were told they may be called. The State-Trait Anxiety Inventory form x-1 was used to investigate pre-bed anxiety, and sleep was assessed using polysomnography and power spectral analysis of the sleep electroencephalographic analysis. Cognitive performance was assessed four times daily using a 10-min psychomotor vigilance task. Participants felt more anxious before bed when they were definitely going to be called, compared with the control and maybe conditions. Conversely, participants experienced significantly less non-rapid eye movement and stage two sleep and poorer cognitive performance when told they may be called. Further, participants had significantly more rapid eye movement sleep in the maybe condition, which may be an adaptive response to the stress associated with this on-call condition. It appears that self-reported anxiety may not be linked with sleep outcomes while on-call. However, this research indicates that it is important to take call likelihood into consideration when constructing rosters and risk-management systems for on-call workers.

  6. Calle y Saberes en Movimiento

    Directory of Open Access Journals (Sweden)

    Laura Daniela Aguirre Aguilar

    2010-01-01

    Full Text Available En México el rezago, el ausentismo, la deserción escolar, el trabajo a temprana edad y el inicio de una vida en la calle, en repetidas ocasiones son consecuencia de un núcleo familiar desarticulado o de una débil relación intrafamiliar, así como de una condición socioeconómica en desventaja. Ante esta problemática, la Secretaría de Educación Pública, instancia gubernamental encargada de garantizar una educación de calidad para la población, trabaja coordinadamente con organizaciones de la sociedad civil e instancias públicas, para la reintegración a los espacios educativos de los niños, niñas y jóvenes en situación de calle.

  7. Ultrasound call detection in capybara

    Directory of Open Access Journals (Sweden)

    Selene S.C. Nogueira

    2012-07-01

    Full Text Available The vocal repertoire of some animal species has been considered a non-invasive tool to predict distress reactivity. In rats ultrasound emissions were reported as distress indicator. Capybaras[ vocal repertoire was reported recently and seems to have ultrasound calls, but this has not yet been confirmed. Thus, in order to check if a poor state of welfare was linked to ultrasound calls in the capybara vocal repertoire, the aim of this study was to track the presence of ultrasound emissions in 11 animals under three conditions: 1 unrestrained; 2 intermediately restrained, and 3 highly restrained. The ultrasound track identified frequencies in the range of 31.8±3.5 kHz in adults and 33.2±8.5 kHz in juveniles. These ultrasound frequencies occurred only when animals were highly restrained, physically restrained or injured during handling. We concluded that these calls with ultrasound components are related to pain and restraint because they did not occur when animals were free of restraint. Thus we suggest that this vocalization may be used as an additional tool to assess capybaras[ welfare.

  8. A proof theory for constructive default logic

    NARCIS (Netherlands)

    Y-H. Tan (Yao-Hua)

    1993-01-01

    textabstractWe present what we call Constructive Default Logic (CDL) - a default logic in which the fixed-point definition of extensions is replaced by a constructive definition which yield so-called constructive extensions. Selection functions are used to represent explicitly the control of the

  9. Reciprocity of mobile phone calls

    OpenAIRE

    Kovanen, Lauri; Saramaki, Jari; Kaski, Kimmo

    2010-01-01

    We present a study of the reciprocity of human behaviour based on mobile phone usage records. The underlying question is whether human relationships are mutual, in the sense that both are equally active in keeping up the relationship, or is it on the contrary typical that relationships are lopsided, with one party being significantly more active than the other. We study this question with the help of a mobile phone data set consisting of all mobile phone calls between 5.3 million customers of...

  10. What Do Monkey Calls Mean?

    Science.gov (United States)

    Schlenker, Philippe; Chemla, Emmanuel; Zuberbühler, Klaus

    2016-12-01

    A field of primate linguistics is gradually emerging. It combines general questions and tools from theoretical linguistics with rich data gathered in experimental primatology. Analyses of several monkey systems have uncovered very simple morphological and syntactic rules and have led to the development of a primate semantics that asks new questions about the division of semantic labor between the literal meaning of monkey calls, additional mechanisms of pragmatic enrichment, and the environmental context. We show that comparative studies across species may validate this program and may in some cases help in reconstructing the evolution of monkey communication over millions of years. Copyright © 2016. Published by Elsevier Ltd.

  11. A Relational Account of Call-by-Value Sequentiality

    DEFF Research Database (Denmark)

    Riecke, Jon Gary; Sandholm, Anders Bo

    2002-01-01

    We construct a model for FPC, a purely functional, sequential, call-by-value language. The model is built from partial continuous functions, in the style of Plotkin, further constrained to be uniform with respect to a class of logical relations. We prove that the model is fully abstract....

  12. Constructed Wetlands

    Science.gov (United States)

    these systems can improve water quality, engineers and scientists construct systems that replicate the functions of natural wetlands. Constructed wetlands are treatment systems that use natural processes

  13. BUFO PARDALIS (ANURA: BUFONIDAE): MATING CALL AND ...

    African Journals Online (AJOL)

    the calls of one of these species, Bufo pardalis. Hewitt, were not analysed by Tandy & Keith. (1972). Furthennore there is some confusion in the literature regarding the mating call of this species. For these reasons this mating call is here clarified. The mating call of B. pardaiis was first described by Ranger (in Hewitt 1935) as ...

  14. 78 FR 76218 - Rural Call Completion

    Science.gov (United States)

    2013-12-17

    ... calls to rural areas, and enforce restrictions against blocking, choking, reducing, or restricting calls... to alert the Commission of systemic problems receiving calls from a particular originating long... associated with completing calls to rural areas. These rules will also enhance our ability to enforce...

  15. Construction management

    CERN Document Server

    Pellicer, Eugenio; Teixeira, José C; Moura, Helder P; Catalá, Joaquín

    2014-01-01

    The management of construction projects is a wide ranging and challenging discipline in an increasingly international industry, facing continual challenges and demands for improvements in safety, in quality and cost control, and in the avoidance of contractual disputes. Construction Management grew out of a Leonardo da Vinci project to develop a series of Common Learning Outcomes for European Managers in Construction. Financed by the European Union, the project aimed to develop a library of basic materials for developing construction management skills for use in a pan-European context. Focused exclusively on the management of the construction phase of a building project from the contractor's point of view, Construction Management covers the complete range of topics of which mastery is required by the construction management professional for the effective delivery of new construction projects. With the continued internationalisation of the construction industry, Construction Management will be required rea...

  16. A Group Action Method for Construction of Strong Substitution Box

    Science.gov (United States)

    Jamal, Sajjad Shaukat; Shah, Tariq; Attaullah, Atta

    2017-06-01

    In this paper, the method to develop cryptographically strong substitution box is presented which can be used in multimedia security and data hiding techniques. The algorithm of construction depends on the action of a projective general linear group over the set of units of the finite commutative ring. The strength of substitution box and ability to create confusion is assessed with different available analyses. Moreover, the ability of resistance against malicious attacks is also evaluated. The substitution box is examined by bit independent criterion, strict avalanche criterion, nonlinearity test, linear approximation probability test and differential approximation probability test. This substitution box is equated with well-recognized substitution boxes such as AES, Gray, APA, S8, prime of residue, Xyi and Skipjack. The comparison shows encouraging results about the strength of the proposed box. The majority logic criterion is also calculated to analyze the strength and its practical implementation.

  17. Electrochemical construction

    Science.gov (United States)

    Einstein, Harry; Grimes, Patrick G.

    1983-08-23

    An electrochemical cell construction features a novel co-extruded plastic electrode in an interleaved construction with a novel integral separator-spacer. Also featured is a leak and impact resistant construction for preventing the spill of corrosive materials in the event of rupture.

  18. Usability Constructs

    DEFF Research Database (Denmark)

    Hertzum, Morten; Clemmesen, Torkil; Hornbæk, Kasper Anders Søren

    2007-01-01

    Whereas research on usability predominantly employs universal definitions of the aspects that comprise usability, people experience their use of information systems through personal constructs. Based on 48 repertory-grid interviews, this study investigates how such personal constructs are affected...... use of constructs traditionally associated with usability (e.g., easy-to-use, intuitive, and liked). Further analysis of the data is ongoing...

  19. Hornbills can distinguish between primate alarm calls.

    Science.gov (United States)

    Rainey, Hugo J.; Zuberbühler, Klaus; Slater, Peter J. B.

    2004-01-01

    Some mammals distinguish between and respond appropriately to the alarm calls of other mammal and bird species. However, the ability of birds to distinguish between mammal alarm calls has not been investigated. Diana monkeys (Cercopithecus diana) produce different alarm calls to two predators: crowned eagles (Stephanoaetus coronatus) and leopards (Panthera pardus). Yellow-casqued hornbills (Ceratogymna elata) are vulnerable to predation by crowned eagles but are not preyed on by leopards and might therefore be expected to respond to the Diana monkey eagle alarm call but not to the leopard alarm call. We compared responses of hornbills to playback of eagle shrieks, leopard growls, Diana monkey eagle alarm calls and Diana monkey leopard alarm calls and found that they distinguished appropriately between the two predator vocalizations as well as between the two Diana monkey alarm calls. We discuss possible mechanisms leading to these responses. PMID:15209110

  20. Calling in Work: Secular or Sacred?

    Science.gov (United States)

    Steger, Michael F.; Pickering, N. K.; Shin, J. Y.; Dik, B. J.

    2010-01-01

    Recent scholarship indicates that people who view their work as a calling are more satisfied with their work and their lives. Historically, calling has been regarded as a religious experience, although modern researchers frequently have adopted a more expansive and secular conceptualization of calling, emphasizing meaning and personal fulfillment…

  1. Indico CONFERENCE: Define the Call for Abstracts

    CERN Multimedia

    CERN. Geneva; Ferreira, Pedro

    2017-01-01

    In this tutorial, you will learn how to define and open a call for abstracts. When defining a call for abstracts, you will be able to define settings related to the type of questions asked during a review of an abstract, select the users who will review the abstracts, decide when to open the call for abstracts, and more.

  2. Do market participants learn from conference calls?

    NARCIS (Netherlands)

    Roelofsen, E.; Verbeeten, F.; Mertens, G.

    2014-01-01

    We examine whether market participants learn from the information that is disseminated during the Q-and-A section of conference calls. Specifically, we investigate whether stock prices react to information on intangible assets provided during conference calls, and whether conference calls

  3. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2001-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.

  4. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2001-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note: the number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.

  5. How to call the Fire Brigade

    CERN Multimedia

    2003-01-01

    The telephone numbers for the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from "wired" telephones, however, from mobile phones it leads to non-CERN emergency services.

  6. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2002-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.  

  7. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2002-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.

  8. Dynamic call center routing policies using call waiting and agent idle times

    NARCIS (Netherlands)

    Chan, W.; Koole, G.M.; L'Ecuyer, P.

    2014-01-01

    We study call routing policies for call centers with multiple call types and multiple agent groups. We introduce new weight-based routing policies where each pair (call type, agent group) is given a matching priority defined as an affine combination of the longest waiting time for that call type and

  9. Perceiving a Calling, Living a Calling, and Job Satisfaction: Testing a Moderated, Multiple Mediator Model

    Science.gov (United States)

    Duffy, Ryan D.; Bott, Elizabeth M.; Allan, Blake A.; Torrey, Carrie L.; Dik, Bryan J.

    2012-01-01

    The current study examined the relation between perceiving a calling, living a calling, and job satisfaction among a diverse group of employed adults who completed an online survey (N = 201). Perceiving a calling and living a calling were positively correlated with career commitment, work meaning, and job satisfaction. Living a calling moderated…

  10. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    Directory of Open Access Journals (Sweden)

    Laszlo B Kish

    Full Text Available Recently, Bennett and Riedel (BR (http://arxiv.org/abs/1303.7435v1 argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional security of the KLJN method has not been successfully challenged.

  11. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    Science.gov (United States)

    Kish, Laszlo B; Abbott, Derek; Granqvist, Claes G

    2013-01-01

    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.

  12. Construction mathematics

    CERN Document Server

    Virdi, Surinder; Virdi, Narinder Kaur

    2014-01-01

    Construction Mathematics is an introductory level mathematics text, written specifically for students of construction and related disciplines. Learn by tackling exercises based on real-life construction maths. Examples include: costing calculations, labour costs, cost of materials and setting out of building components. Suitable for beginners and easy to follow throughout. Learn the essential basic theory along with the practical necessities. The second edition of this popular textbook is fully updated to match new curricula, and expanded to include even more learning exercises. End of chapter exercises cover a range of theoretical as well as practical problems commonly found in construction practice, and three detailed assignments based on practical tasks give students the opportunity to apply all the knowledge they have gained. Construction Mathematics addresses all the mathematical requirements of Level 2 construction NVQs from City & Guilds/CITB and Edexcel courses, including the BTEC First Diploma in...

  13. FFTF constructibility

    International Nuclear Information System (INIS)

    Weber, S.A.; Hulbert, D.I.

    1975-01-01

    The influence of the design criteria on the constructibility of the Fast Flux Test Facility is described. Specifically, the effects of requirements due to maintenance accessibility, inerting of cells, seismicity, codes, and standards are addressed. The design and construction techniques developed to minimize the impact of the design criteria on cost and schedule are presented with particular emphasis on the cleanliness and humidity controls imposed during construction of the sodium systems. (U.S.)

  14. Long-distance calls in Neotropical primates

    Directory of Open Access Journals (Sweden)

    Oliveira Dilmar A.G.

    2004-01-01

    Full Text Available Long-distance calls are widespread among primates. Several studies concentrate on such calls in just one or in few species, while few studies have treated more general trends within the order. The common features that usually characterize these vocalizations are related to long-distance propagation of sounds. The proposed functions of primate long-distance calls can be divided into extragroup and intragroup ones. Extragroup functions relate to mate defense, mate attraction or resource defense, while intragroup functions involve group coordination or alarm. Among Neotropical primates, several species perform long-distance calls that seem more related to intragroup coordination, markedly in atelines. Callitrichids present long-distance calls that are employed both in intragroup coordination and intergroup contests or spacing. Examples of extragroup directed long-distance calls are the duets of titi monkeys and the roars and barks of howler monkeys. Considerable complexity and gradation exist in the long-distance call repertoires of some Neotropical primates, and female long-distance calls are probably more important in non-duetting species than usually thought. Future research must focus on larger trends in the evolution of primate long-distance calls, including the phylogeny of calling repertoires and the relationships between form and function in these signals.

  15. Outsourcing an Effective Postdischarge Call Program

    Science.gov (United States)

    Meek, Kevin L.; Williams, Paula; Unterschuetz, Caryn J.

    2018-01-01

    To improve patient satisfaction ratings and decrease readmissions, many organizations utilize internal staff to complete postdischarge calls to recently released patients. Developing, implementing, monitoring, and sustaining an effective call program can be challenging and have eluded some of the renowned medical centers in the country. Using collaboration with an outsourced vendor to bring state-of-the-art call technology and staffed with specially trained callers, health systems can achieve elevated levels of engagement and satisfaction for their patients postdischarge. PMID:29494453

  16. Construction Management.

    Science.gov (United States)

    Abbott, James F.

    This article provides a detailed discussion of a team approach to building that involves a construction manager, an architect, and a contractor. Bidding methods are outlined; the major components in construction management -- value engineering and fast track scheduling -- and the use of performance specifications are discussed. The construction…

  17. Construction fraud

    NARCIS (Netherlands)

    Graafland, J.J.; Liedekerke, L.; Dubbink, W.; van Liedekerke, L.; van Luijk, H.

    2011-01-01

    Due to the actions of a whistleblower The Netherlands was confronted with a massive case of construction fraud involving almost the entire construction sector. Price fixing, prior consulting, duplicate accounts, fictitious invoices and active corruption of civil servants were rampant practices. This

  18. Superstring construction

    CERN Document Server

    1989-01-01

    The book includes a selection of papers on the construction of superstring theories, mainly written during the years 1984-1987. It covers ten-dimensional supersymmetric and non-supersymmetric strings, four-dimensional heterotic strings and four-dimensional type-II strings. An introduction to more recent developments in conformal field theory in relation to string construction is provided.

  19. Call Duration Characteristics based on Customers Location

    Directory of Open Access Journals (Sweden)

    Žvinys Karolis

    2014-05-01

    Full Text Available Nowadays a lot of different researches are performed based on call duration distributions (CDD analysis. However, the majority of studies are linked with social relationships between the people. Therefore the scarcity of information, how the call duration is associated with a user's location, is appreciable. The goal of this paper is to reveal the ties between user's voice call duration and the location of call. For this reason we analyzed more than 5 million calls from real mobile network, which were made over the base stations located in rural areas, roads, small towns, business and entertainment centers, residential districts. According to these site types CDD’s and characteristic features for call durations are given and discussed. Submitted analysis presents the users habits and behavior as a group (not an individual. The research showed that CDD’s of customers being them in different locations are not equal. It has been found that users at entertainment, business centers are tend to talk much shortly, than people being at home. Even more CDD can be distorted strongly, when machinery calls are evaluated. Hence to apply a common CDD for a whole network it is not recommended. The study also deals with specific parameters of call duration for distinguished user groups, the influence of network technology for call duration is considered.

  20. 47 CFR 22.921 - 911 call processing procedures; 911-only calling mode.

    Science.gov (United States)

    2010-10-01

    ... programming in the mobile unit that determines the handling of a non-911 call and permit the call to be... CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.921 911 call processing procedures; 911-only calling mode. Mobile telephones manufactured after February 13, 2000 that are capable of...

  1. Help Options in CALL: A Systematic Review

    Science.gov (United States)

    Cardenas-Claros, Monica S.; Gruba, Paul A.

    2009-01-01

    This paper is a systematic review of research investigating help options in the different language skills in computer-assisted language learning (CALL). In this review, emerging themes along with is-sues affecting help option research are identified and discussed. We argue that help options in CALL are application resources that do not only seem…

  2. Coaching "Callings" throughout the Adult Life Cycle.

    Science.gov (United States)

    Hudson, Frederic M.

    2001-01-01

    The process of "callings" continues throughout life. Coaching can connect the present to the future in a meaningful way. Callings represent a value shift requiring revision of the nature and scope of one's central purpose in life and meaningful activities. (JOW)

  3. Performance indicators for call centers with impatience

    NARCIS (Netherlands)

    Jouini, O.; Koole, G.M.; Roubos, A.

    2013-01-01

    An important feature of call center modeling is the presence of impatient customers. This article considers single-skill call centers including customer abandonments. A number of different service-level definitions are structured, including all those used in practice, and the explicit computation of

  4. Call centers with a postponed callback offer

    NARCIS (Netherlands)

    B. Legros (Benjamin); S. Ding (Sihan); R.D. van der Mei (Rob); O. Jouini (Oualid)

    2017-01-01

    textabstractWe study a call center model with a postponed callback option. A customer at the head of the queue whose elapsed waiting time achieves a given threshold receives a voice message mentioning the option to be called back later. This callback option differs from the traditional ones found in

  5. Peafowl antipredator calls encode information about signalers.

    Science.gov (United States)

    Yorzinski, Jessica L

    2014-02-01

    Animals emit vocalizations that convey information about external events. Many of these vocalizations, including those emitted in response to predators, also encode information about the individual that produced the call. The relationship between acoustic features of antipredator calls and information relating to signalers (including sex, identity, body size, and social rank) were examined in peafowl (Pavo cristatus). The "bu-girk" antipredator calls of male and female peafowl were recorded and 20 acoustic parameters were automatically extracted from each call. Both the bu and girk elements of the antipredator call were individually distinctive and calls were classified to the correct signaler with over 90% and 70% accuracy in females and males, respectively. Females produced calls with a higher fundamental frequency (F0) than males. In both females and males, body size was negatively correlated with F0. In addition, peahen rank was related to the duration, end mean frequency, and start harmonicity of the bu element. Peafowl antipredator calls contain detailed information about the signaler and can potentially be used by receivers to respond to dangerous situations.

  6. Calling, is there anything special about it?

    African Journals Online (AJOL)

    2016-07-15

    Jul 15, 2016 ... when a pastor is installed or a new candidate is ordained, 'The one who calls you is faithful .... extension to secular work of the dignity of a calling' (Fowler ... For Luther, therefore, the private life of devotion exercised in the.

  7. The Call to Teach and Teacher Hopefulness

    Science.gov (United States)

    Bullough, Robert V., Jr.; Hall-Kenyon, Kendra M.

    2011-01-01

    The purpose of this paper is to explore teacher motivation and well-being. Our analysis focuses on two central concepts, the notion of a "calling to teach" and of teacher "hopefulness." Data from 205 preservice and inservice teachers were collected to determine teachers' sense of calling and level of hope. Results indicate that overwhelmingly,…

  8. Call center performance with direct response advertising

    NARCIS (Netherlands)

    M. Kiygi Calli (Meltem); M. Weverbergh (Marcel); Ph.H.B.F. Franses (Philip Hans)

    2017-01-01

    textabstractThis study investigates the manpower planning and the performance of a national call center dealing with car repairs and on the road interventions. We model the impact of advertising on the capacity required. The starting point is a forecasting model for the incoming calls, where we take

  9. Perceived Calling and Work Engagement Among Nurses.

    Science.gov (United States)

    Ziedelis, Arunas

    2018-03-01

    The purpose of this study was to explore the relationship of perceived calling and work engagement in nursing over and above major work environment factors. In all, 351 nurses from various health care institutions completed the survey. Data were collected about the most demanding aspects of nursing, major job resources, the degree to which nursing is perceived as a meaningful calling, work engagement, and main demographic information. Hierarchical linear regression was applied to assess the relation between perceived calling and work engagement, while controlling for demographic and work environment factors, and perceived calling was significantly related to two out of three components of nurses' work engagement. The highest association was found with dedication component, and vigor component was related insignificantly. Results have shown that perceived calling might motivate nurses to engage in their work even in burdensome environment, although possible implications for the occupational well-being of nurses themselves remains unclear.

  10. Call cultures in orang-utans?

    Directory of Open Access Journals (Sweden)

    Serge A Wich

    Full Text Available BACKGROUND: Several studies suggested great ape cultures, arguing that human cumulative culture presumably evolved from such a foundation. These focused on conspicuous behaviours, and showed rich geographic variation, which could not be attributed to known ecological or genetic differences. Although geographic variation within call types (accents has previously been reported for orang-utans and other primate species, we examine geographic variation in the presence/absence of discrete call types (dialects. Because orang-utans have been shown to have geographic variation that is not completely explicable by genetic or ecological factors we hypothesized that this will be similar in the call domain and predict that discrete call type variation between populations will be found. METHODOLOGY/PRINCIPAL FINDINGS: We examined long-term behavioural data from five orang-utan populations and collected fecal samples for genetic analyses. We show that there is geographic variation in the presence of discrete types of calls. In exactly the same behavioural context (nest building and infant retrieval, individuals in different wild populations customarily emit either qualitatively different calls or calls in some but not in others. By comparing patterns in call-type and genetic similarity, we suggest that the observed variation is not likely to be explained by genetic or ecological differences. CONCLUSION/SIGNIFICANCE: These results are consistent with the potential presence of 'call cultures' and suggest that wild orang-utans possess the ability to invent arbitrary calls, which spread through social learning. These findings differ substantially from those that have been reported for primates before. First, the results reported here are on dialect and not on accent. Second, this study presents cases of production learning whereas most primate studies on vocal learning were cases of contextual learning. We conclude with speculating on how these findings might

  11. Worldwide construction

    International Nuclear Information System (INIS)

    Williamson, M.

    1994-01-01

    The paper lists major construction projects in worldwide processing and pipelining, showing capacities, contractors, estimated costs, and time of construction. The lists are divided into refineries, petrochemical plants, sulfur recovery units, gas processing plants, pipelines, and related fuel facilities. This last classification includes cogeneration plants, coal liquefaction and gasification plants, biomass power plants, geothermal power plants, integrated coal gasification combined-cycle power plants, and a coal briquetting plant

  12. Construct Measurement in Management Research

    DEFF Research Database (Denmark)

    Nielsen, Bo Bernhard

    2014-01-01

    Far too often do management scholars resort to crude and often inappropriate measures of fundamental constructs in their research; an approach which calls in question the interpretation and validity of their findings. Scholars often legitimize poor choices in measurement with a lack of availability......, this research note raises important questions about the use of proxies in management research and argues for greater care in operationalizing constructs with particular attention to matching levels of theory and measurement....

  13. External GSM phone calls now made simpler

    CERN Multimedia

    2007-01-01

    On 2 July, the IT/CS Telecom Service introduced a new service making external calls from CERN GSM phones easier. A specific prefix is no longer needed for calls outside CERN. External calls from CERN GSM phones are to be simplified. It is no longer necessary to use a special prefix to call an external number from the CERN GSM network.The Telecom Section of the IT/CS Group is introducing a new system that will make life easier for GSM users. It is no longer necessary to use a special prefix (333) to call an external number from the CERN GSM network. Simply dial the number directly like any other Swiss GSM customer. CERN currently has its own private GSM network with the Swiss mobile operator, Sunrise, covering the whole of Switzerland. This network was initially intended exclusively for calls between CERN numbers (replacing the old beeper system). A special system was later introduced for external calls, allowing them to pass thr...

  14. Construction history and construction management

    International Nuclear Information System (INIS)

    Agh, S.

    1999-01-01

    The process of pre-design and design preparation of the Mochovce NPP as well as the construction history of the plant is highlighted, including the financing aspect and problems arising from changes in the technological and other conditions of start-up of the reactor units. The results of international audits performed to improve the level of nuclear safety and implementation of the measures suggested are also described. The milestones of the whole construction process and start-up process, the control and quality system, and the methods of control and management of the complex construction project are outlined. (author)

  15. Attitude of Farmers towards Kisan Call Centres

    Directory of Open Access Journals (Sweden)

    Shely Mary Koshy

    2017-09-01

    Full Text Available The present study was conducted to measure the attitude of farmers in Kerala, India towards Kisan Call Centre (KCC. Kisan Call Centre provides free agricultural advisory services to every citizen involved in agriculture through a toll free number. One hundred and fifty farmers who have utilized the Kisan Call Centre service were selected from the database of KCC. The results showed that the respondents had moderately favourable attitude towards KCC followed by highly favourable attitude. The variables digital divide, temporal awareness on KCC, satisfaction towards KCC and utilization of KCC were found to have a positive correlation with the attitude of respondents towards KCC.

  16. Lunar phases and crisis center telephone calls.

    Science.gov (United States)

    Wilson, J E; Tobacyk, J J

    1990-02-01

    The lunar hypothesis, that is, the notion that lunar phases can directly affect human behavior, was tested by time-series analysis of 4,575 crisis center telephone calls (all calls recorded for a 6-month interval). As expected, the lunar hypothesis was not supported. The 28-day lunar cycle accounted for less than 1% of the variance of the frequency of crisis center calls. Also, as hypothesized from an attribution theory framework, crisis center workers reported significantly greater belief in lunar effects than a non-crisis-center-worker comparison group.

  17. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  18. Cryptographic Aspects of Quantum Reading

    Directory of Open Access Journals (Sweden)

    Gaetana Spedalieri

    2015-04-01

    Full Text Available Besides achieving secure communication between two spatially-separated parties,another important issue in modern cryptography is related to secure communication intime, i.e., the possibility to confidentially store information on a memory for later retrieval.Here we explore this possibility in the setting of quantum reading, which exploits quantumentanglement to efficiently read data from a memory whereas classical strategies (e.g., basedon coherent states or their mixtures cannot retrieve any information. From this point ofview, the technique of quantum reading can provide a new form of technological security fordata storage.

  19. Modal Logics for Cryptographic Processes

    DEFF Research Database (Denmark)

    Frendrup, U.; Huttel, Hans; Jensen, N. J.

    2002-01-01

    We present three modal logics for the spi-calculus and show that they capture strong versions of the environment sensitive bisimulation introduced by Boreale et al. Our logics differ from conventional modal logics for process calculi in that they allow us to describe the knowledge of an attacker ...

  20. Mechanical Verification of Cryptographic Protocols

    Science.gov (United States)

    Cheng, Xiaochun; Ma, Xiaoqi; Huang, Scott C.-H.; Cheng, Maggie

    Information security is playing an increasingly important role in modern society, driven especially by the uptake of the Internet for information transfer. Large amount of information is transmitted everyday through the Internet, which is often the target of malicious attacks. In certain areas, this issue is vital. For example, military departments of governments often transmit a great amount of top-secret data, which, if divulged, could become a huge threat to the public and to national security. Even in our daily life, it is also necessary to protect information. Consider e-commerce systems as an example. No one is willing to purchase anything over the Internet before being assured that all their personal and financial information will always be kept secure and will never be leaked to any unauthorised person or organisation.

  1. Perceiving a calling, living a calling, and job satisfaction: testing a moderated, multiple mediator model.

    Science.gov (United States)

    Duffy, Ryan D; Bott, Elizabeth M; Allan, Blake A; Torrey, Carrie L; Dik, Bryan J

    2012-01-01

    The current study examined the relation between perceiving a calling, living a calling, and job satisfaction among a diverse group of employed adults who completed an online survey (N = 201). Perceiving a calling and living a calling were positively correlated with career commitment, work meaning, and job satisfaction. Living a calling moderated the relations of perceiving a calling with career commitment and work meaning, such that these relations were more robust for those with a stronger sense they were living their calling. Additionally, a moderated, multiple mediator model was run to examine the mediating role of career commitment and work meaning in the relation of perceiving a calling and job satisfaction, while accounting for the moderating role of living a calling. Results indicated that work meaning and career commitment fully mediated the relation between perceiving a calling and job satisfaction. However, the indirect effects of work meaning and career commitment were only significant for individuals with high levels of living a calling, indicating the importance of living a calling in the link between perceiving a calling and job satisfaction. Implications for research and practice are discussed. (c) 2012 APA, all rights reserved.

  2. The function of migratory bird calls

    DEFF Research Database (Denmark)

    Reichl, Thomas; Andersen, Bent Bach; Larsen, Ole Næsbye

    The function of migratory bird calls: do they influence orientation and navigation?   Thomas Reichl1, Bent Bach Andersen2, Ole Naesbye Larsen2, Henrik Mouritsen1   1Institute of Biology, University of Oldenburg, Oldenburg, D-26111 Oldenburg, Germany 2Institute of Biology, University of Southern...... migration and to stimulate migratory restlessness in conspecifics. We wished to test if conspecific flight calls influence the flight direction of a nocturnal migrant, the European Robin (Erithacus rubecula), i.e. if flight calls help migrants keeping course. Wild caught birds showing migratory restlessness...... the experimental bird could be activated successively to simulate a migrating Robin cruising E-W, W-E, S-N or N-S at a chosen height (mostly about 40 m), at 10 m/s and emitting Robin flight calls of 80 dB(A) at 1 m. The simulated flight of a "ding" sound served as a control. During an experiment the bird was first...

  3. 76 FR 4896 - Call for Candidates

    Science.gov (United States)

    2011-01-27

    ... designated to establish generally accepted accounting principles for federal government entities. Generally, non-federal Board members are selected from the general financial community, the accounting and... FEDERAL ACCOUNTING STANDARDS ADVISORY BOARD Call for Candidates AGENCY: Federal Accounting...

  4. Reflections … they called it 'restructuring'[1

    African Journals Online (AJOL)

    turnaround strategy with the appointment of a CEO to implement such strategy in ... found herself accepting so-called 'native' advertising (the practice of publishing an ... preferring to receive their reading 'lite' on mobile platforms. According.

  5. The Role of Calling in Military Engagement

    Science.gov (United States)

    2017-06-01

    depression , hopelessness, emotional and behavior problems , and have lower levels of neuroticism (Oladipo et al., 2013; Suldo & Huebner, 2004; Gilman...retention? Data from surveys of Naval Postgraduate School students reveal many work-related correlations with calling and calling’s positive effects. My...retention? Data from surveys of Naval Postgraduate School students reveal many work-related correlations with calling and calling’s positive effects

  6. Construction safety

    CERN Document Server

    Li, Rita Yi Man

    2013-01-01

    A close-to-ideal blend of suburb and city, speedy construction of towers of Babylon, the sparkling proportion of glass and steel buildings’ facade at night showcase the wisdom of humans. They also witness the footsteps, sweats and tears of architects and engineers. Unfortunately, these signatures of human civilizations are swathed in towering figures of construction accidents. Fretting about these on sites, different countries adopt different measures on sites. This book firstly sketches the construction accidents on sites, followed by a review on safety measures in some of the developing countries such as Bermuda, Egypt, Kuwait and China; as well as developed countries, for example, the United States, France and Singapore. It also highlights the enormous compensation costs with the courts’ experiences in the United Kingdom and Hong Kong.

  7. Salivary alpha amylase in on-call from home fire and emergency service personnel

    Directory of Open Access Journals (Sweden)

    Sarah J Hall

    2017-10-01

    Full Text Available The effect of working on-call from home on the sympatho-adrenal medullary system activity is currently unknown. This study had two aims, Aim 1: examine salivary alpha amylase awakening response (AAR and diurnal salivary alpha amylase (sAA profile in fire and emergency service workers who operate on-call from home following a night on-call with a call (NIGHT-CALL, a night on-call without a call (NO-CALL and an off-call night (OFF-CALL, and Aim 2: explore whether there was an anticipatory effect of working on-call from home (ON compared to when there was an off-call (OFF on the diurnal sAA profile. Participants wore activity monitors, completed sleep and work diaries and collected seven saliva samples a day for one week. AAR area under the curve with respect to ground (AUCG, AAR area under the curve with respect to increase (AUCI, AAR reactivity, diurnal sAA slope, diurnal sAA AUCG and mean 12-h sAA concentrations were calculated. Separate generalised estimating equation models were constructed for each variable of interest for each aim. For Aim 1, there were no differences between NIGHT-CALL or NO-CALL and OFF-CALL for any response variable. For Aim 2, there was no difference between any response variable of interest when ON the following night compared to when OFF the following night (n = 14. These findings suggest that there is no effect of working on-call from home on sAA, but should be interpreted with caution, as overnight data were not collected. Future research, using overnight heart rate monitoring, could help confirm these findings.

  8. Constructing sanctions

    DEFF Research Database (Denmark)

    Jaeger, Mark Daniel

    2016-01-01

    such an effect. This paper explores sanctions conflicts as social constructs. It purports that rally-around-the-flag is all but one part of the discursive dimension of sanctions conflicts. Sanctions are intricately connected with the conflict setting they occur in. The study suggests a dialectical relation...... between how opponents perceive conflicts and the meaning of sanctions therein. This nexus of different constructions of sanctions moreover extends to “targeted” sanctions as well: As restrictive measures against Zimbabwe demonstrate, they are not the kind of minimally-invasive operations with clinical...

  9. Behavioral Preferences for Individual Securities : The Case for Call Warrants and Call Options

    NARCIS (Netherlands)

    Ter Horst, J.R.; Veld, C.H.

    2002-01-01

    Since 1998, large investment banks have flooded the European capital markets with issues of call warrants.This has led to a unique situation in the Netherlands, where now call warrants, traded on the stock exchange, and long-term call options, traded on the options exchange, exist.Both entitle their

  10. RITUAL AND IDENTITY CONSTRUCTION IN NIGERIAN IGBO ...

    African Journals Online (AJOL)

    NGOZI

    Against this background, video films that showcase the language and social attitudes of the Igbo people are seen ... Ritual and Identity Construction in Nigerian Igbo Video Films: A Call for policy .... emphasis on certain themes, the mass media.

  11. Construction work

    CERN Multimedia

    2004-01-01

    Construction work on building 179 will start on the 16th February 2004 and continue until November 2004. The road between buildings 179 and 158 will temporarily become a one way street from Route Democrite towards building 7. The parking places between buildings 179 and 7 will become obsolete. The ISOLDE collaboration would like to apologize for any inconveniences.

  12. Telephone calls by individuals with cancer.

    Science.gov (United States)

    Flannery, Marie; McAndrews, Leanne; Stein, Karen F

    2013-09-01

    To describe symptom type and reporting patterns found in spontaneously initiated telephone calls placed to an ambulatory cancer center practice. Retrospective, descriptive. Adult hematology oncology cancer center. 563 individuals with a wide range of oncology diagnoses who initiated 1,229 telephone calls to report symptoms. Raw data were extracted from telephone forms using a data collection sheet with 23 variables obtained for each phone call, using pre-established coding criteria. A literature-based, investigator-developed instrument was used for the coding criteria and selection of which variables to extract. Symptom reporting, telephone calls, pain, and symptoms. A total of 2,378 symptoms were reported by telephone during the four months. At least 10% of the sample reported pain (38%), fatigue (16%), nausea (16%), swelling (12%), diarrhea (12%), dyspnea (10%), and anorexia (10%). The modal response was to call only one time and to report only one symptom (55%). Pain emerged as the symptom that most often prompted an individual to pick up the telephone and call. Although variation was seen in symptom reporting, an interesting pattern emerged with an individual reporting on a solitary symptom in a single telephone call. The emergence of pain as the primary symptom reported by telephone prompted educational efforts for both in-person clinic visit management of pain and prioritizing nursing education and protocol management of pain reported by telephone. Report of symptoms by telephone can provide nurses unique insight into patient-centered needs. Although pain has been an important focus of education and research for decades, it remains a priority for individuals with cancer. A wide range in symptom reporting by telephone was evident.

  13. LA CONSTRUCCIÓN TEÓRICA Y PRÁCTICA DE UN NUEVO HÁBITAT MODERNO: UNOS PATIOS Y UNA CALLE (1946-1954 / The theoretical and practical construction of a new modern habitat: some patios and a street (1946-1954

    Directory of Open Access Journals (Sweden)

    Juan Pedro Sanz Alarcón

    2013-11-01

    European architects in exile, with the figure of the Spanish architect Sert as an outstanding example in the United States, favoured new lines of work. His 1946 proposals in the Peruvian city of Chimbote showed “a more human” concern than the previous examples. The great leap in these approaches took place in the early 50s when the young collaborators of Le Corbusier were entrusted with the construction of the Unité d’Habitation at Marseilles, and through the well-known ATBAT-Afrique group, in the construction of new suburbs in Casablanca. The proposals of patio houses developed there by Ecochard and Candilis, along with the urban proposals of the Smithsons in London, came together in the CIAM IX that brought about the creation of TEAM 10. This was the turning point and the start towards a new concept of the contemporary habitat.

  14. Modelling Constructs

    DEFF Research Database (Denmark)

    Kindler, Ekkart

    2009-01-01

    , these notations have been extended in order to increase expressiveness and to be more competitive. This resulted in an increasing number of notations and formalisms for modelling business processes and in an increase of the different modelling constructs provided by modelling notations, which makes it difficult......There are many different notations and formalisms for modelling business processes and workflows. These notations and formalisms have been introduced with different purposes and objectives. Later, influenced by other notations, comparisons with other tools, or by standardization efforts...... to compare modelling notations and to make transformations between them. One of the reasons is that, in each notation, the new concepts are introduced in a different way by extending the already existing constructs. In this chapter, we go the opposite direction: We show that it is possible to add most...

  15. Potential of Progressive Construction Systems in Slovakia

    Science.gov (United States)

    Kozlovska, Maria; Spisakova, Marcela; Mackova, Daniela

    2017-10-01

    Construction industry is a sector with rapid development. Progressive technologies of construction and new construction materials also called modern methods of construction (MMC) are developed constantly. MMC represent the adoption of construction industrialisation and the use of prefabrication of components in building construction. One of these modern methods is also system Varianthaus, which is based on, insulated concrete forms principle and provides complete production plant for wall, ceiling and roof elements for a high thermal insulation house construction. Another progressive construction system is EcoB, which represents an insulated precast concrete panel based on combination of two layers, insulation and concrete, produced in a factory as a whole. Both modern methods of construction are not yet known and wide-spread in the Slovak construction market. The aim of this paper is focused on demonstration of MMC using potential in Slovakia. MMC potential is proved based on comparison of the selected parameters of construction process - construction costs and construction time. The subject of this study is family house modelled in three material variants - masonry construction (as a representative of traditional methods of construction), Varianthaus and EcoB (as the representatives of modern methods of construction). The results of this study provide the useful information in decision-making process for potential investors of construction.

  16. Glasbury Bridge 1: The Jumper. Close Call.

    Science.gov (United States)

    Journal of Adventure Education and Outdoor Leadership, 1994

    1994-01-01

    Describes an incident in which a group of 10th-grade students in a 1-week outdoor residential program in the Wye Valley (Great Britain) defied program rules, drank alcohol, and had a close call with a near-drowning. Discusses five strategies for dealing with such groups coalesced around a rebellious leader. (SV)

  17. Implementing Distributed Algorithms using Remote Procedure Call

    NARCIS (Netherlands)

    Bal, H.E.; van Renesse, R.; Tanenbaum, A.S.

    1987-01-01

    Remote procedure call (RPC) is a simple yet powerful primitiv~ for communication and synchronization between distributed processes. A problem with RPC is that it tends to decrease the amount of parallelism in an application due to its synchronous nature. This paper shows how light-weight processes

  18. Calle San Martín

    Directory of Open Access Journals (Sweden)

    Gonzalo Cerda Brintrup

    1988-06-01

    Full Text Available En la década del 30 era un barrizal transitado por carretas, caballos y peatones, flanqueada por unas veredas algo más altas que la calle, limitadas por gruesos tablones que la Municipalidad reparaba de año en año.

  19. Inhibitors of calling behavior of Plodia interpunctella.

    Science.gov (United States)

    Hirashima, Akinori; Shigeta, Yoko; Eiraku, Tomohiko; Kuwano, Eiichi

    2003-01-01

    Some octopamine agonists were found to suppress the calling behavior of the stored product Indian meal moth, Plodia interpunctella. Compounds were screened using a calling behavior bioassay using female P. interpunctella. Four active derivatives, with inhibitory activity at the nanomolar range, were identified in order of decreasing activity: 2-(1-phenylethylamino)-2-oxazoline > 2-(2-ethyl,6-methylanilino)oxazolidine > 2-(2-methyl benzylamino)-2-thiazoline > 2-(2,6-diethylanilino)thiazolidine. Three-dimensional pharmacophore hypotheses were built from a set of 15 compounds. Among the ten common-featured models generated by the program Catalyst/HipHop, a hypothesis including a hydrogen-bond acceptor lipid, a hydrophobic aromatic and two hydrophobic aliphatic features was considered to be essential for inhibitory activity in the calling behavior. Active compounds mapped well onto all the hydrogen-bond acceptor lipid, hydrophobic aromatic and hydrophobic aliphatic features of the hypothesis. On the other hand, less active compounds were shown not to achieve the energetically favorable conformation that is found in the active molecules in order to fit the 3D common-feature pharmacophore models. The present studies demonstrate that inhibition of calling behavior is via an octopamine receptor.

  20. Inhibitors of calling behavior of Plodia interpunctella

    Directory of Open Access Journals (Sweden)

    Akinori Hirashima

    2003-01-01

    Full Text Available Some octopamine agonists were found to suppress the calling behavior of the stored product Indian meal moth, Plodia interpunctella. Compounds were screened using a calling behavior bioassay using female P. interpunctella. Four active derivatives, with inhibitory activity at the nanomolar range, were identified in order of decreasing activity: 2-(1-phenylethylamino-2-oxazoline > 2-(2-ethyl,6-methylanilinooxazolidine > 2-(2-methyl benzylamino-2-thiazoline > 2-(2,6-diethylanilinothiazolidine. Three-dimensional pharmacophore hypotheses were built from a set of 15 compounds. Among the ten common-featured models generated by the program Catalyst/HipHop, a hypothesis including a hydrogen-bond acceptor lipid, a hydrophobic aromatic and two hydrophobic aliphatic features was considered to be essential for inhibitory activity in the calling behavior. Active compounds mapped well onto all the hydrogen-bond acceptor lipid, hydrophobic aromatic and hydrophobic aliphatic features of the hypothesis. On the other hand, less active compounds were shown not to achieve the energetically favorable conformation that is found in the active molecules in order to fit the 3D common-feature pharmacophore models. The present studies demonstrate that inhibition of calling behavior is via an octopamine receptor.

  1. Computer Assisted Language Learning (CALL) Software: Evaluation ...

    African Journals Online (AJOL)

    Evaluating the nature and extent of the influence of Computer Assisted Language Learning (CALL) on the quality of language learning is highly problematic. This is owing to the number and complexity of interacting variables involved in setting the items for teaching and learning languages. This paper identified and ...

  2. What is this thing called growth?

    Science.gov (United States)

    Adrian M. Gilbert

    1954-01-01

    What is this thing called "growth"? We foresters are constantly thinking in terms of growth. We use growth data to evaluate a forest property. We use them to determine how much we can cut. We use them to weigh the results of a type of cutting.

  3. CIFSRF Concept Notes Call 2013 Instructions

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    Cc: (the other principal investigators and third-party organisations). Subject: CultiAF 2013 Call for Concept Notes Submitted by (names of all principal ..... clerical, accounting, or secretarial help, general office expenses, office rental and utility ... Please provide the details of financial contributions that will be made to the ...

  4. Relabeling the Medications We Call Antidepressants

    Directory of Open Access Journals (Sweden)

    David Antonuccio

    2012-01-01

    Full Text Available This paper raises the question about whether the data on the medications we call antidepressants justify the label of antidepressant. The authors argue that a true antidepressant should be clearly superior to placebo, should offer a risk/benefit balance that exceeds that of alternative treatments, should not increase suicidality, should not increase anxiety and agitation, should not interfere with sexual functioning, and should not increase depression chronicity. Unfortunately, these medications appear to fall short on all of these dimensions. Many of the “side effects” of these medications have larger effect sizes than the antidepressant effect size. To call these medications antidepressants may make sense from a marketing standpoint but may be misleading from a scientific perspective. Consumers deserve a label that more accurately reflects the data on the largest effects and helps them understand the range of effects from these medications. In other words, it may make just as much sense to call these medications antiaphrodisiacs as antidepressants because the negative effects on libido and sexual functioning are so common. It can be argued that a misleading label may interfere with our commitment to informed consent. Therefore, it may be time to stop calling these medications antidepressants.

  5. 76 FR 36130 - Call for Candidates

    Science.gov (United States)

    2011-06-21

    ... financial information in decision-making. The Board meets in Washington, DC, for two days every other month... FEDERAL ACCOUNTING STANDARDS ADVISORY BOARD Call for Candidates AGENCY: Federal Accounting... candidates. Any applicant who provided the Federal Accounting Standards Advisory Board (FASAB or the Board...

  6. 78 FR 76257 - Rural Call Completion

    Science.gov (United States)

    2013-12-17

    ... must be held together with rubber bands or fasteners. Any envelopes must be disposed of before entering... Completion/Call Termination Handbook outlining standards and practices of the industry relevant to ensuring... telecommunications networks. Transmission facilities may be based on a single technology or a combination of...

  7. 17 CFR 31.18 - Margin calls.

    Science.gov (United States)

    2010-04-01

    ... transaction merchant is unable to effect personal contact with a leverage customer, a telegram sent to the....18 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION LEVERAGE TRANSACTIONS § 31.18 Margin calls. (a) No leverage transaction merchant shall liquidate a leverage contract because of...

  8. Make a 21st century phone call

    CERN Multimedia

    Katarina Anthony

    2014-01-01

    Want to avoid roaming charges? Click to call anyone at CERN? How about merging your CERN landline with your existing smartphone? That's all easily done with Lync, CERN's new opt-in service that can take your calls to the next level.   The Lync application on Windows (left) and iPhone (right). Lync unites CERN's traditional telephone service with the digital sphere. "Lync gives you the gift of mobility, by letting you access your CERN landline on the go," explains Pawel Grzywaczewski, service manager of the Lync system. "Once you've registered your CERN telephone with the service, you can run the Lync application and make calls from a range of supported devices. No matter where you are in the world - be it simply out to lunch or off at an international conference - you can make a CERN call as though you were in the office. All you need is an Internet connection!" Following a recent upgrade, CERN's Lync service now has...

  9. When to call a linear system nonnegative

    NARCIS (Netherlands)

    Nieuwenhuis, J.W.

    1998-01-01

    In this paper we will consider discrete time invariant linear systems that allow for an input-state-output representation with a finite dimensional state space, and that have a finite number of inputs and outputs. The basic issue in this paper is when to call these systems nonnegative. An important

  10. Don't Call It School

    Science.gov (United States)

    Robb, Daniel

    2006-01-01

    "Homeschooling," "deschooling," and "unschooling" are commonly used terms in the alternative-education world, but each lacks specificity. In this article, the author describes what he discovered during several visits to North Star. Known officially as North Star: Self-Directed Learning for Teens, it is not as structured as a so-called "free"…

  11. Optimization of Overflow Policies in Call Centers

    DEFF Research Database (Denmark)

    Koole, G.M.; Nielsen, B.F.; Nielsen, T.B.

    2015-01-01

    . A Markov decision chain is used to determine the optimal policy. This policy outperforms considerably the ones used most often in practice, which use a fixed threshold. The present method can be used also for other call-center models and other situations where performance is based on actual waiting times...

  12. Japanese electric utilities call for IPP capacity

    Energy Technology Data Exchange (ETDEWEB)

    Jeffs, E.

    1997-03-01

    Japan`s ten power utilities have finally grasped the nettle, and called in IPPs to supply at least 3 GW of new capacity in each of the next ten years. The first twenty schemes awarded last year are all based on existing industrial energy producers, and consist mainly of coal- or oil-fired plants of 150 MW or less. 1 tab.

  13. Impact of mobility on call block, call drops and optimal cell size in small cell networks

    OpenAIRE

    Ramanath , Sreenath; Voleti , Veeraruna Kavitha; Altman , Eitan

    2011-01-01

    We consider small cell networks and study the impact of user mobility. Assuming Poisson call arrivals at random positions with random velocities, we discuss the characterization of handovers at the boundaries. We derive explicit expressions for call block and call drop probabilities using tools from spatial queuing theory. We also derive expressions for the average virtual server held up time. These expressions are used to derive optimal cell sizes for various profile of velocities in small c...

  14. LAS CHICAS EN LA CASA, LOS CHICOS EN LA CALLE. CONSTRUCCIÓN GENÉRICA, VIOLENCIA Y PRÁCTICAS DE SOCIABILIDAD EN VILLA EL NAILON, CÓRDOBA / The girls in the house, the boys on the street. General construction, violence and sociability practices in Córdoba

    Directory of Open Access Journals (Sweden)

    María Elena Previtali

    2010-12-01

    which from the earliest infancy they structure the uses of the different spaces of the villa with the divisions and inequalities in the relations of conyugality. The analysis of labor practices and of friendship are constituted also in central areas to understand how the use of the violence in the exchanges between young people and groups regulate the relations and are constituted in symbolic spaces to construct and to demonstrate masculinities or femininity that face and are not bent easily.   Keywords: young; spaces; couples; gender; violence.

  15. Constructing Catalonia

    Directory of Open Access Journals (Sweden)

    Bill Philips

    2009-07-01

    Full Text Available Catalonia, in common with other nations, has long been concerned with the question of identity and difference. Its problematic relationship with Spain has led to an emphasis on differentiating itself from its larger neighbour (if we are to accept, as most Spaniards do not, that Catalonia is not Spain, a situation complicated by the loss of the Spanish colonies of Cuba and The Philippines in 1898, and the Spanish Civil War and subsequent dictatorship from 1936 to 1976. Beginning in the late nineteenth century, the construction of a Catalan identity followed a similar route to that taken by other European nations such as England, Ireland and, indeed, Spain, including an emphasis on rural values, activities and the countryside, and the conversion of specifically local traditions into national past times. It is only in the last ten years or so that this model of Catalan identity has been recognised for what it is – a model constructed and encouraged for and by specific nationalist political interests. Ironically, Catalonia’s identity abroad has also been constructed and manipulated for political purposes, but from quite a different perspective. Orwell’s /Homage to Catalonia/ (1938 narrates an extremely blinkered version of the Spanish Civil War which has achieved iconic status as a result of cold war politics. Subsequent portrayals of the Spanish Civil War – Valentine Cunningham’s /The Penguin Book of Spanish Civil War Verse/ (ed., Penguin, 1980, or Ken Loach’s 1995 film /Land and Freedom/ base their arguments unquestioningly on /Homage to Catalonia/, perpetuating a view of the nation’s recent history that is both reductive and inaccurate

  16. Layout Construction

    DEFF Research Database (Denmark)

    Frandsen, Gudmund Skovbjerg; Palsberg, Jens; Schmidt, Erik Meineche

    We design a system for generating newspaper layout proposals. The input to the system consists of editorial information (text, pictures, etc) and style information (non-editorial information that specifies the aesthetic appearance of a layout). We consider the automation of layout construction...... to pose two main problems. One problem consists in optimizing the layout with respect to the constraints and preferences specified in the style information. Another problem consists in finding a representation of the style information that both supports its use in the combinatorial optimization...

  17. Construction of a low-cost luximeter

    Science.gov (United States)

    Pedroso, L. S.; de Macedo, J. A.; de Araújo, M. S. T.; Voelzke, M. R.

    2016-04-01

    This paper proposes the construction of an electronic instrument called digital luximeter, combining simplicity and low cost, making it simpler and cheaper than those on the market. Its construction tends to facilitate dissemination and access to this type of measuring instrument between high school teachers and educational institutions, making it ideal to be a science lab.

  18. US calls for CO2 cut

    International Nuclear Information System (INIS)

    Roberts, M.

    1996-01-01

    The US Government has outraged energy-intensive industries by calling for an international agreement to reduce global emissions of carbon dioxide (CO 2 ) and other greenhouse gases. In a clear policy shift, the US--the world's largest emitter of greenhouse gases and not previously an advocate of curbing them--says it now intends to lead moves to prevent global warming. At last week's Second Conference of the Parties (COP-2) to the United Nations Framework Convention on Climate Change (FCCC), US Undersecretary for Global Affairs Timothy Wirth called for open-quotes an agreement that sets a realistic, verifiable, and binding medium-term emissions target.close quotes Individual countries should be free to choose how to meet targets, and the US favors market-based mechanisms, he says. open-quotes Climate change is a serious problem and will require sustained long-term investment to be addressed successfully,close quotes Wirth says

  19. Performance of multi-service system with retrials due to blocking and called-party-busy

    DEFF Research Database (Denmark)

    Stepanov, S.N.; Kokina, O.A.; Iversen, Villy Bæk

    2008-01-01

    In this paper we construct a model of a multi-service system with an arbitrary number of bandwidth flow demands, taking into account retrials due to both blocking along the route and to called-party-busy. An approximate algorithm for estimation of key performance measures is proposed, and the pro......In this paper we construct a model of a multi-service system with an arbitrary number of bandwidth flow demands, taking into account retrials due to both blocking along the route and to called-party-busy. An approximate algorithm for estimation of key performance measures is proposed...

  20. BUSINESS MODELS FOR EXTENDING OF 112 EMERGENCY CALL CENTER CAPABILITIES WITH E-CALL FUNCTION INSERTION

    Directory of Open Access Journals (Sweden)

    Pop Dragos Paul

    2010-12-01

    Full Text Available The present article concerns present status of implementation in Romania and Europe of eCall service and the proposed business models regarding eCall function implementation in Romania. eCall system is used for reliable transmission in case of crush between In Vehicle System and Public Service Answering Point, via the voice channel of cellular and Public Switched Telephone Network (PSTN. eCall service could be initiated automatically or manual the driver. All data presented in this article are part of researches made by authors in the Sectorial Contract Implementation study regarding eCall system, having as partners ITS Romania and Electronic Solution, with the Romanian Ministry of Communication and Information Technology as beneficiary.

  1. Circus: A Replicated Procedure Call Facility

    Science.gov (United States)

    1984-08-01

    298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 client client stubs ...... ...... ..... ..... runtime libary stub compiler binding agent...runtime libary Figure 1: Structure of the Circus system replicated procedure call paired message protocol unreliable datagrams Figure 2: Circus...114-121. [11) Digit &! Equipment Corporation, Intel Corporation, a.nd Xerox Corporation. The Ethernet: A Local Area Networlc. September 1080. [12

  2. Beware of the Spirits that You Call!

    DEFF Research Database (Denmark)

    Vasquez, Consuelo; Schoeneborn, Dennis; Sergi, Viviane

    This article proposes to study the constitution of organization by acknowledging the fundamentally intertwined nature of order and disorder. Adopting a dialectical lens, we explore the (dis)ordering properties of communication by focusing on both the symbolic and the material dimensions of language...... plays a key role in the development of projects (and more broadly organizations), keeping them in motion by calling forth continuous processes of meaning negotiation....

  3. [Work-family conflict in call center].

    Science.gov (United States)

    Ghislieri, Chiara; Ricotta, Simona; Colombo, Lara

    2012-01-01

    The working environment of call centers, which have seen a significant growth in recent years, has been the subject of several studies aiming at understanding its specific dynamics, with particular attention to the possible causes of stress and discomfort. Despite the fact that the work-family conflict is considered a source of stress responsible for undermining workers' well-being, and as such has been explored in many work environments, there is still very little research specific to call centers. This study had the following aims: to explore work-family conflict perceived by call-center operators taking account of any differences related to respondents'professional and personal characteristics; to understand which demands and resources can have an impact on work-family conflict in this context. The study was carried out on a sample of 898 call center operators in a telecommunications company through the administration of a self-reporting questionnaire. Data analysis included: t-test, one-way analysis of variance, linear correlations and multiple regressions. A higher perception of work-family conflict among workers having a full-time contract was observed compared to those having part-time contracts. Multiple regression analysis identified as sources of influence on work-family conflict: emotional dissonance, uneasiness due customer dissatisfaction, workload, avoidance coping and working hours. Work-family conflict in the context studied is not particularly critical: it is in part influenced by professional and personal characteristics of respondents and primarily caused by work demands. Managerial implications are discussed, especially referred to training activities.

  4. “Computer Assisted Language Learning” (CALL

    Directory of Open Access Journals (Sweden)

    Nazlı Gündüz

    2005-10-01

    Full Text Available This article will provide an overview of computers; an overview of the history of CALL, itspros and cons, the internet, World Wide Web, Multimedia, and research related to the uses of computers in the language classroom. Also, it also aims to provide some background for the beginnerson using the Internet in language classes today. It discusses some of the common types of Internetactivities that are being used today, what the minimum requirements are for using the Internet forlanguage learning, and some easy activities you can adapt for your classes. Some special terminology related to computers will also be used in this paper. For example, computer assisted language learning(CALL refers to the sets of instructions which need to be loaded into the computer for it to be able to work in the language classroom. It should be borne in mind that CALL does not refer to the use of acomputer by a teacher to type out a worksheet or a class list or preparing his/her own teaching alone.Hardware refers to any computer equipment used, including the computer itself, the keyboard, screen (or the monitor, the disc-drive, and the printer. Software (computer programs refers to the sets of instructions which need to be loaded into the computer for it to be able to work.

  5. When Crisis Calls for a Referendum.

    Science.gov (United States)

    Blanchfield, Terrence A.

    1998-01-01

    The school business official will be involved in many referenda over the course of a career. School budgets, capital projects, equipment acquisitions, school bus purchases, and emergency construction projects are among the most common situations requiring a referendum. A time frame is needed, and most states have guidelines spelling out procedures…

  6. Entrepreneurship research and practice: a call to action for psychology.

    Science.gov (United States)

    Hisrich, Robert; Langan-Fox, Janice; Grant, Sharon

    2007-09-01

    Entrepreneurship is a major source of employment, economic growth, and innovation, promoting product and service quality, competition, and economic flexibility. It is also a mechanism by which many people enter the society's economic and social mainstream, aiding culture formation, population integration, and social mobility. This article aims to illuminate research opportunities for psychologists by exposing gaps in the entrepreneurship literature and describing how these gaps can be filled. A "call to action" is issued to psychologists to develop theory and undertake empirical research focusing on five key topic areas: the personality characteristics of entrepreneurs, the psychopathology of entrepreneurs, entrepreneurial cognition, entrepreneurship education, and international entrepreneurship. Methodological issues are discussed and recommendations provided. It is shown that psychologists can help identify the factors that influence new venture creation and success and inform the construction of public policy to facilitate entrepreneurship.

  7. Calling patterns in human communication dynamics.

    Science.gov (United States)

    Jiang, Zhi-Qiang; Xie, Wen-Jie; Li, Ming-Xia; Podobnik, Boris; Zhou, Wei-Xing; Stanley, H Eugene

    2013-01-29

    Modern technologies not only provide a variety of communication modes (e.g., texting, cell phone conversation, and online instant messaging), but also detailed electronic traces of these communications between individuals. These electronic traces indicate that the interactions occur in temporal bursts. Here, we study intercall duration of communications of the 100,000 most active cell phone users of a Chinese mobile phone operator. We confirm that the intercall durations follow a power-law distribution with an exponential cutoff at the population level but find differences when focusing on individual users. We apply statistical tests at the individual level and find that the intercall durations follow a power-law distribution for only 3,460 individuals (3.46%). The intercall durations for the majority (73.34%) follow a Weibull distribution. We quantify individual users using three measures: out-degree, percentage of outgoing calls, and communication diversity. We find that the cell phone users with a power-law duration distribution fall into three anomalous clusters: robot-based callers, telecom fraud, and telephone sales. This information is of interest to both academics and practitioners, mobile telecom operators in particular. In contrast, the individual users with a Weibull duration distribution form the fourth cluster of ordinary cell phone users. We also discover more information about the calling patterns of these four clusters (e.g., the probability that a user will call the c(r)-th most contact and the probability distribution of burst sizes). Our findings may enable a more detailed analysis of the huge body of data contained in the logs of massive users.

  8. Call for another special issue / book

    Science.gov (United States)

    Bostenaru Dan, M.

    2009-04-01

    We would like to continue the series of special issue or maybe edit a book on this topic. To complete the formerly edited special issues we would like to link natural hazards research to cultural heritage research. We see a way of doing this connected to "integrated conservation", which sees the involvment of urban planning in conservation, as well as the (urban) sociology, the integration of the user, the participatism. We further call for investigation of GIS applications for the investigation of natural hazards' impact in this field. We are open for further ideas and wait for you at the Splinter meeting.

  9. Call center. Centrados en el cliente

    OpenAIRE

    Leal-Alonso-de-Castañeda, José Enrique

    2003-01-01

    La empresa actual ha de estar preparada para responder al Cliente tal y como éste espera, porque no se busca un cliente puntual, sino un cliente fiel. La globalización de la economía y del acceso a los mercados exige que la empresa sea capaz de atraer al cliente no sólo con un servicio de calidad, sino además con una atención de calidad. La implantación de un Call Center (Centro de Atención al Cliente, Centro de Atención de Llamadas) constituye por todo ello una estrategia de negocio qu...

  10. JPEG XS call for proposals subjective evaluations

    Science.gov (United States)

    McNally, David; Bruylants, Tim; Willème, Alexandre; Ebrahimi, Touradj; Schelkens, Peter; Macq, Benoit

    2017-09-01

    In March 2016 the Joint Photographic Experts Group (JPEG), formally known as ISO/IEC SC29 WG1, issued a call for proposals soliciting compression technologies for a low-latency, lightweight and visually transparent video compression scheme. Within the JPEG family of standards, this scheme was denominated JPEG XS. The subjective evaluation of visually lossless compressed video sequences at high resolutions and bit depths poses particular challenges. This paper describes the adopted procedures, the subjective evaluation setup, the evaluation process and summarizes the obtained results which were achieved in the context of the JPEG XS standardization process.

  11. First Class Call Stacks: Exploring Head Reduction

    Directory of Open Access Journals (Sweden)

    Philip Johnson-Freyd

    2016-06-01

    Full Text Available Weak-head normalization is inconsistent with functional extensionality in the call-by-name λ-calculus. We explore this problem from a new angle via the conflict between extensionality and effects. Leveraging ideas from work on the λ-calculus with control, we derive and justify alternative operational semantics and a sequence of abstract machines for performing head reduction. Head reduction avoids the problems with weak-head reduction and extensionality, while our operational semantics and associated abstract machines show us how to retain weak-head reduction's ease of implementation.

  12. What Is This Thing Called Learner's Lexicography?

    DEFF Research Database (Denmark)

    Nielsen, Sandro

    2010-01-01

    Learner lexicography as a research area has attracted increased attention during the past decades, but what is actually the true nature of learner lexicography? This question calls for a complex answer. Learner lexicography has as its objective to develop principles that help practitioners......, namely its functions, data and structures, as this strengthens the basis of learner lexicography because it leads to a proper study and understanding of the competences and needs of learners. Finally, the modern theory of dictionary functions encourages theoretical and practical lexicographers to adopt...

  13. Nuclear plant refurbishment calls for patience. [Construction of radioactive effluent plant

    Energy Technology Data Exchange (ETDEWEB)

    Henly, Anna

    1989-08-01

    All nuclear power plants produce a small quantity of liquid effluent from wash hand basins, showers and surface drains on the site. The effluent is termed low-level radioactive waste and under the 'Radioactive Substances Act' can be discharged into estuaries or the sea. Before a controlled discharge can be made the effluent has to be chemically treated and have any radioactive particulate matter removed. The replacing of the radioactive effluent plant at the Berkeley nuclear power station in the United Kingdom is described, with particular reference to the vigorous safety standards and quality assurance programme operated by the Central Electricity Generating Board. (author).

  14. Efficient construction of approximate call graphs for JavaScript IDE services

    DEFF Research Database (Denmark)

    Feldthaus, Asger; Schäfer, Max; Sridharan, Manu

    2013-01-01

    The rapid rise of JavaScript as one of the most popular programming languages of the present day has led to a demand for sophisticated IDE support similar to what is available for Java or C#. However, advanced tooling is hampered by the dynamic nature of the language, which makes any form of stat...

  15. Collapse simulation of building constructions

    Directory of Open Access Journals (Sweden)

    Nekrest'yanov Viktor Nikolaevich

    Full Text Available The physical reasons for building structures destruction are both the forces arising at stress-strain state of construction elements and external influences arising at emergency situations, as well as their moments, impulses and periodic impulses with the frequencies close to of fluctuations frequencies of construction elements. We shall call the mathematical calculation models for the parameters-reasons of destructions the basic models. The basic models of destruction of building structures elements allow not only providing necessary level of reliability and survivability of the elements and the construction as a whole already at the stage of their design, but also giving the chance, at their corresponding completion, to provide rational decisions on the general need of recovery works and their volume depending on destruction level. Especially important for rational design decisions development, which ensure the demanded constructional safety of building structures, is library creation of the basic mathematical models of standard processes of bearing elements destructions for standard construction designs for the purpose of the further forecast (assessment of the level and probabilities of standard destructions. Some basic mathematical models of destructions processes of the standard elements of building structures are presented in the present article. A model of accounting for construction defects and a model of obtaining requirements to probabilities of partial destructions of a construction are given. Both of these models are probabilistic.

  16. A Call for National Security System Transformation

    Science.gov (United States)

    2012-06-01

    Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Fox News Corporation. “Last American Troops Leave Iraq...by Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Stewart, Douglas. “Constructing the Iron Cage: The...1947 National Security Act.” In Affairs of State: The Interagency and National Security. Edited by Gabriel Marcella . Carlisle, PA: Strategic

  17. Interactionability in Computer Game: Call of Duty

    Directory of Open Access Journals (Sweden)

    masoud Kowsari

    2009-11-01

    Full Text Available For a long time communication theorists have criticized public media for being unilateral. What they prescript is to transform pattern of communication into bilateral one; in other words, to make media interactional. Telephone is the first fully interactional, however, there was a long road to the contemporary communication and information media which are highly interactional. Nevertheless, not all the modern media are equally interactional. Therefore, it is necessary to evaluate levels of interactionability in modern media and strength them. As other concepts in communication, interaction has different definitions, implying various aspects of the audience-media relation. And this feature of multi-dimensionality is to be considered. Quistis (2002 suggests a model in which all the technical, social, and comprehensive aspects of interaction are inherent. In other words, not only the technical aspect of media, but also audience’s perception plays a key role in the model. Visual-computer games are good instance of interactionability in modern media. However, not all games are equally interactional. Analyzing a well-known computer game “Call of Duty”, this article attempts to study different levels of interactionability. The main question is: how can one offer a pragmatic definition of three dimensions of interactionability to study computer games; and how this features are in Call of Duty applied?

  18. Theology links Christian ministry with God's call.

    Science.gov (United States)

    O'Connell, L J

    1984-03-01

    Catholic health care ministry originates in and is shaped by the theme of call in the Old and New Testaments. To be specifically Catholic, health professionals and facilities must define their ministries according to the values expressed in this theological tradition. Sponsorship. The opportunity to provide health care enables religious communities to contribute to God's ongoing creation process and to reiterate Christ's call to minister to others. Although health care facility sponsorship thrusts religious communities into the arena of big business, the abandonment of the health care mission could be considered a betrayal of evangelical values. Quality of life. The implicit concern for human dignity that distinguishes Catholic health care facilities should be evident in personalized patient care, just working conditions, and a commitment to healing in the civic community. Stewardship in ethics. The development of business policies and procedures and institutional responses to social change should be carefully considered in light of the Catholic understanding of loving covenant and the Christian way of life. Shared ministry. Health care facilities have played a leading role in implementing the Second Vatican Council's vision of ministry. Sponsoring communities' continued willingness to share responsibilities with laity will be imperative in meeting the health care demands of the future.

  19. Theologia and the Ideologica of Language: The calling of a theology ...

    African Journals Online (AJOL)

    The article argues that texts, and theology faculties as texts, are just as any structure or construction haunted by their sacred secret. Haunted by the ghosts in the texts from the past to be inspired for the calling of a theology and religion faculty in a time of populism and the 'renaissance of (neo)nationalism', according to Van ...

  20. A comparative analysis of the statistical properties of large mobile phone calling networks.

    Science.gov (United States)

    Li, Ming-Xia; Jiang, Zhi-Qiang; Xie, Wen-Jie; Miccichè, Salvatore; Tumminello, Michele; Zhou, Wei-Xing; Mantegna, Rosario N

    2014-05-30

    Mobile phone calling is one of the most widely used communication methods in modern society. The records of calls among mobile phone users provide us a valuable proxy for the understanding of human communication patterns embedded in social networks. Mobile phone users call each other forming a directed calling network. If only reciprocal calls are considered, we obtain an undirected mutual calling network. The preferential communication behavior between two connected users can be statistically tested and it results in two Bonferroni networks with statistically validated edges. We perform a comparative analysis of the statistical properties of these four networks, which are constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that these networks share many common structural properties and also exhibit idiosyncratic features when compared with previously studied large mobile calling networks. The empirical findings provide us an intriguing picture of a representative large social network that might shed new lights on the modelling of large social networks.

  1. NUESTRA PORTADA. Jugar en la calle

    Directory of Open Access Journals (Sweden)

    Ramon Balius i Juli

    2008-06-01

    Full Text Available Esta vez Nuestra Portada tiene un carácter excepcional. La ocupan dos obras del que fue el “ninotaire” (dibujante de humor inteligente más importante de nuestro país: Francesc Vila i Rufas, conocido por todos como Cesc (1927–2006. Ambos dibujos destacan por sus inconfundibles características de sencillez y, a la vez, de grandeza argumental, que nos han movido a titular este comentario como “Jugar en la calle”. Comenzaré recordando mi precaria experiencia de infancia y primera juventud en esta actividad de índole “suburbana”. Son muchas las personas de mi edad que en algún momento de sus primeros años han jugado en la calle. Recuerdo que la primera vez que lo hice fue hacia 1938, en Sant Boi de Llobregat (denominado entonces Vilaboi, jugando al fútbol. Pasé unos meses en este pueblo huyendo de las bombas que caían sobre Barcelona. También por aquel tiempo, o quizá uno o dos años después, tuve el deseo, que no he podido satisfacer, de deslizarme sobre unos artefactos de madera con ruedas de cojinetes de bolas por la calle de Enric Granados, donde vivía (los construían los chicos del barrio, en formas rudimentarias, que hoy recordarían a los patinetes o los “skateboards”. Durante el bachillerato, al salir de la Escuela Pia de Balmes esquina con Travesera de Gracia, algunas veces había jugado también a fútbol en la calle Tuset, que por aquellos años no estaba bien urbanizada y tenía unas aceras amplísimas sin asfaltar. En los primeros cursos de la carrera de Medicina, participé en unos continuos e inacabables partidos de fútbol que, desde primera hora de la mañana y hasta el mediodía, se organizaban diariamente en el patio claustrado de la Facultad. Generalmente jugábamos entre clase y clase, aunque existía un núcleo de jugadores entusiastas que no entraban en las aulas en ningún momento. Esta competición se clausuró al cabo de bastantes años, cuando el Decano decidió adornar el patio con

  2. ITER, On the way to call for the license

    International Nuclear Information System (INIS)

    Alejaidre, C.; Girard, J.P.

    2007-01-01

    Full text of publication follows: All the seven ITER Parties have now ratified the lTER Agreement, which was signed in Paris in November last year. On October 24, 2007 the ITER Agreement enters officially into force. The licensing procedure to start construction shall be launched within the coming months in order to start construction at the beginning of 2009. The Host Party, Europe and the Host State, France have already participated together with the ITER Organization (IO) to a public debate to present the project to the neighboring populations (January to May 2006) and other administrative procedures to prepare the site and the roads for heavy loads. According to host state law on licensing of nuclear facilities, IO will send a set of administrative documents including a safety assessment (called Preliminary Safety Report) and public hearing files including impact studies and risk analysis. The review and public hearing are expected mid-08 to be consistent with the start of nuclear building construction on site. The latest update of the design took into account of inputs from: -An internal design review managed through eight specialist groups including safety and licensing, - Host State regulations (technical and QA), which should be fulfilled as quoted in the ITER agreement, - Site adaptation including land configuration, environmental conditions and external hazards. The ITER designers, in close contact with the Participant Teams, are proceeding with the adaptation of the generic design to comply with these new inputs. The codes and standards for all equipment are also under revision in order to fit with the expected requirements, taking into account the procurement sharing agreement and the French regulations. In the earlier stage of ITER design fusion took benefit from fission knowledge, in the present stage fusion is taking the lead as can be demonstrated by the update of the European mechanical code RCC-MR, now ready and updated to the vacuum vessel design

  3. Comprometimento organizacional de trabalhadores de call center

    Directory of Open Access Journals (Sweden)

    Kely César Martins Paiva

    2015-09-01

    Full Text Available RESUMOO Neste artigo, analisa-se como se apresenta o comprometimento organizacional de trabalhadores de um call center, localizado em Belo (A Horizonte (Minas Gerais, Brasil. Após o delineamento conceitual UJ do tema central, são expostos os resultados de um estudo de caso descritivo, realizado com abordagens quantitativa e qualitativa. Os dados de 399 questionários e 22 entrevistas são, respectivamente, tratados estatisticamente e submetidos à análise de conteúdo. A base de comprometimento que predominou entre esses infoproletários foi "obrigação pelo desempenho" e, em menor grau, "afetiva". Foi observado que quanto maior é o seu tempo de experiência nesse tipo de organização, menores são os níveis de comprometimento de modo geral, fatos esclarecidos, parcialmente, por meio das entrevistas.

  4. Museo a todo pedal: Calle 26

    Directory of Open Access Journals (Sweden)

    Catalina Delgado

    2018-05-01

    Full Text Available Este texto reseña el proyecto urbano “MUSEO A TODO PEDAL: CALLE 26” realizado con la intención de promover el conocimiento y la apropiación crítica del patrimonio escultórico de la Avenida El Dorado en la ciudad de Bogotá, Colombia. La gestión dio inicio en octubre de 2014 con una serie de actividades, entre ellas, el lanzamiento oficial de la Guía de Monumentos y Sitios y la organización de una carrera ciclística de observación. Es del interés de RevistArquis, publicar este proyecto en diálogo con el ensayo de uno de los autores publicado en el Vol. 1 (2015 Número 07 “Usos Cotidianos y Populares de la Bicicleta en Bogotá”. This paper reviews the urban project “MUSEO A TODO PEDAL: CALLE 26” held to promote awareness and critical appropriation of the sculptural heritage of Avenida El Dorado in Bogota, Colombia. The urban project began in October 2014 with a series of activities including the official launch of the Guide on Monuments and Sites and the organization of a watching cycling road race. RevistArquis is honored to publish this project in dialogue with the essay by the same author published in Vol. 1 (2015 Number 07 “Usos Cotidianos y Populares de la Bicicleta en Bogotá”.

  5. From nestling calls to fledgling silence: adaptive timing of change in response to aerial alarm calls.

    Science.gov (United States)

    Magrath, Robert D; Platzen, Dirk; Kondo, Junko

    2006-09-22

    Young birds and mammals are extremely vulnerable to predators and so should benefit from responding to parental alarm calls warning of danger. However, young often respond differently from adults. This difference may reflect: (i) an imperfect stage in the gradual development of adult behaviour or (ii) an adaptation to different vulnerability. Altricial birds provide an excellent model to test for adaptive changes with age in response to alarm calls, because fledglings are vulnerable to a different range of predators than nestlings. For example, a flying hawk is irrelevant to a nestling in a enclosed nest, but is dangerous to that individual once it has left the nest, so we predict that young develop a response to aerial alarm calls to coincide with fledging. Supporting our prediction, recently fledged white-browed scrubwrens, Sericornis frontalis, fell silent immediately after playback of their parents' aerial alarm call, whereas nestlings continued to calling despite hearing the playback. Young scrubwrens are therefore exquisitely adapted to the changing risks faced during development.

  6. Experimental study on rapid embankment construction methods

    International Nuclear Information System (INIS)

    Hirano, Hideaki; Egawa, Kikuji; Hyodo, Kazuya; Kannoto, Yasuo; Sekimoto, Tsuyoshi; Kobayashi, Kokichi.

    1982-01-01

    In the construction of a thermal or nuclear power plant in a coastal area, shorter embankment construction period has come to be called for recently. This tendency is remarkable where construction period is limited due to meteorological or sea conditions. To meet this requirement, the authors have been conducting basic experimental studies on two methods for the rapid execution of embankment construction, that is, Steel Plate Cellular Bulkhead Embedding Method and Ship Hull Caisson Method. This paper presents an outline of the results of the experimental study on these two methods. (author)

  7. Sharing programming resources between Bio* projects through remote procedure call and native call stack strategies

    DEFF Research Database (Denmark)

    Prins, Pjotr; Goto, Naohisa; Yates, Andrew

    2012-01-01

    Open-source software (OSS) encourages computer programmers to reuse software components written by others. In evolutionary bioinformatics, OSS comes in a broad range of programming languages, including C/C++, Perl, Python, Ruby, Java, and R. To avoid writing the same functionality multiple times...... for different languages, it is possible to share components by bridging computer languages and Bio* projects, such as BioPerl, Biopython, BioRuby, BioJava, and R/Bioconductor. In this chapter, we compare the two principal approaches for sharing software between different programming languages: either by remote...... procedure call (RPC) or by sharing a local call stack. RPC provides a language-independent protocol over a network interface; examples are RSOAP and Rserve. The local call stack provides a between-language mapping not over the network interface, but directly in computer memory; examples are R bindings, RPy...

  8. Staffing to Maximize Profit for Call Centers with Impatient and Repeat-Calling Customers

    Directory of Open Access Journals (Sweden)

    Jun Gong

    2015-01-01

    Full Text Available Motivated by call center practice, we study the optimal staffing of many-server queues with impatient and repeat-calling customers. A call center is modeled as an M/M/s+M queue, which is developed to a behavioral queuing model in which customers come and go based on their satisfaction with waiting time. We explicitly take into account customer repeat behavior, which implies that satisfied customers might return and have an impact on the arrival rate. Optimality is defined as the number of agents that maximize revenues net of staffing costs, and we account for the characteristic that revenues are a direct function of staffing. Finally, we use numerical experiments to make certain comparisons with traditional models that do not consider customer repeat behavior. Furthermore, we indicate how managers might allocate staffing optimally with various customer behavior mechanisms.

  9. Sharing programming resources between Bio* projects through remote procedure call and native call stack strategies.

    Science.gov (United States)

    Prins, Pjotr; Goto, Naohisa; Yates, Andrew; Gautier, Laurent; Willis, Scooter; Fields, Christopher; Katayama, Toshiaki

    2012-01-01

    Open-source software (OSS) encourages computer programmers to reuse software components written by others. In evolutionary bioinformatics, OSS comes in a broad range of programming languages, including C/C++, Perl, Python, Ruby, Java, and R. To avoid writing the same functionality multiple times for different languages, it is possible to share components by bridging computer languages and Bio* projects, such as BioPerl, Biopython, BioRuby, BioJava, and R/Bioconductor. In this chapter, we compare the two principal approaches for sharing software between different programming languages: either by remote procedure call (RPC) or by sharing a local call stack. RPC provides a language-independent protocol over a network interface; examples are RSOAP and Rserve. The local call stack provides a between-language mapping not over the network interface, but directly in computer memory; examples are R bindings, RPy, and languages sharing the Java Virtual Machine stack. This functionality provides strategies for sharing of software between Bio* projects, which can be exploited more often. Here, we present cross-language examples for sequence translation, and measure throughput of the different options. We compare calling into R through native R, RSOAP, Rserve, and RPy interfaces, with the performance of native BioPerl, Biopython, BioJava, and BioRuby implementations, and with call stack bindings to BioJava and the European Molecular Biology Open Software Suite. In general, call stack approaches outperform native Bio* implementations and these, in turn, outperform RPC-based approaches. To test and compare strategies, we provide a downloadable BioNode image with all examples, tools, and libraries included. The BioNode image can be run on VirtualBox-supported operating systems, including Windows, OSX, and Linux.

  10. Sustainable house construction and green financing. Explanation for 'green mortgages'

    International Nuclear Information System (INIS)

    1997-05-01

    The Dutch government finances the sustainable construction of new houses by means of so-called 'green loans'. Extra costs for the construction of a sustainable house are compensated by a lower interest rate for a green loan. In this brochure it is explained when green financing of house construction is possible and how to apply for such loans

  11. Unique voices in harmony: Call-and-response to address race and physics teaching

    Science.gov (United States)

    Cochran, Geraldine L.; White, Gary D.

    2017-09-01

    In the February 2016 issue of The Physics Teacher, we announced a call for papers on race and physics teaching. The response was muted at first, but has now grown to a respectable chorale-sized volume. As the manuscripts began to come in and the review process progressed, Geraldine Cochran graciously agreed to come on board as co-editor for this remarkable collection of papers, to be published throughout the fall of 2017 in TPT. Upon reviewing the original call and the responses from the physics community, the parallels between generating this collection and the grand call-and-response tradition became compelling. What follows is a conversation constructed by the co-editors that is intended to introduce the reader to the swell of voices that responded to the original call. The authors would like to thank Pam Aycock for providing many useful contributions to this editorial.

  12. A construction process model for implementing constructability in construction

    NARCIS (Netherlands)

    Langkemper, J.; Al-Jibouri, S.; Reymen, I.M.M.J.; Maas, G.J.; Gassel, van F.

    2003-01-01

    In construction, failure of design professionals to consider how a builder will implement the design can result in scheduling problems, cost escalation, delays and disputes during the construction process. The integration of construction knowledge and experience during planning and design is termed

  13. Pathological aspects of so called "hilar cholangiocarcinoma".

    Science.gov (United States)

    Castellano-Megías, Víctor M; Ibarrola-de Andrés, Carolina; Colina-Ruizdelgado, Francisco

    2013-07-15

    Cholangiocarcinoma (CC) arising from the large intrahepatic bile ducts and extrahepatic hilar bile ducts share clinicopathological features and have been called hilar and perihilar CC as a group. However, "hilar and perihilar CC" are also used to refer exclusively to the intrahepatic hilar type CC or, more commonly, the extrahepatic hilar CC. Grossly, a major distinction can be made between papillary and non-papillary tumors. Histologically, most hilar CCs are well to moderately differentiated conventional type (biliary) carcinomas. Immunohistochemically, CK7, CK20, CEA and MUC1 are normally expressed, being MUC2 positive in less than 50% of cases. Two main premalignant lesions are known: biliary intraepithelial neoplasia (BilIN) and intraductal papillary neoplasm of the biliary tract (IPNB). IPNB includes the lesions previously named biliary papillomatosis and papillary carcinoma. A series of 29 resected hilar CC from our archives is reviewed. Most (82.8%) were conventional type adenocarcinomas, mostly well to moderately differentiated, although with a broad morphological spectrum; three cases exhibited a poorly differentiated cell component resembling signet ring cells. IPNB was observed in 5 (17.2%), four of them with an associated invasive carcinoma. A clear cell type carcinoma, an adenosquamous carcinoma and two gastric foveolar type carcinomas were observed.

  14. From Systematic Review to Call for Action.

    Science.gov (United States)

    Sawin, Erika Metzler; Sobel, Linda L; Annan, Sandra L; Schminkey, Donna L

    2017-06-01

    Intimate partner violence (IPV) is a global public health and criminal justice concern with significant impacts; especially high rates are seen among rural Hispanic American (HA) communities, the fastest growing population in the United States. They experience additional barriers to care including extreme poverty, lesser education, gender norms, and language and immigration issues. A systematic literature review was conducted using Cooper's framework to identify evidence supporting associations between interventions and prevention, reduction, and elimination of IPV among rural HA women. Searches conducted on databases including CINAHL, PubMed, Medline, Women's Studies International, MedicLatina, and JSTOR used the MeSH terms Hispanic Americans (Latino/a and Hispanic), domestic violence, and intimate partner violence. Selected studies were published between January 1, 2000, and January 1, 2014. Of the 617 yielded articles, only 6 met the inclusion criteria. Of these, none closely examined rurality or provided valid and reliable measures of outcomes, instead reporting program descriptions and suggested interventions. We identify key findings to guide program, screening, and tool development. Our study identifies a gap in knowledge, research, and effective practices and issues a call for action to create evidence-based tools to prevent, reduce, and eliminate IPV in these underserved populations.

  15. REMINDER: In a medical emergency call 74444

    CERN Multimedia

    2005-01-01

    What happened? A CERN colleague, complaining of pains that might indicate serious heart problem, went to the ?infirmary' on the Prévessin site for medical aid. He was unaware that the ?infirmary' was in fact no such thing, but the office of the French contractors' medical practitioner, and, on top of that, it was closed. He therefore took his own car and went to the CERN Fire Station on the Meyrin Site (Building 65). The firemen and the CERN medical team took care of him and requested helicopter transport to the Geneva cantonal hospital, where he responded well to medical treatment. What do we learn from this event? You must call the CERN internal number 74444 in the event of serious and acute illness, and do not have to present yourself in person or get somebody to go with you. This number is not reserved exclusively for accident, pollution, fire etc. The Firemen can prodice professional assistance at all times as required: first aid on the spot, amulance transport and medical assistance as necessary. ...

  16. A study of so-called hypochondriasis.

    Science.gov (United States)

    von Scheele, C; Nordgren, L; Kempi, V; Hetta, J; Hallborg, A

    1990-01-01

    Twenty-four patients with unexplained somatic complaints were subjected to a thorough somatic examination. Only when the examination proved negative was the patient entered into the study. The patients were clinically appraised according to criteria given in DSM-III. Generalized anxiety disorder (GAD) was diagnosed in 12, somatization disorder (SD) in 8, and hypochondriasis in 4 patients. Seventeen of the 24 patients agreed to participate in biochemical investigations including a TRH load, a dexamethasone test, and a determination of the monoamine metabolites 5-HIAA and HVA in cerebrospinal fluid (CSF). A normal TSH increase and a normal suppression of cortisol were registered. The HVA values correlated significantly with the 5-HIAA values as well as with the alexithymia scores. Concerning alexithymia and maturity level, no difference as to social class was found. The patients filled in a Zung depression chart. The Zung scale and the 5-HIAA values were both inconsistent with depressive illness. In so-called hypochondriasis a long-term relationship, including selected somatic and biochemical examinations and thorough information, was crucial in abating the patient's distrust and thus the need for health care.

  17. Individual and contextual variation in Thomas langur male loud calls

    NARCIS (Netherlands)

    Wich, S.A.; Koski, S.; Vries, Han de; Schaik, Carel P. van

    2003-01-01

    Individual and contextual differences in male loud calls of wild Thomas langurs (Presbytis thomasi) were studied in northern Sumatra, Indonesia. Loud calls were given in the following contexts: morning calls, vocal responses to other groups, between-group encounter calls and alarmcalls. Loud

  18. Linking Calling Orientations to Organizational Attachment via Organizational Instrumentality

    Science.gov (United States)

    Cardador, M. Teresa; Dane, Erik; Pratt, Michael G.

    2011-01-01

    Despite an emerging interest in callings, researchers know little about whether calling orientations matter in the workplace. We explore the under-examined relationship between a calling orientation and employees' attachment to their organizations. Although some theory suggests that callings may be negatively related to organizational attachment,…

  19. Calling under pressure: short-finned pilot whales make social calls during deep foraging dives.

    Science.gov (United States)

    Jensen, Frants H; Perez, Jacobo Marrero; Johnson, Mark; Soto, Natacha Aguilar; Madsen, Peter T

    2011-10-22

    Toothed whales rely on sound to echolocate prey and communicate with conspecifics, but little is known about how extreme pressure affects pneumatic sound production in deep-diving species with a limited air supply. The short-finned pilot whale (Globicephala macrorhynchus) is a highly social species among the deep-diving toothed whales, in which individuals socialize at the surface but leave their social group in pursuit of prey at depths of up to 1000 m. To investigate if these animals communicate acoustically at depth and test whether hydrostatic pressure affects communication signals, acoustic DTAGs logging sound, depth and orientation were attached to 12 pilot whales. Tagged whales produced tonal calls during deep foraging dives at depths of up to 800 m. Mean call output and duration decreased with depth despite the increased distance to conspecifics at the surface. This shows that the energy content of calls is lower at depths where lungs are collapsed and where the air volume available for sound generation is limited by ambient pressure. Frequency content was unaffected, providing a possible cue for group or species identification of diving whales. Social calls may be important to maintain social ties for foraging animals, but may be impacted adversely by vessel noise.

  20. Construction of Nijenhuis operators and dendriform trialgebras

    Directory of Open Access Journals (Sweden)

    Philippe Leroux

    2004-01-01

    Full Text Available We construct Nijenhuis operators from particular bialgebras called dendriform-Nijenhuis bialgebras. It turns out that such Nijenhuis operators commute with TD-operators, a kind of Baxter-Rota operators, and are therefore closely related to dendriform trialgebras. This allows the construction of associative algebras, called dendriform-Nijenhuis algebras, made out of nine operations and presenting an exotic combinatorial property. We also show that the augmented free dendriform-Nijenhuis algebra and its commutative version have a structure of connected Hopf algebras. Examples are given.

  1. Optimal scheduling in call centers with a callback option

    OpenAIRE

    Legros , Benjamin; Jouini , Oualid; Koole , Ger

    2016-01-01

    International audience; We consider a call center model with a callback option, which allows to transform an inbound call into an outbound one. A delayed call, with a long anticipated waiting time, receives the option to be called back. We assume a probabilistic customer reaction to the callback offer (option). The objective of the system manager is to characterize the optimal call scheduling that minimizes the expected waiting and abandonment costs. For the single-server case, we prove that ...

  2. Call for Papers: Photonics in Switching

    Science.gov (United States)

    Wosinska, Lena; Glick, Madeleine

    2006-04-01

    Call for Papers: Photonics in Switching Guest Editors: Lena Wosinska, Royal Institute of Technology (KTH) / ICT Sweden Madeleine Glick, Intel Research, Cambridge, UK Technologies based on DWDM systems allow data transmission with bit rates of Tbit/s on a single fiber. To facilitate this enormous transmission volume, high-capacity and high-speed network nodes become inevitable in the optical network. Wideband switching, WDM switching, optical burst switching (OBS), and optical packet switching (OPS) are promising technologies for harnessing the bandwidth of WDM optical fiber networks in a highly flexible and efficient manner. As a number of key optical component technologies approach maturity, photonics in switching is becoming an increasingly attractive and practical solution for the next-generation of optical networks. The scope of this special issue is focused on the technology and architecture of optical switching nodes, including the architectural and algorithmic aspects of high-speed optical networks. Scope of Submission The scope of the papers includes, but is not limited to, the following topics: WDM node architectures Novel device technologies enabling photonics in switching, such as optical switch fabrics, optical memory, and wavelength conversion Routing protocols WDM switching and routing Quality of service Performance measurement and evaluation Next-generation optical networks: architecture, signaling, and control Traffic measurement and field trials Optical burst and packet switching OBS/OPS node architectures Burst/Packet scheduling and routing algorithms Contention resolution/avoidance strategies Services and applications for OBS/OPS (e.g., grid networks, storage-area networks, etc.) Burst assembly and ingress traffic shaping Hybrid OBS/TDM or OBS/wavelength routing Manuscript Submission To submit to this special issue, follow the normal procedure for submission to JON and select ``Photonics in Switching' in the features indicator of the online

  3. Geneva calling: WHO resolution on mental disorders

    Directory of Open Access Journals (Sweden)

    Barbui Corrado

    2012-06-01

    Full Text Available Abstract Background A new resolution on mental, neurological and substance use disorders was adopted in January 2012 by the World Health Organization (WHO Executive Board. The resolution urges WHO and Member States to collaborate in the development of a comprehensive mental health action plan, to be submitted for discussion and approval to the WHO World Health Assembly. This commentary aims at rising awareness on the risk that this resolution may not fulfil its potential. Discussion Lack of political awareness and visibility of the resolution is a first major issue. Theoretically, Member States should be aware of the resolution and support its implementation at their respective national level, but in practice political commitment may not be high enough, and technical and financial resources made available may be limited. A second challenge is that the resolution suggests to work with Member States and technical agencies to promote academic exchange through which to contribute to policy-making in mental health. It is not straightforward, however, how such a statement may be effectively translated into action. A third key methodological aspect is how scientific evidence and factors other than scientific evidence will be handled. This seems particularly relevant in the field of mental health, where value-based decisions together with resource and feasibility considerations may be unavoidable. Summary We argue that WHO and Member States should work together to increase the visibility of the resolution, ensuring that Ministries of Health and other relevant components of the health systems are aware of the resolution and its implications. As the resolution urges for academic exchange, WHO should develop a plan for an explicit, inclusive and open call for support and collaboration, so that partners willing to contribute are not kept out from the process. The production of an action plan for mental disorders should be based on scientifically sound

  4. Calling under pressure: Short-finned pilot whales make social calls during deep foraging dives

    DEFF Research Database (Denmark)

    Jensen, Frants Havmand; Marrero Perez, Jacobo; Johnson, Mark

    2011-01-01

    Toothed whales rely on sound to echolocate prey and communicate with conspecifics, but little is known about how extreme pressure affects pneumatic sound production in deep-diving species with a limited air supply. The short-finned pilot whale (Globicephala macrorhynchus) is a highly social species...... among the deep-diving toothed whales, in which individuals socialize at the surface but leave their social group in pursuit of prey at depths of up to 1000 m. To investigate if these animals communicate acoustically at depth and test whether hydrostatic pressure affects communication signals, acoustic...... DTAGs logging sound, depth and orientation were attached to 12 pilot whales. Tagged whales produced tonal calls during deep foraging dives at depths of up to 800 m. Mean call output and duration decreased with depth despite the increased distance to conspecifics at the surface. This shows...

  5. Biomimetic agent based modelling using male Frog calling behaviour as a case study

    DEFF Research Database (Denmark)

    Jørgensen, Søren V.; Demazeau, Yves; Christensen-Dalsgaard, Jakob

    2014-01-01

    by individuals to generate their observed population behaviour. A number of existing agent-modelling frameworks are considered, but none have the ability to handle large numbers of time-dependent event-generating agents; hence the construction of a new tool, RANA. The calling behaviour of the Puerto Rican Tree...... Frog, E. coqui, is implemented as a case study for the presentation and discussion of the tool, and results from this model are presented. RANA, in its present stage of development, is shown to be able to handle the problem of modelling calling frogs, and several fruitful extensions are proposed...

  6. Constructing Aligned Assessments Using Automated Test Construction

    Science.gov (United States)

    Porter, Andrew; Polikoff, Morgan S.; Barghaus, Katherine M.; Yang, Rui

    2013-01-01

    We describe an innovative automated test construction algorithm for building aligned achievement tests. By incorporating the algorithm into the test construction process, along with other test construction procedures for building reliable and unbiased assessments, the result is much more valid tests than result from current test construction…

  7. No Call for Action? Why There Is No Union (Yet in Philippine Call Centers

    Directory of Open Access Journals (Sweden)

    Niklas Reese

    2013-01-01

    Full Text Available This contribution presents findings from a qualitative study which focused on young urban professionals in the Philippines who work(ed in international call centers – workplaces usually characterized by job insecurity and other forms of precarity, factory-like working conditions, and disembeddedness. Nevertheless, trade unions in these centers have not come into existence. Why collective action is not chosen by call center agents as an option to tackle the above mentioned problems – this is what the research project this article is based on tried to understand. After outlining some workrelated problems identified by Filipino call center agents, the article will focus on the strategies the agents employ to counter these problems (mainly accommodation and everyday resistance. By highlighting five objective and five subjective reasons (or reasons by circumstances and reasons by framing, we conclude that it is not repressive regulation policies, but rather the formative power and the internalization of discourses of rule within individual life strategies that are preventing the establishment of unions and other collective action structures.

  8. Using Semantic Similarity In Automated Call Quality Evaluator For Call Centers

    Directory of Open Access Journals (Sweden)

    Ria A. Sagum

    2015-08-01

    Full Text Available Conversation between the agent and client are being evaluated manually by a quality assurance officer QA. This job is only one of the responsibilities being done by a QA and particularly eat ups a lot of time for them which lead to late evaluation results that may cause untimely response of the company to concerns raised by their clients. This research developed an application software that automates and evaluates the quality assurance in business process outsourcing companies or customer service management implementing sentence similarity. The developed system includes two modules speaker diarization which includes transcription and question and answer extraction and similarity checker which checks the similarity between the extracted answer and the answer of the call center agent to a question. The system was evaluated for Correctness of the extracted answers and accurateness of the evaluation for a particular call. Audio conversations were tested for the accuracy of the transcription module which has an accuracy of 27.96. The Precision Recall and F-measure of the extracted answer was tested as 78.03 96.26 and 86.19 respectively. The Accuracy of the system in evaluating a call is 70.

  9. Perspectives of construction robots

    Science.gov (United States)

    Stepanov, M. A.; Gridchin, A. M.

    2018-03-01

    This article is an overview of construction robots features, based on formulating the list of requirements for different types of construction robots in relation to different types of construction works.. It describes a variety of construction works and ways to construct new or to adapt existing robot designs for a construction process. Also, it shows the prospects of AI-controlled machines, implementation of automated control systems and networks on construction sites. In the end, different ways to develop and improve, including ecological aspect, the construction process through the wide robotization, creating of data communication networks and, in perspective, establishing of fully AI-controlled construction complex are formulated.

  10. New degradation call admission control for increasing WCDMA system capacity

    Institute of Scientific and Technical Information of China (English)

    Liu Ningqing; Lu Zhi; Gu Xuemai

    2006-01-01

    Propose a new degradation call admission control(DCAC)scheme, which can be used in wideband code division multiple access communication system. So-called degradation is that non-real time call has the characteristic of variable bit rate, so decreasing its bit rate can reduce the load of the system, consequently the system can admit new call which should be blocked when the system is close to full load, therefore new call's access probability increases. This paper brings forward design project and does system simulation, simulation proves that DCAC can effectively decrease calls' blocking probability and increase the total number of the on-line users.

  11. Canonical quantization of so-called non-Lagrangian systems

    Energy Technology Data Exchange (ETDEWEB)

    Gitman, D.M. [Universidade de Sao Paulo, Instituto de Fisica, Caixa Postal 66318-CEP, Sao Paulo, S.P. (Brazil); Kupriyanov, V.G. [Universidade de Sao Paulo, Instituto de Fisica, Caixa Postal 66318-CEP, Sao Paulo, S.P. (Brazil); Tomsk State University, Physics Department, Tomsk (Russian Federation)

    2007-04-15

    We present an approach to the canonical quantization of systems with equations of motion that are historically called non-Lagrangian equations. Our viewpoint of this problem is the following: despite the fact that a set of differential equations cannot be directly identified with a set of Euler-Lagrange equations, one can reformulate such a set in an equivalent first-order form that can always be treated as the Euler-Lagrange equations of a certain action. We construct such an action explicitly. It turns out that in the general case the hamiltonization and canonical quantization of such an action are non-trivial problems, since the theory involves time-dependent constraints. We adopt the general approach of hamiltonization and canonical quantization for such theories as described in D.M. Gitman, I.V. Tyutin, Quantization of Fields with Constraints (Springer, Berlin, 1990). to the case under consideration. There exists an ambiguity (that cannot be reduced to the addition of a total time derivative) in associating a Lagrange function with a given set of equations. We present a complete description of this ambiguity. The proposed scheme is applied to the quantization of a general quadratic theory. In addition, we consider the quantization of a damped oscillator and of a radiating point-like charge. (orig.)

  12. Canonical quantization of so-called non-Lagrangian systems

    International Nuclear Information System (INIS)

    Gitman, D.M.; Kupriyanov, V.G.

    2007-01-01

    We present an approach to the canonical quantization of systems with equations of motion that are historically called non-Lagrangian equations. Our viewpoint of this problem is the following: despite the fact that a set of differential equations cannot be directly identified with a set of Euler-Lagrange equations, one can reformulate such a set in an equivalent first-order form that can always be treated as the Euler-Lagrange equations of a certain action. We construct such an action explicitly. It turns out that in the general case the hamiltonization and canonical quantization of such an action are non-trivial problems, since the theory involves time-dependent constraints. We adopt the general approach of hamiltonization and canonical quantization for such theories as described in D.M. Gitman, I.V. Tyutin, Quantization of Fields with Constraints (Springer, Berlin, 1990). to the case under consideration. There exists an ambiguity (that cannot be reduced to the addition of a total time derivative) in associating a Lagrange function with a given set of equations. We present a complete description of this ambiguity. The proposed scheme is applied to the quantization of a general quadratic theory. In addition, we consider the quantization of a damped oscillator and of a radiating point-like charge. (orig.)

  13. Construction completion report

    International Nuclear Information System (INIS)

    1990-01-01

    This Construction Completion Report documents the major construction projects at the Waste Isolation Pilot Plant (WIPP) site and related information on contracts, schedules, and other areas which affected construction. This report is not intended to be an exhaustive detailed analysis of construction, but is a general overview and summary of the WIPP construction. 10 refs., 29 figs

  14. Automatic Construction of Java Programs from Functional Program Specifications

    OpenAIRE

    Md. Humayun Kabir

    2015-01-01

    This paper presents a novel approach to construct Java programs automatically from the input functional program specifications on natural numbers from the constructive proofs of the input specifications using an inductive theorem prover called Poiti'n. The construction of a Java program from the input functional program specification involves two phases. The theorem prover is used to construct a higher order functional (HOF) program from the input specification expressed as an existential the...

  15. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  16. Validation of the Cognitive Assessment of Later Life Status (CALLS instrument: a computerized telephonic measure

    Directory of Open Access Journals (Sweden)

    Parsons Thomas D

    2007-05-01

    Full Text Available Abstract Background Brief screening tests have been developed to measure cognitive performance and dementia, yet they measure limited cognitive domains and often lack construct validity. Neuropsychological assessments, while comprehensive, are too costly and time-consuming for epidemiological studies. This study's aim was to develop a psychometrically valid telephone administered test of cognitive function in aging. Methods Using a sequential hierarchical strategy, each stage of test development did not proceed until specified criteria were met. The 30 minute Cognitive Assessment of Later Life Status (CALLS measure and a 2.5 hour in-person neuropsychological assessment were conducted with a randomly selected sample of 211 participants 65 years and older that included equivalent distributions of men and women from ethnically diverse populations. Results Overall Cronbach's coefficient alpha for the CALLS test was 0.81. A principal component analysis of the CALLS tests yielded five components. The CALLS total score was significantly correlated with four neuropsychological assessment components. Older age and having a high school education or less was significantly correlated with lower CALLS total scores. Females scored better overall than males. There were no score differences based on race. Conclusion The CALLS test is a valid measure that provides a unique opportunity to reliably and efficiently study cognitive function in large populations.

  17. Concrete construction engineering handbook

    CERN Document Server

    Nawy, Edward G

    2008-01-01

    Provides coverage of concrete construction engineering and technology. This work features discussions focusing on: the advances in engineered concrete materials; reinforced concrete construction; specialized construction techniques; and, design recommendations for high performance.

  18. Call for concept notes: Research on Myanmar's decentralization and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... are launching this research call under a new initiative called Knowledge for ... Over the decades of military rule, information sharing, research, and freedom of ... Research outputs would take the form of working papers for peer-review and ...

  19. TPMG Northern California appointments and advice call center.

    Science.gov (United States)

    Conolly, Patricia; Levine, Leslie; Amaral, Debra J; Fireman, Bruce H; Driscoll, Tom

    2005-08-01

    Kaiser Permanente (KP) has been developing its use of call centers as a way to provide an expansive set of healthcare services to KP members efficiently and cost effectively. Since 1995, when The Permanente Medical Group (TPMG) began to consolidate primary care phone services into three physical call centers, the TPMG Appointments and Advice Call Center (AACC) has become the "front office" for primary care services across approximately 89% of Northern California. The AACC provides primary care phone service for approximately 3 million Kaiser Foundation Health Plan members in Northern California and responds to approximately 1 million calls per month across the three AACC sites. A database records each caller's identity as well as the day, time, and duration of each call; reason for calling; services provided to callers as a result of calls; and clinical outcomes of calls. We here summarize this information for the period 2000 through 2003.

  20. ASR performance analysis of an experimental call routing system

    CSIR Research Space (South Africa)

    Modipa, T

    2009-11-01

    Full Text Available Call routing is an important application of Automatic Speech Recognition (ASR) technology. In this paper the authors discuss the main issues affecting the performance of a call routing system and describe the ASR component of the "Auto...

  1. Advertisement call and tadpole morphology of the clutch-guarding ...

    African Journals Online (AJOL)

    Advertisement call and tadpole morphology of the clutch-guarding frog Mantidactylus argenteus from eastern ... We provide the first descriptions of the tadpole and advertisement call of Mantidactylus argenteus. ... AJOL African Journals Online.

  2. Purpose, Mission, and Context: The Call for Educating Future Leaders

    Science.gov (United States)

    Chunoo, Vivechkanand; Osteen, Laura

    2016-01-01

    This chapter calls on higher education to reclaim its role in leadership education. Specifically it examines higher education's purpose, context, and mission as clarion calls to embed leadership education throughout higher education institutions and focuses on why this is important.

  3. Electoronic Performance Monitoring in Call Centers: An Ethical Decision Model

    OpenAIRE

    Perkins, David

    2013-01-01

    Ever since it emerged on a widespread basis in the 1990s, electronic performance monitoring of employees has received significant scrutiny in the literature. Call centers have been the focus of many of these studies. This particular study addresses the issue of electronic performance monitoring in call centers from an ethical perspective. The following ethical dilemma is offered: "Is it ethical for a call center manager to evaluate the performance of a call center employee using electronic pe...

  4. Smart Grid Technology and Consumer Call Center Readiness

    OpenAIRE

    Schamber, Kelsey L.

    2010-01-01

    The following reasearch project deals with utility call center readiness to address customer concerns and questions about the Smart Grid and smart meter technology. Since consumer engagement is important for the benefits of the Smart Grid to be realized, the readiness and ability of utilities to answer consumer questions is an important issue. Assessing the readiness of utility call centers to address pertinant customer concerns was accomplished by calling utility call centers with Smart Grid...

  5. Doubts raised on the validity of construction and payment guarantees

    African Journals Online (AJOL)

    A construction company had been liquidated and the employer had called up the guarantee .... Due to the small size of the target populations in both the quantitative and qualitative ..... contingent liability that remains in terms of the guarantee.

  6. Calling vs Receiving Party Pays: Market Penetration and the Importance of the Call Externality

    OpenAIRE

    Tommaso Majer; Michele Pistollato

    2010-01-01

    In this paper we study how the access price affects the choice of the tariff regime taken by the network operators. We show that for high values of the access price, that is taken as a parameter by the firms, networks decide to charge only the callers. Otherwise, for low values of the access charge, networks charge also the receivers. Moreover, we compare market penetration and total welfare between the two price regimes. Our model suggests that, for high values of call externality, market pe...

  7. Calling vs receiving party pays : market penetration and the importance of the call externality

    OpenAIRE

    Majer, Tommaso

    2011-01-01

    In this paper we study how the access price affects the choice of the tariff regime taken by the network operators. We show that for high values of the access price, that is taken as a parameter by the firms, networks decide to charge only the callers. Otherwise, for low values of the access charge, networks charge also the receivers. Moreover, we compare market penetration and total welfare between the two price regimes. Our model suggests that, for high values of call externality, market pe...

  8. A reflection through cinema about the meaning of what we call home

    Directory of Open Access Journals (Sweden)

    Luciana Helena Mussi

    2011-09-01

    Full Text Available This article aims to reflect on the meaning of "emotional" what we call home through the short film "Tsumiki no ie" (translation: The House in small cubes. The film poses questions perceived as a foundation / base for understanding the importance of this “material made of bricks, lime and memory whose final product is called "home”. Our memory is constructed from the memories built by affective ties, joys, desires, addiction, bereavement and many other materials of the heart and soul. The research shows that art done through cinema, with a constructed language with images, can contribute a lot in understanding where an aging housing means much more than a safe place to live. Backed by the conceptual literature is intended to immerse yourself in the charms and enchantments of this art to understand what a "house, our house staff” reminds us that special meaning and it is replaced in old age.

  9. Examining calling as a double-edged sword for employability

    NARCIS (Netherlands)

    Lysova, Evgenia I.; Jansen, Paul G.W.; Khapova, Svetlana N.; Plomp, Judith; Tims, Maria

    2018-01-01

    Using a two-study design (total N = 1232), this paper examines the relationship between calling and employability. We suggest that, on the one hand, calling can positively relate to employability due to individuals’ engagement in proactive professional development (PPD). On the other hand, calling

  10. 29 CFR 785.17 - On-call time.

    Science.gov (United States)

    2010-07-01

    ... On-call time. An employee who is required to remain on call on the employer's premises or so close... employee who is not required to remain on the employer's premises but is merely required to leave word at his home or with company officials where he may be reached is not working while on call. (Armour & Co...

  11. Evolution of advertisement calls in African clawed frogs

    Science.gov (United States)

    Tobias, Martha L.; Evans, Ben J.; Kelley, Darcy B.

    2014-01-01

    Summary For most frogs, advertisement calls are essential for reproductive success, conveying information on species identity, male quality, sexual state and location. While the evolutionary divergence of call characters has been examined in a number of species, the relative impacts of genetic drift or natural and sexual selection remain unclear. Insights into the evolutionary trajectory of vocal signals can be gained by examining how advertisement calls vary in a phylogenetic context. Evolution by genetic drift would be supported if more closely related species express more similar songs. Conversely, a poor correlation between evolutionary history and song expression would suggest evolution shaped by natural or sexual selection. Here, we measure seven song characters in 20 described and two undescribed species of African clawed frogs (genera Xenopus and Silurana) and four populations of X. laevis. We identify three call types — click, burst and trill — that can be distinguished by click number, call rate and intensity modulation. A fourth type is biphasic, consisting of two of the above. Call types vary in complexity from the simplest, a click, to the most complex, a biphasic call. Maximum parsimony analysis of variation in call type suggests that the ancestral type was of intermediate complexity. Each call type evolved independently more than once and call type is typically not shared by closely related species. These results indicate that call type is homoplasious and has low phylogenetic signal. We conclude that the evolution of call type is not due to genetic drift, but is under selective pressure. PMID:24723737

  12. The Role of Analyst Conference Calls in Capital Markets

    NARCIS (Netherlands)

    E.M. Roelofsen (Erik)

    2010-01-01

    textabstractMany firms conduct a conference call with analysts shortly after the quarterly earnings announcement. In these calls, management discusses the completed quarter, and analysts can ask questions. Due to SEC requirements, conference calls in the United States are virtually always live

  13. Bats aloft: Variation in echolocation call structure at high altitudes

    Science.gov (United States)

    Bats alter their echolocation calls in response to changes in ecological and behavioral conditions, but little is known about how they adjust their call structure in response to changes in altitude. This study examines altitudinal variation in the echolocation calls of Brazilian free-tailed bats, T...

  14. Calling and Career Preparation: Investigating Developmental Patterns and Temporal Precedence

    Science.gov (United States)

    Hirschi, Andreas; Herrmann, Anne

    2013-01-01

    The presence of a calling and career development are assumed to be closely related. However, the nature of and reason for this relationship have not been thoroughly investigated. We hypothesized the existence of reciprocal effects between calling and three dimensions of career preparation and assessed the change of the presence of a calling,…

  15. Correlates of Gay-Related Name-Calling in Schools

    Science.gov (United States)

    Slaatten, Hilde; Hetland, Jørn; Anderssen, Norman

    2015-01-01

    The aim of this study was to examine whether attitudes about gay-related name-calling, social norms concerning gay-related name-calling among co-students, teacher intervention, and school-related support would predict whether secondary school pupils had called another pupil a gay-related name during the last month. A total of 921 ninth-grade…

  16. 47 CFR 90.241 - Radio call box operations.

    Science.gov (United States)

    2010-10-01

    ... remains on for a period in excess of three minutes. The automatic cutoff system must be designed so the... Public Safety Pool for highway call box systems subject to the following requirements: (1) Call box... effective radiated power (ERP). (3) The height of a call box antenna may not exceed 6.1 meters (20 feet...

  17. The Barbados Emergency Ambulance Service: High Frequency of Nontransported Calls

    Directory of Open Access Journals (Sweden)

    Sherwin E. Phillips

    2012-01-01

    Full Text Available Objectives. There are no published studies on the Barbados Emergency Ambulance Service and no assessment of the calls that end in nontransported individuals. We describe reasons for the nontransport of potential clients. Methods. We used the Emergency Medical Dispatch (Medical Priority Dispatch System instrument, augmented with five local call types, to collect information on types of calls. The calls were categorised under 7 headings. Correlations between call types and response time were calculated. Results. Most calls were from the category medical (54%. Nineteen (19% percent of calls were in the non-transported category. Calls from call type Cancelled accounted for most of these and this was related to response time, while Refused service was inversely related (. Conclusions. The Barbados Ambulance Service is mostly used by people with a known illness and for trauma cases. One-fifth of calls fall into a category where the ambulance is not used often due to cancellation which is related to response time. Other factors such as the use of alternative transport are also important. Further study to identify factors that contribute to the non-transported category of calls is necessary if improvements in service quality are to be made.

  18. Sleep Quality of Call Handlers Employed in International Call Centers in National Capital Region of Delhi, India.

    Science.gov (United States)

    Raja, J D; Bhasin, S K

    2016-10-01

    Call center sector in India is a relatively new and fast growing industry driving employment and growth in modern India today. Most international call centers in National Capital Region (NCR) of Delhi operate at odd work hours corresponding to a time suitable fortheir international customers. The sleep quality of call handlers employed in these call centers is in jeopardy owing to their altered sleep schedule. To assess the sleep quality and determine its independent predictors among call handlers employed in international call centers in NCR of Delhi. A cross-sectional questionnaire-based study was conducted on 375 call handlers aged 18-39 years employed in international call centers in NCR of Delhi. Sleep quality was assessed using Athens Insomnia scale along with a pre-tested, structured questionnaire. The mean age of respondents was 24.6 (SD 2.4) years. 78% of participants were male. 83.5% of respondents were unmarried. 44.3% of call handlers were cigarette smokers. Physical ailments were reported by 37% call handlers. 77.6% of call handlers had somesuspicion of insomnia or suspected insomnia; the rest had no sleep problem. Smoking, poor social support, heavy workload, lack of relaxation facility at office, and prolonged travel time to office were independent predictors of sleep quality (pSafeguarding their health becomes an occupational health challenge to public health specialists.

  19. Heart rate variability changes in physicians working on night call.

    Science.gov (United States)

    Malmberg, Birgitta; Persson, Roger; Flisberg, Per; Ørbaek, Palle

    2011-03-01

    Adverse effects by night-call duty have become an important occupational health issue. The aim of this study was to investigate whether the heart rate variability (HRV) differed during recovery from day work and night-call duty between distinct physician specialities. We studied the impact of a 16-h night-call duty on autonomic balance, measured by HRV, among two physician groups differing with respect to having to deal with life-threatening conditions while on call. Nineteen anaesthesiologists (ANEST) and 16 paediatricians and ear, nose and throat surgeons (PENT) were monitored by ambulatory digital Holter electrocardiogram (ECG). Heart rate variability was analysed between 21:00 and 22:00 after an ordinary workday, on night call and in the evening post-call. Absolute and normalized high-frequency power (HF, HFnu) were the main outcome variables, expressing parasympathetic influence on the heart. ANEST had lower HF power than PENT while on night call and post-daytime work (p work compared with post-night-call duty (p balance and did not differ between specialities. However, the less dynamic HRV after daytime work and during night-call duty in the ANEST group may indicate a higher physiological stress level. These results may contribute to the improvement of night-call schedules within the health care sector.

  20. Sense of coherence, career adaptability and burnout of early-career Black staff in the call centre environment

    Directory of Open Access Journals (Sweden)

    Nisha Harry

    2013-11-01

    Research purpose: This study explored whether call centre agents’ sense of coherence significantly influences their career adaptability and whether their burnout levels significantly moderate the sense of coherence–career adaptability relationship. The research also investigated whether age, gender and years of service (as control variables, along with sense of coherence, predicted career adaptability. Motivation for the study: The positive psychological construct of career adaptability and its association with call centre agents’ sense of coherence, burnout, age, gender and years of service have not yet been investigated in the call centre environment. Research design, approach and method: A cross-sectional quantitative survey design was used. The Orientation to Life, Career Adapt-Abilities Scale and Maslach Burnout Inventory General Scale were administered to a non-probability purposive sample of 409 early-career Black staff employed in three of the largest outsourced financial call centres in Africa. Main findings: Multiple regression analyses revealed that age, gender and meaningfulness significantly predicted call centre agents’ career adaptability, but that their burnout levels do not significantly moderate the sense of coherence–career adaptability relationship. Practical/managerial implications: Enhancing call centre agents’ sense of meaningfulness will increase their levels of career adaptability and career wellbeing. Contribution/value-add: This research is the first to investigate the construct of career adaptability in the call centre environment and adds new knowledge and insights to the existing wellness and positive psychology literature.

  1. Emotional labor and dysmenorrhea in women working in sales and call centers.

    Science.gov (United States)

    Cho, In-Jung; Kim, Hyunjoo; Lim, Sinye; Oh, Sung-Soo; Park, Sungjin; Kang, Hee-Tae

    2014-01-01

    This study was conducted to investigate the association between emotional labor and dysmenorrhea among women working in sales and call centers in Seoul, South Korea. Working women in sales jobs and call centers in Seoul were interviewed face-to-face by well-trained interviewers. In total, 975 participants were analyzed in the final model. Emotional labor was measured using a constructed questionnaire with two components: an emotive effort component with three questions and an emotive dissonance component with five questions. To examine the association between emotional labor and dysmenorrhea, chi-squared tests and logistic regression were applied. The prevalence of dysmenorrhea among sales workers and call center workers were 43.0% and 61.1%, respectively. The adjusted odds ratios (OR) of emotive effort and emotive dissonance for dysmenorrhea in call center workers were 1.88 (95% confidence interval [CI], 1.07-3.28) and 1.72 (95% CI, 1.13-2.63), respectively. The adjusted OR of emotive effort and emotive dissonance for dysmenorrhea in sales workers were 1.71 (95% CI, 0.92-3.16) and 1.15 (95% CI, 0.67-1.98), respectively. Emotional labor was found to be associated with dysmenorrhea in call center workers. Further studies to investigate other factors, such as management strategies and the relationship between emotional labor and dysmenorrhea, are needed to support interventions to prevent dysmenorrhea that will further promote the quality of health and life of working women.

  2. Representation of individual elements of a complex call sequence in primary auditory cortex

    Directory of Open Access Journals (Sweden)

    Mark Nelson Wallace

    2013-10-01

    Full Text Available Conspecific communication calls can be rhythmic or contain extended, discontinuous series of either constant or frequency modulated harmonic tones and noise bursts separated by brief periods of silence. In the guinea pig, rhythmic calls can produce isomorphic responses within the primary auditory cortex (AI where single units respond to every call element. Other calls such as the chutter comprise a series of short irregular syllables that vary in their spectral content and are more like human speech. These calls can also evoke isomorphic responses, but may only do so in fields in the auditory belt and not in AI. Here we present evidence that cells in AI treat the individual elements within a syllable as separate auditory objects and respond selectively to one or a subset of them. We used a single chutter exemplar to compare single/multi-unit responses in the low-frequency portion of AI - AI(LF and the low-frequency part of the thalamic medial geniculate body - MGB(LF in urethane anaesthetised guinea pigs. Both thalamic and cortical cells responded with brief increases in firing rate to one, or more, of the 8 main elements present in the chutter call. Almost none of the units responded to all 8 elements. While there were many different combinations of responses to between one and five of the elements, MBG(LF and AI(LF neurons exhibited the same specific types of response combinations. Nearby units in the upper layers of the cortex tended to respond to similar combinations of elements while the deep layers were less responsive. Thus the responses from a number of AI units would need to be combined in order to represent the entire chutter call. Our results don’t rule out the possibility of constructive convergence but there was no evidence that a convergence of inputs within AI led to a complete representation of all eight elements.

  3. Spatio-Temporal Data Construction

    Directory of Open Access Journals (Sweden)

    Hai Ha Le

    2013-08-01

    Full Text Available On the route to a spatio-temporal geoscience information system, an appropriate data model for geo-objects in space and time has been developed. In this model, geo-objects are represented as sequences of geometries and properties with continuous evolution in each time interval. Because geomodeling software systems usually model objects at specific time instances, we want to interpolate the geometry and properties from two models of an object with only geometrical constraints (no physical or mechanical constraints. This process is called spatio-temporal data construction or morphological interpolation of intermediate geometries. This paper is strictly related to shape morphing, shape deformation, cross-parameterization and compatible remeshing and is only concerned with geological surfaces. In this study, two main sub-solutions construct compatible meshes and find trajectories in which vertices of the mesh evolve. This research aims to find an algorithm to construct spatio-temporal data with some constraints from the geosciences, such as cutting surfaces by faulting or fracturing phenomena and evolving boundaries attached to other surfaces. Another goal of this research is the implementation of the algorithm in a software product, namely a gOcad plug-in. The four main procedures of the algorithm are cutting the surfaces, setting up constraints, partitioning and calculating the parameterizations and trajectories. The software has been tested to construct data for a salt dome and other surfaces in regard to the geological processes of faulting, deposition and erosion. The result of this research is an algorithm and software for the construction of spatio-temporal data.

  4. Reducing juvenile delinquency with automated cell phone calls.

    Science.gov (United States)

    Burraston, Bert O; Bahr, Stephen J; Cherrington, David J

    2014-05-01

    Using a sample of 70 juvenile probationers (39 treatment and 31 controls), we evaluated the effectiveness of a rehabilitation program that combined cognitive-behavioral training and automated phone calls. The cognitive-behavioral training contained six 90-min sessions, one per week, and the phone calls occurred twice per day for the year following treatment. Recidivism was measured by whether they were rearrested and the total number of rearrests during the 1st year. To test the impact of the phone calls, those who received phone calls were divided into high and low groups depending on whether they answered more or less than half of their phone calls. Those who completed the class and answered at least half of their phone calls were less likely to have been arrested and had fewer total arrests.

  5. An empirical analysis of the corporate call decision

    International Nuclear Information System (INIS)

    Carlson, M.D.

    1998-01-01

    An economic study of the the behaviour of financial managers of utility companies was presented. The study examined whether or not an option pricing based model of the call decision does a better job of explaining callable preferred share prices and call decisions compared to other models. In this study, the Rust (1987) empirical technique was extended to include the use of information from preferred share prices in addition to the call decisions. Reasonable estimates were obtained from data of shares of the Pacific Gas and Electric Company (PGE) for the transaction costs associated with a call. It was concluded that the managers of the PGE clearly take into account the value of the option to delay the call when making their call decisions

  6. Career Construction with a Gay Client: A Case Study

    Science.gov (United States)

    Maree, Jacobus Gideon

    2014-01-01

    This article reports on the value of career construction counselling (CCC) with a gay person. The participant was selected purposively, with the selection criteria calling for a mid-career woman who had sought career counselling. The intervention involved administration of the "Career Construction Interview" (CCI) and the creation of a…

  7. The oil market. Call on OPEC determines the oil price

    International Nuclear Information System (INIS)

    Kingma, D.; Mulder, M.

    2001-01-01

    Several scenarios are applied to determine the oil price for the medium-long term, based on the so-called 'call on OPEC'. The 'call on OPEC' is part of the demand for oil which has to supplied by OPEC. It is expected that the nominal oil price will be circa $24 per barrel in 2004, based on a global growth of 4%. 2 refs

  8. Calling 911! What role does the pediatrician play?

    Science.gov (United States)

    Grossman, Devin; Kunkov, Sergey; Kaplan, Carl; Crain, Ellen F

    2013-06-01

    The objective of this study was to compare admission rates and medical interventions among children whose caregivers called their child's primary care provider (PCP) before taking an ambulance to the pediatric emergency department (PED) versus those who did not. This was a prospective cohort study of patients brought to an urban, public hospital PED via emergency medical system (EMS). Children were included if the caregiver called 911 to have them transported via EMS and was present in the PED. The main variable was whether the child's PCP was called before EMS utilization. Study outcomes were medical interventions, such as intravenous line insertion or laboratory tests, and hospital admission. χ Test and logistic regression were used to evaluate the relationship of the main variable to the study outcomes. Six hundred fourteen patients met inclusion criteria and were enrolled. Five hundred eighty-five patients (95.3%) were reported to have a PCP. Seventy-four caregivers (12.1%) called their child's PCP before calling EMS. Two hundred seventy-seven patients (45.1%) had medical interventions performed; of these, 42 (15.2%) called their PCP (P = 0.03). Forty-two patients (6.8%) were admitted; among these, 14 (33.3%) called their PCP (P < 0.01). Adjusting for triage level, patients whose caregiver called the PCP before calling EMS were 3.2 times (95% confidence interval, 1.9-5.2 times) more likely to be admitted and 1.7 times (95% confidence interval, 1.1-2.9 times) more likely to have a medical intervention compared with patients whose caregivers did not call their child's PCP. Children were more likely to be admitted or require a medical intervention if their caregiver called their PCP before calling EMS. The availability of a PCP for telephone triage may help to optimize EMS utilization.

  9. Constructing a logical, regular axis topology from an irregular topology

    Science.gov (United States)

    Faraj, Daniel A.

    2014-07-01

    Constructing a logical regular topology from an irregular topology including, for each axial dimension and recursively, for each compute node in a subcommunicator until returning to a first node: adding to a logical line of the axial dimension a neighbor specified in a nearest neighbor list; calling the added compute node; determining, by the called node, whether any neighbor in the node's nearest neighbor list is available to add to the logical line; if a neighbor in the called compute node's nearest neighbor list is available to add to the logical line, adding, by the called compute node to the logical line, any neighbor in the called compute node's nearest neighbor list for the axial dimension not already added to the logical line; and, if no neighbor in the called compute node's nearest neighbor list is available to add to the logical line, returning to the calling compute node.

  10. Leveraging management information in improving call centre productivity

    Directory of Open Access Journals (Sweden)

    Manthisana Mosese

    2016-04-01

    Objectives: This research explored the use of management information and its impact on two fundamental functions namely, improving productivity without compromising the quality of service, in the call centre of a well-known South African fashion retailer, Edcon. Following the implementation of the call centre technology project the research set out to determine how Edcon can transform their call centre to improve productivity and customer service through effective utilisation of their management information. Method: Internal documents and reports were analysed to provide the basis of evaluation between the measures of productivity prior to and post the implementation of a technology project at Edcon’s call centre. Semi-structured in-depth and group interviews were conducted to establish the importance and use of management information in improving productivity and customer service. Results: The results indicated that the availability of management information has indeed contributed to improved efficiency at the Edcon call centre. Although literature claims that there is a correlation between a call centre technology upgrade and improvement in performance, evident in the return on investment being realised within a year or two of implementation, it fell beyond the scope of this study to investigate the return on investment for Edcon’s call centre. Conclusion: Although Edcon has begun realising benefits in improved productivity in their call centre from their available management information, information will continue to play a crucial role in supporting management with informed decisions that will improve the call centre operations. [pdf to follow

  11. On-call work and health: a review

    Directory of Open Access Journals (Sweden)

    Botterill Jackie S

    2004-12-01

    Full Text Available Abstract Many professions in the fields of engineering, aviation and medicine employ this form of scheduling. However, on-call work has received significantly less research attention than other work patterns such as shift work and overtime hours. This paper reviews the current body of peer-reviewed, published research conducted on the health effects of on-call work The health effects studies done in the area of on-call work are limited to mental health, job stress, sleep disturbances and personal safety. The reviewed research suggests that on-call work scheduling can pose a risk to health, although there are critical gaps in the literature.

  12. The Influence of Judgment Calls on Meta-Analytic Findings.

    Science.gov (United States)

    Tarrahi, Farid; Eisend, Martin

    2016-01-01

    Previous research has suggested that judgment calls (i.e., methodological choices made in the process of conducting a meta-analysis) have a strong influence on meta-analytic findings and question their robustness. However, prior research applies case study comparison or reanalysis of a few meta-analyses with a focus on a few selected judgment calls. These studies neglect the fact that different judgment calls are related to each other and simultaneously influence the outcomes of a meta-analysis, and that meta-analytic findings can vary due to non-judgment call differences between meta-analyses (e.g., variations of effects over time). The current study analyzes the influence of 13 judgment calls in 176 meta-analyses in marketing research by applying a multivariate, multilevel meta-meta-analysis. The analysis considers simultaneous influences from different judgment calls on meta-analytic effect sizes and controls for alternative explanations based on non-judgment call differences between meta-analyses. The findings suggest that judgment calls have only a minor influence on meta-analytic findings, whereas non-judgment call differences between meta-analyses are more likely to explain differences in meta-analytic findings. The findings support the robustness of meta-analytic results and conclusions.

  13. Preassembly method for construction of nuclear power station

    International Nuclear Information System (INIS)

    Shimazaki, Yasuyoshi

    1986-01-01

    Recently preassembly method for construction are generally popular in Japan and this trend is prevailing all over the world. They provide good solutions to the problems that the Japanese construction industry faces and also they meet the needs for construction of nuclear power plants having heavily reinforced concrete structures. We have already established basic technologies for the methods, developing more advanced methods (more systematic, larger sized, more applicable, etc.). In the near future, they will be further developed up to a complete system called 'Industrialized construction method'. This system will include the use of precast concrete component, steel concrete composit structures and construction robots. (author)

  14. Construction dust amelioration techniques.

    Science.gov (United States)

    2012-04-01

    Dust produced on seasonal road construction sites in Alaska is both a traffic safety and environmental concern. Dust emanating from : unpaved road surfaces during construction severely reduces visibility and impacts stopping sight distance, and contr...

  15. Improving concrete overlay construction.

    Science.gov (United States)

    2010-03-01

    Several road construction projects involving concrete overlays at the state and county levels in Iowa in 2009 were studied for : construction techniques and methods. The projects that were evaluated consisted of sites in four Iowa counties: Osceola, ...

  16. Construction project management handbook.

    Science.gov (United States)

    2012-03-01

    The purpose of the FTA Construction Project Management Handbook is to provide guidelines for use by public transit agencies (Agen-cies) undertaking substantial construction projects, either for the first time or with little prior experience with cons...

  17. Visualization of construction engineering

    International Nuclear Information System (INIS)

    Okada, Hisako; Miura, Jun

    2000-01-01

    It is required for nuclear power plant construction to reduce construction cost and shorten construction period. An early and accurate construction planning including schedule coordination among the companies has recently become more important and it is possible to obtain necessary information for construction planning in early stage. In this situation, we have been developing a visualization system for construction engineering for nuclear power plants. This system has an interface with the existing Plant Layout 3D-CAD system and consists of three sub systems: (1) Scheduling and simulation system, (2) Yard planning system and (3) Scaffolding planning system. This paper describes overview of this system. This visualization system is very helpful for construction engineers to easily understand situation and environment around installation area, to easily plan a work sequence and confirm the planned schedule, and it is also effective for customers and workers to understand the planning. As a result, this visualization system enables safety and high quality construction. (author)

  18. Construction Sector (NAICS 23)

    Science.gov (United States)

    Find environmental regulatory information for the construction sector, including the construction of buildings or engineering projects. This includes RCRA information for hazardous waste, refrigeration compliance, asbestos, effluent guidelines & lead laws

  19. Organizational Behaviour in Construction

    DEFF Research Database (Denmark)

    Kreiner, Kristian

    2013-01-01

    Review of: Organizational Behaviour in Construction / Anthony Walker (Wiley-Blackwell,2011 336 pp)......Review of: Organizational Behaviour in Construction / Anthony Walker (Wiley-Blackwell,2011 336 pp)...

  20. USAID Construction Assessment

    Data.gov (United States)

    US Agency for International Development — The USAID construction assessment is a survey of the character, scope, value and management of construction activities supported by USAID during the period from June...

  1. Validating MEDIQUAL Constructs

    Science.gov (United States)

    Lee, Sang-Gun; Min, Jae H.

    In this paper, we validate MEDIQUAL constructs through the different media users in help desk service. In previous research, only two end-users' constructs were used: assurance and responsiveness. In this paper, we extend MEDIQUAL constructs to include reliability, empathy, assurance, tangibles, and responsiveness, which are based on the SERVQUAL theory. The results suggest that: 1) five MEDIQUAL constructs are validated through the factor analysis. That is, importance of the constructs have relatively high correlations between measures of the same construct using different methods and low correlations between measures of the constructs that are expected to differ; and 2) five MEDIQUAL constructs are statistically significant on media users' satisfaction in help desk service by regression analysis.

  2. Heterotic string construction

    International Nuclear Information System (INIS)

    Schellekens, A.N.

    1989-01-01

    In this paper an elementary introduction to the principles of four-dimensional string construction will be given. Although the emphasis is on lattice constructions, almost all results have further, and often quite straightforward generalizations to other constructions. Since heterotic strings look phenomenologically more promising than type-II theories the authors only consider the former, although everything can easily be generalized to type-II theories. Some additional aspects of lattice constructions are discussed, and an extensive review can be found

  3. Well Being and Job Satisfaction Among Call Centre Agents

    DEFF Research Database (Denmark)

    Wiegman, Inger Marie; Mathiesen, Karen; Møller, Niels

    2004-01-01

    A survey among 774 agents in four large Danish companies in house call centres shows that working in a call center is stressfull. Lack of control and autonomy, lack of potentiality and challenges, conflict between qualitative and quantitative demands and monitoring all have an adverse effect on job...

  4. Environmental constraints and call evolution in torrent-dwelling frogs.

    Science.gov (United States)

    Goutte, Sandra; Dubois, Alain; Howard, Samuel D; Marquez, Rafael; Rowley, Jodi J L; Dehling, J Maximilian; Grandcolas, Philippe; Rongchuan, Xiong; Legendre, Frédéric

    2016-04-01

    Although acoustic signals are important for communication in many taxa, signal propagation is affected by environmental properties. Strong environmental constraints should drive call evolution, favoring signals with greater transmission distance and content integrity in a given calling habitat. Yet, few empirical studies have verified this prediction, possibly due to a shortcoming in habitat characterization, which is often too broad. Here we assess the potential impact of environmental constraints on the evolution of advertisement call in four groups of torrent-dwelling frogs in the family Ranidae. We reconstruct the evolution of calling site preferences, both broadly categorized and at a finer scale, onto a phylogenetic tree for 148 species with five markers (∼3600 bp). We test models of evolution for six call traits for 79 species with regard to the reconstructed history of calling site preferences and estimate their ancestral states. We find that in spite of existing morphological constraints, vocalizations of torrent-dwelling species are most probably constrained by the acoustic specificities of torrent habitats and particularly their high level of ambient noise. We also show that a fine-scale characterization of calling sites allows a better perception of the impact of environmental constraints on call evolution. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  5. Online scheduling policies for multiclass call centers with impatient customers

    NARCIS (Netherlands)

    Jouini, O.; Pot, S.A.; Koole, G.M.; Dallery, Y.

    2010-01-01

    We consider a call center with two classes of impatient customers: premium and regular classes. Modeling our call center as a multiclass GI / GI / s + M queue, we focus on developing scheduling policies that satisfy a target ratio constraint on the abandonment probabilities of premium customers to

  6. Analysis of jitter due to call-level fluctuations

    NARCIS (Netherlands)

    M.R.H. Mandjes (Michel)

    2005-01-01

    textabstractIn communication networks used by constant bit rate applications, call-level dynamics (i.e., entering and leaving calls) lead to fluctuations in the load, and therefore also fluctuations in the delay (jitter). By intentionally delaying the packets at the destination, one can transform

  7. The advertisement call, breeding biology, description of the tadpole ...

    African Journals Online (AJOL)

    Males of Bufo dombensis were observed calling late at night at Ongongo Waterfall in north-western Namibia. The analyzed advertisement calls differ distinctly from those of B. vertebralis, B. hoeschi and B. fenoulheti, indicating that all these taxa are separate valid species. Tadpoles raised from a breeding pair found at ...

  8. Jamaican Call-In Radio: A Uses and Gratification Analysis.

    Science.gov (United States)

    Surlin, Stuart H.

    Noting that radio call-in programs seem to contain the elements for active audience involvement and participation, a study was conducted to examine the hypothesis that information gain and surveillance are the primary gratifications sought through call-in radio programs, especially in a culture that has a strong oral tradition and relatively few…

  9. Sustainability in CALL Learning Environments: A Systemic Functional Grammar Approach

    Science.gov (United States)

    McDonald, Peter

    2014-01-01

    This research aims to define a sustainable resource in Computer-Assisted Language Learning (CALL). In order for a CALL resource to be sustainable it must work within existing educational curricula. This feature is a necessary prerequisite of sustainability because, despite the potential for educational change that digitalization has offered since…

  10. The Structure and Function of Male Thomas Langur Loud Calls

    NARCIS (Netherlands)

    Wich, Serge Alexander

    2002-01-01

    This study has addressed the acoustical structure of male loud calls and their function in Thomas langur social organisation. Thomas langurs are medium sized primate that lives in Sumatra, Indonesia. Ome of the characteristics of this species is the loud call of males. Several functions for loud

  11. In- and Out-of-the-Money Convertible Bond Calls

    DEFF Research Database (Denmark)

    Bechman, Ken; Lunde, Asger; Zebedee, Allan

    2014-01-01

    Convertible bond calls typically cause significant reactions in equity prices. The empirical research largely finds negative and positive announcement effects for the in-the-money and the out-of-the-money calls respectively. However, this research has difficulty distinguishing between the two mai...

  12. Consumer Experiences Calling Toll-Free Corporate Hotlines.

    Science.gov (United States)

    Martin, Charles L.; Smart, Denise T.

    1994-01-01

    Finds that dimensions that contribute to caller satisfaction (of toll-free corporate hotlines) included operator characteristics such as knowledge, courtesy, and interest; specific behaviors such as apologizing for a problem, thanking the consumer for calling, and encouraging them to call again; and reducing time placed on "hold." (SR)

  13. 39 CFR 6.4 - Attendance by conference telephone call.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Attendance by conference telephone call. 6.4 Section 6.4 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE MEETINGS (ARTICLE VI) § 6.4 Attendance by conference telephone call. For regularly scheduled meetings of...

  14. 47 CFR 64.1320 - Payphone call tracking system audits.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Payphone call tracking system audits. 64.1320... call tracking system audits. (a) Unless it has entered into an alternative compensation arrangement... Completing Carrier must undergo an audit of its § 64.1310(a)(1) tracking system by an independent third party...

  15. Called to do meaningful work : A blessing or a curse?

    NARCIS (Netherlands)

    van Vuuren, Hubrecht A.

    2017-01-01

    Two groups of people are particularly inclined to mention a calling when talking about their work motivation: those who are spiritual (because the concept of calling originated in the religious realm) and those in serving occupations (such as hospitals, schools, and nongovernmental organizations).

  16. Short communications: Calls of three species of arthroleptid frogs ...

    African Journals Online (AJOL)

    The calls of three anuran species in the family Arthroleptidae in the sub-family Astylosterminae from Equatorial Guinea are described including information on calling behaviour. For each species, we present a characteristic audiospectrogram and oscillogram. We also provide numerical information about the spectral and ...

  17. Advertisement calls of Bolivian species of Scinax (Amphibia, Anura, Hylidae)

    NARCIS (Netherlands)

    Riva, de la Ignacio; Márquez, Rafael; Bosch, Jaime

    1994-01-01

    The advertisement calls of eight Bolivian species of Scinax are described including information on the calling behaviour of each species. A characteristic audiospectrogram and oscillogram are presented for each species, as well as numerical information about the spectral and temporal features of the

  18. 47 CFR 64.1505 - Restrictions on collect telephone calls.

    Science.gov (United States)

    2010-10-01

    ... SERVICES (CONTINUED) MISCELLANEOUS RULES RELATING TO COMMON CARRIERS Interstate Pay-Per-Call and Other Information Services § 64.1505 Restrictions on collect telephone calls. (a) No common carrier shall provide interstate transmission or billing and collection services to an entity offering any service within the scope...

  19. CALL in the Year 2000: A Look Back from 2016

    Science.gov (United States)

    Chapelle, Carol A.

    2016-01-01

    This commentary offers a brief reflection on the state of CALL in 1997, when "Language Learning & Technology" was launched with my paper entitled "CALL in the year 2000: Still in search of research paradigms?" The point of my 1997 paper was to suggest the potential value of research on second language learning for the study…

  20. Call Centres in Denmark 2004 - Strategy, HR Practices & Performance

    DEFF Research Database (Denmark)

    Sørensen, Ole H.; El-Salanti, Nadia

    This survey is the first scientifically based benchmarking study of the Danish call centre industry. The main results from the study are based on answers from 128 call centres, which correspond to a response rate of 65%. The Danish study is part of a global project coordinated by researchers at C...

  1. Impact of Using CALL on Iranian EFL Learners' Vocabulary Knowledge

    Science.gov (United States)

    Yunus, Melor Md; Salehi, Hadi; Amini, Mahdi

    2016-01-01

    Computer Assisted Language Learning (CALL) integration in EFL contexts has intensified noticeably in recent years. This integration might be in different ways and for different purposes such as vocabulary acquisition, grammar learning, phonology, writing skills, etc. More explicitly, this study is an attempt to explore the effect of using CALL on…

  2. 47 CFR 25.284 - Emergency Call Center Service.

    Science.gov (United States)

    2010-10-01

    ... mobile satellite service to end-user customers (part 25, subparts A-D) must provide Emergency Call Center... Center personnel must determine the emergency caller's phone number and location and then transfer or otherwise redirect the call to an appropriate public safety answering point. Providers of mobile satellite...

  3. Evaluation of Static JavaScript Call Graph Algorithms

    NARCIS (Netherlands)

    J.-J. Dijkstra (Jorryt-Jan)

    2014-01-01

    htmlabstractThis thesis consists of a replication study in which two algorithms to compute JavaScript call graphs have been implemented and evaluated. Existing IDE support for JavaScript is hampered due to the dynamic nature of the language. Previous studies partially solve call graph computation

  4. Steven MacCall: Winner of LJ's 2010 Teaching Award

    Science.gov (United States)

    Berry, John N., III

    2010-01-01

    This article profiles Steven L. MacCall, winner of "Library Journal's" 2010 Teaching Award. An associate professor at the School of Library and Information Studies (SLIS) at the University of Alabama, Tuscaloosa, MacCall was nominated by Kathie Popadin, known as "Kpop" to the members of her cohort in the online MLIS program at SLIS. Sixteen of…

  5. Calls to Teen Line: Representative Concerns of Adolescents.

    Science.gov (United States)

    Boehm, Kathryn E.; Schondel, Connie K.; Ivoska, William J.; Marlowe, Alison L.; Manke-Mitchell, Laurie

    1998-01-01

    Study examines whether the concerns of teenagers calling a peer listening service are representative of the concerns of teenagers in the area served. Results indicate that students' biggest concerns involve family problems, peer relationships, self-esteem, and school problems. Concludes that calls to the teen line are representative. (Author/GCP)

  6. Completion of cathode strip chamber (CSC) installation on the so-called YE+2 wheel of CMS on March 2005.

    CERN Multimedia

    Tejinder S. Virdee

    2005-01-01

    The pictures have been taken in the CMS construction hall in Cessy (neighbouring France), called SX5, in March 2005 and show the status of cathode strip chamber (CSC) assembly on the yoke disk YE+2. The chambers are labelled ME+3 and their installation has been completed on March 16th, 2005.

  7. Safety in construction industry

    International Nuclear Information System (INIS)

    Khan, A.M.

    1979-01-01

    Causative factors of accidents in construction industry in the context of experience of construction work of the Rajasthan Atomic Power Project are enumerated. The aspect of accident cost - direct and indirect - is discussed briefly. Setting up of a safety set-up at construction sites is emphasized and principles which should guide the accident prevention programme are spelt out. (M.G.B.)

  8. Investigating CALL in the Classroom: Situational Variables to Consider

    Directory of Open Access Journals (Sweden)

    Darlene Liutkus

    2012-01-01

    Full Text Available A new paradigm in second language pedagogy has Computer Assisted Language Learning (CALL playing a significant role. Much of the literature to-date claims that CALL can have a positive impact on students’ second language acquisition (SLA. Mixed method of research produces data to investigate if CALL positively affects student language proficiency, motivation and autonomy. Classroom observation of participants in their natural environment is a qualitative technique used but has situational variables that could skew results if not structured. A questionnaire is a quantitative tool that can offer insight regarding participants’ perception of performance but can contradict what the researcher has observed. This paper will take an in-depth look at variables such as: instructor’s pedagogical application; blending CALL into the curriculum; types of CALL implemented; feedback received and their implications for design of the data collection tools

  9. Call Admission Scheme for Multidimensional Traffic Assuming Finite Handoff User

    Directory of Open Access Journals (Sweden)

    Md. Baitul Al Sadi

    2017-01-01

    Full Text Available Usually, the number of users within a cell in a mobile cellular network is considered infinite; hence, M/M/n/k model is appropriate for new originated traffic, but the number of ongoing calls around a cell is always finite. Hence, the traffic model of handoff call will be M/M/n/k/N. In this paper, a K-dimensional traffic model of a mobile cellular network is proposed using the combination of limited and unlimited users case. A new call admission scheme (CAS is proposed based on both thinning scheme and fading condition. The fading condition of the wireless channel access to a handoff call is prioritized compared to newly originated calls.

  10. Addressee Errors in ATC Communications: The Call Sign Problem

    Science.gov (United States)

    Monan, W. P.

    1983-01-01

    Communication errors involving aircraft call signs were portrayed in reports of 462 hazardous incidents voluntarily submitted to the ASRS during an approximate four-year period. These errors resulted in confusion, disorder, and uncoordinated traffic conditions and produced the following types of operational anomalies: altitude deviations, wrong-way headings, aborted takeoffs, go arounds, runway incursions, missed crossing altitude restrictions, descents toward high terrain, and traffic conflicts in flight and on the ground. Analysis of the report set resulted in identification of five categories of errors involving call signs: (1) faulty radio usage techniques, (2) call sign loss or smearing due to frequency congestion, (3) confusion resulting from similar sounding call signs, (4) airmen misses of call signs leading to failures to acknowledge or readback, and (5) controller failures regarding confirmation of acknowledgements or readbacks. These error categories are described in detail and several associated hazard mitigating measures that might be aken are considered.

  11. The renewal of hydroelectric concessions in competitive call

    International Nuclear Information System (INIS)

    2013-01-01

    This document discusses various issues associated with the planned competitive call on the French hydraulic power plants. The principles of this competitive call for hydroelectric concessions are first addressed: administrative regime of concessions, competitive call process, criteria of selection of the concession holder, case of 'concession of valleys', potential competitors. It outlines and discusses the difficulties of this competitive call: France is the single country to implement this procedure; it concerns a national asset; it questions the guarantee of a future use of equipment at best for the energy benefits of French consumers; the competitive call is a nice idea indeed but extremely complex. A note discusses the profitability aspects of Plants for Transfer of Energy by Pumping

  12. Evidence That Calls-Based and Mobility Networks Are Isomorphic.

    Directory of Open Access Journals (Sweden)

    Michele Coscia

    Full Text Available Social relations involve both face-to-face interaction as well as telecommunications. We can observe the geography of phone calls and of the mobility of cell phones in space. These two phenomena can be described as networks of connections between different points in space. We use a dataset that includes billions of phone calls made in Colombia during a six-month period. We draw the two networks and find that the call-based network resembles a higher order aggregation of the mobility network and that both are isomorphic except for a higher spatial decay coefficient of the mobility network relative to the call-based network: when we discount distance effects on the call connections with the same decay observed for mobility connections, the two networks are virtually indistinguishable.

  13. [Bioacoustic of the advertisement call of Ceratophrys cranwelli (Anura: Ceratophryidae)].

    Science.gov (United States)

    Valetti, Julián Alonso; Salas, Nancy Edith; Martino, Adolfo Ludovico

    2013-03-01

    The advertisement call plays an important role in the life history of anuran amphibians, mainly during the breeding season. Call features represent an important character to discriminate species, and sound emissions are very effective to assure or reinforce genetic incompatibility, especially in the case of sibling species. Since frogs are ectotherms, acoustic properties of their calls will vary with temperature. In this study, we described the advertisement call of C. cranwelli, quantifying the temperature effect on its components. The acoustic emissions were recorded during 2007 using a DAT record Sony TCD-100 with stereo microphone ECM-MS907 Sony and tape TDK DAT-RGX 60. As males emit their calls floating in temporary ponds, water temperatures were registered after recording the advertisement calls with a digital thermometer TES 1300+/-0.1 degreeC. Altogether, 54 calls from 18 males were analyzed. The temporal variables of each advertisement call were measured using oscillograms and sonograms and the analyses of dominant frequency were performed using a spectrogram. Multiple correlation analysis was used to identify the temperature-dependent acoustic variables and the temperature effect on these variables was quantified using linear regression models. The advertisement call of C. cranwelli consists of a single pulse group. Call duration, Pulse duration and Pulse interval decreased with the temperature, whereas the Pulse rate increased with temperature. The temperature-dependent variables were standardized at 25 degreeC according to the linear regression model obtained. The acoustic variables that were correlated with the temperature are the variables which emissions depend on laryngeal muscles and the temperature constraints the contractile properties of muscles. Our results indicated that temperature explains an important fraction of the variability in some acoustic variables (79% in the Pulse rate), and demonstrated the importance of considering the effect of

  14. Occupational voice demands and their impact on the call-centre industry

    Directory of Open Access Journals (Sweden)

    Duffy OM

    2009-04-01

    Full Text Available Abstract Background Within the last decade there has been a growth in the call-centre industry in the UK, with a growing awareness of the voice as an important tool for successful communication. Occupational voice problems such as occupational dysphonia, in a business which relies on healthy, effective voice as the primary professional communication tool, may threaten working ability and occupational health and safety of workers. While previous studies of telephone call-agents have reported a range of voice symptoms and functional vocal health problems, there have been no studies investigating the use and impact of vocal performance in the communication industry within the UK. This study aims to address a significant gap in the evidence-base of occupational health and safety research. The objectives of the study are: 1. to investigate the work context and vocal communication demands for call-agents; 2. to evaluate call-agents' vocal health, awareness and performance; and 3. to identify key risks and training needs for employees and employers within call-centres. Methods and design This is an occupational epidemiological study, which plans to recruit call-centres throughout the UK and Ireland. Data collection will consist of three components: 1. interviews with managers from each participating call-centre to assess their communication and training needs; 2. an online biopsychosocial questionnaire will be administered to investigate the work environment and vocal demands of call-agents; and 3. voice acoustic measurements of a random sample of participants using the Multi-dimensional Voice Program (MDVP. Qualitative content analysis from the interviews will identify underlying themes and issues. A multivariate analysis approach will be adopted using Structural Equation Modelling (SEM, to develop voice measurement models in determining the construct validity of potential factors contributing to occupational dysphonia. Quantitative data will be

  15. EPR project construction cost control

    International Nuclear Information System (INIS)

    Duflo, D.; Pouget-Abadie, X.; Dufour, A.; Kauffmann, G.

    2001-01-01

    The EPR project is now managed by EDF in cooperation with the German Utilities. The main engineering activities for this period are related to the preparation of construction project management, deepening of some safety issues, definition of the project technical reference. The EPR project concerns the so-called reference unit, that is an isolated first-off unit, with unit electrical power of about 1500 MW. The construction costs evaluated are those of the nuclear island, the conventional island, site facilities, installation work and the administrative buildings. The EPR project construction cost evaluation method applies to all the equipment installed and commissioned. It requires the availability of a preliminary project detailed enough to identify the bill of quantities. To these quantities are then assigned updated unit prices that are based either on cost bases for similar and recent facilities or taken from request for quotation for similar equipment or result from gains due to contractual conditions benefiting from simplifications in the functional and technical specifications. The input and output data are managed in a model that respects the breakdown on which the evaluation method is based. The structural organization of this method reflects a functional breakdown on the one hand (nuclear island, conventional island, common site elements) and on the other hand a breakdown according to equipment or activity (civil engineering, mechanics, electricity, instrumentation and control). This paper discusses the principle and the method of construction cost evaluation carried out, the cost data base and input and output parameters as well as results and oncoming cost analysis tasks. (author)

  16. Construction practices: Pulse builder survey results

    Energy Technology Data Exchange (ETDEWEB)

    Kadulski, R

    This paper discusses the results of a nationwide builder survey on common building techniques, such as framing, insulation, airtight construction practices, testing for airtightness, windows, furnaces and water heaters, and ventilation. Results indicate that changes in construction were mainly influenced by the R-2000 program. The spread of R-2000 technology is reflected in the use of higher insulation levels than are called for by codes or than is normal practice, sealing of joints, and attention to air and vapour retarders as well as air tight drywall techniques combined with mechanical ventilation systems.

  17. Sustainable construction: construction and demolition waste reconsidered.

    Science.gov (United States)

    del Río Merino, Mercedes; Izquierdo Gracia, Pilar; Weis Azevedo, Isabel Salto

    2010-02-01

    Construction activity in Europe has increased substantially in the past decade. Likewise, there has also been a commensurate rise in the generation of construction and demolition waste (C&DW). This, together with the fact that in many European countries the rate of recycling and reuse of C&DW is still quite low has engendered a serious environmental problem and a motivation to develop strategies and management plans to solve it. Due to its composition, there is a significant potential to reuse and/or recycle C&DW, and thereby, contribute to improving the sustainability of construction and development, but practical procedures are not yet widely known or practiced in the construction industry. This article (a) summarizes the different applications that are presently practiced to optimize the recovery and/or application of C&DW for reuse, and (b) proposes various measures and strategies to improve the processing of this waste. The authors suggest that to enhance environmental effectiveness, a conscious and comprehensive C&DW management plan should be implemented in each jurisdiction. More precisely, this study presents a holistic approach towards C&DW management, through which environmental benefits can be achieved through the application of new construction methods that can contribute to sustainable growth.

  18. TPX tokamak construction management

    International Nuclear Information System (INIS)

    Knutson, D.; Kungl, D.; Seidel, P.; Halfast, C.

    1995-01-01

    A construction management contract normally involves the acquisition of a construction management firm to assist in the design, planning, budget conformance, and coordination of the construction effort. In addition the construction management firm acts as an agent in the awarding of lower tier contracts. The TPX Tokamak Construction Management (TCM) approach differs in that the construction management firm is also directly responsible for the assembly and installation of the tokamak including the design and fabrication of all tooling required for assembly. The Systems Integration Support (SIS) contractor is responsible for the architect-engineering design of ancillary systems, such as heating and cooling, buildings, modifications and site improvements, and a variety of electrical requirements, including switchyards and >4kV power distribution. The TCM will be responsible for the procurement of materials and the installation of the ancillary systems, which can either be performed directly by the TCM or subcontracted to a lower tier subcontractor. Assurance that the TPX tokamak is properly assembled and ready for operation when turned over to the operations team is the primary focus of the construction management effort. To accomplish this a disciplined constructability program will be instituted. The constructability effort will involve the effective and timely integration of construction expertise into the planning, component design, and field operations. Although individual component design groups will provide liaison during the machine assembly operations, the construction management team is responsible for assembly

  19. Towards green construction

    International Nuclear Information System (INIS)

    Bajracharya, Bijaya B.; Shrestha, Prasanna M.

    2000-01-01

    Sustainability is the key to any development works. In the operation phase, hydro power is the most sustainable form of energy. However construction activities for the same power station are usually far from being green. The popular myth is that construction activity converts green into grey. Despite this popular myth, construction of a hydro power project in Nepal has made the project area greener than earlier during the construction phase itself. Choice of construction technology, appropriate level of environmental impact assessment, monitoring of environmental parameters along side the construction progress followed by mitigation at the right time; launching community development programmes side by side, having environmental specification in contractual documents and self-reliance to fulfill environmental obligations by contractors itself are the key factors in the environmental management within the construction activities. The main conclusions in the paper is the need to change the way to think about the project constraints

  20. How engineering facilitates construction

    International Nuclear Information System (INIS)

    Bailey, D.T.

    1976-01-01

    During a recent survey, construction personnel at jobsites were asked, ''what are the ten most unwanted construction problems.'' One reoccurring answer was design/construction incompatibility. In fact, many designs were impractical from a construction point of view. The reasons for this problem can be identified: Once construction begins, engineering is under intense pressure to issue new drawings to allow work to progress according to schedule. Other reasons may be the relative inexperience of the design personnel in construction, changes in design criteria and delays in receipt of supplier or client information. A description is presented of ways to solve this problem by obtaining construction expertise and input into the various phases and products of the engineering work

  1. Temporal Statistical Analysis of Degree Distributions in an Undirected Landline Phone Call Network Graph Series

    Directory of Open Access Journals (Sweden)

    Orgeta Gjermëni

    2017-10-01

    Full Text Available This article aims to provide new results about the intraday degree sequence distribution considering phone call network graph evolution in time. More specifically, it tackles the following problem. Given a large amount of landline phone call data records, what is the best way to summarize the distinct number of calling partners per client per day? In order to answer this question, a series of undirected phone call network graphs is constructed based on data from a local telecommunication source in Albania. All network graphs of the series are simplified. Further, a longitudinal temporal study is made on this network graphs series related to the degree distributions. Power law and log-normal distribution fittings on the degree sequence are compared on each of the network graphs of the series. The maximum likelihood method is used to estimate the parameters of the distributions, and a Kolmogorov–Smirnov test associated with a p-value is used to define the plausible models. A direct distribution comparison is made through a Vuong test in the case that both distributions are plausible. Another goal was to describe the parameters’ distributions’ shape. A Shapiro-Wilk test is used to test the normality of the data, and measures of shape are used to define the distributions’ shape. Study findings suggested that log-normal distribution models better the intraday degree sequence data of the network graphs. It is not possible to say that the distributions of log-normal parameters are normal.

  2. Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph

    Directory of Open Access Journals (Sweden)

    Jae-wook Jang

    2015-01-01

    Full Text Available As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns. To enrich this effort and by capitalizing on ideas from the social network analysis domain, we build a tool that can help classify malware families using features driven from the graph structure of their system calls. To achieve that, we first construct a system call graph that consists of system calls found in the execution of the individual malware families. To explore distinguishing features of various malware species, we study social network properties as applied to the call graph, including the degree distribution, degree centrality, average distance, clustering coefficient, network density, and component ratio. We utilize features driven from those properties to build a classifier for malware families. Our experimental results show that “influence-based” graph metrics such as the degree centrality are effective for classifying malware, whereas the general structural metrics of malware are less effective for classifying malware. Our experiments demonstrate that the proposed system performs well in detecting and classifying malware families within each malware class with accuracy greater than 96%.

  3. PACE: Proactively Secure Accumulo with Cryptographic Enforcement

    Science.gov (United States)

    2017-05-27

    will be replaced with the values from the decrypted destination field. PACE encrypts data using AES and supports the following modes: CTR, CFB, CBC, OFB...2) Searchable Encryption : PACE also support searching for encrypted data. This is done using AES in SIV mode [11] to provide deterministic encryption ...row ”Alphabet”), then the search term is encrypted deterministically, and that term is searched on the server. Because AES does not preserve the

  4. Design and analysis of cryptographic algorithms

    DEFF Research Database (Denmark)

    Kölbl, Stefan

    . From securing our passwords and personal data to protecting mobile communication from eavesdroppers and our electronic bank transactions from manipulation. These applications would be impossible without cryptography. The main topic of this thesis is the design and security analysis of the most......In today’s world computers are ubiquitous. They can be found in virtually any industry and most households own at least one personal computer or have a mobile phone. Apart from these fairly large and complex devices, we also see computers on a much smaller scale appear in everyday objects...... to this development. However, most of this communication happens over inherently insecure channels requiring methods to protect our communication. A further issue is the vast amount of data generated, which raises serious privacy concerns. Cryptography provides the key components for protecting our communication...

  5. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  6. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  7. Cryptographic Techniques for Privacy Preserving Identity

    Science.gov (United States)

    2011-05-13

    has been done to investigate the privacy implications of stylometry, however. Several researchers have considered whether the author of an academic ...Interface and Classification Society of North America, 2005. [66] H. Maurer, F. Kappe, and B. Zaka. Plagiarism —a survey. Journal of Universal Com- puter

  8. Cryptographically-Enhanced Privacy for Recommender Systems

    NARCIS (Netherlands)

    Jeckmans, Arjan

    2014-01-01

    Automated recommender systems are used to help people find interesting content or persons in the vast amount of information available via the internet. There are different types of recommender systems, for example collaborative filtering systems and content-based recommender systems. However, all

  9. A Formal Language for Cryptographic Protocol Requirements

    Science.gov (United States)

    1996-01-01

    L;KAB; AgKBS ; fA; TAgKAB (4) B sends to A: fTA + 1gKAB Here A and B are two principals. By sending the rst message, A requests of the...A: CertB; fAKBgKA ; algchoiceB; fmd (fAKBgKA ; algchoiceB ; NA; alglistA)gK1 B (3) A sends to B: fAKAgKB ; fmd (fAKAgKB ; fAKBgKA)gK1 A CertX is a...alglistA 3. B sends to C: CertB ; fAKBgKC ; algchoiceB; fmd (fAKBgKC ; algchoiceB ; NA; alglistA)gK1 B (intercepted by I) 4. IB sends to A : CertB

  10. Data Security Using Cryptographic Approach | Okoro | Information ...

    African Journals Online (AJOL)

    The need for data security in Information and Communications Technology (ICT) can not be overemphasized. In this paper, the use of symmetric and asymmetric key cryptographies to clearly achieve the required protection by means of prime number system and modular multiplicative inverse has been highlighted and ...

  11. CryptosFS: Fast Cryptographic Secure NFS

    OpenAIRE

    O'Shanahan, Declan

    2000-01-01

    The issue of security in file-systems is as relevant today as when the first file system was developed. Current file system implementations rely heavily on centralised security mechanisms such as access control lists. The problem of security in file systems was made more complicated by the introduction of remote access to files. Storing information on a remote server has the potential to introduce additional security weaknesses into the file system model. The client, the commun...

  12. Deep Learning Based Cryptographic Primitive Classification

    OpenAIRE

    Hill, Gregory D.; Bellekens, Xavier J. A.

    2017-01-01

    Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures perform well, however, the problem has not ceased. Reverse engineering potentially malicious software is a cumbersome task due to platform eccentricities and obfuscated transmutation mechanisms, hence requiring smarter, more efficient detection s...

  13. Threshold quantum cryptograph based on Grover's algorithm

    International Nuclear Information System (INIS)

    Du Jianzhong; Qin Sujuan; Wen Qiaoyan; Zhu Fuchen

    2007-01-01

    We propose a threshold quantum protocol based on Grover's operator and permutation operator on one two-qubit signal. The protocol is secure because the dishonest parties can only extract 2 bits from 3 bits information of operation on one two-qubit signal while they have to introduce error probability 3/8. The protocol includes a detection scheme to resist Trojan horse attack. With probability 1/2, the detection scheme can detect a multi-qubit signal that is used to replace a single-qubit signal, while it makes every legitimate qubit invariant

  14. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  15. On Protocol Security in the Cryptographic Model

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    you as possible. This is the general problem of secure multiparty computation. The usual way of formalizing the problem is to say that a number of parties who do not trust each other wish to compute some function of their local inputs, while keeping their inputs as secret as possible and guaranteeing...... the channels by which they communicate. A general solution to the secure multiparty computation problem is a compiler which given any feasible function describes an efficient protocol which allows the parties to compute the function securely on their local inputs over an open network. Over the past twenty...... years the secure multiparty computation problem has been the subject of a large body of research, both research into the models of multiparty computation and research aimed at realizing general secure multiparty computation. The main approach to realizing secure multiparty computation has been based...

  16. Conduits to care: call lights and patients’ perceptions of communication

    Science.gov (United States)

    Montie, Mary; Shuman, Clayton; Galinato, Jose; Patak, Lance; Anderson, Christine A; Titler, Marita G

    2017-01-01

    Background Call light systems remain the primary means of hospitalized patients to initiate communication with their health care providers. Although there is vast amounts of literature discussing patient communication with their health care providers, few studies have explored patients’ perceptions concerning call light use and communication. The specific aim of this study was to solicit patients’ perceptions regarding their call light use and communication with nursing staff. Methods Patients invited to this study met the following inclusion criteria: proficient in English, been hospitalized for at least 24 hours, aged ≥21 years, and able to communicate verbally (eg, not intubated). Thirty participants provided written informed consent, were enrolled in the study, and completed interviews. Results Using qualitative descriptive methods, five major themes emerged from patients’ perceptions (namely; establishing connectivity, participant safety concerns, no separation: health care and the call light device, issues with the current call light, and participants’ perceptions of “nurse work”). Multiple minor themes supported these major themes. Data analysis utilized the constant comparative methods of Glaser and Strauss. Discussion Findings from this study extend the knowledge of patients’ understanding of not only why inconsistencies occur between the call light and their nurses, but also why the call light is more than merely a device to initiate communication; rather, it is a direct conduit to their health care and its delivery. PMID:29075125

  17. Conduits to care: call lights and patients' perceptions of communication.

    Science.gov (United States)

    Montie, Mary; Shuman, Clayton; Galinato, Jose; Patak, Lance; Anderson, Christine A; Titler, Marita G

    2017-01-01

    Call light systems remain the primary means of hospitalized patients to initiate communication with their health care providers. Although there is vast amounts of literature discussing patient communication with their health care providers, few studies have explored patients' perceptions concerning call light use and communication. The specific aim of this study was to solicit patients' perceptions regarding their call light use and communication with nursing staff. Patients invited to this study met the following inclusion criteria: proficient in English, been hospitalized for at least 24 hours, aged ≥21 years, and able to communicate verbally (eg, not intubated). Thirty participants provided written informed consent, were enrolled in the study, and completed interviews. Using qualitative descriptive methods, five major themes emerged from patients' perceptions (namely; establishing connectivity, participant safety concerns, no separation: health care and the call light device, issues with the current call light, and participants' perceptions of "nurse work"). Multiple minor themes supported these major themes. Data analysis utilized the constant comparative methods of Glaser and Strauss. Findings from this study extend the knowledge of patients' understanding of not only why inconsistencies occur between the call light and their nurses, but also why the call light is more than merely a device to initiate communication; rather, it is a direct conduit to their health care and its delivery.

  18. Identification of sympatric bat species by the echolocation calls

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    One hundred and thirty-eight echolocation calls of 63 free-flying individuals of five bat species (Rhinolophus ferrumequinum,Myotis formosus,Myotis ikonnikovi,Myotis daubentoni and Murina leucogaster)were recorded (by ultrasonic bat detector (D980)) in Zhi'an village of Jilin Province,China.According to the frequency-time spectra,these calls were categorized into two types:FM/CF (constant frequency) / FM (R.ferrumequinum) and FM (frequency modulated)(M.formosus,M.ikonnikovi,M.daubentoni and M.leucogaster).Sonograms of the calls of R.ferrumequinum could easily be distinguished from those of the other four species.For the calls of the remaining four species,six echolocation call parameters,including starting frequency,ending frequency,peak frequency duration,longest inter-pulse interval and shortest inter-pulse interval,were examined by stepwise discriminant analysis.The results show that 84.1% of calls were correctly classified,which indicates that these parameters of echolocation calls play an important role in identifying bat species.These parameters can be used to test the accuracy of general predictions based on bats' morphology in the same forest and can provide essential information for assessing patterns of bat habitat use.

  19. The association between advertising and calls to a tobacco quitline

    Science.gov (United States)

    Mosbaek, Craig H; Austin, Donald F; Stark, Michael J; Lambert, Lori C

    2007-01-01

    Objective This study assessed the cost effectiveness of different types of television and radio advertisements and the time of day in which advertisements were placed in generating calls to the Oregon tobacco quitline. Design Cost effectiveness was measured by cost per call, calculated as the cost of advertising divided by the number of quitline calls generated by that advertising. Advertising was bought in one‐week or two‐week blocks and included 27 daytime television buys, 22 evening television buys and 31 radio buys. Results Cost effectiveness varied widely by medium, time of day and advertisement used. Daytime television was seven times more cost effective than evening television and also more cost effective than radio. The most effective advertisements at generating quitline calls were real life testimonials by people who lost family members to tobacco and advertisements that deal practically with how to quit. Conclusions Placement of television advertisements during the day versus the evening can increase an advertisement's effectiveness in generating calls to a quitline. Some advertising messages were more effective than others in generating calls to a quitline. Quitline providers can apply findings from previous research when planning media campaigns. In addition, call volume should be monitored in order to assess the cost effectiveness of different strategies to promote use of the quitline. PMID:18048626

  20. SYSTEMIC INNOVATION IN CONSTRUCTION: THE

    DEFF Research Database (Denmark)

    Jensen, Jens Stissing; Koch, Christian

    2007-01-01

    -based. This approach evaluates the outcome of the program against the main intentions formulated in the tender material. Drawing on systemic innovation theory an alternative evaluative approach is suggested which focuses on the build-up of organizational and institutional resources to support the development...... of an emerging ICT trajectory. While the result-based evaluation points to some weaknesses in the quality of the best-practice and cross-organizational elements of the case-material, the systemic approach point to some important sideeffects of the program, such as the stabilization and enrolment of the industry......This paper offers an evaluation of a best practice program called ‘Best in Construction’ (BiC) which aimed to identify and document cases of successful ICT use in the Danish construction industry. The program is evaluated using two different approaches. The first approach is result...

  1. Frogs Call at a Higher Pitch in Traffic Noise

    Directory of Open Access Journals (Sweden)

    Kirsten M. Parris

    2009-06-01

    Full Text Available Male frogs call to attract females for mating and to defend territories from rival males. Female frogs of some species prefer lower-pitched calls, which indicate larger, more experienced males. Acoustic interference occurs when background noise reduces the active distance or the distance over which an acoustic signal can be detected. Birds are known to call at a higher pitch or frequency in urban noise, decreasing acoustic interference from low-frequency noise. Using Bayesian linear regression, we investigated the effect of traffic noise on the pitch of advertisement calls in two species of frogs, the southern brown tree frog (Litoria ewingii and the common eastern froglet (Crinia signifera. We found evidence that L. ewingii calls at a higher pitch in traffic noise, with an average increase in dominant frequency of 4.1 Hz/dB of traffic noise, and a total effect size of 123 Hz. This frequency shift is smaller than that observed in birds, but is still large enough to be detected by conspecific frogs and confer a significant benefit to the caller. Mathematical modelling predicted a 24% increase in the active distance of a L. ewingii call in traffic noise with a frequency shift of this size. Crinia signifera may also call at a higher pitch in traffic noise, but more data are required to be confident of this effect. Because frog calls are innate rather than learned, the frequency shift demonstrated by L. ewingii may represent an evolutionary adaptation to noisy conditions. The phenomenon of frogs calling at a higher pitch in traffic noise could therefore constitute an intriguing trade-off between audibility and attractiveness to potential mates.

  2. Metaphor Analysis and the Construction of Gender

    OpenAIRE

    Rudolf Schmitt

    2009-01-01

    Recently there has been an increasing number of studies on the construction of gender based on metaphors (KOLLER, 2004a, 2004b, 2005; ANDERSON VASBY & HORN SHEELER, 2005; EBELING & SCHMITZ, 2006; BOCK VON WÜLFINGEN, 2007). Many of these studies seem to have overlooked one of the most thoroughly developed theories of metaphor, LAKOFF and JOHNSON's so-called cognitive theory of metaphor or limited themselves to LAKOFF and JOHNSON's first book from 1980. In this article I explore current researc...

  3. The experience of work in a call centre environment

    Directory of Open Access Journals (Sweden)

    Sanet Hauptfleisch

    2006-10-01

    Full Text Available This qualitative research study explored the work experience in a call centre environment in an information technology call centre based in South Africa, which service foreign customers exclusively. Three data collection methods were used, namely narratives, in-depth interviews with call centre consultants, and observation. Following a grounded theory approach, four themes were elicited, namely the perceptions of team members, uncertainty created by a constantly changing environment, perceived distances due to management practices, and depersonalisation experienced while actually dealing with customers. In addition to this, the reported impact of these themes on work performance was explored and compared to existing research.

  4. Acoustic model optimisation for a call routing system

    CSIR Research Space (South Africa)

    Kleynhans, N

    2012-11-01

    Full Text Available Secretary system and provides background on some application-specific ASR issues. Section III details the ASR development effort as well as corpus selection and design. Our experiments are described Fig. 1. High level AutoSecretary call flow. in Section IV... and results and a discussion are presented in Section V. Lastly, the conclusion and possible future work appear in Section VI. II. BACKGROUND A. AutoSecretary IVR System Figure 1 shows the high level call flow of the AutoSecretary call routing system...

  5. A synthetic operational account of call-by-need evaluation

    DEFF Research Database (Denmark)

    Zerny, Ian; Danvy, Olivier

    2013-01-01

    . The syntactic theory was initiated by Ariola, Felleisen, Maraist, Odersky and Wadler and is prevalent today to reason equationally about lazy programs, on par with Barendregt et al.'s term graphs. Nobody knows, however, how the theory of call by need compares to the practice of call by need: all that is known...... machine implementing lazy evaluation. The machines are intensionally compatible with extensional reasoning about lazy programs and they are lock-step equivalent. Each machine functionally corresponds to a natural semantics for call by need in the style of Launchbury, though for non-preprocessed λ...

  6. Construction time of PWRs

    International Nuclear Information System (INIS)

    Moreira, João M.L.; Gallinaro, Bruno; Carajilescov, Pedro

    2013-01-01

    The construction time of PWRs is studied considering published data about nuclear power plants in the world. For the 268 PWRs in operation in 2010, the mode of the construction time distribution is around 5–6 years, and 80% of the plants were built in less than 120 months. To circumvent the problem of comparing plants with different size we normalized the construction time to plants with 1 GW. We restricted the analysis to 201 PWRs which suffered less from external factors that were beyond the control of the management from 1965 to 2010. The results showed that the normalized construction time did not increase over the years and nor with the plants’ gross power level. The learning rate of the industry regarding normalized construction times showed a reduction with 95% confidence level of about 0.56±0.07 months for each 10 GW of installed capacity. Over the years the normalized construction time decreased and became more predictable. The data showed that countries with more centralized regulatory, construction and operation environments were able to build PWRs in shorter times. Countries less experienced with the nuclear technology built PWRs in longer times. - Highlights: ► The construction time of PWRs is analyzed based on historical data. ► Different factors affecting construction time are considered in the analyses. ► The normalized construction time of PWRs decreased with time and gross power level. ► Countries with more centralized institutions built PWRs more quickly

  7. What Should Guide Reality Construction?

    DEFF Research Database (Denmark)

    Ravn, Ib

    1991-01-01

    The constructivist movement in the social sciences (Berger & Luckmann, Gergen) argues that social institutions are the constructions of a community of human agents. This implies that people possess the power to radically change those institutions. This raises what may be called the values problem...... ethical positions (relativism and absolutism) as distorted or degenerate cases of an ideal case, characterized by unity-in-diversity. This model is offered as a framework for a discussion of the values problem in constructivism, particularly in social research....... in the scientific community, whereas in the general community it is at least acknowledged as an issue. The values problem in constructivism has been addressed by a number of writers in second-order cybernetics, who offer reflections on ethics and values that are quite tentative and call for further elaboration....... The remainder of the chapter is an attempt to provide a broader context for a constructivist discussion of values and ethics. To do this I discuss the concept of the "implicate order," an ontological framework proposed by the theoretical physicist David Bohm (1980b). As will be shown, this ontology implies...

  8. The Role of Hypothesis in Constructive Design Research

    DEFF Research Database (Denmark)

    Bang, Anne Louise; Krogh, Peter; Ludvigsen, Martin

    2012-01-01

    It is, today, widely appreciated that Research-through-Design – or Constructive Design Research as we will call it in this paper – allows for designers to produce knowledge based on the skills and capacities of the design field itself. However, most of the research fails to bridge the gap between...... the general notions of constructive design research and the detailed research activities of the field. We therefore suggest bridging this methodological gap in the academic discussion with what we have ended up calling the “entrance level of constructive design research”. As a step towards to a more nuanced...... and solid perspective on how to keep constructive design research on track, this paper offers a model for understanding the role of hypothesis in constructive design research. The model allows for understanding the hypothesis’s relation to research motivation, questions, experiments, evaluation...

  9. Constructing Student Problems in Phylogenetic Tree Construction.

    Science.gov (United States)

    Brewer, Steven D.

    Evolution is often equated with natural selection and is taught from a primarily functional perspective while comparative and historical approaches, which are critical for developing an appreciation of the power of evolutionary theory, are often neglected. This report describes a study of expert problem-solving in phylogenetic tree construction.…

  10. Emergency distress call system for automobiles in Lagos state, Nigeria

    African Journals Online (AJOL)

    Emergency distress call system for automobiles in Lagos state, Nigeria. ... PROMOTING ACCESS TO AFRICAN RESEARCH ... and communications technology capabilities to transportation and the medical care system in order to save lives, ...

  11. SNPMClust: Bivariate Gaussian Genotype Clustering and Calling for Illumina Microarrays

    Directory of Open Access Journals (Sweden)

    Stephen W. Erickson

    2016-07-01

    Full Text Available SNPMClust is an R package for genotype clustering and calling with Illumina microarrays. It was originally developed for studies using the GoldenGate custom genotyping platform but can be used with other Illumina platforms, including Infinium BeadChip. The algorithm first rescales the fluorescent signal intensity data, adds empirically derived pseudo-data to minor allele genotype clusters, then uses the package mclust for bivariate Gaussian model fitting. We compared the accuracy and sensitivity of SNPMClust to that of GenCall, Illumina's proprietary algorithm, on a data set of 94 whole-genome amplified buccal (cheek swab DNA samples. These samples were genotyped on a custom panel which included 1064 SNPs for which the true genotype was known with high confidence. SNPMClust produced uniformly lower false call rates over a wide range of overall call rates.

  12. Call for Expressions of Interest: Strengthening cyber policy centres ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... cyber policy themes, and the capacity and drive to augment work in the other ... to improve their research, policy influence, and organizational performance. ... Call for new OWSD Fellowships for Early Career Women Scientists now open.

  13. Calling songs of some South African cicadas (Homoptera: Cicadidae)

    African Journals Online (AJOL)

    1987-07-13

    Jul 13, 1987 ... Figure 11 Posture of male cicadas during calling song, illustrated by a specimen ... parameters of the smaller samples falls within that of the largest conspecific ... under the control of the neuromuscular system (Pringle. 1954b).

  14. Call for proposals: Innovations for the economic inclusion of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2018-03-20

    Mar 20, 2018 ... ... cooperation agreement to support joint research projects in December 2017. ... but in most cases they have difficulty reaching marginalized youth ... Visit the call page for detailed information and to access application forms.

  15. Call for concept notes for research on gender equality and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-08-07

    Aug 7, 2017 ... Call for concept notes for research on gender equality and decentralization in Myanmar ... address gender inequality in political participation; and; improve gender-sensitive ... ROSSA's latest bulletin puts a focus on women.

  16. Call to protect deep-sea coral, sponge ecosystems

    Science.gov (United States)

    Showstack, Randy

    2004-03-01

    More than 1100 scientists are signatories to a 15 February consensus statement calling for the protection of deep sea coral and sponge ecosystems. The statement indicates that ``the greatest human threat'' to these ecosystems ``is commercial fishing, especially bottom trawling.''

  17. A new stratification of mourning dove call-count routes

    Science.gov (United States)

    Blankenship, L.H.; Humphrey, A.B.; MacDonald, D.

    1971-01-01

    The mourning dove (Zenaidura macroura) call-count survey is a nationwide audio-census of breeding mourning doves. Recent analyses of the call-count routes have utilized a stratification based upon physiographic regions of the United States. An analysis of 5 years of call-count data, based upon stratification using potential natural vegetation, has demonstrated that this uew stratification results in strata with greater homogeneity than the physiographic strata, provides lower error variance, and hence generates greatet precision in the analysis without an increase in call-count routes. Error variance was reduced approximately 30 percent for the contiguous United States. This indicates that future analysis based upon the new stratification will result in an increased ability to detect significant year-to-year changes.

  18. Taxonomic and phylogenetic utility of variation in advertising calls of ...

    African Journals Online (AJOL)

    Taxonomic and phylogenetic utility of variation in advertising calls of francolins and spurfowls (Galliformes: Phasianidae). Tshifhiwa G. Mandiwana-Neudani, Rauri C.K. Bowie, Martine Hausberger, Laurence Henry, Timothy M. Crowe ...

  19. Nuthatches eavesdrop on variations in heterospecific chickadee mobbing alarm calls

    Science.gov (United States)

    Templeton, Christopher N.; Greene, Erick

    2007-01-01

    Many animals recognize the alarm calls produced by other species, but the amount of information they glean from these eavesdropped signals is unknown. We previously showed that black-capped chickadees (Poecile atricapillus) have a sophisticated alarm call system in which they encode complex information about the size and risk of potential predators in variations of a single type of mobbing alarm call. Here we show experimentally that red-breasted nuthatches (Sitta canadensis) respond appropriately to subtle variations of these heterospecific “chick-a-dee” alarm calls, thereby evidencing that they have gained important information about potential predators in their environment. This study demonstrates a previously unsuspected level of discrimination in intertaxon eavesdropping. PMID:17372225

  20. Institutional dynamic of the call center industry in Denmark and France

    DEFF Research Database (Denmark)

    Sørensen, Ole H.; Beraud, Mathieu; Colin, Thierry

    2005-01-01

    The call centre development is substantially increasing in the most part of industrialized countries. Coming to the fore and seeking for staff, this sector is still looking for benchmarks, especially in terms of employment. Currently it can be said that the sector is under construction since its ...... to the specific micro and meso dynamic of this emerging industry. We base on a part of the first results obtained in a research on low wage initiated by the Russell Rage Foundation. More precisely we use the results from sectoral survey....

  1. Call for tender - Areva-Alstom: watershed in wind energy - Technological duel on the open sea

    International Nuclear Information System (INIS)

    Dupin, L.

    2012-01-01

    The author comments the answers to a call for tender made by the French government and concerning five offshore wind farm sites (Le Treport, Fecamp, Courseulles sur Mer, Saint-Brieuc and Saint-Nazaire). As they are present within the three consortiums, Areva and Alstom should provide the wind turbines. This would result in the construction by Alstom of two blade and mast factories and two turbine and pad factories. For both companies, this market of 500 to 600 turbines is an opportunity. Many jobs are at stake. They push themselves forward for their experience or their innovation capacity. But their wind turbines will be based on foreign (Spanish or German) technology

  2. A Call-Put Duality for Perpetual American Options

    OpenAIRE

    Alfonsi, Aurélien; Jourdain, Benjamin

    2006-01-01

    International audience; It is well known that in models with time-homogeneous local volatility functions and constant interest and dividend rates, the European Put prices are transformed into European Call prices by the simultaneous exchanges of the interest and dividend rates and of the strike and spot price of the underlying. This paper investigates such a Call Put duality for perpetual American options. It turns out that the perpetual American Put price is equal to the perpetual American C...

  3. Non-linguistic analysis of call center conversations

    CERN Document Server

    Kopparapu, Sunil Kumar

    2014-01-01

    The book focuses on the part of the audio conversation not related to language such as speaking rate (in terms of number of syllables per unit time) and emotion centric features. This text examines using non-linguistics features to infer information from phone calls to call centers. The author analyzes 'how' the conversation happens and not 'what' the conversation is about by audio signal processing and analysis.

  4. Android: Call C Functions with the Native Development Kit (NDK)

    Science.gov (United States)

    2016-09-01

    from a Java application. 15. SUBJECT TERMS Android , NDK, Native Development Kit, C callable, Java Native Interface, JNI, Java, C/C++ 16. SECURITY ...ARL-TN-0782 ● SEP 2016 US Army Research Laboratory Android : Call C Functions with the Native Development Kit (NDK) by Hao Q...Do not return it to the originator. ARL-TN-0782 ● SEP 2016 US Army Research Laboratory Android : Call C Functions with the Native

  5. 29 CFR 778.221 - “Call-back” pay.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false âCall-backâ pay. 778.221 Section 778.221 Labor Regulations...Regular Rateâ Payments Not for Hours Worked § 778.221 “Call-back” pay. (a) General. In the interest of... payments consist of a specified number of hours' pay at the applicable straight time or overtime rates...

  6. Objective assessment of IP video calls with Asterisk

    OpenAIRE

    Kapičák, Lukáš; Nevlud, Pavel; Mikulec, Martin; Zdrálek, Jaroslav

    2012-01-01

    The paper deals with an objective assessment of IP video calls transmission over GSM and UMTS networks. Video transmission is affected by many factors in mobile network. Among these factors belong packet loss, latency and transmission rate of the mobile network. Network properties were simulated by Simena network simulator. Our team have developed a unique technique for finding defects in video appearing in video calls. This technique is built on modified Asterisk SW PBX with enabled video re...

  7. Nonpasserine bird produces soft calls and pays retaliation cost

    OpenAIRE

    Paweł Ręk; Tomasz S. Osiejuk

    2011-01-01

    Low-amplitude vocalizations produced during aggressive encounters, courtship, or both (quiet/soft songs) have been described for many species of song-learning passerines; however, such signals have not been studied among nonlearning birds. During aggressive interactions, apart from using the broadcast call, male corncrakes (Crex crex) produce a low-amplitude, gurgling--mewing call, which appears to be equivalent to soft songs of songbirds. Previous studies have shown that low-amplitude vocali...

  8. Bundling the value of discharge telephone calls and leader rounding.

    Science.gov (United States)

    Setia, Nina; Meade, Christine

    2009-03-01

    Discharge telephone calls made by hospital staff provide invaluable opportunities to prevent adverse events, improve quality of care, and increase patient satisfaction. Similarly, the effect of rounding on patients can improve clinical quality and improve both patient and staff satisfaction. The author discusses how the combination of implementing both nurse leader rounding and discharge telephone calls simultaneously produced powerful positive outcomes in satisfaction and patient quality of care.

  9. On-call emergency workload of a general surgical team.

    Science.gov (United States)

    Jawaid, Masood; Raza, Syed Muhammad; Alam, Shams Nadeem; Manzar, S

    2009-01-01

    To examine the on-call emergency workload of a general surgical team at a tertiary care teaching hospital to guide planning and provision of better surgical services. During six months period from August to January 2007; all emergency calls attended by general surgical team of Surgical Unit II in Accident and Emergency department (A and E) and in other units of Civil, Hospital Karachi, Pakistan were prospectively recorded. Data recorded includes timing of call, diagnosis, operation performed and outcome apart from demography. Total 456 patients (326 males and 130 females) were attended by on-call general surgery team during 30 emergency days. Most of the calls, 191 (41.9%) were received from 8 am to 5 pm. 224 (49.1%) calls were of abdominal pain, with acute appendicitis being the most common specific pathology in 41 (9.0%) patients. Total 73 (16.0%) calls were received for trauma. Total 131 (28.7%) patients were admitted in the surgical unit for urgent operation or observation while 212 (46.5%) patients were discharged from A and E. 92 (20.1%) patients were referred to other units with medical referral accounts for 45 (9.8%) patients. Total 104 (22.8%) emergency surgeries were done and the most common procedure performed was appendicectomy in 34 (32.7%) patients. Major workload of on-call surgical emergency team is dealing with the acute conditions of abdomen. However, significant proportion of patients are suffering from other conditions including trauma that require a holistic approach to care and a wide range of skills and experience. These results have important implications in future healthcare planning and for the better training of general surgical residents.

  10. On-call emergency workload of a general surgical team

    Directory of Open Access Journals (Sweden)

    Jawaid Masood

    2009-01-01

    Full Text Available Background: To examine the on-call emergency workload of a general surgical team at a tertiary care teaching hospital to guide planning and provision of better surgical services. Patients and Methods: During six months period from August to January 2007; all emergency calls attended by general surgical team of Surgical Unit II in Accident and Emergency department (A and E and in other units of Civil, Hospital Karachi, Pakistan were prospectively recorded. Data recorded includes timing of call, diagnosis, operation performed and outcome apart from demography. Results: Total 456 patients (326 males and 130 females were attended by on-call general surgery team during 30 emergency days. Most of the calls, 191 (41.9% were received from 8 am to 5 pm. 224 (49.1% calls were of abdominal pain, with acute appendicitis being the most common specific pathology in 41 (9.0% patients. Total 73 (16.0% calls were received for trauma. Total 131 (28.7% patients were admitted in the surgical unit for urgent operation or observation while 212 (46.5% patients were discharged from A and E. 92 (20.1% patients were referred to other units with medical referral accounts for 45 (9.8% patients. Total 104 (22.8% emergency surgeries were done and the most common procedure performed was appendicectomy in 34 (32.7% patients. Conclusion: Major workload of on-call surgical emergency team is dealing with the acute conditions of abdomen. However, significant proportion of patients are suffering from other conditions including trauma that require a holistic approach to care and a wide range of skills and experience. These results have important implications in future healthcare planning and for the better training of general surgical residents.

  11. GROUP POLICY BASED AUTHENTICATION ON INCOMING CALLS FOR ANDROID SMARTPHONES

    OpenAIRE

    Sunita M. Kumbhar, Prof. Z.M Shaikh

    2016-01-01

    The numbers of Smartphone users increasing day by day. Hence, there is need to propose advanced Group Policy based Authentication for incoming calls for Android phone. Android platform provides a variety of functions that support the programming of face recognition, as in image processing. Group policy based authentication scheme increases the security which restricts the access of incoming call form un-authorized user. To solve problems, related to face recognition should be applied in the p...

  12. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  13. Imperfect construction of microclusters

    Science.gov (United States)

    Schneider, E.; Zhou, K.; Gilbert, G.; Weinstein, Y. S.

    2014-01-01

    Microclusters are the basic building blocks used to construct cluster states capable of supporting fault-tolerant quantum computation. In this paper, we explore the consequences of errors on microcluster construction using two error models. To quantify the effect of the errors we calculate the fidelity of the constructed microclusters and the fidelity with which two such microclusters can be fused together. Such simulations are vital for gauging the capability of an experimental system to achieve fault tolerance.

  14. VE of construction industry

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1987-10-15

    This book gives descriptions of basic of VE of construction industry including doing away with mannerism, necessity of cost reduction, management method of cost reduction, thinking of idea, target of VE, starting VE activity, technical method of VE of construction industry such as thinking of idea with brainstorming, function trade method, new brainstorming, MM method, morphology analysis and lateral thinking, cases of VE of construction industry.

  15. VE of construction industry

    International Nuclear Information System (INIS)

    1987-10-01

    This book gives descriptions of basic of VE of construction industry including doing away with mannerism, necessity of cost reduction, management method of cost reduction, thinking of idea, target of VE, starting VE activity, technical method of VE of construction industry such as thinking of idea with brainstorming, function trade method, new brainstorming, MM method, morphology analysis and lateral thinking, cases of VE of construction industry.

  16. Leveraging Call Center Logs for Customer Behavior Prediction

    Science.gov (United States)

    Parvathy, Anju G.; Vasudevan, Bintu G.; Kumar, Abhishek; Balakrishnan, Rajesh

    Most major businesses use business process outsourcing for performing a process or a part of a process including financial services like mortgage processing, loan origination, finance and accounting and transaction processing. Call centers are used for the purpose of receiving and transmitting a large volume of requests through outbound and inbound calls to customers on behalf of a business. In this paper we deal specifically with the call centers notes from banks. Banks as financial institutions provide loans to non-financial businesses and individuals. Their call centers act as the nuclei of their client service operations and log the transactions between the customer and the bank. This crucial conversation or information can be exploited for predicting a customer’s behavior which will in turn help these businesses to decide on the next action to be taken. Thus the banks save considerable time and effort in tracking delinquent customers to ensure minimum subsequent defaulters. Majority of the time the call center notes are very concise and brief and often the notes are misspelled and use many domain specific acronyms. In this paper we introduce a novel domain specific spelling correction algorithm which corrects the misspelled words in the call center logs to meaningful ones. We also discuss a procedure that builds the behavioral history sequences for the customers by categorizing the logs into one of the predefined behavioral states. We then describe a pattern based predictive algorithm that uses temporal behavioral patterns mined from these sequences to predict the customer’s next behavioral state.

  17. Responses of squirrel monkeys to their experimentally modified mobbing calls

    Science.gov (United States)

    Fichtel, Claudia; Hammerschmidt, Kurt

    2003-05-01

    Previous acoustic analyses suggested emotion-correlated changes in the acoustic structure of squirrel monkey (Saimiri sciureus) vocalizations. Specifically, calls given in aversive contexts were characterized by an upward shift in frequencies, often accompanied by an increase in amplitude. In order to test whether changes in frequencies or amplitude are indeed relevant for conspecific listeners, playback experiments were conducted in which either frequencies or amplitude of mobbing calls were modified. Latency and first orienting response were measured in playback experiments with six adult squirrel monkeys. After broadcasting yaps with increased frequencies or amplitude, squirrel monkeys showed a longer orienting response towards the speaker than after the corresponding control stimuli. Furthermore, after broadcasting yaps with decreased frequencies or amplitude, squirrel monkeys showed a shorter orienting response towards the speaker than after the corresponding manipulated calls with higher frequencies or amplitude. These results suggest that changes in frequencies or amplitude were perceived by squirrel monkeys, indicating that the relationship between call structure and the underlying affective state of the caller agreed with the listener's assessment of the calls. However, a simultaneous increase in frequencies and amplitude did not lead to an enhanced response, compared to each single parameter. Thus, from the receiver's perspective, both call parameters may mutually replace each other.

  18. Sustainability in CALL Learning Environments: A Systemic Functional Grammar Approach

    Directory of Open Access Journals (Sweden)

    Peter McDonald

    2014-09-01

    Full Text Available This research aims to define a sustainable resource in Computer-Assisted Language Learning (CALL. In order for a CALL resource to be sustainable it must work within existing educational curricula. This feature is a necessary prerequisite of sustainability because, despite the potential for educational change that digitalization has offered since the nineteen nineties, curricula in traditional educational institutions have not fundamentally changed, even as we move from a pre-digital society towards a digital society. Curricula have failed to incorporate CALL resources because no agreed-upon pedagogical language enables teachers to discuss CALL classroom practices. Systemic Functional Grammar (SFG can help to provide this language and bridge the gap between the needs of the curriculum and the potentiality of CALL-based resources. This paper will outline how SFG principles can be used to create a pedagogical language for CALL and it will give practical examples of how this language can be used to create sustainable resources in classroom contexts.

  19. HITACHI construction CAE system

    International Nuclear Information System (INIS)

    Yoshida, M.

    1994-01-01

    Construction and maintenance of nuclear power plants have important problems such as shortening the construction period and reducing the construction cost. Recently, the problem of insufficient construction labor has arisen, and as drastic strategic development has become a necessary counter-measure. The following four principles are included in the measures to be taken for efficient execution of the construction work within the short construction period: (1) reduction of on-site work and expansion of module block making, (2)improvement of the accuracy of the on-site work process, adjustment and expansion of the work in parallel with the construction process, (3)improvement of efficiency of the on-site work and mechanization and automation of the work, (4)improvement of the accuracy of the management of the construction. A three dimensional simulation system plant construction plan CAE, comprising five modules has been developed. A project management system was also developed to improve the accuracy and efficiency of management work in the field

  20. Sustainable construction in rural Guatemala.

    Science.gov (United States)

    Temple, Ericka K; Rose, Elizabeth

    2011-11-01

    Waste management is a significant problem in Guatemala, as elsewhere in the developing world. The inappropriate disposal of solid waste produces pollution and places the environment and human health at risk. Environmental risk factors, including inadequate disposal of solid waste, are implicated in 25-30% of disease worldwide with children bearing a disproportionate burden of those diseases. Therefore, economic development which reduces inappropriate disposal of waste and affords economic opportunities may help reduce the global burden of disease on children. In the indigenous highlands of central Guatemala, a community supported non-profit organisation called Long Way Home (http://www.longwayhomeinc.org) is employing alternative construction techniques to build a vocational school complex. The construction of the school from waste materials demonstrates the use and principles of re-purposing materials, helps clean the environment and affords further educational and vocational opportunities. This article will outline the health problems inherent in an indigenous area of a developing country and will offer an alternative solution to reverse environmental risk factors associated with solid waste pollution and also actively improve child health.

  1. Outpatient outcomes and satisfaction in pediatric population: data from the postoperative phone call.

    Science.gov (United States)

    Brenn, B Randall; Choudhry, Dinesh K; Sacks, Karen

    2016-02-01

    Quality and patient/parent satisfaction are goals for pediatric perioperative services. As part of the implementation of our operating room electronic medical record (EMR), a postoperative phone call questionnaire was developed to assess patients discharged after outpatient surgery. The goal of this initiative was to determine the rate of common postoperative complications and understand reasons for patient/parent dissatisfaction. Institutional Review Board approval was obtained for chart review. The postoperative phone call survey was attempted by our postanesthesia care unit nursing staff on all pediatric outpatients. The call was attempted for 3 days. From 2009 to 2013, more than 37 000 phone records existed in our EMR, Epic Optime (Epic Systems, Verona, WI). These data were extracted to a business intelligence (BI) program, QlikView (Qliktech, Radnor, PA, USA). A BI dashboard was constructed to obtain phone call results for any given time frame from monthly to spanning several years. Complications were logged as 4-point severity rating scales (none, mild, moderate, severe) with descriptions for each level. The BI dashboard calculated the overall and rates by severity for the following: (i) nausea, (ii) vomiting, (iii) pain, (iv) bleeding, (v) hoarseness, and (vi) difficulty eating. Of 42 688 outpatient cases, 37 620 postoperative phone calls were completed for an overall response rate of 88%. Pain, at 11.1%, was the highest reported postoperative complication. The rate of dissatisfaction was reported to be 0.31%. Most patients reporting dissatisfaction (62%) did not report any complications. Contingency coefficient showed that there was little relationship between satisfaction and presence of complications. A postoperative phone survey is cost-effective and appreciated by patients. We found that satisfaction with our perioperative services was not related to the rates of reported complications. Although reducing complications is of utmost importance

  2. Recognition method of construction conflict based on driver's eye movement.

    Science.gov (United States)

    Xu, Yi; Li, Shiwu; Gao, Song; Tan, Derong; Guo, Dong; Wang, Yuqiong

    2018-04-01

    Drivers eye movement data in simulated construction conflicts at different speeds were collected and analyzed to find the relationship between the drivers' eye movement and the construction conflict. On the basis of the relationship between the drivers' eye movement and the construction conflict, the peak point of wavelet processed pupil diameter, the first point on the left side of the peak point and the first blink point after the peak point are selected as key points for locating construction conflict periods. On the basis of the key points and the GSA, a construction conflict recognition method so called the CCFRM is proposed. And the construction conflict recognition speed and location accuracy of the CCFRM are verified. The good performance of the CCFRM verified the feasibility of proposed key points in construction conflict recognition. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. Sleep Quality of Call Handlers Employed in International Call Centers in National Capital Region of Delhi, India

    Directory of Open Access Journals (Sweden)

    JD Raja

    2016-10-01

    suspicion of insomnia or suspected insomnia; the rest had no sleep problem. Smoking, poor social support, heavy workload, lack of relaxation facility at office, and prolonged travel time to office were independent predictors of sleep quality (p<0.05. Conclusion: Call handlers have to compromise upon their sleep owing to the contemporary work settings in call centers. Safeguarding their health becomes an occupational health challenge to public health specialists.

  4. Computer aided fault tree construction for electrical systems

    International Nuclear Information System (INIS)

    Fussell, J.B.

    1975-01-01

    A technique is presented for automated construction of the Boolean failure logic diagram, called the fault tree, for electrical systems. The method is a technique for synthesizing a fault tree from system-independent component characteristics. Terminology is defined and heuristic examples are given for all phases of the model. The computer constructed fault trees are in conventional format, use conventional symbols, and are deductively constructed from the main failure of interest to the individual component failures. The synthesis technique is generally applicable to automated fault tree construction for other types of systems

  5. Conduits to care: call lights and patients’ perceptions of communication

    Directory of Open Access Journals (Sweden)

    Montie M

    2017-09-01

    Full Text Available Mary Montie,1 Clayton Shuman,1 Jose Galinato,1 Lance Patak,2 Christine A Anderson,1 Marita G Titler1 1Department of Systems, Populations, and Leadership, School of Nursing, University of Michigan, Ann Arbor, MI, 2Department of Anesthesiology and Pain Medicine, Seattle Children’s Hospital, Seattle, WA, USA Background: Call light systems remain the primary means of hospitalized patients to initiate communication with their health care providers. Although there is vast amounts of literature discussing patient communication with their health care providers, few studies have explored patients’ perceptions concerning call light use and communication. The specific aim of this study was to solicit patients’ perceptions regarding their call light use and communication with nursing staff. Methods: Patients invited to this study met the following inclusion criteria: proficient in English, been hospitalized for at least 24 hours, aged ≥21 years, and able to communicate verbally (eg, not intubated. Thirty participants provided written informed consent, were enrolled in the study, and completed interviews. Results: Using qualitative descriptive methods, five major themes emerged from patients’ perceptions (namely; establishing connectivity, participant safety concerns, no separation: health care and the call light device, issues with the current call light, and participants’ perceptions of “nurse work”. Multiple minor themes supported these major themes. Data analysis utilized the constant comparative methods of Glaser and Strauss. Discussion: Findings from this study extend the knowledge of patients’ understanding of not only why inconsistencies occur between the call light and their nurses, but also why the call light is more than merely a device to initiate communication; rather, it is a direct conduit to their health care and its delivery. Keywords: nurse–patient communication, medical technology, quality of care, qualitative research

  6. Development of Innovative Construction Technologies for ABWRs

    International Nuclear Information System (INIS)

    Yamashita, T.; Fukuda, T.; Masuda, N.

    2002-01-01

    This paper describes an effort by Tokyo Electric Power Company (TEPCO) to shorten the construction time in a drastic manner for the Advanced Boiling Water Reactors (ABWR), thereby aiming at reducing construction costs. First an outline of the actual construction records for the five BWR Units and the two ABWR Units at the Kashiwazaki-Kariwa site is introduced along with the construction methods employed for these units. There is a continued trend in the reduction of construction time from Unit 1 to 7 owing to a number of improvements made to these units, and in particular it is noteworthy that the drastic reduction was accomplished due to the change in reactor type from BWR to ABWR. Explained next is an on-going effort for the next ABWR and the following next generation of ABWRs to further shorten construction time. In this effort an emphasis is laid on the development of innovative construction methods by the adoption of steel plate/concrete composite structures (SC Structure), and the application of those structures even to containment vessel (so-called SCCV). This work is being conducted as part of TEPCO's research and development for the next generation ABWRs (ABWR II). Presently it is expected that the construction time from bedrock inspection to fuel loading could be shortened in a stepwise fashion to 38 and 31.5 months for the next ABWR and finally to 23 months for the next generation ABWR II, thus enabling a greatly reduced power generating cost and enhanced safety during construction. In addition to the above effort, a preliminary study has been performed concerning the application of base isolation systems to ABWR plants. From this study which is aimed at standardization, lowered cost and mitigation of engineering work, it was found that base isolation system effectively reduces seismic response and is instrumental in achieving the above-mentioned objectives. Therefore it can be said that the use of this system gives more freedom in selecting sites

  7. The dramatic extraction construction in French

    Directory of Open Access Journals (Sweden)

    Anne Abeillé

    2009-01-01

    Full Text Available Relying on spoken corpora (Corpaix, CRFP and on previous studies (Sabio 1995, 1996, we identify a construction common in spoken French, which we analyze as a particular case of extraction:a. dix sept ans il a. (Seventeen years he has [Corpaix]b. deux cigarettes j'ai fumé. (Two cigarettes I smoked [on the fly]The construction can only be a root clause and a declarative clause. Its interpretation is that of a thetic proposition. On the other hand, it is not associated with a unique information structure, since it is compatible with a focus-ground partition, with the extracted constotunet as a narrow focus, or with an all focus interpretation. We call this construction ‘dramatic extraction’, and the extracted element a ‘center’ (i.e. a focus or a figure. We formalize our analysis in the HPSG grammar.

  8. Wall Construction; Carpentry: 901892.

    Science.gov (United States)

    Dade County Public Schools, Miami, FL.

    The curriculum guide outlines a course designed to provide instruction in floor and wall layout, and in the diverse methods and construction of walls. Upon completion of this course the students should have acquired a knowledge of construction plans and structural foundations in addition to a basic knowledge of mathematics. The course consists of…

  9. Safety in construction?

    NARCIS (Netherlands)

    Swuste, P.H.J.J.

    2013-01-01

    The available literature on Construction Safety is not very optimistic about the chances of evidence-based safety in the construction industry exerting a positive influence. Many articles indicate that the structures and processes that are designed to ensure safety in the industry are poor. Safety

  10. INDOT Construction Inspection Priorities

    Science.gov (United States)

    2012-05-01

    In the last decade, the Indiana Department of Transportation (INDOT) has experienced an increase in their construction projects (e.g., INDOTs : construction spending was $789 million in 2006 and increased to $1,081.4 million in 2010); while the le...

  11. Employment and winter construction

    DEFF Research Database (Denmark)

    Hansen, Ernst Jan de Place; Larsen, Jacob Norvig

    2011-01-01

    Reduced seasonal building activity in the construction sector is often assumed to be related to hard winter conditions for building activities and poor working conditions for construction workers, resulting in higher costs and poor quality of building products, particularly in the northern hemisp...... of contracts for workers is more likely to explain differences in seasonal activity than climatic or technological factors....

  12. Human Resource Construction

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    Centering on strategic objective of reform and development,CIAE formulated its objectives in human resource construction for the 13th Five-year Plan period,and achieved new apparent progress in human resource construction in 2015.1 Implementation of"LONGMA Project"

  13. Governmentalities of Construction

    DEFF Research Database (Denmark)

    Gottlieb, Stefan; Jensen, Jens Stissing

    2016-01-01

    In this paper, we apply Foucault’s concept of governmentality in a dual analysis of the formation and transformation of the construction sector and the construction worker. The governmentality concept is well-suited for such an analysis as it directs attention to the ways in which control is the ...

  14. Nuclear reactor constructions

    International Nuclear Information System (INIS)

    Baddley, A.H.

    1981-01-01

    A method of constructing a radiation shielding plug for use in the roof of the coolant containment vault of liquid metal cooled fast breeder reactors is described. The construction allows relative movement of that part of service cables and pipes which are carried by the fixed roof and that part which is carried by the rotatable plug. (U.K.)

  15. Constructional and Conceptual Composition

    Science.gov (United States)

    Dodge, Ellen Kirsten

    2010-01-01

    Goldberg's (1995) recognition that, in addition to various word-level constructions, sentences also instantiate meaningful argument structure constructions enables a non-polysemy-based analysis of various verb 'alternations' (Levin 1993). In such an analysis, meaning variations associated with the use of the same verb in different argument…

  16. Personal Usability Constructs

    DEFF Research Database (Denmark)

    Hertzum, Morten; Clemmensen, Torkil; Hornbæk, Kasper

    2011-01-01

    Whereas the concept of usability is predominantly defined analytically, people relate to systems through personal usability constructs. Based on 48 repertory-grid interviews, this study investigates how such personal constructs are affected by two factors crucial to the international development...

  17. Industrialization for sustainable construction?

    NARCIS (Netherlands)

    Egmond - de Wilde De Ligny, van E.L.C.; Barrett, P; Amaratunga, D.; Haigh, R; Keraminiyage, K.; Pathirage, C

    2010-01-01

    Sustainable construction (SuCo), which genesis dates in the early 1990’s, advocates the creation and operation of a quality and healthy built environment based on resource efficiency, life cycle economics and ecological principles. (Kibert, 2003). Currently the Construction Industry does not meet

  18. Operations management for construction

    CERN Document Server

    March, Chris

    2009-01-01

    Students studying construction management and related subjects need to have a broad understanding of the major aspects of controlling the building processes. Operations Management for Construction is one of three textbooks (Business Organisation, Operations Management and Finance Control) written to systematically cover the field. Focusing on construction sites and operations which are challenging to run, Chris March explores issues such as the setting up of the site, the deciding of the methodology of construction, and the sequence of work and resourcing. As changing and increasing regulations affect the way sites are managed, he also considers the issues and methods of successful administering, safety, quality and environment. Finally, the contractor's responsibility to the environment, including relationships with third parties, selection of materials, waste management and sustainability is discussed. Chris March has a wealth of practical experience in the construction industry, as well as considerable exp...

  19. VENTILATION NEEDS DURING CONSTRUCTION

    International Nuclear Information System (INIS)

    C.R. Gorrell

    1998-01-01

    The purpose of this analysis is to determine ventilation needs during construction and development of the subsurface repository and develop systems to satisfy those needs. For this analysis, construction is defined as pre-emplacement excavation and development is excavation that takes place simultaneously with emplacement. The three options presented in the ''Overall Development and Emplacement Ventilation Systems'' analysis (Reference 5.5) for development ventilation will be applied to construction ventilation in this analysis as well as adding new and updated ventilation factors to each option for both construction and development. The objective of this analysis is to develop a preferred ventilation system to support License Application Design. The scope of this analysis includes: (1) Description of ventilation conditions; (2) Ventilation factors (fire hazards, dust control, construction logistics, and monitoring and control systems); (3) Local ventilation alternatives; (4) Global ventilation options; and (5) Evaluation of options

  20. Call-related factors influencing output power from mobile phones.

    Science.gov (United States)

    Hillert, Lena; Ahlbom, Anders; Neasham, David; Feychting, Maria; Järup, Lars; Navin, Roshan; Elliott, Paul

    2006-11-01

    Mobile phone use is increasing but there is also concern for adverse health effects. Well-designed prospective studies to assess several health outcomes are required. In designing a study of mobile phone use, it is important to assess which factors need to be considered in classifying the exposure to radiofrequency fields (RF). A pilot study was performed in Sweden and in the UK 2002 to 2003 to test the feasibility of recruiting a cohort of mobile phone users from a random population sample and from mobile phone subscription lists for a prospective study. As one part of this pilot study, different factors were evaluated regarding possible influence on the output power of the phones. By local switch logging, information on calls made from predefined subscriptions or dedicated handsets were obtained and the output power of phones during calls made indoors and outdoors, in moving and stationary mode, and in rural as well in urban areas were compared. In this experiment, calls were either 1, 1.5 or 5 min long. The results showed that high mobile phone output power is more frequent in rural areas whereas the other factors (length of call, moving/stationary, indoor/outdoor) were of less importance. Urban and rural area should be considered in an exposure index for classification of the exposure to RF from mobile phones and may be assessed by first base station during mobile phone calls or, if this information is not available, possibly by using home address as a proxy.

  1. Communication between residents and attending doctors on call after hours.

    Science.gov (United States)

    Novoselsky Persky, Michal A; Yinnon, Amos M; Freier-Dror, Yossi; Henshke-Bar-Meir, Ruth

    2013-12-01

    Off-hours medical care in hospitals is provided by residents, while attendings on call are available for assistance. This study evaluated the gap between residents' expectations and professional guidelines' requirements of attendings on call and what actually occurs during night shifts, while comparing surgical and medical specialties. Two questionnaires based on professional guidelines were filled by residents. The first queried about residents' expectations of attendings on call, and the second asked about communication with the attendings during actual night shifts. While 91 (100%) of residents expected the attending on call to be available by phone during the shift, only 44 (48%) expected the attending to initiate contact, and only 17 (19%) expected the attending to visit the ward or emergency department (ED) without being requested to do so. In 127 shifts (84%), some form of communication occurred. Residents called their attendings during 105 shifts (70%). However, attendings initiated contact with residents at the beginning or during the shift in only 67 (44%) and 62 (41%) shifts, respectively, and initiated a visit to the ward/ED during the shift in only 41 cases (27%). Surgical attendings initiated contact in these three ways significantly more frequently than medical attendings [21 (28%) versus 46 (61%), 20 (26%) versus 42 (56%) and 4 (5%) versus 37 (50%), respectively; P communication during night shifts between residents and attendings occurs in most shifts, attendings initiate far less contact with residents than is required by the guidelines. © 2013 John Wiley & Sons Ltd.

  2. [A relational database to store Poison Centers calls].

    Science.gov (United States)

    Barelli, Alessandro; Biondi, Immacolata; Tafani, Chiara; Pellegrini, Aristide; Soave, Maurizio; Gaspari, Rita; Annetta, Maria Giuseppina

    2006-01-01

    Italian Poison Centers answer to approximately 100,000 calls per year. Potentially, this activity is a huge source of data for toxicovigilance and for syndromic surveillance. During the last decade, surveillance systems for early detection of outbreaks have drawn the attention of public health institutions due to the threat of terrorism and high-profile disease outbreaks. Poisoning surveillance needs the ongoing, systematic collection, analysis, interpretation, and dissemination of harmonised data about poisonings from all Poison Centers for use in public health action to reduce morbidity and mortality and to improve health. The entity-relationship model for a Poison Center relational database is extremely complex and not studied in detail. For this reason, not harmonised data collection happens among Italian Poison Centers. Entities are recognizable concepts, either concrete or abstract, such as patients and poisons, or events which have relevance to the database, such as calls. Connectivity and cardinality of relationships are complex as well. A one-to-many relationship exist between calls and patients: for one instance of entity calls, there are zero, one, or many instances of entity patients. At the same time, a one-to-many relationship exist between patients and poisons: for one instance of entity patients, there are zero, one, or many instances of entity poisons. This paper shows a relational model for a poison center database which allows the harmonised data collection of poison centers calls.

  3. Instrument calls and real-time code for laboratory automation

    International Nuclear Information System (INIS)

    Taber, L.; Ames, H.S.; Yamauchi, R.K.; Barton, G.W. Jr.

    1978-01-01

    These programs are the result of a joint Lawrence Livermore Laboratory and Environmental Protection Agency project to automate water quality laboratories. They form the interface between the analytical instruments and the BASIC language programs for data reduction and analysis. They operate on Data General NOVA 840's at Cincinnati and Chicago and on a Data General ECLIPSE C330 at Livermore. The operating system consists of unmodified RDOS, Data General's disk operating system, and Data General's multiuser BASIC modified to provide the instrument CALLs and other functions described. Instruments automated at various laboratories include Technicon AutoAnalyzers, atomic absorption spectrophotometers, total organic carbon analyzers, an emission spectrometer, an electronic balance, sample changers, and an optical spectrophotometer. Other instruments may be automated using these same CALLs, or new CALLs may be written as described

  4. Mental, physical and social health problems of call centre workers

    Directory of Open Access Journals (Sweden)

    P Bhuyar

    2008-01-01

    Full Text Available Background: Call centre workers in BPO face unique occupational hazards - mental, physical and psychosocial. Material & Method: A sample 100 call centre workers of both sexes and from two cities Pune and Mumbai were surveyed by both qualitative and quantitative methods for the above health problems. Results: A high proportion of workers faced sleep disturbances and associated mental stress and anxiety. Sleep disturbance and anxiety was significantly more in international call centres compared to domestic. There was also disturbance in circadian rhythms due to night shift. Physical problems such as musculoskeletal disorders, obesity, eye, and hearing problems were also present. Psychosocial problems included disruption in family life, use of tobacco and alcohol, and faulty eating habits. Conclusion: Better personal management, health education and more research is indicated to study the health problems in this emerging occupation.

  5. Calls for Tender and Market Surveys Roles and Procedures

    CERN Document Server

    Annila, L

    2000-01-01

    ST division has implemented certain procedures to handle the calls for tender and market surveys. In January 1998, the division leader set up the 'call-for-tender co-ordination office' to check and approve each technical document leaving the division. The mandate of the call-for-tender co-ordination office is to check the quality of the documents, in order for these documents to be as clear as possible in terms of both content and structure. The role of this office is to contribute positively and give service to the people writing the documents, and not to give negative criticism. The aim of this paper is to present the mandate of the office, how papers are processed, and to draw up a first result summary.

  6. Using poison center exposure calls to predict methadone poisoning deaths.

    Directory of Open Access Journals (Sweden)

    Nabarun Dasgupta

    Full Text Available PURPOSE: There are more drug overdose deaths in the Untied States than motor vehicle fatalities. Yet the US vital statistics reporting system is of limited value because the data are delayed by four years. Poison centers report data within an hour of the event, but previous studies suggested a small proportion of poisoning deaths are reported to poison centers (PC. In an era of improved electronic surveillance capabilities, exposure calls to PCs may be an alternate indicator of trends in overdose mortality. METHODS: We used PC call counts for methadone that were reported to the Researched Abuse, Diversion and Addiction-Related Surveillance (RADARS® System in 2006 and 2007. US death certificate data were used to identify deaths due to methadone. Linear regression was used to quantify the relationship of deaths and poison center calls. RESULTS: Compared to decedents, poison center callers tended to be younger, more often female, at home and less likely to require medical attention. A strong association was found with PC calls and methadone mortality (b=0.88, se=0.42, t=9.5, df=1, p<0.0001, R(2 =0.77. These findings were robust to large changes in a sensitivity analysis assessing the impact of underreporting of methadone overdose deaths. CONCLUSIONS: Our results suggest that calls to poison centers for methadone are correlated with poisoning mortality as identified on death certificates. Calls received by poison centers may be used for timely surveillance of mortality due to methadone. In the midst of the prescription opioid overdose epidemic, electronic surveillance tools that report in real-time are powerful public health tools.

  7. Penentuan Nilai Opsi Call Eropa Dengan Pembayaran Dividen

    Directory of Open Access Journals (Sweden)

    Diana Purwandari

    2016-08-01

    Full Text Available Fluktuasi harga saham menyebabkan perdagangan saham memiliki resiko. Opsi merupakan alternatif untuk mengurangi resiko dalam perdagangan saham. Opsi Eropa adalah suatu kontrak keuangan yang memberikan hak, bukan kewajiban, kepada holder, untuk membeli atau menjual aset pokok dari writer pada saat jatuh tempo dengan harga yang sudah ditentukan. Model penilaian harga opsi yang banyak diterima dalam bidang finansial adalah model Black-Scholes. Tujuan dari penelitian ini adalah mengetahui pengaruh pembagian dividen terhadap harga saham dan menentukan nilai opsi call Eropa dengan pembayaran dividen pada waktu yang telah ditentukan. Nilai opsi call Eropa dengan pembayaran dividen pada waktu yang telah ditentukan diperoleh menggunakan integrasi numerik dengan metode Simpson sebesar 12,6388.Kata kunci: opsi call Eropa, model Black-Scholes, dividen, metode Simpson.ABSTRACT Fluctuations in stock prices lead stock trading risk. An alternative options to reduce the risk in stock trading. European option is a financial contract that gives the right, but not the obligation, to the holder, to buy or sell the underlying asset of the writer at the maturity date at a price specified. Option price valuation models are widely accepted in the field of finance is the Black-Scholes model. The purpose of this study is to determine the effect of dividend distribution to the stock price and determine the value of the European call option with dividend payments at a predetermined time. Value of the European call option with dividend payments at a predetermined time obtained using numerical integration with Simpson method of 12,6388.Key words: European call options, Black-Scholes model, dividend, Simpson method.

  8. Construction in Occupied Spaces

    Directory of Open Access Journals (Sweden)

    Ward Andrew E.

    2017-06-01

    Full Text Available Conducting construction activities in occupied environments presents a great challenge due to the additional logistical requirements and the presence of the building occupants. The aim of this research is to gather and evaluate the means and methods to successfully plan, manage, and execute construction activities in occupied spaces in an effort to provide consolidated industry tools and strategies for maintaining a schedule and minimizing the impact on the occupants. The methodology of the research utilizes an exploratory approach to gather qualitative data. The data was collected through interviews with industry professionals to identify industry best practices. The semi-structured interviews provided a platform for the documents, lessons learned, and the techniques and strategies used for occupied construction by the construction industry. The information obtained in the interview process identified six themes that are critical to achieving and maintaining quality in occupied construction. These themes of the schedule, cost, customer satisfaction, planning, fire/life safety and utilities, and contractor management are reviewed in detail, and the paper discusses how to manage each element. The analysis and extracted management techniques, procedures and strategies can be used by the construction industry for future projects by focusing on the critical aspects of occupied construction and the manner in which to succeed with it.

  9. Construction in Occupied Spaces

    Science.gov (United States)

    Ward, Andrew E.; Azhar, Salman; Khalfan, Malik

    2017-06-01

    Conducting construction activities in occupied environments presents a great challenge due to the additional logistical requirements and the presence of the building occupants. The aim of this research is to gather and evaluate the means and methods to successfully plan, manage, and execute construction activities in occupied spaces in an effort to provide consolidated industry tools and strategies for maintaining a schedule and minimizing the impact on the occupants. The methodology of the research utilizes an exploratory approach to gather qualitative data. The data was collected through interviews with industry professionals to identify industry best practices. The semi-structured interviews provided a platform for the documents, lessons learned, and the techniques and strategies used for occupied construction by the construction industry. The information obtained in the interview process identified six themes that are critical to achieving and maintaining quality in occupied construction. These themes of the schedule, cost, customer satisfaction, planning, fire/life safety and utilities, and contractor management are reviewed in detail, and the paper discusses how to manage each element. The analysis and extracted management techniques, procedures and strategies can be used by the construction industry for future projects by focusing on the critical aspects of occupied construction and the manner in which to succeed with it.

  10. Untrained Forward Observer (UFO) Translator for Call for Fire

    Science.gov (United States)

    2013-09-01

    can use it, why there is a need for this type of system, what research questions this thesis will answer, the UFO Translator’s relevance to the DoD...of the UFO Translator discussed in Chapter III. E. WHAT IS CALL FOR FIRE? A Call for Fire (CFF) is a request for fire from an observer to the Fire...type, size, and degree of protection are sent. For 21 the UFO Translator, there will be drop down menus to help the user decide what to choose

  11. Exploring antecedents and consequences of burnout in a call centre

    Directory of Open Access Journals (Sweden)

    Willie A. Visser

    2008-10-01

    Full Text Available The aim of this study was to investigate the relationship between six characteristics of call centre work environments, burnout, affective commitment and turnover intentions. These characteristics were competing management goals, work overload, electronic performance monitoring, lack of career opportunities, lack of skill variety and emotional labour. A convenient sample of employees (N = 146 was obtained from a call centre. Multiple regression analysis showed that work overload, lack of career opportunities, skill variety and emotional labour were the most important predictors of burnout. Burnout had a direct effect on turnover intentions. Affective commitment partially mediated the relationship between burnout and turnover intention.

  12. Basket call option pricing for CCVG using sparse grids

    KAUST Repository

    Crocce, Fabian

    2016-01-06

    The use of processes with jumps to overcome the shortcomings of the classical Black and Scholes when modelling stock prices has became very popular. One of the best-known models is the Common Clock Variance Gamma model (CCVG), introduced by Madan and Seneta in the 1990 [3]. We propose a method to price European basket call options modelled by the CCVG. The method could be extended to other model obtained by the subordination of a multidimensional Brownian motion and to more general options. To simplify the expositions we consider calls under the CCVG.

  13. Executing application function calls in response to an interrupt

    Science.gov (United States)

    Almasi, Gheorghe; Archer, Charles J.; Giampapa, Mark E.; Gooding, Thomas M.; Heidelberger, Philip; Parker, Jeffrey J.

    2010-05-11

    Executing application function calls in response to an interrupt including creating a thread; receiving an interrupt having an interrupt type; determining whether a value of a semaphore represents that interrupts are disabled; if the value of the semaphore represents that interrupts are not disabled: calling, by the thread, one or more preconfigured functions in dependence upon the interrupt type of the interrupt; yielding the thread; and if the value of the semaphore represents that interrupts are disabled: setting the value of the semaphore to represent to a kernel that interrupts are hard-disabled; and hard-disabling interrupts at the kernel.

  14. Erlang C Formula and its Use in the Call Centers

    Directory of Open Access Journals (Sweden)

    Erik Chromy

    2011-01-01

    Full Text Available This paper deals with calculation of important parameters of the Call Center using the Erlang C formula and then results are verified through simulations. Erlang C formula is defined as a function of two variables: the number of agents N and the load A. On the base of their values it is possible to determine the probability PC, that the incoming call will not be served immediately, but it will have to wait in the waiting queue. Simulations satisfy the assumption of Markov models.

  15. Acoustic model optimisation for a call routing system

    CSIR Research Space (South Africa)

    Kleynhans, N

    2012-11-01

    Full Text Available and results and a discussion are presented in Section V. Lastly, the conclusion and possible future work appear in Section VI. II. BACKGROUND A. AutoSecretary IVR System Figure 1 shows the high level call flow of the AutoSecretary call routing system... to be difficult Corpus Name # utterances duration in hours Lwazi English 5843 5.03 Lwazi English plus Lwazi language prompts 7770 5.57 NCHLT English 106018 76.97 AST English (5 dialects) 51745 29.80 TABLE I THE NUMBER OF TRAINING UTTERANCES AND DURATION...

  16. Basket call option pricing for CCVG using sparse grids

    KAUST Repository

    Crocce, Fabian; Hä ppö lä , Juho; Iania, Alessandro; Tempone, Raul

    2016-01-01

    The use of processes with jumps to overcome the shortcomings of the classical Black and Scholes when modelling stock prices has became very popular. One of the best-known models is the Common Clock Variance Gamma model (CCVG), introduced by Madan and Seneta in the 1990 [3]. We propose a method to price European basket call options modelled by the CCVG. The method could be extended to other model obtained by the subordination of a multidimensional Brownian motion and to more general options. To simplify the expositions we consider calls under the CCVG.

  17. Should general practitioners call patients by their first names?

    Science.gov (United States)

    McKinstry, B

    1990-10-06

    To assess the acceptability to patients of the use of patients' first names by doctors and doctors' first names by patients in general practice. An administered questionnaire survey. 5 General practices in Lothian. 475 Patients consulting 30 general practitioners. Response by patients to questionnaire on attitude to use of first names. Most of the patients either liked (223) or did not mind (175) being called by their first names. Only 77 disliked it, most of whom were aged over 65. Most patients (324) did not, however, want to call the doctor by his or her first name. General practitioners should consider using patients' first names more often, particularly with younger patients.

  18. Construction and Demolition Waste

    DEFF Research Database (Denmark)

    Christensen, Thomas Højlund; Andersen, L.

    2011-01-01

    Construction and demolition waste (C&D waste) is the waste generated during the building, repair, remodeling or removal of constructions. The constructions can be roads, residential housing and nonresidential buildings. C&D waste has traditionally been considered without any environmental problems...... should be managed accordingly. Another reason is that it has been documented that a large fraction of C&D waste (about 90 %) can be easily recycled and thus can conserve landfill capacity. C&D waste may conveniently be divided into three subcategories: Buildings, roads and excavations. This chapter...

  19. Construction program management

    CERN Document Server

    Delaney, Joseph

    2013-01-01

    Although construction is one of the largest industries in the United States, it lags behind other industries in its implementation of modern management techniques such as those contained in the Standard for Program Management (the Standard) by the Project Management Institute (PMI(R)). Construction Program Management details the successful use of the PMI(R) approach for the construction of capital programs. It demonstrates, through case studies, how implementation of PMI's set of tools and techniques can improve the chances of program success. Exploring tactical and strategic management method

  20. Sustainability Base Construction Update

    Science.gov (United States)

    Mewhinney, Michael

    2012-01-01

    Construction of the new Sustainability Base Collaborative support facility, expected to become the highest performing building in the federal government continues at NASA's Ames Research Center, Moffet Field, Calif. The new building is designed to achieve a platinum rating under the leadership in Energy and Environment Design (LEED) new construction standards for environmentally sustainable construction developed by the U. S. Green Building Council, Washington, D. C. When completed by the end of 2011, the $20.6 million building will feature near zero net energy consumption, use 90 percent less potable water than conventionally build buildings of equivalent size, and will result in reduced building maintenance costs.

  1. Construction, fabrication, and installation

    International Nuclear Information System (INIS)

    1992-05-01

    This standard specifies the construction, fabrication, and installation requirements that apply to concrete containment structures of a containment system designated as class containment components, parts and appurtenances for nuclear power plants

  2. Construction of anhydrite dams

    Energy Technology Data Exchange (ETDEWEB)

    Bortoluzzi, L; Francois, G

    1977-05-01

    To construct a ventilation dam, the road is closed with a fibreglass sheet onto which 3 or 4 cm of anhydrite paste is sprayed. The equipment necessary is described, and the cost is compared with that of an aggregate dam.

  3. Construction Minerals Operations

    Data.gov (United States)

    Department of Homeland Security — This map layer includes construction minerals operations in the United States. The data represent commodities covered by the Minerals Information Team (MIT) of the...

  4. Caltrans : construction manual

    Science.gov (United States)

    2009-08-01

    Caltrans intends this manual as a resource for all personnel engaged in contract administration. The manual establishes policies and procedures for the construction phase of Caltrans projects. However, this manual is not a contract document. It impos...

  5. Lead in Construction

    National Research Council Canada - National Science Library

    1993-01-01

    Although Occupational Safety and Health Administration (OSHA) regulations for occupational lead exposure have been in effect since 1971 for the construction and general industries, the agency regulations for general industry in 1978...

  6. On Construction Grammar

    Institute of Scientific and Technical Information of China (English)

    XIAO Kunxue

    2005-01-01

    Constructionist approach with its brand-new perspective has begun to demonstrate its dynamic power. This paper attempts to review the basic ideas, achievements and comparison with generative grammar of Construction Grammar and generalize some problems and future research prospects.

  7. Nuclear power plant construction

    International Nuclear Information System (INIS)

    Lima Moreira, Y.M. de.

    1979-01-01

    The legal aspects of nuclear power plant construction in Brazil, derived from governamental political guidelines, are presented. Their evolution, as a consequence of tecnology development is related. (A.L.S.L.) [pt

  8. Skin Problems in Construction

    Science.gov (United States)

    ... you work with… Wet cement or plaster Abrasive cleaners Paints Adhesives Chemical solvents These materials can contain ... health hazards construction workers face on the job. Production of this card was supported by Grant OH009762 ...

  9. Passive solar construction handbook

    Energy Technology Data Exchange (ETDEWEB)

    Levy, E.; Evans, D.; Gardstein, C.

    1981-08-01

    Many of the basic elements of passive solar design are reviewed. The unique design constraints presented in passive homes are introduced and many of the salient issues influencing design decisions are described briefly. Passive solar construction is described for each passive system type: direct gain, thermal storage wall, attached sunspace, thermal storage roof, and convective loop. For each system type, important design and construction issues are discussed and case studies illustrating designed and built examples of the system type are presented. Construction details are given and construction and thermal performance information is given for the materials used in collector components, storage components, and control components. Included are glazing materials, framing systems, caulking and sealants, concrete masonry, concrete, brick, shading, reflectors, and insulators. The Load Collector Ratio method for estimating passive system performance is appended, and other analysis methods are briefly summarized. (LEW)

  10. Photovoltaic roof construction

    Energy Technology Data Exchange (ETDEWEB)

    Hawley, W.W.

    1980-02-26

    In a batten-seam roof construction employing at least one photovoltaic cell module, the electrical conduits employed with the at least one photovoltaic cell module are disposed primarily under the battens of the roof.

  11. Ship construction and welding

    CERN Document Server

    Mandal, Nisith R

    2017-01-01

    This book addresses various aspects of ship construction, from ship types and construction materials, to welding technologies and accuracy control. The contents of the book are logically organized and divided into twenty-one chapters. The book covers structural arrangement with longitudinal and transverse framing systems based on the service load, and explains basic structural elements like hatch side girders, hatch end beams, stringers, etc. along with structural subassemblies like floors, bulkheads, inner bottom, decks and shells. It presents in detail double bottom construction, wing tanks & duct keels, fore & aft end structures, etc., together with necessary illustrations. The midship sections of various ship types are introduced, together with structural continuity and alignment in ship structures. With regard to construction materials, the book discusses steel, aluminum alloys and fiber reinforced composites. Various methods of steel material preparation are discussed, and plate cutting and form...

  12. Construction and material specification

    Science.gov (United States)

    2002-01-01

    These Construction and Material Specifications are written to the Bidder before award of the : Contract and to the Contractor after award of the Contract. The sentences that direct the Contractor to perform Work are written as commands. For example, ...

  13. Valuation of European Call Option via Inverse Fourier Transform

    Directory of Open Access Journals (Sweden)

    Rubenis Oskars

    2017-12-01

    Full Text Available Very few models allow expressing European call option price in closed form. Out of them, the famous Black- Scholes approach sets strong constraints - innovations should be normally distributed and independent. Availability of a corresponding characteristic function of log returns of underlying asset in analytical form allows pricing European call option by application of inverse Fourier transform. Characteristic function corresponds to Normal Inverse Gaussian (NIG probability density function. NIG distribution is obtained based on assumption that time series of log returns follows APARCH process. Thus, volatility clustering and leptokurtic nature of log returns are taken into account. The Fast Fourier transform based on trapezoidal quadrature is numerically unstable if a standard cumulative probability function is used. To solve the problem, a dampened cumulative probability is introduced. As a computation tool Matlab framework is chosen because it contains many effective vectorization tools that greatly enhance code readability and maintenance. The characteristic function of Normal Inverse Gaussian distribution is taken and exercised with the chosen set of parameters. Finally, the call price dependence on strike price is obtained and rendered in XY plot. Valuation of European call option with analytical form of characteristic function allows further developing models with higher accuracy, as well as developing models for some exotic options.

  14. 28 CFR 540.103 - Inmate telephone calls to attorneys.

    Science.gov (United States)

    2010-07-01

    ... attorneys when the inmate demonstrates that communication with attorneys by correspondence, visiting, or... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Inmate telephone calls to attorneys. 540.103 Section 540.103 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE INSTITUTIONAL...

  15. Business Analytics in the Marketing Curriculum: A Call for Integration

    Science.gov (United States)

    Mintu-Wimsatt, Alma; Lozada, Héctor R.

    2018-01-01

    Marketing education has responded, to some extent, to the academic challenges emanating from the Big Data revolution. To provide a forum to specifically discuss how business analytics has been integrated into the marketing curriculum, we developed a Special Issue for "Marketing Education Review." We start with a call to action that…

  16. Musharraf calls for North-South cooperation: Science and technology

    CERN Multimedia

    2006-01-01

    "President Gen Pervez Musharraf has called for improved North-South cooperation in scinece and technology and said it would enable millions of people in the developing countries to realize the goal of rapid socio-economic progress" (1.5 page)

  17. Using Call Detail Records for Modeling Coastal Recreation Behavior

    Science.gov (United States)

    Call data records (CDR) are data from cellular phone networks that can be used to understand human mobility or where people go spatially. They can be used to estimate visitation to an area such as a coastal access point for a given time window, as well as provide information on t...

  18. Criteria for Evaluating a Game-Based CALL Platform

    Science.gov (United States)

    Ní Chiaráin, Neasa; Ní Chasaide, Ailbhe

    2017-01-01

    Game-based Computer-Assisted Language Learning (CALL) is an area that currently warrants attention, as task-based, interactive, multimodal games increasingly show promise for language learning. This area is inherently multidisciplinary--theories from second language acquisition, games, and psychology must be explored and relevant concepts from…

  19. The advertisement call of Ameerega pulchripecta (Silverstone, 1976)(Anura, Dendrobatidae).

    Science.gov (United States)

    Costa-Campos, Carlos Eduardo; Lima, Albertina Pimentel; Amézquita, Adolfo

    2016-07-06

    The name Ameerega picta was once used to denote a lineage of poison frogs (Dendrobatidae) distributed throughout most of the Amazon basin (Silverstone 1976); more recently, to describe a phenetic group involving at least 18 species, Lötters et al. (2007) pointed out that some of the lineages were indeed derived from the former A. picta. Among them, the nominal species with the widest distribution is A. hahneli (Haddad & Martins 1994; Twomey & Brown 2008), also an alleged complex of poorly defined species (Grant et al. 2006; Fouquet et al. 2007; Roberts et al. 2007). The mate-recognition signal, the advertisement call, was part of the evidence used to revalidate A. hahneli as a different species from A. picta. Although the advertisement call has been described for one or few individuals of other species in the group (Haddad & Martins 1994; Costa et al. 2006; Twomey & Brown 2008; Lötters et al. 2009), namely A. flavopicta, A. braccata and A. boehmei, and A. hahneli, we still lack a formal description for A. pulchripecta, the sister taxon of A. hahneli (Twomey & Brown 2008). Its call has been qualitatively described as similar to A. hahneli's call, but "deeper-voiced" (Lötters et al. 2007).

  20. Factors Hindering the Integration of CALL in a Tertiary Institution

    Directory of Open Access Journals (Sweden)

    Izaham Shah Ismail

    2008-12-01

    Full Text Available The field of Computer Assisted Language Learning (CALL is a field that is constantly evolving as it is very much dependent on the advancement of computer technologies. With new technologies being invented almost every day, experts in the field are looking for ways to apply these new technologies in the language classroom. Despite that, teachers are said to be slow at adopting technology in their classrooms and language teachers, whether at schools or tertiary institutions, are no exception. This study attempts to investigate the factors that hinder ESL instructors at an institution of higher learning from integrating CALL in their lessons. Interviews were conducted with five ESL instructors and results revealed that factors which hinder them from integrating CALL in their teaching are universal factors such as knowledge in technology and pedagogy, computer facilities and resources, absence of exemplary integration of CALL, personal beliefs on language teaching, views on the role of a computers as teacher, and evaluation of learning outcomes.