Sample records for guaranteed time key

  1. Waiting time guarantee - an update

    Socha, Karolina; Bech, Mickael


    The rule of extended free choice of hospital, in force since 2002, provides patients with an option to choose a private hospital if the public system is unable to provide a treatment within the guaranteed waiting time of one month. In June 2008 the Government declared in their yearly budget agree...



    transmission time, as required by the hard real-time tasks, but also high ... The network and message models are presented in ... node has a unique number in the range 0, 1, 2…N-1. For each .... To overcome this, an integer U is added to the ...

  3. Guaranteed cost control of time-delay chaotic systems

    Park, Ju H.; Kwon, O.M.


    This article studies a guaranteed cost control problem for a class of time-delay chaotic systems. Attention is focused on the design of memory state feedback controllers such that the resulting closed-loop system is asymptotically stable and an adequate level of performance is also guaranteed. Using the Lyapunov method and LMI (linear matrix inequality) framework, two criteria for the existence of the controller are derived in terms of LMIs. A numerical example is given to illustrate the proposed method

  4. Guaranteed Cost Finite-Time Control of Discrete-Time Positive Impulsive Switched Systems

    Leipo Liu


    Full Text Available This paper considers the guaranteed cost finite-time boundedness of discrete-time positive impulsive switched systems. Firstly, the definition of guaranteed cost finite-time boundedness is introduced. By using the multiple linear copositive Lyapunov function (MLCLF and average dwell time (ADT approach, a state feedback controller is designed and sufficient conditions are obtained to guarantee that the corresponding closed-loop system is guaranteed cost finite-time boundedness (GCFTB. Such conditions can be solved by linear programming. Finally, a numerical example is provided to show the effectiveness of the proposed method.

  5. Optimal Guaranteed Service Time and Service Level Decision with Time and Service Level Sensitive Demand

    Sangjun Park


    Full Text Available We consider a two-stage supply chain with one supplier and one retailer. The retailer sells a product to customer and the supplier provides a product in a make-to-order mode. In this case, the supplier’s decisions on service time and service level and the retailer’s decision on retail price have effects on customer demand. We develop optimization models to determine the optimal retail price, the optimal guaranteed service time, the optimal service level, and the optimal capacity to maximize the expected profit of the whole supply chain. The results of numerical experiments show that it is more profitable to determine the optimal price, the optimal guaranteed service time, and the optimal service level simultaneously and the proposed model is more profitable in service level sensitive market.

  6. Low-cost guaranteed-throughput communication ring for real-time streaming MPSoCs

    Dekens, B.H.J.; Kurtin, Philip Sebastian; Bekooij, Marco Jan Gerrit; Smit, Gerardus Johannes Maria


    Connection-oriented guaranteed-throughput mesh-based networks on chip have been proposed as a replacement for buses in real-time embedded multiprocessor systems such as software defined radios. Even with attractive features like throughput and latency guarantees they are not always used because

  7. Guaranteed Cost Finite-Time Control of Fractional-Order Positive Switched Systems

    Leipo Liu


    Full Text Available The problem of guaranteed cost finite-time control of fractional-order positive switched systems (FOPSS is considered in this paper. Firstly, a new cost function is defined. Then, by constructing linear copositive Lyapunov functions and using the average dwell time (ADT approach, a state feedback controller and a static output feedback controller are constructed, respectively, and sufficient conditions are derived to guarantee that the corresponding closed-loop systems are guaranteed cost finite-time stable (GCFTS. Such conditions can be easily solved by linear programming. Finally, two examples are given to illustrate the effectiveness of the proposed method.

  8. Guarantee of remaining life time. Integrity of mechanical components and control of ageing phenomena

    Schuler, X.; Herter, K.H.; Koenig, G.


    The life time of safety relevant systems, structures and components (SSC) of Nuclear Power Plants (NPP) is determined by two main principles. First of all the required quality has to be produced during the design and fabrication process. This means that quality has to be produced and can't be improved by excessive inspections (Basis Safety - quality through production principle). The second one is assigned to the initial quality which has to be maintained during operation. This concerns safe operation during the total life time (life time management), safety against ageing phenomena (AM - ageing management) as well as proof of integrity (e.g. break preclusion or avoidance of fracture for SSC with high safety relevance). Initiated by the Fukushima Dai-ichi event in Japan in spring 2011 for German NPP's Long Term Operation (LTO) is out of question. In June 2011 legislation took decision to phase-out from nuclear by 2022. As a fact safe operation shall be guaranteed for the remaining life time. Within this technical framework the ageing management is a key element. Depending on the safety-relevance of the SSC under observation including preventive maintenance various tasks are required in particular to clarify the mechanisms which contribute systemspecifically to the damage of the components and systems and to define their controlling parameters which have to be monitored and checked. Appropriate continuous or discontinuous measures are to be considered in this connection. The approach to ensure a high standard of quality in operation for the remaining life time and the management of the technical and organizational aspects are demonstrated and explained. The basis for ageing management to be applied to NNPs is included in Nuclear Safety Standard 1403 which describes the ageing management procedures. For SSC with high safety relevance a verification analysis for rupture preclusion (proof of integrity, integrity concept) shall be performed (Nuclear Safety Standard 3206

  9. Computation Offloading for Frame-Based Real-Time Tasks under Given Server Response Time Guarantees

    Anas S. M. Toma


    Full Text Available Computation offloading has been adopted to improve the performance of embedded systems by offloading the computation of some tasks, especially computation-intensive tasks, to servers or clouds. This paper explores computation offloading for real-time tasks in embedded systems, provided given response time guarantees from the servers, to decide which tasks should be offloaded to get the results in time. We consider frame-based real-time tasks with the same period and relative deadline. When the execution order of the tasks is given, the problem can be solved in linear time. However, when the execution order is not specified, we prove that the problem is NP-complete. We develop a pseudo-polynomial-time algorithm for deriving feasible schedules, if they exist.  An approximation scheme is also developed to trade the error made from the algorithm and the complexity. Our algorithms are extended to minimize the period/relative deadline of the tasks for performance maximization. The algorithms are evaluated with a case study for a surveillance system and synthesized benchmarks.

  10. The unethical focus on access: a study of medical ethics and the waiting-time guarantee.

    Karlberg, H I; Brinkmo, B-M


    All civilized societies favour ethical principles of equity. In healthcare, these principles generally focus on needs for medical care. Methods for establishing priorities among such needs are instrumental in this process. In this study, we analysed whether rules on access to healthcare, waiting-time guarantees, conflict with ethical principles of distributive justice. We interviewed directors, managers and other decision-makers of various healthcare providers of hospitals, primary care organizations and purchasing offices. We also conducted focus group interviews with professionals from a number of distinct medical areas. Our informants and their co-workers were reasonably familiar with the ethical platforms for priority-setting established by the Swedish parliament, giving the sickest patients complete priority. However, to satisfy the waiting-time guarantees, the informants often had to make priority decisions contrary to the ethical principles by favouring access before needs to keep waiting times within certain limits. The common opinion was that the waiting-time guarantee leads to crowding-out effects, overruling the ethical principles based on needs. For more than a decade, the interpretation in Sweden of the equitable principle based on medical needs has been distorted through political decisions, leading to healthcare providers giving priority to access rather than needs for care.

  11. Statistical methods for elimination of guarantee-time bias in cohort studies: a simulation study

    In Sung Cho


    Full Text Available Abstract Background Aspirin has been considered to be beneficial in preventing cardiovascular diseases and cancer. Several pharmaco-epidemiology cohort studies have shown protective effects of aspirin on diseases using various statistical methods, with the Cox regression model being the most commonly used approach. However, there are some inherent limitations to the conventional Cox regression approach such as guarantee-time bias, resulting in an overestimation of the drug effect. To overcome such limitations, alternative approaches, such as the time-dependent Cox model and landmark methods have been proposed. This study aimed to compare the performance of three methods: Cox regression, time-dependent Cox model and landmark method with different landmark times in order to address the problem of guarantee-time bias. Methods Through statistical modeling and simulation studies, the performance of the above three methods were assessed in terms of type I error, bias, power, and mean squared error (MSE. In addition, the three statistical approaches were applied to a real data example from the Korean National Health Insurance Database. Effect of cumulative rosiglitazone dose on the risk of hepatocellular carcinoma was used as an example for illustration. Results In the simulated data, time-dependent Cox regression outperformed the landmark method in terms of bias and mean squared error but the type I error rates were similar. The results from real-data example showed the same patterns as the simulation findings. Conclusions While both time-dependent Cox regression model and landmark analysis are useful in resolving the problem of guarantee-time bias, time-dependent Cox regression is the most appropriate method for analyzing cumulative dose effects in pharmaco-epidemiological studies.

  12. Mahanaxar: quality of service guarantees in high-bandwidth, real-time streaming data storage

    Bigelow, David [Los Alamos National Laboratory; Bent, John [Los Alamos National Laboratory; Chen, Hsing-Bung [Los Alamos National Laboratory; Brandt, Scott [UCSC


    Large radio telescopes, cyber-security systems monitoring real-time network traffic, and others have specialized data storage needs: guaranteed capture of an ultra-high-bandwidth data stream, retention of the data long enough to determine what is 'interesting,' retention of interesting data indefinitely, and concurrent read/write access to determine what data is interesting, without interrupting the ongoing capture of incoming data. Mahanaxar addresses this problem. Mahanaxar guarantees streaming real-time data capture at (nearly) the full rate of the raw device, allows concurrent read and write access to the device on a best-effort basis without interrupting the data capture, and retains data as long as possible given the available storage. It has built in mechanisms for reliability and indexing, can scale to meet arbitrary bandwidth requirements, and handles both small and large data elements equally well. Results from our prototype implementation shows that Mahanaxar provides both better guarantees and better performance than traditional file systems.

  13. Delay-Dependent Guaranteed Cost Control of an Interval System with Interval Time-Varying Delay

    Xiao Min


    Full Text Available This paper concerns the problem of the delay-dependent robust stability and guaranteed cost control for an interval system with time-varying delay. The interval system with matrix factorization is provided and leads to less conservative conclusions than solving a square root. The time-varying delay is assumed to belong to an interval and the derivative of the interval time-varying delay is not a restriction, which allows a fast time-varying delay; also its applicability is broad. Based on the Lyapunov-Ktasovskii approach, a delay-dependent criterion for the existence of a state feedback controller, which guarantees the closed-loop system stability, the upper bound of cost function, and disturbance attenuation lever for all admissible uncertainties as well as out perturbation, is proposed in terms of linear matrix inequalities (LMIs. The criterion is derived by free weighting matrices that can reduce the conservatism. The effectiveness has been verified in a number example and the compute results are presented to validate the proposed design method.


    Svitlana Pavlova


    Full Text Available Purpose: The present work is devoted to improving of flight safety in civil aviation by creating and implementing a new system of resolution of dynamic conflict of aircrafts. The developed system is aimed at ensuring a guaranteed level of safety when resolution of rarefied conflict situations of aircraft in real-time. Methods: The proposed system is based on a new method of conflict resolution of aircraft on the basis of the theory of invariance. Results: The development of the system of conflict resolution of aircraft in real time and the implementation of the respective algorithms such control will ensure effective prevention of dangerous approaches. Discussion: The system is implemented as single unified equipment using satellite and radar navigation systems that will ensure the positioning of aircraft in real time. Provided that the system should be installed on all aircraft and integrated on board to properly ensure its functionality and interact with navigation systems.

  15. Study of Allocation Guaranteed Time Slot Wireless Body Area Networks Based on IEEE 802.15.4

    Yundra, E.; Harsono, G. D.


    This paper aims to determine the size of the Guaranteed Time Slot (GTS) on the super frame structure required for each sensor as well as to know the performance of the GTS resized system compared to the GTS standard on IEEE 802.15.4. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called allocation Guaranteed Time Slot (ALGATIS). ALGATIS is expected to effectively allocate guaranteed time slot to the requested sensors, it adjusts the length of the slot in super frame duration based on the length of the packet data. This article presents a simulation experiment of IEEE 802.15.4, especially for star network, to predict the throughput of networks and average energy consumption. The simulation experiments show that the performance of ALGATIS is better than that of IEEE 802.15.4 standard in term of the throughput of networks and average energy consumption

  16. Robust Guaranteed Cost Observer Design for Singular Markovian Jump Time-Delay Systems with Generally Incomplete Transition Probability

    Yanbo Li


    Full Text Available This paper is devoted to the investigation of the design of robust guaranteed cost observer for a class of linear singular Markovian jump time-delay systems with generally incomplete transition probability. In this singular model, each transition rate can be completely unknown or only its estimate value is known. Based on stability theory of stochastic differential equations and linear matrix inequality (LMI technique, we design an observer to ensure that, for all uncertainties, the resulting augmented system is regular, impulse free, and robust stochastically stable with the proposed guaranteed cost performance. Finally, a convex optimization problem with LMI constraints is formulated to design the suboptimal guaranteed cost filters for linear singular Markovian jump time-delay systems with generally incomplete transition probability.

  17. Non-fragile guaranteed cost control for uncertain neutral dynamic systems with time-varying delays in state and control input

    Lien, C.-H.


    This article considers non-fragile guaranteed cost control problem for a class of uncertain neutral system with time-varying delays in both state and control input. Delay-dependent criteria are proposed to guarantee the robust stabilization of systems. Linear matrix inequality (LMI) optimization approach is used to solve the non-fragile guaranteed cost control problem. Non-fragile guaranteed cost control for unperturbed neutral system is considered in the first step. Robust non-fragile guaranteed cost control for uncertain neutral system is designed directly from the unperturbed condition. An efficient approach is proposed to design the non-fragile guaranteed cost control for uncertain neutral systems. LMI toolbox of Matlab is used to implement the proposed results. Finally, a numerical example is illustrated to show the usefulness of the proposed results


    Vasile NEME


    The present study propose the analyse of the irrevocable commitment of a bank entity towards a determined person, through which guarantees a certain legal conduct of its client, and, in case of breach, assumes the payment obligation of a determined amount of money. This kind of legal technique it is called bank guarantee and in the usual business language it is called “Letter of Bank Guarantee”. The determined reason to choose this scientific initiative it is the frequency of this kind of fin...

  19. Time to refine key climate policy models

    Barron, Alexander R.


    Ambition regarding climate change at the national level is critical but is often calibrated with the projected costs — as estimated by a small suite of energy-economic models. Weaknesses in several key areas in these models will continue to distort policy design unless collectively addressed by a diversity of researchers.

  20. Delay-Dependent Guaranteed Cost H∞ Control of an Interval System with Interval Time-Varying Delay

    Zhongke Shi


    Full Text Available This paper concerns the problem of the delay-dependent robust stability and guaranteed cost H∞ control for an interval system with time-varying delay. The interval system with matrix factorization is provided and leads to less conservative conclusions than solving a square root. The time-varying delay is assumed to belong to an interval and the derivative of the interval time-varying delay is not a restriction, which allows a fast time-varying delay; also its applicability is broad. Based on the Lyapunov-Ktasovskii approach, a delay-dependent criterion for the existence of a state feedback controller, which guarantees the closed-loop system stability, the upper bound of cost function, and disturbance attenuation lever for all admissible uncertainties as well as out perturbation, is proposed in terms of linear matrix inequalities (LMIs. The criterion is derived by free weighting matrices that can reduce the conservatism. The effectiveness has been verified in a number example and the compute results are presented to validate the proposed design method.

  1. An Analytical Solution for Probabilistic Guarantees of Reservation Based Soft Real--Time Systems

    Palopoli, Luigi; Fontanelli, Daniele; Abeni, Luca; Villalba Frias, Bernardo


    We show a methodology for the computation of the probability of deadline miss for a periodic real-time task scheduled by a resource reservation algorithm. We propose a modelling technique for the system that reduces the computation of such a probability to that of the steady state probability of an infinite state Discrete Time Markov Chain with a periodic structure. This structure is exploited to develop an efficient numeric solution where different accuracy/computation time trade-offs can be...

  2. Quality guaranteed theory

    Hwang, Ui Cheol


    This book tells of introduction of quality guaranteed theory like definition of quality and quality management, quality guaranteed, requirement of quality guaranteed, contrast of QA and QC, quality of guaranteed object, activity of quality guaranteed, set-up of quality that is naturally supposed such as quality guaranteed in plan and design, check of quality guaranteed, order of claim processing and cases of claim management.

  3. Communication key using delay times in time-delayed chaos synchronization

    Kim, Chil-Min; Kye, Won-Ho; Rim, Sunghwan; Lee, Soo-Young


    We propose an efficient key scheme, which can generate a great number of communication keys, for communication using chaos synchronization. We have attained the keys from delay times of time-delay coupled chaotic systems. We explain the scheme and the efficiency by coupling Henon and logistic maps and illustrate them by coupling Navier-Stokes and Lorenz equations as a continuous system

  4. The Banking Counter-Guarantee. Juridical Regime

    Postolache Rada


    Full Text Available Not so much studied by the specialised literature, the banking counter-guarantee may beconfounded with the other types of guarantee which frequently go with the guaranteed obligation –simple guarantee, collateral guarantee, the confirmation of the guarantee. The counter-guarantee may bean independent or accessory obligation, as the case may be, exclusively governed by its text, accordingto the parties’ will. At the same time, it is a complex juridical act, a contract whose contents cannot beset apart from the contracts connected form an “economic” point of view. The counter-guarantee is theresult of the banking practice and is generated by the need to make amends for the flaws generated bythe direct guarantee. The present research is focused on the analysis of the banking practice, normativeacts, jurisprudence and banking juridical literature.

  5. An one-time-pad key communication protocol with entanglement

    Cai, Qing-yu


    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  6. Event-Triggered Asynchronous Guaranteed Cost Control for Markov Jump Discrete-Time Neural Networks With Distributed Delay and Channel Fading.

    Yan, Huaicheng; Zhang, Hao; Yang, Fuwen; Zhan, Xisheng; Peng, Chen


    This paper is concerned with the guaranteed cost control problem for a class of Markov jump discrete-time neural networks (NNs) with event-triggered mechanism, asynchronous jumping, and fading channels. The Markov jump NNs are introduced to be close to reality, where the modes of the NNs and guaranteed cost controller are determined by two mutually independent Markov chains. The asynchronous phenomenon is considered, which increases the difficulty of designing required mode-dependent controller. The event-triggered mechanism is designed by comparing the relative measurement error with the last triggered state at the process of data transmission, which is used to eliminate dispensable transmission and reduce the networked energy consumption. In addition, the signal fading is considered for the effect of signal reflection and shadow in wireless networks, which is modeled by the novel Rice fading models. Some novel sufficient conditions are obtained to guarantee that the closed-loop system reaches a specified cost value under the designed jumping state feedback control law in terms of linear matrix inequalities. Finally, some simulation results are provided to illustrate the effectiveness of the proposed method.

  7. Real-Time Emulation of Heterogeneous Wireless Networks with End-to-Edge Quality of Service Guarantees: The AROMA Testbed

    Anna Umbert


    Full Text Available This work presents and describes the real-time testbed for all-IP Beyond 3G (B3G heterogeneous wireless networks that has been developed in the framework of the European IST AROMA project. The main objective of the AROMA testbed is to provide a highly accurate and realistic framework where the performance of algorithms, policies, protocols, services, and applications for a complete heterogeneous wireless network can be fully assessed and evaluated before bringing them to a real system. The complexity of the interaction between all-IP B3G systems and user applications, while dealing with the Quality of Service (QoS concept, motivates the development of this kind of emulation platform where different solutions can be tested in realistic conditions that could not be achieved by means of simple offline simulations. This work provides an in-depth description of the AROMA testbed, emphasizing many interesting implementation details and lessons learned during the development of the tool that may result helpful to other researchers and system engineers in the development of similar emulation platforms. Several case studies are also presented in order to illustrate the full potential and capabilities of the presented emulation platform.

  8. Star Formation at z~6: i-Dropouts in the Advanced Camera for Surveys Guaranteed Time Observation Fields

    Bouwens, R. J.; Illingworth, G. D.; Rosati, P.; Lidman, C.; Broadhurst, T.; Franx, M.; Ford, H. C.; Magee, D.; Benítez, N.; Blakeslee, J. P.; Meurer, G. R.; Clampin, M.; Hartig, G. F.; Ardila, D. R.; Bartko, F.; Brown, R. A.; Burrows, C. J.; Cheng, E. S.; Cross, N. J. G.; Feldman, P. D.; Golimowski, D. A.; Gronwall, C.; Infante, L.; Kimble, R. A.; Krist, J. E.; Lesser, M. P.; Martel, A. R.; Menanteau, F.; Miley, G. K.; Postman, M.; Sirianni, M.; Sparks, W. B.; Tran, H. D.; Tsvetanov, Z. I.; White, R. L.; Zheng, W.


    preferred value and suggests a star formation rate of 0.0090+/-0.0031 Msolar yr-1 Mpc-3 to zAB~27, or ~0.036+/-0.012 Msolar yr-1 Mpc-3 by extrapolating the luminosity function to the faint limit, assuming α=-1.6. Third, we follow a very similar procedure, except that we assume no incompleteness, and find a rest-frame continuum luminosity that is ~2-3 times lower than our other two determinations. This final estimate is to be taken as a lower limit and is important if there are modest changes in the colors or surface brightnesses from z~5 to z~6 (the other estimates assume no large changes in the intrinsic selectability of objects). We note that all three estimates are well within the canonical range of luminosity densities necessary for reionization of the universe at this epoch by star-forming galaxies. Based on observations made with the NASA/ESA Hubble Space Telescope, which is operated by the Association of Universities for Research in Astronomy, Inc., under NASA contract NAS 5-26555. These observations are associated with programs 7817, 9290, 9301, and 9583. Based on observations collected at the European Southern Observatory, Paranal, Chile (LP166.A-0701).

  9. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing


    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  10. British Military surgical key performance indicators: time for an update?

    Marsden, Max Er; Sharrock, A E; Hansen, C L; Newton, N J; Bowley, D M; Midwinter, M


    Key performance indicators (KPIs) are metrics that compare actual care against an ideal structure, process or outcome standard. KPIs designed to assess performance in deployed military surgical facilities have previously been published. This study aimed to review the overall performance of surgical trauma care for casualties treated at Role 3 Camp Bastion, Medical Treatment Facility, Afghanistan, in light of the existing Defence Medical Services (DMS) KPIs. The secondary aims were to assess the utility of the surgical KPIs and make recommendations for future surgical trauma care review. Data on 22 surgical parameters were prospectively collected for 150 injured patients who had primary surgery at Camp Bastion between 1 May 2013 and 20 August 2013. Additional information for these patients was obtained using the Joint Theatre Trauma Register. The authors assessed data recording, applicability and compliance with the KPIs. Median data recording was 100% (IQR 98%-100%), median applicability was 56% (IQR 10%-99%) and median compliance was 78% (IQR 58%-93%). One KPI was not applicable to any patient in our population. Eleven KPIs achieved >80% compliance, five KPIs had 80%-60% compliance and five KPIs had performance of the surgical aspect of military trauma care in 2013. The KPIs highlight areas for improvement in service delivery. Individual KPI development should be driven by evidence and reflect advances in practice and knowledge. A method of stakeholder consultation, and sequential refinement following evidence review, may be the right process to develop the future set of DMS KPIs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to

  11. NCA & Credit Guarantees


    purposes of the National Credit Act; what the definition of a credit guarantee set out ...... Scholtz et al National Credit Act in para 8.2.4; Scott et al Law of Commerce ..... Eitelberg E "Autonomy of Documentary Credit Undertakings in South African.

  12. Marketing service guarantees for health care.

    Levy, J S


    The author introduces the concept of service guarantees for application in health care and differentiates between explicit, implicit, and conditional vs. unconditional types of guarantees. An example of an unconditional guarantee of satisfaction is provided by the hospitality industry. Firms conveying an implicit guarantee are those with outstanding reputations for products such as luxury automobiles, or ultimate customer service, like Nordstrom. Federal Express and Domino's Pizza offer explicit guarantees of on-time delivery. Taking this concept into efforts to improve health care delivery involves a number of caveats. Customers invited to use exceptional service cards may use these to record either satisfaction or dissatisfaction. The cards need to provide enough specific information about issues so that "immediate action could be taken to improve processes." Front-line employees should be empowered to respond to complaints in a meaningful way to resolve the problem before the client leaves the premises.

  13. 75 FR 4707 - Continuous Construction-Permanent Loan Guarantees Under the Section 538 Guaranteed Rural Rental...


    ... permanent financing phase of a project. In addition to the proposed form of guarantee, the Agency will... financing phase of the project. This third form of guarantee is being proposed in response to input from... requests. * * * * * Lease-up period. The period of time that begins when the first unit in the project...

  14. The Risk Management of Minimum Return Guarantees

    Antje Mahayni


    Full Text Available Contracts paying a guaranteed minimum rate of return and a fraction of a positive excess rate, which is specified relative to a benchmark portfolio, are closely related to unit-linked life-insurance products and can be considered as alternatives to direct investment in the underlying benchmark. They contain an embedded power option, and the key issue is the tractable and realistic hedging of this option, in order to rigorously justify valuation by arbitrage arguments and prevent the guarantees from becoming uncontrollable liabilities to the issuer. We show how to determine the contract parameters conservatively and implement robust risk-management strategies.

  15. Do Job Security Guarantees Work?

    Alex Bryson; Lorenzo Cappellari; Claudio Lucifora


    We investigate the effect of employer job security guarantees on employee perceptions of job security. Using linked employer-employee data from the 1998 British Workplace Employee Relations Survey, we find job security guarantees reduce employee perceptions of job insecurity. This finding is robust to endogenous selection of job security guarantees by employers engaging in organisational change and workforce reductions. Furthermore, there is no evidence that increased job security through job...

  16. Implementation of a Wireless Time Distribution Testbed Protected with Quantum Key Distribution

    Bonior, Jason D [ORNL; Evans, Philip G [ORNL; Sheets, Gregory S [ORNL; Jones, John P [ORNL; Flynn, Toby H [ORNL; O' Neil, Lori Ross [Pacific Northwest National Laboratory (PNNL); Hutton, William [Pacific Northwest National Laboratory (PNNL); Pratt, Richard [Pacific Northwest National Laboratory (PNNL); Carroll, Thomas E. [Pacific Northwest National Laboratory (PNNL)


    Secure time transfer is critical for many timesensitive applications. the Global Positioning System (GPS) which is often used for this purpose has been shown to be susceptible to spoofing attacks. Quantum Key Distribution offers a way to securely generate encryption keys at two locations. Through careful use of this information it is possible to create a system that is more resistant to spoofing attacks. In this paper we describe our work to create a testbed which utilizes QKD and traditional RF links. This testbed will be used for the development of more secure and spoofing resistant time distribution protocols.

  17. On QoS guarantee in MPLS network with software deadline awareness

    Gao, Yu; Jin, Yaohui; Cheng, Hong; Yu, Yingdi; Sun, Weiqiang; Guo, Wei; Hu, Weisheng


    With the increasing number of internet users, more and more real-time services are added into the network, such as IPTV, online-video, Voice over IP, etc. As we know, throughput is a highly important performance criterion for scheduling algorithms of networks. Besides throughput, these growing real-time services are very sensitive to delay variance termed as jitter. Therefore, high performance scheduling algorithm should achieve good performance in terms of throughput, delay, jitter and fairness together. Scheduling algorithm with deadline-awareness employed in packet switching plays a key role in QoS guarantees. Although traditional hard-deadline can provide guarantee on in-node delay-deadline criteria, the end-to-end delay-deadline criteria cannot be guaranteed due to the characteristic of hard-deadline, while the delay-deadline guaranteed throughput is low. Thus, soft-deadline scheduling algorithm has been proposed. In this paper, we investigate and compare the classical hard-deadline and soft-deadline switching algorithm. A new scheme "Bonus System" is proposed in order to realize the idea of soft-deadline switching algorithm. Bonus System based on soft-deadline is compared with classical Early-Deadline First scheme based on hard-deadline, which shows that Bonus System has better performance in End-to-End deadline guarantee.

  18. A New Quantum Key Distribution Scheme Based on Frequency and Time Coding

    Chang-Hua, Zhu; Chang-Xing, Pei; Dong-Xiao, Quan; Jing-Liang, Gao; Nan, Chen; Yun-Hui, Yi


    A new scheme of quantum key distribution (QKD) using frequency and time coding is proposed, in which the security is based on the frequency-time uncertainty relation. In this scheme, the binary information sequence is encoded randomly on either the central frequency or the time delay of the optical pulse at the sender. The central frequency of the single photon pulse is set as ω 1 for bit 0 and set as ω 2 for bit 1 when frequency coding is selected. However, the single photon pulse is not delayed for bit 0 and is delayed in τ for 1 when time coding is selected. At the receiver, either the frequency or the time delay of the pulse is measured randomly, and the final key is obtained after basis comparison, data reconciliation and privacy amplification. With the proposed method, the effect of the noise in the fiber channel and environment on the QKD system can be reduced effectively

  19. Switching Fuzzy Guaranteed Cost Control for Nonlinear Networked Control Systems

    Linqin Cai


    Full Text Available This paper deals with the problem of guaranteed cost control for a class of nonlinear networked control systems (NCSs with time-varying delay. A guaranteed cost controller design method is proposed to achieve the desired control performance based on the switched T-S fuzzy model. The switching mechanism is introduced to handle the uncertainties of NCSs. Based on Lyapunov functional approach, some sufficient conditions for the existence of state feedback robust guaranteed cost controller are presented. Simulation results show that the proposed method is effective to guarantee system’s global asymptotic stability and quality of service (QoS.

  20. Detector dead-time effects and paralyzability in high-speed quantum key distribution

    Rogers, Daniel J; Bienfang, Joshua C; Nakassis, Anastase; Xu Hai; Clark, Charles W


    Recent advances in quantum key distribution (QKD) have given rise to systems that operate at transmission periods significantly shorter than the dead times of their component single-photon detectors. As systems continue to increase in transmission rate, security concerns associated with detector dead times can limit the production rate of sifted bits. We present a model of high-speed QKD in this limit that identifies an optimum transmission rate for a system with given link loss and detector response characteristics

  1. 7 CFR 1720.9 - Guarantee Agreement.


    ... bonds. (b) The guaranteed bonds shall refer to the guarantee agreement as controlling the terms of the... the holder of the guaranteed bonds; (11) Claim procedures; (12) What constitutes a failure by the...

  2. 27 CFR 6.61 - Guaranteeing loans.


    ... OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Guaranteeing Loans § 6.61 Guaranteeing loans. The act by an industry member of guaranteeing any loan or the repayment of any financial...

  3. Corporate Bond Guarantees and The Value of Financial Flexibility

    Altieri, M.; Massa, M; Manconi, A


    We examine the effects of the decision of parent companies to guarantee bonds issued by their subsidiaries. The market value of the parent firm’s outstanding bonds drops five times more when it issues a guarantee for subsidiary debt than when it issues a new bond in its own name. This effect is

  4. Telemonitoring guaranteed performance

    Quinette, J Y [TECSOL, Perpignan (France)


    The design of any product follows 3 stages: research development and demonstration, before diffusion. The level of experimental detail required (and therefore, the number of measuring points) decreases with each stage. The demonstration phase must be the demonstration that all is running well and of the economical interest of the solar solution. That is why the real time supervision of strategic points of the installation, allowing both the rapid localization of any incident, and the establishment of detailed daily energy balance sheets, seems to be particularly well adapted to following up demonstration projects. At the end of the monitoring period, the productivity of the system must be proven; for that, collected datas must be analyzed every day, in order to make necessary corrections or adjustings and to verify as soon as possible their influence. At that stage, data analysis is more important than the accuracy of measurements. In order to simplify collected datas analysis, results are presented by 3 means: classical data sheet, with daily or hourly values, which are automatically printed; synoptic schemes, that group simplified scheme of the installation and energy and consumption flows (for weekly sheets); and the monthly results are presented on a bill (but with nothing to pay). In the following pages, you can find examples of the main presentation sheets of different installations for solar thermal heating.

  5. Backup key generation model for one-time password security protocol

    Jeyanthi, N.; Kundu, Sourav


    The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.

  6. A Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT and Key Coloumnar Transposition (KCT Method

    Pryo Utomo


    Full Text Available One Time Pad (OTP is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext will be generated more difficult to be known. In the Key and Plaintext Insertion (KPI Method, we modify the OTP algorithm by adding the key insertion in the plaintext that has been splitted. Meanwhile in the Key Coloumnar Transposition (KCT Method, we modify the OTP algorithm by dividing the key into some parts in matrix of rows and coloumns. Implementation of the algorithms using PHP programming language.

  7. A Novel Real-Time Reference Key Frame Scan Matching Method

    Haytham Mohamed


    Full Text Available Unmanned aerial vehicles represent an effective technology for indoor search and rescue operations. Typically, most indoor missions’ environments would be unknown, unstructured, and/or dynamic. Navigation of UAVs in such environments is addressed by simultaneous localization and mapping approach using either local or global approaches. Both approaches suffer from accumulated errors and high processing time due to the iterative nature of the scan matching method. Moreover, point-to-point scan matching is prone to outlier association processes. This paper proposes a low-cost novel method for 2D real-time scan matching based on a reference key frame (RKF. RKF is a hybrid scan matching technique comprised of feature-to-feature and point-to-point approaches. This algorithm aims at mitigating errors accumulation using the key frame technique, which is inspired from video streaming broadcast process. The algorithm depends on the iterative closest point algorithm during the lack of linear features which is typically exhibited in unstructured environments. The algorithm switches back to the RKF once linear features are detected. To validate and evaluate the algorithm, the mapping performance and time consumption are compared with various algorithms in static and dynamic environments. The performance of the algorithm exhibits promising navigational, mapping results and very short computational time, that indicates the potential use of the new algorithm with real-time systems.

  8. Monitoring Assumptions in Assume-Guarantee Contracts

    Oleg Sokolsky


    Full Text Available Pre-deployment verification of software components with respect to behavioral specifications in the assume-guarantee form does not, in general, guarantee absence of errors at run time. This is because assumptions about the environment cannot be discharged until the environment is fixed. An intuitive approach is to complement pre-deployment verification of guarantees, up to the assumptions, with post-deployment monitoring of environment behavior to check that the assumptions are satisfied at run time. Such a monitor is typically implemented by instrumenting the application code of the component. An additional challenge for the monitoring step is that environment behaviors are typically obtained through an I/O library, which may alter the component's view of the input format. This transformation requires us to introduce a second pre-deployment verification step to ensure that alarms raised by the monitor would indeed correspond to violations of the environment assumptions. In this paper, we describe an approach for constructing monitors and verifying them against the component assumption. We also discuss limitations of instrumentation-based monitoring and potential ways to overcome it.

  9. Field-measured drag area is a key correlate of level cycling time trial performance

    James E. Peterman


    Full Text Available Drag area (Ad is a primary factor determining aerodynamic resistance during level cycling and is therefore a key determinant of level time trial performance. However, Ad has traditionally been difficult to measure. Our purpose was to determine the value of adding field-measured Ad as a correlate of level cycling time trial performance. In the field, 19 male cyclists performed a level (22.1 km time trial. Separately, field-determined Ad and rolling resistance were calculated for subjects along with projected frontal area assessed directly (AP and indirectly (Est AP. Also, a graded exercise test was performed to determine $\\dot {V}{O}_{2}$V̇O2 peak, lactate threshold (LT, and economy. $\\dot {V}{O}_{2}$V̇O2 peak ($\\mathrm{l}~\\min ^{-1}$lmin−1 and power at LT were significantly correlated to power measured during the time trial (r = 0.83 and 0.69, respectively but were not significantly correlated to performance time (r = − 0.42 and −0.45. The correlation with performance time improved significantly (p < 0.05 when these variables were normalized to Ad. Of note, Ad alone was better correlated to performance time (r = 0.85, p < 0.001 than any combination of non-normalized physiological measure. The best correlate with performance time was field-measured power output during the time trial normalized to Ad (r = − 0.92. AP only accounted for 54% of the variability in Ad. Accordingly, the correlation to performance time was significantly lower using power normalized to AP (r = − 0.75 or Est AP (r = − 0.71. In conclusion, unless normalized to Ad, level time trial performance in the field was not highly correlated to common laboratory measures. Furthermore, our field-measured Ad is easy to determine and was the single best predictor of level time trial performance.

  10. 7 CFR 1720.14 - Nature of guarantee; acceleration of guaranteed bonds.


    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Nature of guarantee; acceleration of guaranteed bonds. 1720.14 Section 1720.14 Agriculture Regulations of the Department of Agriculture (Continued) RURAL... TELEPHONE PURPOSES § 1720.14 Nature of guarantee; acceleration of guaranteed bonds. (a) Any guarantee...

  11. Financial Management: Emergency Steel Loan Guarantee Program


    In a February 1, 2001 letter, you expressed concerns about repayments of federally guaranteed loans by borrowers under the Emergency Steel Loan Guarantee Program and the effect of the program on the U.S. steel industry...

  12. 20 CFR 404.230 - Guaranteed alternative.


    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Guaranteed alternative. 404.230 Section 404... INSURANCE (1950- ) Computing Primary Insurance Amounts Guaranteed Alternative for People Reaching Age 62 After 1978 But Before 1984 § 404.230 Guaranteed alternative. (a) General. If you reach age 62 after 1978...

  13. 29 CFR 4022.3 - Guaranteed benefits.


    ... 29 Labor 9 2010-07-01 2010-07-01 false Guaranteed benefits. 4022.3 Section 4022.3 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION COVERAGE AND BENEFITS BENEFITS PAYABLE IN TERMINATED SINGLE-EMPLOYER PLANS General Provisions; Guaranteed Benefits § 4022.3 Guaranteed...

  14. Implementation of Guaranteed Services in the MANGO Clockless Network-on-Chip

    Bjerregaard, Tobias; Sparsø, Jens


    (clockless implementation, standard socket access points, and guaranteed communication services) make MANGO suitable for a modular SoC design flow is explained. Among the advantages of using clockless circuit techniques are inherent global timing closure, low forward latency in pipelines, and zero dynamic......Shared, segmented, on-chip interconnection networks, known as networks-on-chip (NoC), may become the preferred way of interconnecting intellectual property (IP) cores in future giga-scale system-on-chip (SoC) designs. A NoC can provide the required communication bandwidth while accommodating...... the effects of scaling microchip technologies. Equally important, a NoC facilitates a truly modular and scalable design flow. The MANGO (message-passing asynchronous network-on-chip providing guaranteed services over open core protocol (OCP) interfaces) NoC is presented, and how its key characteristics...

  15. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    Molotkov, S. N., E-mail: [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)


    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  16. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    Molotkov, S. N.


    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  17. Financial guarantees and public debt in South Africa

    Ogutu Miruka


    Full Text Available A few years since the worst of the Euro sovereign debt crisis, many nations, from Cyprus to Ireland, including South Africa are re-visiting their public debt management to avert or lessen the impact of similar such happenings in the future. There are a number of studies on risk assessments of fiscal sustainability; however, few focus on contingent liabilities and even fewer on financial guarantees. In South Africa, financial guarantees have consistently comprised just above or below 50% of all contingent liabilities since the early days of majoritarian rule. In lieu of this, the paper analyses the risks posed by financial guarantees to fiscal sustainability in South Africa. We estimate the effect of financial guarantees on public debt in South Africa via the Engle Granger and causality model with quarterly time series data obtained from the South African Reserve Bank (SARB as well as the National Treasury. The data covers the April 1997 to December 2011 period. All econometric methods were executed using the statistical software package E-Views 7. We found that no long run relationship exists between national net loan debt and financial guarantees in South Africa. The pass rate of financial guarantees significantly affects its present value. The pass rate of financial guarantees has a predicting ability in determining the present value of national net loan debt. These findings may be contrary to what would be expected in the case of South Africa considering that the country is managing the issuance of financial guarantees prudently and that at present levels, there is no need for a radical policy shift. The study therefore offers a lesson to similar merging economies on the good governance of contingent liabilities.

  18. Government guarantees and public debt in Croatia

    Anto Bajo


    Full Text Available Government fi nancial and performance guarantees have been issued in Croatia since 1996, to support funding and ensure favourable borrowing conditions in the fi nancial market for companies in majority state ownership. However, government guarantees have rarely been part of defi ned strategies and goals of public debt and risk management. Despite their steady growth, the structure of active guarantees and their infl uence on Croatian public debt are still unknown. This paper analyses the amount and structure of state guarantees, their maturities and the authority and accountability for their management, and it compares the structure of guarantees in terms of economic sectors. The main objective of the paper is to determine the infl uence of government guarantees on the public debt growth.

  19. Guarantees come to professional service firms.

    Hart, C W; Schlesinger, L A; Maher, D


    Can lawyers, doctors, investment bankers, accountants, and consultants guarantee their work? Your money back if not absolutely delighted? Some professional service firms are doing exactly that, and they believe they are gaining not only satisfied customers but higher market share and improved service quality. The authors discuss the benefits and risks of unconditional and more limited guarantees. Firms that address this issue proactively now, they argue, will be less likely to rush into poorly considered guarantees later.

  20. Strategic design of cost savings guarantee in energy performance contracting under uncertainty

    Deng, Qianli; Jiang, Xianglin; Cui, Qingbin; Zhang, Limao


    Highlights: • A methodology is proposed to assist Energy Service Companies to maintain competitiveness in winning bids. • Uncertainties within the energy cost savings are modeled stochastically using the Monte-Carlo simulation. • A strategic energy savings guarantee design curve is derived, where all points return as appropriate guarantees. • A campus case is presented to demonstrate the applicability for finding appropriate guaranteed savings value. - Abstract: Among the key barriers to profit in Energy Performance Contracting (EPC) are uncertainties about attaining the realized energy cost savings and potential disputes over the guaranteed cost savings. In this paper, a methodology has been proposed to assist the Energy Service Company (ESCO): (1) to evaluate the risk threshold if the guarantee has already been made, and (2) to determine the guarantee design, if the guarantee has not been made yet, that not only promises the ESCO’s profitability from EPC but also maintains its competitiveness to win the bid. Uncertainties within the energy cost savings are modeled stochastically using Monte-Carlo simulation, taking both the energy price fluctuation and the facility performance variability into account. Based on that, a strategic energy savings guarantee design curve is derived, that all the points on it would return as appropriate guarantees. Finally, a campus case is presented to demonstrate the applicability for finding the appropriate guaranteed savings value. This method is also worth popularizing in similar performance-based projects

  1. Guaranteeing CERN’s excellence: consolidate experience

    Staff Association


    For its missions CERN requires staff with solid experience in all its domains of activity The Organization has several missions: fundamental research, technical developments and innovation, training the several hundreds of associates, fellows and students, while at the same time taking care of more than 10000 users. In order to guarantee excellence in all of these areas, CERN has to put in place an efficient personnel policy. Such a policy must allow the Organization to recruit collaborators with the highest competence from all Member States, and to keep and motivate them during their entire professional career. But, more importantly, the Organization has to be able to count on a stable workforce. It needs staff with experience gained over a long period in the fields of accelerators, detectors, and operating procedures, if it is to fulfil successfully its important mission of training and knowledge transfer, which is very much appreciated by our Member states, since it highlights a visible return on invest...

  2. Rate effects on timing, key velocity, and finger kinematics in piano performance.

    Bella, Simone Dalla; Palmer, Caroline


    We examined the effect of rate on finger kinematics in goal-directed actions of pianists. In addition, we evaluated whether movement kinematics can be treated as an indicator of personal identity. Pianists' finger movements were recorded with a motion capture system while they performed melodies from memory at different rates. Pianists' peak finger heights above the keys preceding keystrokes increased as tempo increased, and were attained about one tone before keypress. These rate effects were not simply due to a strategy to increase key velocity (associated with tone intensity) of the corresponding keystroke. Greater finger heights may compensate via greater tactile feedback for a speed-accuracy tradeoff that underlies the tendency toward larger temporal variability at faster tempi. This would allow pianists to maintain high temporal accuracy when playing at fast rates. In addition, finger velocity and accelerations as pianists' fingers approached keys were sufficiently unique to allow pianists' identification with a neural-network classifier. Classification success was higher in pianists with more extensive musical training. Pianists' movement "signatures" may reflect unique goal-directed movement kinematic patterns, leading to individualistic sound.

  3. Rate effects on timing, key velocity, and finger kinematics in piano performance.

    Simone Dalla Bella

    Full Text Available We examined the effect of rate on finger kinematics in goal-directed actions of pianists. In addition, we evaluated whether movement kinematics can be treated as an indicator of personal identity. Pianists' finger movements were recorded with a motion capture system while they performed melodies from memory at different rates. Pianists' peak finger heights above the keys preceding keystrokes increased as tempo increased, and were attained about one tone before keypress. These rate effects were not simply due to a strategy to increase key velocity (associated with tone intensity of the corresponding keystroke. Greater finger heights may compensate via greater tactile feedback for a speed-accuracy tradeoff that underlies the tendency toward larger temporal variability at faster tempi. This would allow pianists to maintain high temporal accuracy when playing at fast rates. In addition, finger velocity and accelerations as pianists' fingers approached keys were sufficiently unique to allow pianists' identification with a neural-network classifier. Classification success was higher in pianists with more extensive musical training. Pianists' movement "signatures" may reflect unique goal-directed movement kinematic patterns, leading to individualistic sound.

  4. What Guarantees Should Society Offer Its Youth?

    Brooks, Chris


    Criticising the concept of a "youth guarantee" as it was understood by the OECD in the 1990s and recently again by the European Community, the author argues that just more schooling and training will not help, let alone guarantee a future for disadvantaged, unemployed young people. Rather any policy that wants to help youth to become…

  5. 22 CFR 231.03 - The Guarantee.



  6. 22 CFR 231.04 - Guarantee eligibility.



  7. 19 CFR 351.506 - Loan guarantees.


    ... Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE ANTIDUMPING AND COUNTERVAILING DUTIES Identification and Measurement of Countervailable Subsidies § 351.506 Loan guarantees. (a) Benefit—(1) In general. In the case of a loan guarantee, a benefit exists to the extent that the total amount a firm pays for...

  8. The pricing of bank debt guarantees

    Arping, S.


    We analyze the optimal pricing of government-sponsored bank debt guarantees within the context of an asset substitution framework. We show that the desirability of fair pricing of guarantees depends on the degree of transparency of the banking sector: in relatively opaque banking systems, fair

  9. 77 FR 38015 - Community Programs Guaranteed Loans


    ... section. This is based upon the Agency's experience to date in financing this type of project and the... sections, in order to clarify the types of projects that are eligible for a Community Facilities Guaranteed... Program by limiting the risk to the guaranteed loan portfolio. RHS is seeking to prohibit the financing of...

  10. Robust levitation control for maglev systems with guaranteed bounded airgap.

    Xu, Jinquan; Chen, Ye-Hwa; Guo, Hong


    The robust control design problem for the levitation control of a nonlinear uncertain maglev system is considered. The uncertainty is (possibly) fast time-varying. The system has magnitude limitation on the airgap between the suspended chassis and the guideway in order to prevent undesirable contact. Furthermore, the (global) matching condition is not satisfied. After a three-step state transformation, a robust control scheme for the maglev vehicle is proposed, which is able to guarantee the uniform boundedness and uniform ultimate boundedness of the system, regardless of the uncertainty. The magnitude limitation of the airgap is guaranteed, regardless of the uncertainty. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  11. Robust guaranteed cost tracking control of quadrotor UAV with uncertainties.

    Xu, Zhiwei; Nian, Xiaohong; Wang, Haibo; Chen, Yinsheng


    In this paper, a robust guaranteed cost controller (RGCC) is proposed for quadrotor UAV system with uncertainties to address set-point tracking problem. A sufficient condition of the existence for RGCC is derived by Lyapunov stability theorem. The designed RGCC not only guarantees the whole closed-loop system asymptotically stable but also makes the quadratic performance level built for the closed-loop system have an upper bound irrespective to all admissible parameter uncertainties. Then, an optimal robust guaranteed cost controller is developed to minimize the upper bound of performance level. Simulation results verify the presented control algorithms possess small overshoot and short setting time, with which the quadrotor has ability to perform set-point tracking task well. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  12. Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems.

    da Silva, Thiago Ferreira; Xavier, Guilherme B; Temporão, Guilherme P; von der Weid, Jean Pierre


    By employing real-time monitoring of single-photon avalanche photodiodes we demonstrate how two types of practical eavesdropping strategies, the after-gate and time-shift attacks, may be detected. Both attacks are identified with the detectors operating without any special modifications, making this proposal well suited for real-world applications. The monitoring system is based on accumulating statistics of the times between consecutive detection events, and extracting the afterpulse and overall efficiency of the detectors in real-time using mathematical models fit to the measured data. We are able to directly observe changes in the afterpulse probabilities generated from the after-gate and faint after-gate attacks, as well as different timing signatures in the time-shift attack. We also discuss the applicability of our scheme to other general blinding attacks.

  13. Improvements Needed in Administration of the Guaranteed Student Loan Program.

    General Accounting Office, Washington, DC.

    This report identifies improvements needed in administration of the guaranteed student loan program. Improvements needed are based on the fact that that lenders are not informed when student borrowers drop out of school. Alternatives for providing lenders with timely information on enrollment terminations are indicated. Additional administrative…

  14. Coverage and Rate of Downlink Sequence Transmissions with Reliability Guarantees

    Park, Jihong; Popovski, Petar


    Real-time distributed control is a promising application of 5G in which communication links should satisfy certain reliability guarantees. In this letter, we derive closed-form maximum average rate when a device (e.g. industrial machine) downloads a sequence of n operational commands through cell...

  15. The reactivation time in the treatment of AMD: a forgotten key parameter?

    Real, J P; Luna, J D; Palma, S D


    Summarize and compare the available evidence on the reactivation times in patients with age-related macular degeneration treated with Ranibizumab (RNB). Systematic review of studies that reported the reactivation time of patients (direct method) or the number of injections received in a certain period of follow-up (indirect method). Only 18 of 89 selected studies reported the average reactivation time of patients in a manifest form, without the need of any calculation. The average calculated, weighted reactivation time was 101.8 days with the direct method and 99.8 days in the indirect method (84 studies included). With both methods, it was found that the average reactivation time of the RCTs was between 2 and 3 weeks less than the average time identified in the observational studies. These differences are also reflected in the clinical results, there being a correlation between the number of doses received and the change in BCVA. The analysis of 11 comparative studies showed a difference in reactivation times between patients treated with RNB or Bevacizumab (BVZ). There are few direct studies of reactivation time, but calculation from the PRN dose number turns out to be a good approximation for retrospective study of the variable. The use of the PRN, with criteria not based on optical coherence tomography scans, delays the application of doses between 2 or 3 weeks, and patients suffer loss of clinical benefits. RNB enables patients to receive less injections than BVZ throughout treatment.

  16. Radiation: Time, Space and Spirit--Keys to Scientific Literacy Series.

    Stonebarger, Bill

    This discussion of radiation considers the spectrum of electromagnetic energy including light, x-rays, radioactivity, and other waves. Radiation is considered from three aspects; time, space, and spirit. Time refers to a sense of history; space refers to geography; and spirit refers to life and thought. Several chapters on the history and concepts…

  17. The Gene: Time, Space and Spirit--Keys to Scientific Literacy Series.

    Stonebarger, Bill

    It has only been since the late nineteenth century that people have understood the mechanics of heredity and the discoveries of genes and DNA are even more recent. This booklet considers three aspects of genetics; time, space, and spirit. Time refers to a sense of history; space refers to geography; and spirit refers to life and thought. Several…

  18. The Expanding Universe: Time, Space and Spirit--Keys to Scientific Literacy Series.

    Stonebarger, Bill

    Nearly every culture has made important discoveries about the universe. Most cultures have searched for a better understanding of the cosmos and how the earth and human life relate. The discussion in this booklet considers time, space, and spirit. Time refers to a sense of history; space refers to geography; and spirit refers to life and thought.…

  19. Embedded protostars in the dust, ice, and gas in time (DIGIT) Herschel key program

    Green, Joel D.; Evans II, Neal J.; Jørgensen, Jes Kristian


    We present 50-210 um spectral scans of 30 Class 0/I protostellar sources, obtained with Herschel-PACS, and 0.5-1000 um SEDs, as part of the Dust, Ice, and Gas in Time (DIGIT) Key Program. Some sources exhibit up to 75 H2O lines ranging in excitation energy from 100-2000 K, 12 transitions of OH, a...


    Orlando J. Canelones


    Full Text Available This research aims to describe the operation of services offered by the Regional Mutual Guarantee Societies (SGRs in Venezuela, and to present synthetically, the rudiments for constitution, as well as the legal basis that must rule them, through conducting an executive summary of the Law of the National System of Reciprocal Guarantees for Small and Medium Business and the Promotion, Constitution and Functioning Rules of National Mutual Funds and Guarantees and SGRs.  The methodology used in this research is documentary, through a literature review and exploration that allowed inferences about the importance of Regional SGRs in Venezuela, as financing alternative

  1. Optimal design of uptime-guarantee contracts under IGFR valuations and convex costs

    Hezarkhni, Behzad


    An uptime-guarantee contract commits a service provider to maintain the functionality of a customer’s equipment at least for certain fraction of working time during a contracted period. This paper addresses the optimal design of uptime-guarantee contracts for the service provider when the customer’s valuation of a contract with a given guaranteed uptime level has an Increasing Generalized Failure Rate (IGFR) distribution. We first consider the case where the service provider proposes only one...

  2. Time for action: key considerations for implementing social accountability in the education of health professionals.

    Ventres, William; Boelen, Charles; Haq, Cynthia


    Within health professional education around the world, there exists a growing awareness of the professional duty to be socially responsible, being attentive to the needs of all members of communities, regions, and nations, especially those who disproportionately suffer from the adverse influence of social determinants. However, much work still remains to progress beyond such good intentions. Moving from contemplation to action means embracing social accountability as a key guiding principle for change. Social accountability means that health institutions attend to improving the performance of individual practitioners and health systems by directing educational and practice interventions to promote the health of all the public and assessing the systemic effects of these interventions. In this Reflection, the authors (1) review the reasons why health professional schools and their governing bodies should codify, in both curricular and accreditation standards, norms of excellence in social accountability, (2) present four considerations crucial to successfully implementing this codification, and (3) discuss the challenges such changes might entail. The authors conclude by noting that in adopting socially accountable criteria, schools will need to expand their philosophical scope to recognize social accountability as a vitally important part of their institutional professional identity.

  3. Practical performance of real-time shot-noise measurement in continuous-variable quantum key distribution

    Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Zeng, Guihua


    In a practical continuous-variable quantum key distribution (CVQKD) system, real-time shot-noise measurement (RTSNM) is an essential procedure for preventing the eavesdropper exploiting the practical security loopholes. However, the performance of this procedure itself is not analyzed under the real-world condition. Therefore, we indicate the RTSNM practical performance and investigate its effects on the CVQKD system. In particular, due to the finite-size effect, the shot-noise measurement at the receiver's side may decrease the precision of parameter estimation and consequently result in a tight security bound. To mitigate that, we optimize the block size for RTSNM under the ensemble size limitation to maximize the secure key rate. Moreover, the effect of finite dynamics of amplitude modulator in this scheme is studied and its mitigation method is also proposed. Our work indicates the practical performance of RTSNM and provides the real secret key rate under it.

  4. Countries in transition: Nurturing research in times of turmoil is key ...


    Oct 27, 2010 ... Understanding that times of flux bring both the risk of chaos and the promise of rapid social and economic progress, IDRC has been involved in some 25 countries on the move from war to peace, from dictatorship to democracy, from closed economies to free markets. Support provided to researchers in ...

  5. Continuous performance task in ADHD: Is reaction time variability a key measure?

    Levy, Florence; Pipingas, Andrew; Harris, Elizabeth V; Farrow, Maree; Silberstein, Richard B


    To compare the use of the Continuous Performance Task (CPT) reaction time variability (intraindividual variability or standard deviation of reaction time), as a measure of vigilance in attention-deficit hyperactivity disorder (ADHD), and stimulant medication response, utilizing a simple CPT X-task vs an A-X-task. Comparative analyses of two separate X-task vs A-X-task data sets, and subgroup analyses of performance on and off medication were conducted. The CPT X-task reaction time variability had a direct relationship to ADHD clinician severity ratings, unlike the CPT A-X-task. Variability in X-task performance was reduced by medication compared with the children's unmedicated performance, but this effect did not reach significance. When the coefficient of variation was applied, severity measures and medication response were significant for the X-task, but not for the A-X-task. The CPT-X-task is a useful clinical screening test for ADHD and medication response. In particular, reaction time variability is related to default mode interference. The A-X-task is less useful in this regard.

  6. Understanding consumer response to service guarantees

    Taylor, E.L.; Cole, J.M.


    Whether the goal is customer loyalty to a competitive energy service provider or customer satisfaction with monopoly distribution services, service guarantees must be seen as one way a company can communicate with its customers about the relationship it has (or wants) with them. In short, service guarantees must be evaluated as part of a company's overall brand management strategy. To do this, a conceptual framework within which to develop and link models of service delivery and brand management is needed. This means seeing both as examples of inference management. In this article the authors first interpret findings from their research on utility service guarantees in light of the model of service delivery proposed by Smith, Bolton, and Wagner. The authors then situate this model within their own model of utility brand management. The resulting approach can be used by a utility to evaluate whether and how to adopt service guarantees as part of its overall branding strategy.

  7. Understanding consumer response to service guarantees

    Taylor, E.L.; Cole, J.M.


    Whether the goal is customer loyalty to a competitive energy service provider or customer satisfaction with monopoly distribution services, service guarantees must be seen as one way a company can communicate with its customers about the relationship it has (or wants) with them. In short, service guarantees must be evaluated as part of a company's overall brand management strategy. To do this, a conceptual framework within which to develop and link models of service delivery and brand management is needed. This means seeing both as examples of inference management. In this article the authors first interpret findings from their research on utility service guarantees in light of the model of service delivery proposed by Smith, Bolton, and Wagner. The authors then situate this model within their own model of utility brand management. The resulting approach can be used by a utility to evaluate whether and how to adopt service guarantees as part of its overall branding strategy

  8. The pricing of bank debt guarantees

    Arping, S.


    We analyze the desirability of fair pricing of government guarantees for bank liabilities. Fair pricing is desirable only if the banking sector is sufficiently transparent. In opaque banking systems, fair pricing may exacerbate banks' incentive to take excessive risks.

  9. A Network-Attached Storage System Supporting Guaranteed QoS

    KONG Hua-feng; YU Sheng-sheng; LU Hong-wei


    We propose a network-attached storage system that can support guaranteed Quality of Service (QoS), called POPNet Storage. The special policy of date access and disk scheduling is enable users to access files quickly and directly with guaranteed QoS in the POPNet Storage. The POPNet Storage implements a measurement-based admission control algorithm (PSMBAC) to determine whether to admit a new data access request stream and admit as many requests as possible while meeting the QoS guarantees to its clients. The data reconstruction algorithms in the POPNet Storage also put more emphasis on data availability and guaranteed QoS, thus it is designed to complete the data recovery as soon as possible and at the same time provide the guaranteed QoS for high-priority data access. The experiment results show that the POPNet Storage can provide more significant performance, reliability, and guaranteed QoS than conventional storage systems.


    Turgay GECER


    Credit system is an integrated architecture consisted of financial information, credit rating, credit risk management, receivables and credit insurance systems, credit derivative markets and credit guarantee programs. The main purpose of the credit system is to provide the functioning of all credit channels and to make it easy to access of credit sources demanded by all of real and legal persons in any economic system. Credit guarantee program, the one of prominent elements of the credit syst...

  11. Security Guarantees and Nuclear Non-Proliferation

    Bruno Tertrais


    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  12. Security Guarantees and Nuclear Non-Proliferation

    Bruno Tertrais


    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  13. Key technology research of nuclear signal digitized pulse shaping in real time

    Zhou Jianbin; Wang Min; Zhou Wei; Zhu Xing; Liu Yi; Chen Bao; Lu Baoping; Yue Aizhong; Qin Li; He Xuxin


    The computer simulation and analysis were carried out for the ideal nuclear pulse signal and the actual detector output signals, and the determination method of digital trapezoidal shape parameter for different nuclear pulse shaping time was summarized. At high count rate measurement occasion, the effective count rate is increased, some pile-up pulses are eliminated and the accumulation of dead time of the system is reduced. Meanwhile, Si-PIN semiconductor detector performance was tested by 256 points and 512 points digital triangle forming methods and the analog circuit forming methods for comparative tests. Test results show that the pulse forming treatment method increases the count rate performance and the resolution of detector. (authors)

  14. Key technology research of HILS based on real-time operating system

    Wang, Fankai; Lu, Huiming; Liu, Che


    In order to solve the problems that the long development cycle of traditional simulation and digital simulation doesn't have the characteristics of real time, this paper designed a HILS(Hardware In the Loop Simulation) system based on the real-time operating platform xPC. This system solved the communication problems between HMI and Simulink models through the MATLAB engine interface, and realized the functions of system setting, offline simulation, model compiling and downloading, etc. Using xPC application interface and integrating the TeeChart ActiveX chart component to realize the monitoring function of real-time target application; Each functional block in the system is encapsulated in the form of DLL, and the data interaction between modules was realized by MySQL database technology. When the HILS system runs, search the address of the online xPC target by means of the Ping command, to establish the Tcp/IP communication between the two machines. The technical effectiveness of the developed system is verified through the typical power station control system.

  15. Real-time flood inundation forecasting and mapping for key railway infrastructure: a UK case study

    Murphy Alexandra T.


    Full Text Available Flooding events that impede railway infrastructure can cause severe travel delays for the general public and large fines in delayed minutes for the rail industry. Early warnings of flood inundation can give more time to implement mitigation measures which help reduce cancellations, delays and fines. Initial work is reported on the development of a real-time flood inundation forecasting and mapping system for the Cowley Bridge track area near Exeter, UK. This location is on one of the main access routes to South West England and has suffered major floods in the past resulting in significant transport impacts. Flood forecasting systems in the UK mainly forecast river level/flow rather than extent and depth of flood inundation. Here, the development of a chain of coupled models is discussed that link rainfall to river flow, river level and flood extent for the rail track area relating to Cowley Bridge. Historical events are identified to test model performance in predicting inundation of railway infrastructure. The modelling system will operate alongside a series of in-situ sensors chosen to enhance the flood mapping forecasting system. Sensor data will support offline model calibration/verification and real-time data assimilation as well as monitoring flood conditions to inform track closure decisions.

  16. Pricing of electricity in a time of change - some key issues

    Mostert, W.


    The paper covers four topics: (I) what does full cost coverage mean in the Eastern European power sector, (II) LRMC (Long Run Marginal Cost) pricing in regulated utilities versus free market prices; (III) limits to the internalization of external costs in fuel pricing, (IV) pricing of IPPs (Independent Power Producer). The paper argues that the tariff which allows full cost coverage in the Eastern European power sector should be defined as the minimum tariff which allows 30% self-financing of investments and a rate of return of at least 5% on invested assets. The appropriate level of self-financing relates to the appropriate capital structure of the company; the rate of return to the ability to attract finance in the long run. During the last twenty years there has been general consensus among power economists that the application of the LRMC pricing principle for the setting of tariffs was the best principle to ensure efficiency on both the demand as well as the supply side. In free markets involving TPA (Third Party Access) and spot markets, that principle can no longer be applied. In times of scarcity, prices will be above LMRC; in times of surplus capacity below LRMC. Economists have argued for years that external costs and benefits have to be ''internalized'' in tariffs and prices in order to provide consumers and investors with the right pricing principles

  17. Transitional Leadership: Leadership During Times of Transition, Key Principles, and Considerations for Success.

    Norbash, Alexander


    To suggest a methodical approach for refining transitional management abilities, including empowerment of a growing leader, leading in an unfamiliar organization or leading in an organization that is changing. Management approaches based on the body of work dealing with leadership studies and transitions and dealing with leadership during times of transition and change management were consolidated and categorized. Transitional leaders can benefit from effective leadership training including defining and prospectively accruing necessary experiences and skills; strengthening information gathering skills; effectively self-assessing; valuing and implementing mentoring; formulating strategy; and communicating. A categorical approach to transitional leadership may be implemented through a systems-based and methodical approach to gaining the definable, and distinct sets of skills and abilities necessary for transitional leadership success. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  18. Key Technologies and Applications of Satellite and Sensor Web-coupled Real-time Dynamic Web Geographic Information System

    CHEN Nengcheng


    Full Text Available The geo-spatial information service has failed to reflect the live status of spot and meet the needs of integrated monitoring and real-time information for a long time. To tackle the problems in observation sharing and integrated management of space-borne, air-borne, and ground-based platforms and efficient service of spatio-temporal information, an observation sharing model was proposed. The key technologies in real-time dynamic geographical information system (GIS including maximum spatio-temporal coverage-based optimal layout of earth-observation sensor Web, task-driven and feedback-based control, real-time access of streaming observations, dynamic simulation, warning and decision support were detailed. An real-time dynamic Web geographical information system (WebGIS named GeoSensor and its applications in sensing and management of spatio-temporal information of Yangtze River basin including navigation, flood prevention, and power generation were also introduced.

  19. The time of day differently influences fatigue and locomotor activity: is body temperature a key factor?

    Machado, Frederico Sander Mansur; Rodovalho, Gisele Vieira; Coimbra, Cândido Celso


    The aim of this study was to verify the possible interactions between exercise capacity and spontaneous locomotor activity (SLA) during the oscillation of core body temperature (Tb) that occurs during the light/dark cycle. Wistar rats (n=11) were kept at an animal facility under a light/dark cycle of 14/10h at an ambient temperature of 23°C and water and food ad libitum. Initially, in order to characterize the daily oscillation in SLA and Tb of the rats, these parameters were continuously recorded for 24h using an implantable telemetric sensor (G2 E-Mitter). The animals were randomly assigned to two progressive exercise test protocols until fatigue during the beginning of light and dark-phases. Fatigue was defined as the moment rats could not keep pace with the treadmill. We assessed the time to fatigue, workload and Tb changes induced by exercise. Each test was separated by 3days. Our results showed that exercise capacity and heat storage were higher during the light-phase (plocomotor physical activity have an important inherent component (r=0.864 and r=0.784, respectively, plocomotor activity are not directly associated, both are strongly influenced by daily cycles of light and dark. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. Breast cancer screening in Italy: evaluating key performance indicators for time trends and activity volumes.

    Giordano, Livia; Castagno, Roberta; Giorgi, Daniela; Piccinelli, Cristiano; Ventura, Leonardo; Segnan, Nereo; Zappa, Marco


    Together with the National centre for screening monitoring (ONS), GISMa supports annual collection of data on national breast screening activities. Aggregated data on implementation and performance are gathered through a standardized form to calculate process and impact indicators. Analyzed data belong to 153 local programmes in the period 2006-2011 (2006-2012 for participation rate only). During the whole period, Italian crude participation rate exceeded GISMa's acceptable standard (50%), even though a higher participation in northern and central Italy compared to southern Italy and Islands was observed. Time trend analysis of diagnostic indicators confirmed in 2011 an adequate quality of breast screening performance, especially at subsequent screening. Recall rate at initial screening did not reach the acceptable standard (performance was achieved at subsequent screening. The same trend was followed by the overall detection rate and positive predictive value. They both showed a progressive reduction (from 6.2‰ in 2006 to 4.5‰ in 2011 for DR and from 8.0% in 2006 to 5.2% in 2011 for PPV, respectively) at initial screening and a good, stable trend at subsequent screening. Activity volume analysis shows that in programmes with greater activity (test/year ≥10,000) RR at both initial and subsequent screening has a better performance. This is also true for DR and PPV where programmes with high volumes of activity do better, especially when compared with those that interpret fewer than 5,000 mammograms per year. In spite of a few limits, these results are reassuring, and they reward the efforts made by screening professionals. It is therefore important to continue to monitor screening indicators and suggest, test, and evaluate new strategies for continuous improvement.

  1. Identification of key outcome measures when using the instrumented timed up and go and/or posturography for fall screening.

    Sample, Renee Beach; Kinney, Allison L; Jackson, Kurt; Diestelkamp, Wiebke; Bigelow, Kimberly Edginton


    The Timed Up and Go (TUG) has been commonly used for fall risk assessment. The instrumented Timed Up and Go (iTUG) adds wearable sensors to capture sub-movements and may be more sensitive. Posturography assessments have also been used for determining fall risk. This study used stepwise logistic regression models to identify key outcome measures for the iTUG and posturography protocols. The effectiveness of the models containing these measures in differentiating fallers from non-fallers were then compared for each: iTUG total time duration only, iTUG, posturography, and combined iTUG and posturography assessments. One hundred and fifty older adults participated in this study. The iTUG measures were calculated utilizing APDM Inc.'s Mobility Lab software. Traditional and non-linear posturography measures were calculated from center of pressure during quiet-standing. The key outcome measures incorporated in the iTUG assessment model (sit-to-stand lean angle and height) resulted in a model sensitivity of 48.1% and max re-scaled R 2 value of 0.19. This was a higher sensitivity, indicating better differentiation, compared to the model only including total time duration (outcome of the traditional TUG), which had a sensitivity of 18.2%. When the key outcome measures of the iTUG and the posturography assessments were combined into a single model, the sensitivity was approximately the same as the iTUG model alone. Overall the findings of this study support that the iTUG demonstrates greater sensitivity than the total time duration, but that carrying out both iTUG and posturography does not greatly improve sensitivity when used as a fall risk screening tool. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. An adaptation method to improve secret key rates of time-frequency QKD in atmospheric turbulence channels

    Sun, Xiaole; Djordjevic, Ivan B.; Neifeld, Mark A.


    Free-space optical (FSO) channels can be characterized by random power fluctuations due to atmospheric turbulence, which is known as scintillation. Weak coherent source based FSO quantum key distribution (QKD) systems suffer from the scintillation effect because during the deep channel fading the expected detection rate drops, which then gives an eavesdropper opportunity to get additional information about protocol by performing photon number splitting (PNS) attack and blocking single-photon pulses without changing QBER. To overcome this problem, in this paper, we study a large-alphabet QKD protocol, which is achieved by using pulse-position modulation (PPM)-like approach that utilizes the time-frequency uncertainty relation of the weak coherent photon state, called here TF-PPM-QKD protocol. We first complete finite size analysis for TF-PPM-QKD protocol to give practical bounds against non-negligible statistical fluctuation due to finite resources in practical implementations. The impact of scintillation under strong atmospheric turbulence regime is studied then. To overcome the secure key rate performance degradation of TF-PPM-QKD caused by scintillation, we propose an adaptation method for compensating the scintillation impact. By changing source intensity according to the channel state information (CSI), obtained by classical channel, the adaptation method improves the performance of QKD system with respect to the secret key rate. The CSI of a time-varying channel can be predicted using stochastic models, such as autoregressive (AR) models. Based on the channel state predictions, we change the source intensity to the optimal value to achieve a higher secret key rate. We demonstrate that the improvement of the adaptation method is dependent on the prediction accuracy.

  3. The study of key issues about integration of GNSS and strong-motion records for real-time earthquake monitoring

    Tu, Rui; Zhang, Pengfei; Zhang, Rui; Liu, Jinhai


    This paper has studied the key issues about integration of GNSS and strong-motion records for real-time earthquake monitoring. The validations show that the consistence of the coordinate system must be considered firstly to exclude the system bias between GNSS and strong-motion. The GNSS sampling rate is suggested about 1-5 Hz, and we should give the strong-motion's baseline shift with a larger dynamic noise as its variation is very swift. The initialization time of solving the baseline shift is less than one minute, and ambiguity resolution strategy is not greatly improved the solution. The data quality is very important for the solution, we advised to use multi-frequency and multi-system observations. These ideas give an important guide for real-time earthquake monitoring and early warning by the tight integration of GNSS and strong-motion records.

  4. Probabilistic double guarantee kidnapping detection in SLAM.

    Tian, Yang; Ma, Shugen


    For determining whether kidnapping has happened and which type of kidnapping it is while a robot performs autonomous tasks in an unknown environment, a double guarantee kidnapping detection (DGKD) method has been proposed. The good performance of DGKD in a relative small environment is shown. However, a limitation of DGKD is found in a large-scale environment by our recent work. In order to increase the adaptability of DGKD in a large-scale environment, an improved method called probabilistic double guarantee kidnapping detection is proposed in this paper to combine probability of features' positions and the robot's posture. Simulation results demonstrate the validity and accuracy of the proposed method.

  5. Stand alone photovoltaic systems: guarantee of results



    This study aims to provide a guarantee of results for system performance for users of stand-alone photovoltaic (PV) systems, which have no back-up generator. The appropriate main performance criterion for PV systems is that a specified load is supplied with power either continuously or intermittently whenever the load requires power. A methodology to evaluate the power availability of stand-alone PV systems has been developed as part of the project, which encompasses power losses due to weather variations. The guarantee of results produced allows users to compare system designs from different manufacturers. (UK)

  6. 78 FR 46528 - Surety Bond Guarantee Program


    ... 2013, Public Law 112-239, 126 Stat. 1632: (1) Increasing the contract amount for which SBA is... remedies under contract law, the Act, and the regulations in this part, SBA is relieved of liability in...), including the provisions that increase the contract amounts for which SBA is authorized to guarantee bonds...

  7. 78 FR 63158 - Information Collection; Guaranteed Farm Loan Program


    ... DEPARTMENT OF AGRICULTURE Farm Service Agency Information Collection; Guaranteed Farm Loan Program... collection associated with the Guaranteed Farm Loan Program. The amended estimate adds the merger of the information collection for the Land Contract Guarantee Program (0560-0279) into the Guaranteed Farm Loan...

  8. Convergence Guaranteed Nonlinear Constraint Model Predictive Control via I/O Linearization

    Xiaobing Kong


    Full Text Available Constituting reliable optimal solution is a key issue for the nonlinear constrained model predictive control. Input-output feedback linearization is a popular method in nonlinear control. By using an input-output feedback linearizing controller, the original linear input constraints will change to nonlinear constraints and sometimes the constraints are state dependent. This paper presents an iterative quadratic program (IQP routine on the continuous-time system. To guarantee its convergence, another iterative approach is incorporated. The proposed algorithm can reach a feasible solution over the entire prediction horizon. Simulation results on both a numerical example and the continuous stirred tank reactors (CSTR demonstrate the effectiveness of the proposed method.

  9. Network theory inspired analysis of time-resolved expression data reveals key players guiding P. patens stem cell development.

    Busch, Hauke; Boerries, Melanie; Bao, Jie; Hanke, Sebastian T; Hiss, Manuel; Tiko, Theodhor; Rensing, Stefan A


    Transcription factors (TFs) often trigger developmental decisions, yet, their transcripts are often only moderately regulated and thus not easily detected by conventional statistics on expression data. Here we present a method that allows to determine such genes based on trajectory analysis of time-resolved transcriptome data. As a proof of principle, we have analysed apical stem cells of filamentous moss (P. patens) protonemata that develop from leaflets upon their detachment from the plant. By our novel correlation analysis of the post detachment transcriptome kinetics we predict five out of 1,058 TFs to be involved in the signaling leading to the establishment of pluripotency. Among the predicted regulators is the basic helix loop helix TF PpRSL1, which we show to be involved in the establishment of apical stem cells in P. patens. Our methodology is expected to aid analysis of key players of developmental decisions in complex plant and animal systems.

  10. Self-guaranteed measurement-based quantum computation

    Hayashi, Masahito; Hajdušek, Michal


    In order to guarantee the output of a quantum computation, we usually assume that the component devices are trusted. However, when the total computation process is large, it is not easy to guarantee the whole system when we have scaling effects, unexpected noise, or unaccounted for correlations between several subsystems. If we do not trust the measurement basis or the prepared entangled state, we do need to be worried about such uncertainties. To this end, we propose a self-guaranteed protocol for verification of quantum computation under the scheme of measurement-based quantum computation where no prior-trusted devices (measurement basis or entangled state) are needed. The approach we present enables the implementation of verifiable quantum computation using the measurement-based model in the context of a particular instance of delegated quantum computation where the server prepares the initial computational resource and sends it to the client, who drives the computation by single-qubit measurements. Applying self-testing procedures, we are able to verify the initial resource as well as the operation of the quantum devices and hence the computation itself. The overhead of our protocol scales with the size of the initial resource state to the power of 4 times the natural logarithm of the initial state's size.

  11. Hacking the Bell test using classical light in energy-time entanglement-based quantum key distribution.

    Jogenfors, Jonathan; Elhassan, Ashraf Mohamed; Ahrens, Johan; Bourennane, Mohamed; Larsson, Jan-Åke


    Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.

  12. A Real-Time Recording Model of Key Indicators for Energy Consumption and Carbon Emissions of Sustainable Buildings

    Weiwei Wu


    Full Text Available Buildings’ sustainability is one of the crucial parts for achieving urban sustainability. Applied to buildings, life-cycle assessment encompasses the analysis and assessment of the environmental effects of building materials, components and assemblies throughout the entire life of the building construction, use and demolition. Estimate of carbon emissions is essential and crucial for an accurate and reasonable life-cycle assessment. Addressing the need for more research into integrating analysis of real-time and automatic recording of key indicators for a more accurate calculation and comparison, this paper aims to design a real-time recording model of these crucial indicators concerning the calculation and estimation of energy use and carbon emissions of buildings based on a Radio Frequency Identification (RFID-based system. The architecture of the RFID-based carbon emission recording/tracking system, which contains four functional layers including data record layer, data collection/update layer, data aggregation layer and data sharing/backup layer, is presented. Each of these layers is formed by RFID or network devices and sub-systems that operate at a specific level. In the end, a proof-of-concept system is developed to illustrate the implementation of the proposed architecture and demonstrate the feasibility of the design. This study would provide the technical solution for real-time recording system of building carbon emissions and thus is of great significance and importance to improve urban sustainability.

  13. A Real-Time Recording Model of Key Indicators for Energy Consumption and Carbon Emissions of Sustainable Buildings

    Wu, Weiwei; Yang, Huanjia; Chew, David; Hou, Yanhong; Li, Qiming


    Buildings' sustainability is one of the crucial parts for achieving urban sustainability. Applied to buildings, life-cycle assessment encompasses the analysis and assessment of the environmental effects of building materials, components and assemblies throughout the entire life of the building construction, use and demolition. Estimate of carbon emissions is essential and crucial for an accurate and reasonable life-cycle assessment. Addressing the need for more research into integrating analysis of real-time and automatic recording of key indicators for a more accurate calculation and comparison, this paper aims to design a real-time recording model of these crucial indicators concerning the calculation and estimation of energy use and carbon emissions of buildings based on a Radio Frequency Identification (RFID)-based system. The architecture of the RFID-based carbon emission recording/tracking system, which contains four functional layers including data record layer, data collection/update layer, data aggregation layer and data sharing/backup layer, is presented. Each of these layers is formed by RFID or network devices and sub-systems that operate at a specific level. In the end, a proof-of-concept system is developed to illustrate the implementation of the proposed architecture and demonstrate the feasibility of the design. This study would provide the technical solution for real-time recording system of building carbon emissions and thus is of great significance and importance to improve urban sustainability. PMID:24831109


    Lola D. Sanginova


    Full Text Available Importance: Under current conditions, the Russian economy needs investment resources to ensure sustainable social and economic development. One of instruments of state-financing backing that can be used to support capital intensive, economically viable, financially and socially efficient investment projects that create "growing points" are state guarantees of theRussian Federation.Objective: The objective of this study is to identify possible ways to improve the requirements and procedures of providing state guarantees of theRussian Federationwhich contribute to the increase in the quantity and quality of investment projects of high social importance. Methods: Through the use of general scientific methods, analysis and synthesis, induction and deduction the possibility of creating a more attractive environment for principals is analyzed, measures to reduce the risk for public legal entities in providing state guarantees of theRussian Federationunder credits or bonded loans raised for investment projects implementation.Results: Principles of state guarantee support that ensure the interests of both the principals and the guarantor are defined. The basic directions for improving the mechanism how state guarantees of theRussian Federationsupport investment projects are justified. These directions include increasing availability of obtaining state guarantee support by lowering the cost of investment projects for which the state guarantees may be provided; reducing time of decision making on granting a state guarantee; increasing the creditors’ responsibility for a qualitative assessment of the creditworthiness of principals and investment projects; changing the methodology for assessing the social efficiency of investment projects; increasing the information transparency of provided state guarantees of the Russian Federation.Conclusions: The main result of this study is that under current conditions of economic turbulence state guarantees of the

  15. Toward sensitive document release with privacy guarantees

    David Sánchez; Montserrat Batet


    Toward sensitive document release with privacy guarantees DOI: 10.1016/j.engappai.2016.12.013 URL: Filiació URV: SI Inclòs a la memòria: SI Privacy has become a serious concern for modern Information Societies. The sensitive nature of much of the data that are daily exchanged or released to untrusted parties requires that responsible organizations undertake appropriate privacy protection measures. Nowadays, much...

  16. Keys to Achieving Target First Medical Contact to Balloon Times and Bypassing Emergency Department More Important Than Distance

    Saad Ezad


    Full Text Available Background. Australian guidelines advocate primary percutaneous coronary intervention (PPCI as the reperfusion strategy of choice for ST elevation myocardial infarction (STEMI in patients in whom it can be performed within 90 minutes of first medical contact; otherwise, fibrinolytic therapy is preferred. In a large health district, the reperfusion strategy is often chosen in the prehospital setting. We sought to identify a distance from a PCI centre, which made it unlikely first medical contact to balloon time (FMCTB of less than 90 minutes could be achieved in the Hunter New England health district and to identify causes of delay in patients who were triaged to a PPCI strategy. Methods and Results. We studied 116 patients presenting via the ambulance service with STEMI from January 2016 to December 2016. In patients who were taken directly to the cardiac catheterisation lab, a maximum distance of 50 km from hospital resulted in 75% of patients receiving PCI within 90 minutes and approximately 95% of patients receiving PCI within 120 minutes. Patients who bypassed the emergency department (ED were significantly more likely to have FMCTB of less than 90 minutes (p<0.001 despite having a longer travel distance (28.5 km versus 17.4 km, p<0.001. Patients transiting via the ED were significantly more likely to present out of hours (60 versus 24.2% p<0.001. Conclusions. Patients who do not bypass the ED have a longer FMCTB across all spectrum of distances from the PCI centre; therefore, bypassing the ED is key to achieving target FMCTB times. Using a cutoff distance of 50 km may reduce human error in estimating travel time to our PCI centre and thereby identifying patients who should receive prehospital thrombolysis.

  17. Legal Status of Credit Bank Guarantee in Indonesia’s Legal Guarantee

    Erma Defiana Putriyanti


    Full Text Available The aim of this research is to analyze  about the legal status of the letter hiring as collateral for bank loans in the Indonesian security law. The method of this research is a normative juridical. The results of this research indicate that the decree hiring is not included in the objects that can be bound by pledge, fiduciary, and mortgage then hiring decree hiring is not included in the personal guarantee and corporate guarantee. Although the hiring decree is issued by a legitimate institution, the institution is not bound by an agreement between the debtor debts with the bank but when the decree was used as security for the bank. Hiring letter is not also included in the general collateral. Decree hiring is not an object and does not qualify as material that can be used as general collateral. The conclusion of this research is that the position of the decree hiring as collateral for bank loans is a new form of guarantee which is not included in the general guarantees and the specific ones. This shows that the system of legal guarantees in Indonesia is not pure anymore embrace a closed system, but has started shifting into an open system.

  18. Guaranteed convergence of the Hough transform

    Soffer, Menashe; Kiryati, Nahum


    The straight-line Hough Transform using normal parameterization with a continuous voting kernel is considered. It transforms the colinearity detection problem to a problem of finding the global maximum of a two dimensional function above a domain in the parameter space. The principle is similar to robust regression using fixed scale M-estimation. Unlike standard M-estimation procedures the Hough Transform does not rely on a good initial estimate of the line parameters: The global optimization problem is approached by exhaustive search on a grid that is usually as fine as computationally feasible. The global maximum of a general function above a bounded domain cannot be found by a finite number of function evaluations. Only if sufficient a-priori knowledge about the smoothness of the objective function is available, convergence to the global maximum can be guaranteed. The extraction of a-priori information and its efficient use are the main challenges in real global optimization problems. The global optimization problem in the Hough Transform is essentially how fine should the parameter space quantization be in order not to miss the true maximum. More than thirty years after Hough patented the basic algorithm, the problem is still essentially open. In this paper an attempt is made to identify a-priori information on the smoothness of the objective (Hough) function and to introduce sufficient conditions for the convergence of the Hough Transform to the global maximum. An image model with several application dependent parameters is defined. Edge point location errors as well as background noise are accounted for. Minimal parameter space quantization intervals that guarantee convergence are obtained. Focusing policies for multi-resolution Hough algorithms are developed. Theoretical support for bottom- up processing is provided. Due to the randomness of errors and noise, convergence guarantees are probabilistic.

  19. Biased random key genetic algorithm with insertion and gender selection for capacitated vehicle routing problem with time windows

    Rochman, Auliya Noor; Prasetyo, Hari; Nugroho, Munajat Tri


    Vehicle Routing Problem (VRP) often occurs when the manufacturers need to distribute their product to some customers/outlets. The distribution process is typically restricted by the capacity of the vehicle and the working hours at the distributor. This type of VRP is also known as Capacitated Vehicle Routing Problem with Time Windows (CVRPTW). A Biased Random Key Genetic Algorithm (BRKGA) was designed and coded in MATLAB to solve the CVRPTW case of soft drink distribution. The standard BRKGA was then modified by applying chromosome insertion into the initial population and defining chromosome gender for parent undergoing crossover operation. The performance of the established algorithms was then compared to a heuristic procedure for solving a soft drink distribution. Some findings are revealed (1) the total distribution cost of BRKGA with insertion (BRKGA-I) results in a cost saving of 39% compared to the total cost of heuristic method, (2) BRKGA with the gender selection (BRKGA-GS) could further improve the performance of the heuristic method. However, the BRKGA-GS tends to yield worse results compared to that obtained from the standard BRKGA.

  20. Massive M2M Access with Reliability Guarantees in LTE Systems

    Madueño, Germán Corrales; Kiilerich Pratas, Nuno; Stefanovic, Cedomir


    Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arriva...

  1. Herschel Observations of Protostellar and Young Stellar Objects in Nearby Molecular Clouds: The DIGIT Open Time Key Project

    Green, Joel D.; DIGIT OTKP Team


    The DIGIT (Dust, Ice, and Gas In Time) Open Time Key Project utilizes the PACS spectrometer (57-210 um) onboard the Herschel Space Observatory to study the colder regions of young stellar objects and protostellar cores, complementary to recent observations from Spitzer and ground-based observatories. DIGIT focuses on 30 embedded sources and 64 disk sources, and includes supporting photometry from PACS and SPIRE, as well as spectroscopy from HIFI, selected from nearby molecular clouds. For the embedded sources, PACS spectroscopy will allow us to address the origin of [CI] and high-J CO lines observed with ISO-LWS. Our observations are sensitive to the presence of cold crystalline water ice, diopside, and carbonates. Additionally, PACS scans are 5x5 maps of the embedded sources and their outflows. Observations of more evolved disk sources will sample low and intermediate mass objects as well as a variety of spectral types from A to M. Many of these sources are extremely rich in mid-IR crystalline dust features, enabling us to test whether similar features can be detected at larger radii, via colder dust emission at longer wavelengths. If processed grains are present only in the inner disk (in the case of full disks) or from the emitting wall surface which marks the outer edge of the gap (in the case of transitional disks), there must be short timescales for dust processing; if processed grains are detected in the outer disk, radial transport must be rapid and efficient. Weak bands of forsterite and clino- and ortho-enstatite in the 60-75 um range provide information about the conditions under which these materials were formed. For the Science Demonstration Phase we are observing an embedded protostar (DK Cha) and a Herbig Ae/Be star (HD 100546), exemplars of the kind of science that DIGIT will achieve over the full program.

  2. 12 CFR 370.12 - Payment on the guarantee.


    ... TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.12 Payment on the guarantee. (a) Claims for Deposits in... depositors for funds in a noninterest-bearing transaction account in an insured depository institution that...

  3. Doubts raised on the validity of construction and payment guarantees

    A construction company had been liquidated and the employer had called up the guarantee .... Due to the small size of the target populations in both the quantitative and qualitative ..... contingent liability that remains in terms of the guarantee.

  4. The traceability of renewable energies: the guarantees of origin


    The guarantee of origin has been initially designed by the European Union as a mechanism of support for renewable energies. It is an electronic document which allows an electric power provider to guarantee to its client the origin of the energy it sells him. This document presents the legal background of this guarantee, briefly describes the life cycle of this guarantee, proposes a brief discussion of recent legal evolutions, and briefly discusses its future

  5. Constitutional judges (guarantee of the Constitution and responsibility

    Francisco Javier Ansuátegui Roig


    Full Text Available My aim in this paper is to propose a reflection on the position and the importance that the constitutional judge has in the legal systems of contemporary constitutionalism. The figure of the judge responsible of protecting the Constitution is a key institution, without which we cannot understand the laws of constitutional democracies, their current lines of development, and the guarantee of rights and freedoms that constitute the normative core of these systems. Moreover, the reflection on the exercise of the powers of the judge, its scope and its justification is an important part of contemporary legal discussion, still relevant, albeit not exclusively - in the field of legal philosophy. The object of attention of my reflection is the judge who has the power of judicial review, in a scheme of defense of the Constitution, regardless the specific ways of this defense.

  6. 77 FR 58991 - State-Level Guarantee Fee Pricing


    ... FEDERAL HOUSING FINANCE AGENCY [No. 2012-N-13] State-Level Guarantee Fee Pricing AGENCY: Federal... guarantee fee pricing by state. FHFA's proposal described here would adjust the upfront fees that the... final state-level guarantee fee pricing method, FHFA expects to direct the Enterprises to implement the...

  7. 42 CFR 417.937 - Loan and loan guarantee provisions.


    ... 42 Public Health 3 2010-10-01 2010-10-01 false Loan and loan guarantee provisions. 417.937 Section... HEALTH CARE PREPAYMENT PLANS Administration of Outstanding Loans and Loan Guarantees § 417.937 Loan and loan guarantee provisions. (a) Disbursement of loan proceeds. The principal amount of any loan made or...

  8. 78 FR 48135 - Information Collection; Guaranteed Farm Loan Program


    ... Information Collection; Guaranteed Farm Loan Program AGENCY: Farm Service Agency, USDA. ACTION: Notice... revision of a currently approved information collection associated with the Guaranteed Farm Loan Program. This information collection is used to make and service loans guaranteed by FSA to eligible farmers and...

  9. 13 CFR 107.1720 - Characteristics of SBA's guarantee.


    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Characteristics of SBA's guarantee. 107.1720 Section 107.1720 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS... Characteristics of SBA's guarantee. If SBA agrees to guarantee a Licensee's Debentures or Participating Securities...

  10. The Canadian Nuclear Safety Commission's financial guarantee requirements

    Ferch, R.


    The Nuclear Safety and Control Act gives the Canadian Nuclear Safety Commission (CNSC) the legal authority to require licensees to provide financial guarantees in order to meet the purposes of the Act. CNSC policy and guidance with regard to financial guarantees is outlined, and the current status of financial guarantee requirements as applied to various CNSC licensees is described. (author)

  11. Minimum Price Guarantees In a Consumer Search Model

    M.C.W. Janssen (Maarten); A. Parakhonyak (Alexei)


    textabstractThis paper is the first to examine the effect of minimum price guarantees in a sequential search model. Minimum price guarantees are not advertised and only known to consumers when they come to the shop. We show that in such an environment, minimum price guarantees increase the value of

  12. Unraveling the Timing of Fluid Migration and Trap Formation in the Brooks Range Foothills: A Key to Discovering Hydrocarbons

    Catherine L. Hanks


    Naturally occurring fractures can play a key role in the evolution and producibility of a hydrocarbon accumulation. Understanding the evolution of fractures in the Brooks Range/Colville basin system of northern Alaska is critical to developing a better working model of the hydrocarbon potential of the region. This study addressed this problem by collecting detailed and regional data on fracture distribution and character, structural geometry, temperature, the timing of deformation along the Brooks Range rangefront and adjacent parts of the Colville basin, and the in situ stress distribution within the Colville basin. This new and existing data then were used to develop a model of how fractures evolved in northern Alaska, both spatially and temporally. The results of the study indicate that fractures formed episodically throughout the evolution of northern Alaska, due to a variety of mechanisms. Four distinct fracture sets were observed. The earliest fractures formed in deep parts of the Colville basin and in the underlying Ellesmerian sequence rocks as these rocks experienced compression associated with the growing Brooks Range fold-and-thrust belt. The orientation of these deep basin fractures was controlled by the maximum in situ horizontal stress in the basin at the time of their formation, which was perpendicular to the active Brooks Range thrust front. This orientation stayed consistently NS-striking for most of the early history of the Brooks Range and Colville basin, but changed to NW-striking with the development of the northeastern Brooks Range during the early Tertiary. Subsequent incorporation of these rocks into the fold-and-thrust belt resulted in overprinting of these deep basin fractures by fractures caused by thrusting and related folding. The youngest fractures developed as rocks were uplifted and exposed. While this general order of fracturing remains consistent across the Brooks Range and adjacent Colville basin, the absolute age at any one

  13. 78 FR 79253 - CCC Export Credit Guarantee (GSM-102) Program and Facility Guarantee Program (FGP)


    ... been worked out in advance of the exporter's application for the payment guarantee. Foreign Financial... country of domicile must provide financial statements in accordance with prevailing accounting standards... smaller U.S. exporters. Changes are also intended to improve CCC's financial management of the program...

  14. [Packaging: the guarantee of medicinal quality].

    Chaumeil, J-C


    Primary packaging guarantees the pharmaceutical quality of the medicinal preparation received by the patient. Glass bottles containing parenteral solutions for example ensure that sterility, quality and optimal stability are preserved until administration. Recent innovations in materials research has lead to improvements in parenteral infusions. Multicompartmental bags, allowing extemporaneous mixtures without opening the container, constitute an extremely beneficial advance for the patient, allowing administration of mixtures with solutions and emulsions which would be unstable if stored. Metered dose pressurized inhalers are an excellent example of drug administration devices designed specifically to ensure quality and bioavailability. These examples illustrate the important role of primary packaging and demonstrate the usefulness of research and development in this area.

  15. Resilient guaranteed cost control of a power system.

    Soliman, Hisham M; Soliman, Mostafa H; Hassan, Mohammad F


    With the development of power system interconnection, the low-frequency oscillation is becoming more and more prominent which may cause system separation and loss of energy to consumers. This paper presents an innovative robust control for power systems in which the operating conditions are changing continuously due to load changes. However, practical implementation of robust control can be fragile due to controller inaccuracies (tolerance of resistors used with operational amplifiers). A new design of resilient (non-fragile) robust control is given that takes into consideration both model and controller uncertainties by an iterative solution of a set of linear matrix inequalities (LMI). Both uncertainties are cast into a norm-bounded structure. A sufficient condition is derived to achieve the desired settling time for damping power system oscillations in face of plant and controller uncertainties. Furthermore, an improved controller design, resilient guaranteed cost controller, is derived to achieve oscillations damping in a guaranteed cost manner. The effectiveness of the algorithm is shown for a single machine infinite bus system, and then, it is extended to multi-area power system.

  16. GMG: A Guaranteed, Efficient Global Optimization Algorithm for Remote Sensing.

    D' Helon, CD


    The monocular passive ranging (MPR) problem in remote sensing consists of identifying the precise range of an airborne target (missile, plane, etc.) from its observed radiance. This inverse problem may be set as a global optimization problem (GOP) whereby the difference between the observed and model predicted radiances is minimized over the possible ranges and atmospheric conditions. Using additional information about the error function between the predicted and observed radiances of the target, we developed GMG, a new algorithm to find the Global Minimum with a Guarantee. The new algorithm transforms the original continuous GOP into a discrete search problem, thereby guaranteeing to find the position of the global minimum in a reasonably short time. The algorithm is first applied to the golf course problem, which serves as a litmus test for its performance in the presence of both complete and degraded additional information. GMG is further assessed on a set of standard benchmark functions and then applied to various realizations of the MPR problem.

  17. Honeywell starts energy-management service: savings guaranteed; BOSS replaced

    Schwartz, R.


    Honeywell Inc. guarantees that its new Honeywell Service Link Operation (HSLO), a time-sharing service, will produce greater energy savings than its monthly fees. There are no front-end costs because the central computer is located at the supplier's Atlanta site, making energy management cost-affordable for facilities as small as 25,000 square feet. HSLO replaces Honeywell's Building Operations Service System (BOSS) that has a minimum-size requirement of 100,000 square feet. BOSS customers will be automatically changed to HSLO at no charge. All 21 regional computer centers will be available to users. Johnson Controls, Inc. also operates a time-sharing operation called Total Automated Building Services (TABS). (DCK)

  18. "Financial Innovation and Risk Management: The Cross-Guarantee Solution"

    Bert Ely


    The cross-guarantee concept, which is summarized below, will eliminate the regulatory moral hazard that electronic technology has greatly exacerbated in recent years. The paper concludes by outlining the many benefits cross-guarantees will bring to the financial system as well as the structural and international implications of using cross-guarantees to bring market-driven regulation to the financial services sector of the American economy.

  19. 42 CFR 57.1507 - Limitations applicable to loan guarantee.


    ... FOR CONSTRUCTION OF TEACHING FACILITIES, EDUCATIONAL IMPROVEMENTS, SCHOLARSHIPS AND STUDENT LOANS Loan Guarantees and Interest Subsidies to Assist in Construction of Teaching Facilities for Health Profession...

  20. Legal basis and administrative departments for securing and guaranteeing the energy supply

    Besslich, W.


    The headline is no game with the words. It distinguishes between the securing of the supply in times of peace and the guarantee in times of defense during war which is a popular topic again and follows a linguistic term by the Bundesrat of 1915 which was kept alive up to day. (orig.) [de

  1. Study on the Correlation between Gene Expression and Enzyme Activity of Seven Key Enzymes and Ginsenoside Content in Ginseng in Over Time in Ji'an, China.

    Yin, Juxin; Zhang, Daihui; Zhuang, Jianjian; Huang, Yi; Mu, Ying; Lv, Shaowu


    Panax ginseng is a traditional medicine. Fresh ginseng is one of the most important industries related to ginseng development, and fresh ginseng of varying ages has different medicinal properties. Previous research has not systematically reported the correlation between changes in key enzyme activity with changes in ginsenoside content in fresh ginseng over time. In this study, for the first time, we use ginseng samples of varying ages in Ji'an and systematically reported the changes in the activity of seven key enzymes (HMGR, FPS, SS, SE, DS, CYP450, and GT). We investigated the content of ginsenoside and gene expression of these key enzymes. Ginsenoside content was measured using HPLC. HPLC, GC-MS, and LC-MS were combined to measure the enzyme activity of the key enzymes. Quantitative PCR was used in the investigation of gene expression. By analyzing the correlation between the enzyme activity and the transcription level of the key enzymes with ginsenoside content, we found that DS and GT enzyme activities are significantly correlated with the ginsenoside content in different ages of ginseng. Our findings might provide a new strategy to discriminate between ginseng of different years. Meanwhile, this research provides important information for the in-depth study of ginsenoside biosynthesis.

  2. Change in intraindividual variability over time as a key metric for defining performance-based cognitive fatigability.

    Wang, Chao; Ding, Mingzhou; Kluger, Benzi M


    Cognitive fatigability is conventionally quantified as the increase over time in either mean reaction time (RT) or error rate from two or more time periods during sustained performance of a prolonged cognitive task. There is evidence indicating that these mean performance measures may not sufficiently reflect the response characteristics of cognitive fatigue. We hypothesized that changes in intraindividual variability over time would be a more sensitive and ecologically meaningful metric for investigations of fatigability of cognitive performance. To test the hypothesis fifteen young adults were recruited. Trait fatigue perceptions in various domains were assessed with the Multidimensional Fatigue Index (MFI). Behavioral data were then recorded during performance of a three-hour continuous cued Stroop task. Results showed that intraindividual variability, as quantified by the coefficient of variation of RT, increased linearly over the course of three hours and demonstrated a significantly greater effect size than mean RT or accuracy. Change in intraindividual RT variability over time was significantly correlated with relevant subscores of the MFI including reduced activity, reduced motivation and mental fatigue. While change in mean RT over time was also correlated with reduced motivation and mental fatigue, these correlations were significantly smaller than those associated with intraindividual RT variability. RT distribution analysis using an ex-Gaussian model further revealed that change in intraindividual variability over time reflects an increase in the exponential component of variance and may reflect attentional lapses or other breakdowns in cognitive control. These results suggest that intraindividual variability and its change over time provide important metrics for measuring cognitive fatigability and may prove useful for inferring the underlying neuronal mechanisms of both perceptions of fatigue and objective changes in performance. Copyright © 2014

  3. 10 CFR 609.10 - Loan Guarantee Agreement.


    ... accepted accounting principles and practices. The non-guaranteed portion (if any) of any Guaranteed... examination, to any pertinent books, documents, papers, and records of the Borrower, Eligible Lender or other... transferring Eligible Lender was performing these functions and transfer such functions to the new Eligible...

  4. 7 CFR 1493.430 - Application for a payment guarantee.


    ... (includes upward loading tolerance, if any); (12) Guaranteed value; (13) Guarantee fee; (14) The term length... (including packaging, if any); (8) Mean quantity, contract loading tolerance and, if the exporter chooses, a request for CCC to reserve coverage up to the maximum quantity permitted by the contract loading tolerance...

  5. Investment Guarantees in the South African Life Insurance Industry ...

    This paper explores the risks faced by South African life insurance companies arising from the provision of investment guarantees in products sold. The current thinking and practice of the larger South African life insurance companies regarding investment guarantees is set out following their responses to a survey.

  6. 13 CFR 120.613 - Secondary Participation Guarantee Agreement.


    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Secondary Participation Guarantee Agreement. 120.613 Section 120.613 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Secondary Market Certificates § 120.613 Secondary Participation Guarantee Agreement. When a Lender...

  7. 12 CFR 370.4 - Transaction Account Guarantee Program.


    ... GENERAL POLICY TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.4 Transaction Account Guarantee Program. (a) In addition to the coverage afforded to depositors under 12 CFR Part 330, a depositor's funds in a noninterest... determining whether funds are in a noninterest-bearing transaction account for purposes of this section, the...

  8. 76 FR 31217 - Single Family Housing Guaranteed Loan Program


    ... Farm Service Agency 7 CFR Part 1980 RIN 0575-AC83 Single Family Housing Guaranteed Loan Program... the Rural Housing Service (RHS) Section 502 Single Family Housing Guaranteed Loan Program (SFHGLP) by eliminating the lender's published Department of Veterans Affairs (VA) rate for first mortgage loans with no...

  9. 48 CFR 52.247-60 - Guaranteed Shipping Characteristics.


    ... Characteristics. 52.247-60 Section 52.247-60 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION....247-60 Guaranteed Shipping Characteristics. As prescribed in 47.305-16(b)(1), insert the following clause: Guaranteed Shipping Characteristics (DEC 1989) (a) The offeror is requested to complete...

  10. 13 CFR 120.400 - Loan Guarantee Agreements.


    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Loan Guarantee Agreements. 120.400 Section 120.400 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Lenders § 120... specific proposed loan that a Lender may submit. The existence of a Loan Guarantee Agreement does not limit...

  11. 7 CFR 4279.149 - Personal and corporate guarantee.


    ... guarantees are part of the collateral for the loan, but are not considered in determining whether a loan is... documents to the Agency's satisfaction that collateral, equity, cashflow, and profitability indicate an... guarantee form. When warranted by an Agency assessment of potential financial risk, Agency approved...

  12. 7 CFR 2201.28 - Participation in guaranteed Loans.


    ... Participation in guaranteed Loans. (a) Subject to paragraphs (b), (c) and (d) of this section, a Lender may distribute the risk of a portion of a Loan guaranteed under the Program by sale of participations therein if... in part as a result of the sale of such participations; (2) The Lender remains solely responsible for...

  13. 14 CFR 1300.23 - Participation in guaranteed loans.


    ... lender may distribute the risk of a portion of a loan guaranteed under the program by sale of... transferred in whole or in part; (2) The lender remains solely responsible for the administration of the loan... loans guaranteed under the program: (1) Eligible lenders; (2) Private investment funds and insurance...

  14. Modelling the guaranteed QoS for wireless sensor networks: a network calculus approach

    Yu Jianping


    Full Text Available Abstract Wireless sensor networks (WSNs became one of the high technology domains during the last 10 years. Real-time applications for them make it necessary to provide the guaranteed quality of service (QoS. The main contributions of this article are a system skeleton and a guaranteed QoS model that are suitable for the WSNs. To do it, we develop a sensor node model based on virtual buffer sharing and present a two-layer scheduling model using the network calculus. With the system skeleton, we develop a guaranteed QoS model, such as the upper bounds on buffer queue length/delay/effective bandwidth, and single-hop/multi-hops delay/jitter/effective bandwidth. Numerical results show the system skeleton and the guaranteed QoS model are scalable for different types of flows, including the self-similar traffic flows, and the parameters of flow regulators and service curves of sensor nodes affect them. Our proposal leads to buffer dimensioning, guaranteed QoS support and control in the WSNs.

  15. Nonfragile Guaranteed Cost Control and Optimization for Interconnected Systems of Neutral Type

    Heli Hu


    Full Text Available The design and optimization problems of the nonfragile guaranteed cost control are investigated for a class of interconnected systems of neutral type. A novel scheme, viewing the interconnections with time-varying delays as effective information but not disturbances, is developed to decrease the conservatism. Many techniques on decomposing and magnifying the matrices are utilized to obtain the guaranteed cost of the considered system. Also, an algorithm is proposed to solve the nonlinear problem of the interconnected matrices. Based on this algorithm, the minimization of the guaranteed cost of the considered system is obtained by optimization. Further, the state feedback control is extended to the case in which the underlying system is dependent on uncertain parameters. Finally, two numerical examples are given to illustrate the proposed method, and some comparisons are made to show the advantages of the schemes of dealing with the interconnections.

  16. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Qin Qin


    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  17. Just-in-Time Adaptive Interventions (JITAIs) in Mobile Health: Key Components and Design Principles for Ongoing Health Behavior Support.

    Nahum-Shani, Inbal; Smith, Shawna N; Spring, Bonnie J; Collins, Linda M; Witkiewitz, Katie; Tewari, Ambuj; Murphy, Susan A


    The just-in-time adaptive intervention (JITAI) is an intervention design aiming to provide the right type/amount of support, at the right time, by adapting to an individual's changing internal and contextual state. The availability of increasingly powerful mobile and sensing technologies underpins the use of JITAIs to support health behavior, as in such a setting an individual's state can change rapidly, unexpectedly, and in his/her natural environment. Despite the increasing use and appeal of JITAIs, a major gap exists between the growing technological capabilities for delivering JITAIs and research on the development and evaluation of these interventions. Many JITAIs have been developed with minimal use of empirical evidence, theory, or accepted treatment guidelines. Here, we take an essential first step towards bridging this gap. Building on health behavior theories and the extant literature on JITAIs, we clarify the scientific motivation for JITAIs, define their fundamental components, and highlight design principles related to these components. Examples of JITAIs from various domains of health behavior research are used for illustration. As we enter a new era of technological capacity for delivering JITAIs, it is critical that researchers develop sophisticated and nuanced health behavior theories capable of guiding the construction of such interventions. Particular attention has to be given to better understanding the implications of providing timely and ecologically sound support for intervention adherence and retention.

  18. Quantum key management

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth


    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  19. 7 CFR 4290.1600 - Secretary's authority to issue and guarantee Trust Certificates.


    ... INVESTMENT COMPANY (âRBICâ) PROGRAM Financial Assistance for RBICs (Leverage) Funding Leverage by Use of... the timely payment of the principal and interest thereon. Any such guarantee of such TC is limited to... any TC. (b) Authority to arrange public or private fundings of Leverage. The Secretary in his or her...

  20. It’s Time to Take the Chill Out of Cost Containment and Re-energize Key Acquisition Practice


    Lockheed Martin ? ? ? ? ZCORE Cost Oriented Resource  Estimating Model USAF ? ? ? ? ACEIT Automated Cost  Estimating  Integrated  Tools  (USAF, USA...and Logistics) Milestone III chair LCCH Criticisms of high cost, ASD (Acquisition and Logistics) Milestone III chair ACEIT (86 USAF at Hanscom...w/Tecolote Research) ACEIT (86 USAF at Hanscom w/Tecolote Research) ?? It’s Time to Take the Chill Out of Cost Containment and Re-energize a

  1. Phase information of time-frequency transforms as a key feature for classification of atrial fibrillation episodes

    Ortigosa, Nuria; Fernández, Carmen; Galbis, Antonio; Cano, Óscar


    Patients suffering from atrial fibrillation can be classified into different subtypes, according to the temporal pattern of the arrhythmia and its recurrence. Nowadays, clinicians cannot differentiate a priori between the different subtypes, and patient classification is done afterwards, when its clinical course is available. In this paper we present a comparison of classification performances when differentiating paroxysmal and persistent atrial fibrillation episodes by means of support vector machines. We analyze short surface electrocardiogram recordings by extracting modulus and phase features from several time-frequency transforms: short-time Fourier transform, Wigner–Ville, Choi–Williams, Stockwell transform, and general Fourier-family transform. Overall, accuracy higher than 81% is obtained when classifying phase information features of real test ECGs from a heterogeneous cohort of patients (in terms of progression of the arrhythmia and antiarrhythmic treatment) recorded in a tertiary center. Therefore, phase features can facilitate the clinicians’ choice of the most appropriate treatment for each patient by means of a non-invasive technique (the surface ECG). (paper)

  2. ngVLA Key Science Goal 3: Charting the Assembly, Structure, and Evolution of Galaxies Over Cosmic Time

    Riechers, Dominik A.; Bolatto, Alberto D.; Carilli, Chris; Casey, Caitlin M.; Decarli, Roberto; Murphy, Eric Joseph; Narayanan, Desika; Walter, Fabian; ngVLA Galaxy Assembly through Cosmic Time Science Working Group, ngVLA Galaxy Ecosystems Science Working Group


    The Next Generation Very Large Array (ngVLA) will fundamentally advance our understanding of the formation processes that lead to the assembly of galaxies throughout cosmic history. The combination of large bandwidth with unprecedented sensitivity to the critical low-level CO lines over virtually the entire redshift range will open up the opportunity to conduct large-scale, deep cold molecular gas surveys, mapping the fuel for star formation in galaxies over substantial cosmic volumes. Imaging of the sub-kiloparsec scale distribution and kinematic structure of molecular gas in both normal main-sequence galaxies and large starbursts back to early cosmic epochs will reveal the physical processes responsible for star formation and black hole growth in galaxies over a broad range in redshifts. In the nearby universe, the ngVLA has the capability to survey the structure of the cold, star-forming interstellar medium at parsec-resolution out to the Virgo cluster. A range of molecular tracers will be accessible to map the motion, distribution, and physical and chemical state of the gas as it flows in from the outer disk, assembles into clouds, and experiences feedback due to star formation or accretion into central super-massive black holes. These investigations will crucially complement studies of the star formation and stellar mass histories with the Large UV/Optical/Infrared Surveyor and the Origins Space Telescope, providing the means to obtain a comprehensive picture of galaxy evolution through cosmic times.

  3. Microfossils, a Key to Unravel Cold-Water Carbonate Mound Evolution through Time: Evidence from the Eastern Alboran Sea.

    Claudio Stalder

    Full Text Available Cold-water coral (CWC ecosystems occur worldwide and play a major role in the ocean's carbonate budget and atmospheric CO2 balance since the Danian (~65 m.y. ago. However their temporal and spatial evolution against climatic and oceanographic variability is still unclear. For the first time, we combine the main macrofaunal components of a sediment core from a CWC mound of the Melilla Mounds Field in the Eastern Alboran Sea with the associated microfauna and we highlight the importance of foraminifera and ostracods as indicators of CWC mound evolution in the paleorecord. Abundances of macrofauna along the core reveal alternating periods dominated by distinct CWC taxa (mostly Lophelia pertusa, Madrepora oculata that correspond to major shifts in foraminiferal and ostracod assemblages. The period dominated by M. oculata coincides with a period characterized by increased export of refractory organic matter to the seafloor and rather unstable oceanographic conditions at the benthic boundary layer with periodically decreased water energy and oxygenation, variable bottom water temperature/density and increased sediment flow. The microfaunal and geochemical data strongly suggest that M. oculata and in particular Dendrophylliidae show a higher tolerance to environmental changes than L. pertusa. Finally, we show evidence for sustained CWC growth during the Alleröd-Younger-Dryas in the Eastern Alboran Sea and that this period corresponds to stable benthic conditions with cold/dense and well oxygenated bottom waters, high fluxes of labile organic matter and relatively strong bottom currents.

  4. Monitoring and Evaluation of Cultivated Land Irrigation Guarantee Capability with Remote Sensing

    Zhang, C., Sr.; Huang, J.; Li, L.; Wang, H.; Zhu, D.


    Abstract: Cultivated Land Quality Grade monitoring and evaluation is an important way to improve the land production capability and ensure the country food safety. Irrigation guarantee capability is one of important aspects in the cultivated land quality monitoring and evaluation. In the current cultivated land quality monitoring processing based on field survey, the irrigation rate need much human resources investment in long investigation process. This study choses Beijing-Tianjin-Hebei as study region, taking the 1 km × 1 km grid size of cultivated land unit with a winter wheat-summer maize double cropping system as study object. A new irrigation capacity evaluation index based on the ratio of the annual irrigation requirement retrieved from MODIS data and the actual quantity of irrigation was proposed. With the years of monitoring results the irrigation guarantee capability of study area was evaluated comprehensively. The change trend of the irrigation guarantee capability index (IGCI) with the agricultural drought disaster area in rural statistical yearbook of Beijing-Tianjin-Hebei area was generally consistent. The average of IGCI value, the probability of irrigation-guaranteed year and the weighted average which controlled by the irrigation demand index were used and compared in this paper. The experiment results indicate that the classification result from the present method was close to that from irrigation probability in the gradation on agriculture land quality in 2012, with overlap of 73% similar units. The method of monitoring and evaluation of cultivated land IGCI proposed in this paper has a potential in cultivated land quality level monitoring and evaluation in China. Key words: remote sensing, evapotranspiration, MODIS cultivated land quality, irrigation guarantee capability Authors: Chao Zhang, Jianxi Huang, Li Li, Hongshuo Wang, Dehai Zhu China Agricultural University

  5. Pricing unit-linked insurance with guaranteed benefit

    Iqbal, M.; Novkaniza, F.; Novita, M.


    Unit-linked insurance is an investment-linked insurance, that is, the given benefit is the premium investment out-come. Recently, the most widely marketed insurance in the industry is unit-linked insurance with guaranteed benefit. With guaranteed benefit applied, the insurance benefits form is similar to the payoff form of European call option. Thereby, pricing European call option is involved in pricing unit-linked insurance with guaranteed benefit. The dynamics of investment outcome is assumed to follow stochastic interest rate. Hence, change of measure methods is used in pricing unit-linked insurance. The discount factor with stochastic interest rate needs to be modified as well to be zero coupon bond price. Eventually, the insurance premium is calculated by equivalence principle with guaranteed benefit and insurance period explicitly given.

  6. 7 CFR 1720.8 - Issuance of the guarantee.


    ... accounting firm or federal banking regulator, annual consolidated financial statements audited by an... financial covenants, and events of default and remedies; (3) Prior to the issuance of the guarantee, the...

  7. Several Guaranteed Descent Conjugate Gradient Methods for Unconstrained Optimization

    San-Yang Liu


    Full Text Available This paper investigates a general form of guaranteed descent conjugate gradient methods which satisfies the descent condition gkTdk≤-1-1/4θkgk2  θk>1/4 and which is strongly convergent whenever the weak Wolfe line search is fulfilled. Moreover, we present several specific guaranteed descent conjugate gradient methods and give their numerical results for large-scale unconstrained optimization.

  8. Implementation of a financial guarantee policy at the CNSC

    Barker, R.


    The Canadian Nuclear Safety Commission (CNSC) was established in 2000 under the Nuclear Safety and Control Act (NSCA) to replace the Atomic Energy Control Board (AECB). Prior to the coming in force of the NSCA, financial guarantees associated with licensed activities were not prescribed in the Atomic Energy Control Act or its regulations. Under the NSCA, the Commission Tribunal 'the Commission' was given authority to impose conditions in licences requiring financial guarantees from licensees. Other provisions of the NSCA provided information on the application of financial guarantees and for refunds when decommissioning obligations had been met. Since 2000, the application of financial guarantees has been primarily focussed on licences issued pursuant to the Class I Nuclear Facilities Regulations and the Uranium Mines and Mills Regulations. This was to assure that the requirements for financial guarantees were initially directed at the high risk, complex facilities licensed by the CNSC. However, all licensees have not yet been required to provide a financial guarantee for all licensed facilities, activities or licence types. Additionally, CNSC expectations in relation to when financial guarantees, associated decommissioning plans and cost estimates need to be reviewed, updated and submitted, and what they should entail have been evolving, indicating a need for a clear CNSC policy on the subject. Consequently, the CNSC is proceeding with the development of a financial guarantee policy and implementation plan to assure that generators of nuclear waste will have the financial resources available to decommission nuclear facilities, operations and devices and that this activity will not fall to government as a future liability. This program will require approval by the Commission, planned for 2012. This paper will further describe this policy and its possible outcomes. (author)

  9. A Unified Pricing of Variable Annuity Guarantees under the Optimal Stochastic Control Framework

    Pavel V. Shevchenko


    Full Text Available In this paper, we review pricing of the variable annuity living and death guarantees offered to retail investors in many countries. Investors purchase these products to take advantage of market growth and protect savings. We present pricing of these products via an optimal stochastic control framework and review the existing numerical methods. We also discuss pricing under the complete/incomplete financial market models, stochastic mortality and optimal/sub-optimal policyholder behavior, and in the presence of taxes. For numerical valuation of these contracts in the case of simple risky asset process, we develop a direct integration method based on the Gauss-Hermite quadratures with a one-dimensional cubic spline for calculation of the expected contract value, and a bi-cubic spline interpolation for applying the jump conditions across the contract cashflow event times. This method is easier to implement and faster when compared to the partial differential equation methods if the transition density (or its moments of the risky asset underlying the contract is known in closed form between the event times. We present accurate numerical results for pricing of a Guaranteed Minimum Accumulation Benefit (GMAB guarantee available on the market that can serve as a numerical benchmark for practitioners and researchers developing pricing of variable annuity guarantees to assess the accuracy of their numerical implementation.

  10. Guaranteed Cost Fault-Tolerant Control for Networked Control Systems with Sensor Faults

    Qixin Zhu


    Full Text Available For the large scale and complicated structure of networked control systems, time-varying sensor faults could inevitably occur when the system works in a poor environment. Guaranteed cost fault-tolerant controller for the new networked control systems with time-varying sensor faults is designed in this paper. Based on time delay of the network transmission environment, the networked control systems with sensor faults are modeled as a discrete-time system with uncertain parameters. And the model of networked control systems is related to the boundary values of the sensor faults. Moreover, using Lyapunov stability theory and linear matrix inequalities (LMI approach, the guaranteed cost fault-tolerant controller is verified to render such networked control systems asymptotically stable. Finally, simulations are included to demonstrate the theoretical results.

  11. Customer intentions to invoke service guarantees: Do excellence in service recovery, type of guarantee, and cultural orientation matter?

    Van Vaerenbergh, Yves; De Keyser, Arne; Larivière, Bart


    Purpose – Many service providers feel confident about their service quality and thus offer service guarantees to their customers. Yet service failures are inevitable. As guarantees can only be invoked when customers report service failures, firms are given the opportunity to redress the original failure potentially influencing customer outcomes. The purpose of this paper is to provide the first empirical investigation of whether excellence in service recovery affects customers’ intentions to ...

  12. Nuclear power: status, outlook, guarantees of sustainable development

    Cherkasov, A.S.


    Full text: The principal advantages of nuclear power - almost unlimited fuel resources, its high energy capacity, ecological compatibility with a possibility of high wastes concentration - determine the large-scale nuclear power development. The signs of large-scale power - a large rate (dozens of percent) in electricity production, diverse areas (electricity, heat supply, technologies, transport) and media of application (land, ocean, space), extension of number of user countries, diversified power systems (centralized, autonomous), obligatory reproduction and reuse of produced fuel - create various requirements to nuclear power installations of the future. Economic efficiency and competitiveness, safety (of reactors and fuel cycle with waste), proper characteristics of nuclear fuel reproduction, guarantees of nuclear arm's non-proliferation and, particularly, public acceptance are the conditions of such nuclear power development. The up-to-date situation is the following: the 441 nuclear power-generation units with total installed power of 377.36 GW el. (in 31 countries) supply by 1/6 part of the world electric-power consumptions. The 32 units are in stage of the construction. To the present mid-century the level of the nuclear power production, as supposed, must be increased 4-5 times at the following scenario of a regional distribution of nuclear electric powers, GW: USA, Europe and developed countries of Eastern Asia - 1000, FSU-countries - 100 and developing countries - 400

  13. QoE Guarantee Scheme Based on Cooperative Cognitive Cloud and Opportunistic Weight Particle Swarm

    Weihang Shi


    Full Text Available It is well known that the Internet application of cloud services may be affected by the inefficiency of cloud computing and inaccurate evaluation of quality of experience (QoE seriously. In our paper, based on construction algorithms of cooperative cognitive cloud platform and optimization algorithm of opportunities weight particle swarm clustering, the QoE guarantee mechanism was proposed. The mechanism, through the sending users of requests and the cognitive neighbor users’ cooperation, combined the cooperation of subcloud platforms and constructed the optimal cloud platform with the different service. At the same time, the particle swarm optimization algorithm could be enhanced dynamically according to all kinds of opportunity request weight, which could optimize the cooperative cognitive cloud platform. Finally, the QoE guarantee scheme was proposed with the opportunity weight particle swarm optimization algorithm and collaborative cognitive cloud platform. The experimental results show that the proposed mechanism compared is superior to the QoE guarantee scheme based on cooperative cloud and QoE guarantee scheme based on particle swarm optimization, compared with optimization fitness and high cloud computing service execution efficiency and high throughput performance advantages.

  14. Assume-Guarantee Abstraction Refinement Meets Hybrid Systems

    Bogomolov, Sergiy; Frehse, Goran; Greitschus, Marius; Grosu, Radu; Pasareanu, Corina S.; Podelski, Andreas; Strump, Thomas


    Compositional verification techniques in the assume- guarantee style have been successfully applied to transition systems to efficiently reduce the search space by leveraging the compositional nature of the systems under consideration. We adapt these techniques to the domain of hybrid systems with affine dynamics. To build assumptions we introduce an abstraction based on location merging. We integrate the assume-guarantee style analysis with automatic abstraction refinement. We have implemented our approach in the symbolic hybrid model checker SpaceEx. The evaluation shows its practical potential. To the best of our knowledge, this is the first work combining assume-guarantee reasoning with automatic abstraction-refinement in the context of hybrid automata.

  15. Bank guarantee in Serbian and European legal systems

    Pajtić Bojan L.


    Full Text Available The paper analyses a bank guarantee as an institute derived from a surety contract. By issuing a bank guarantee the bank commits to the creditor that it will fulfill valid and due liabilities of a debtor, in the event of default by the debtor. This collateral demonstrates significant advantages as compared to other personal assets, particularly with regards to a higher level of protection to creditors in contractual relations. Due to the aforementioned benefit the institute has been increasingly applied in legal dealings, both in our and other legal systems. In the paper, I will point out normative solutions in terms of regulation of a bank guarantee as a specific legal activity in which there is no accessoriness, which is not the case with security. This research particularly focuses on the comparative legal analysis of this collateral.

  16. Fundamental quantitative security in quantum key generation

    Yuen, Horace P.


    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  17. Administrative Circular No. 13 (Rev. 3) - Guarantees for representatives of the personnel


    Administrative Circular No. 13 (Rev. 3) entitled “Guarantees for representatives of the personnel”, approved by the Director-General following discussion at the Standing Concertation Committee meeting of 5 December 2013 and entering into force on 1 January 2014, is available on the intranet site of the Human Resources Department (see here).   This circular is applicable to all members of the personnel. It cancels and replaces Administrative Circular No. 13 (Rev. 2) entitled “Guarantees for members of the personnel holding representative office” of November 1992. The circular was revised in order to adapt the time given to the representatives of the personnel to perform their elective mandate and to ensure more transparency in their activities, by indicating, inter alia, the percentage of time worked in the framework of their mandate, as well as the training, activities and ensuing results. Department Head Office HR Department

  18. The observable defects and the proper functioning guarantee in trading

    Jorge Oviedo Albán


    Full Text Available This paper discusses two legal mechanisms for buyer´s protection contained in the Colombian Commercial Code, parallel to building regulations, because of hidden defects in the sale, which are: guarantee by observable defects at delivery and guarantee for proper functioning. The author analyzes the poor way such actions are enshrined in the Code as a consequence of a fragmented and dispersed regime for defective compliance actions in the laws of Private Law. This paper proposes a reinterpretation of such actions from the perspective of the lack of conformity that is based on a unified system of remedies for breach, concepts embodied in modern instruments of contract law.

  19. Quantum dense key distribution

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.


    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  20. Key improvements to XTR

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.


    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  1. Secret Key Agreement: Fundamental Limits and Practical Challenges

    Rezki, Zouheir


    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  2. Detection, quantitation and identification of enteroviruses from surface waters and sponge tissue from the Florida Keys using real-time RT-PCR

    Donaldson, K.A.; Griffin, Dale W.; Paul, J.H.


    A method was developed for the quantitative detection of pathogenic human enteroviruses from surface waters in the Florida Keys using Taqman (R) one-step Reverse transcription (RT)-PCR with the Model 7700 ABI Prism (R) Sequence Detection System. Viruses were directly extracted from unconcentrated grab samples of seawater, from seawater concentrated by vortex flow filtration using a 100kD filter and from sponge tissue. Total RNA was extracted from the samples, purified and concentrated using spin-column chromatography. A 192-196 base pair portion of the 5??? untranscribed region was amplified from these extracts. Enterovirus concentrations were estimated using real-time RT-PCR technology. Nine of 15 sample sites or 60% were positive for the presence of pathogenic human enteroviruses. Considering only near-shore sites, 69% were positive with viral concentrations ranging from 9.3viruses/ml to 83viruses/g of sponge tissue (uncorrected for extraction efficiency). Certain amplicons were selected for cloning and sequencing for identification. Three strains of waterborne enteroviruses were identified as Coxsackievirus A9, Coxsackievirus A16, and Poliovirus Sabin type 1. Time and cost efficiency of this one-step real-time RT-PCR methodology makes this an ideal technique to detect, quantitate and identify pathogenic enteroviruses in recreational waters. Copyright ?? 2002 Elsevier Science Ltd.

  3. Further improvements in competitive guarantees for QoS buffering

    Bansal, N.; Fleischer, L.K.; Kimbrel, T.; Mahdian, M.; Schieber, B.; Sviridenko, M.; Diaz, J.; Karhumäki, J.; Lepistö, A.; Sannella, D.


    We study the behavior of algorithms for buffering packets weighted by different levels of Quality of Service (QoS) guarantees in a single queue. Buffer space is limited, and packet loss occurs when the buffer overflows. We describe a modification of the previously proposed ``preemptive greedy{''}

  4. 32 CFR 151.7 - Fair trial guarantees.


    ... MILITARY JUSTICE STATUS OF FORCES POLICIES AND INFORMATION § 151.7 Fair trial guarantees. The following is... competent interpreter when the accused does not understand the language in which the trial is conducted and does not have counsel proficient in the language both of the court and of the accused. (p) Accused is...

  5. 7 CFR 1493.40 - Application for payment guarantee.


    ... and allowances, if any. (11) Port value (includes upward loading tolerance, if any). (12) Guaranteed..., contract loading tolerance and, if necessary, a request for CCC to reserve coverage up to the maximum quantity permitted by the contract loading tolerance. (9) Unit sales price of the commodity, or a mechanism...

  6. Interface Input/Output Automata: Splitting Assumptions from Guarantees

    Larsen, Kim Guldstrand; Nyman, Ulrik; Wasowski, Andrzej


    's \\IOAs [11], relying on a context dependent notion of refinement based on relativized language inclusion. There are two main contributions of the work. First, we explicitly separate assumptions from guarantees, increasing the modeling power of the specification language and demonstrating an interesting...

  7. 7 CFR 1980.488 - Guaranteed industrial development bond issues.


    ... industrial plants for lease to private businesses engaged in industrial manufacturing and does not provide... 7 Agriculture 14 2010-01-01 2009-01-01 true Guaranteed industrial development bond issues. 1980..., DEPARTMENT OF AGRICULTURE (CONTINUED) PROGRAM REGULATIONS (CONTINUED) GENERAL Business and Industrial Loan...

  8. 12 CFR 370.3 - Debt Guarantee Program.


    ... convertible debt to be issued, (C) The mandatory conversion date, (D) The conversion rate (i.e., the total... exchange rate in effect on the date that the debt is funded. (c) Calculation and reporting responsibility... guarantee expires on the earliest of the mandatory conversion date for mandatory convertible debt, the...

  9. Pricing and Hedging Guaranteed Returns on Mix Funds

    Vellekoop, M.H.; van de Kamp, A.A.; Post, B.A.


    Abstract In this paper we propose a valuation and hedging strategy for a guaranteed minimal rate of return on a mix fund, which participates in both bonds and stocks. For the case where a fixed amount of money is invested, we show that a European put option on the mix fund replicates the cash flows

  10. 48 CFR 52.228-1 - Bid Guarantee.


    ... as accepted. (c) The amount of the bid guarantee shall be ____ percent of the bid price or $____, whichever is less. (d) If the successful bidder, upon acceptance of its bid by the Government within the period specified for acceptance, fails to execute all contractual documents or furnish executed bond(s...

  11. 29 CFR 541.604 - Minimum guarantee plus extras.


    ... DEFINING AND DELIMITING THE EXEMPTIONS FOR EXECUTIVE, ADMINISTRATIVE, PROFESSIONAL, COMPUTER AND OUTSIDE SALES EMPLOYEES Salary Requirements § 541.604 Minimum guarantee plus extras. (a) An employer may provide... commission on sales. An exempt employee also may receive a percentage of the sales or profits of the employer...

  12. 78 FR 13999 - Maximum Interest Rates on Guaranteed Farm Loans


    ..., cost-plus, flat-rate, or market based) to price guaranteed loans, provided the rates do not exceed the... (LIBOR) or the 5-year Treasury note rate, unless the lender uses a formal written risk-based pricing... cost in the form of a lower interest rate than the borrower would otherwise receive. Therefore, the FSA...

  13. Stabilization with guaranteed safety using Control Lyapunov–Barrier Function

    Romdlony, Muhammad Zakiyullah; Jayawardhana, Bayu


    We propose a novel nonlinear control method for solving the problem of stabilization with guaranteed safety for nonlinear systems. The design is based on the merging of the well-known Control Lyapunov Function (CLF) and the recent concept of Control Barrier Function (CBF). The proposed control

  14. 13 CFR 400.214 - Participations in guaranteed loans.


    ...) Subject to paragraphs (b), (c) and (d) of this section, a Lender may distribute the risk of a portion of a... the Guarantee is assigned, conveyed, sold, or transferred in whole or in part; (2) The Lender remains... Lenders; (2) Private investment funds and insurance companies that do not usually invest in commercial...

  15. 78 FR 64175 - Hashemite Kingdom of Jordan Loan Guarantees Issued Under the Further Continuing Appropriations...


    ... procedures and standard terms and conditions applicable to loan guarantees to be issued for the benefit of... Definitions. 233.03 The Guarantee. 233.04 Guarantee eligibility. 233.05 Non-impairment of the Guarantee. 233... Default; Application for Compensation; payment. 233.09 No acceleration of Eligible Notes. [[Page 64176...

  16. 13 CFR 115.18 - Refusal to issue further guarantees; suspension and termination of PSB status.


    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Refusal to issue further guarantees; suspension and termination of PSB status. 115.18 Section 115.18 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SURETY BOND GUARANTEE Provisions for All Surety Bond Guarantees § 115.18 Refusal to issue further guarantees; suspension...

  17. Cryptographic robustness of a quantum cryptography system using phase-time coding

    Molotkov, S. N.


    A cryptographic analysis is presented of a new quantum key distribution protocol using phase-time coding. An upper bound is obtained for the error rate that guarantees secure key distribution. It is shown that the maximum tolerable error rate for this protocol depends on the counting rate in the control time slot. When no counts are detected in the control time slot, the protocol guarantees secure key distribution if the bit error rate in the sifted key does not exceed 50%. This protocol partially discriminates between errors due to system defects (e.g., imbalance of a fiber-optic interferometer) and eavesdropping. In the absence of eavesdropping, the counts detected in the control time slot are not caused by interferometer imbalance, which reduces the requirements for interferometer stability.

  18. Development Concept of Guaranteed Verification Electric Power System Simulation Tools and Its Realization

    Gusev Alexander


    Full Text Available The analysis of existing problem reliability and verification of widespread electric power systems (EPS simulation tools is presented in this article. Everything simulation tools are based on the using of numerical methods for ordinary differential equations. Described the concept of guaranteed verification EPS simulation tools and the structure of its realization are based using the Simulator having properties of continuous , without decomposition three-phase EPS simulation in real time and on an unlimited range with guaranteed accuracy. The information from the Simulator can be verified by using data only quasi-steady-state regime received from the SCADA and such Simulator can be applied as the standard model for verification any EPS simulation tools.

  19. How a Guaranteed Annual Income Could Put Food Banks Out of Business

    J.C. Herbert Emery


    the burden on the public health-care system. Canadian governments already spend billions of dollars on the downstream effects of poverty, but scant emphasis is put on programs targeting poverty’s roots. There is no evidence, where smaller-scale experiments have been tried, to show that a guaranteed income program creates a serious problem with negative incentives and discourages people from working who otherwise might. But because this is a common worry with working-age guaranteed income eligibility, phasing in the program gradually, by lowering eligibility a few years at a time, will allow ongoing investigation and analysis of the effects, before the program is rolled out on a large scale. The tremendous impact that guaranteed incomes have had on reducing poverty and improving health among seniors is something for which Canadians can be rightly proud. So much so that it is incumbent upon us to investigate whether Canada could use the same policy tools to drastically reduce poverty and improve health among Canadians of all ages.

  20. Learning from label proportions in brain-computer interfaces: Online unsupervised learning with guarantees

    Verhoeven, Thibault; Schmid, Konstantin; Müller, Klaus-Robert; Tangermann, Michael; Kindermans, Pieter-Jan


    Objective Using traditional approaches, a brain-computer interface (BCI) requires the collection of calibration data for new subjects prior to online use. Calibration time can be reduced or eliminated e.g., by subject-to-subject transfer of a pre-trained classifier or unsupervised adaptive classification methods which learn from scratch and adapt over time. While such heuristics work well in practice, none of them can provide theoretical guarantees. Our objective is to modify an event-related potential (ERP) paradigm to work in unison with the machine learning decoder, and thus to achieve a reliable unsupervised calibrationless decoding with a guarantee to recover the true class means. Method We introduce learning from label proportions (LLP) to the BCI community as a new unsupervised, and easy-to-implement classification approach for ERP-based BCIs. The LLP estimates the mean target and non-target responses based on known proportions of these two classes in different groups of the data. We present a visual ERP speller to meet the requirements of LLP. For evaluation, we ran simulations on artificially created data sets and conducted an online BCI study with 13 subjects performing a copy-spelling task. Results Theoretical considerations show that LLP is guaranteed to minimize the loss function similar to a corresponding supervised classifier. LLP performed well in simulations and in the online application, where 84.5% of characters were spelled correctly on average without prior calibration. Significance The continuously adapting LLP classifier is the first unsupervised decoder for ERP BCIs guaranteed to find the optimal decoder. This makes it an ideal solution to avoid tedious calibration sessions. Additionally, LLP works on complementary principles compared to existing unsupervised methods, opening the door for their further enhancement when combined with LLP. PMID:28407016




    Full Text Available In our country existed and exists still a constant concern to respect and guarantee human rights and fundamental freedoms, especially after 1989, when Romania became a member or acceding to international or regional treaties and conventions enshrining such rights. Taking into consideration the importance of respecting human rights, we consider that is necessary to research how they are secured in Romania, because only when these guarantees are known by their beneficiaries and those involved in their protection, actions which affect these values of humanity can be avoided. In human rights, rules of international law have priority over those entered in the domestic law if they contain provisions which may be interpreted differently on the same matter, unless the Constitution or national laws contain more favourable provisions.

  2. The fiduciary guarantee in the Romanian and European legal context

    Cornelia Lefter


    Full Text Available The importance of the fiduciary guarantee has not reached its full potential in the Romanian market, nor in the European area. The ongoing “dispute” between the fiduciary operations (familiar to the continental law and the trust (with its common -law heritage seems to be won by the latter. However, considering the express provisions on the fiduciary operations in the Romanian Civil Code entered into force in 2011, similar to the introduction of the same legal instrument in the French Civil Code in 2007, could give a boost to this ancient tool, present from the Roman era. Even if the European legal framework do not provide many rules on this institution, however, the Financial Collateral Directive raised many questions on how the fiduciary guarantees can be used in practice, and contributed to the change that followed in this area.

  3. Comparative Analysis of Minimum Income Guaranteed Schemes within the Member States of the European Union

    Simona Maria Stănescu


    Full Text Available The commitment of the European Union (EU Member States towards accomplishing the commonly agreed goals (1997 European Employment Strategy, Lisbon 2000, and Europe 2020 is supported by a continuous assessment of domestic social policy tendencies. From this perspective, the main goal of the paper is to comparatively analyse the last safety net for the most vulnerable people. The screening of guaranteed minimum resources provides an overview of the applicable statutory basis, schemes in place, types of social benefits concerned, financing and organisation mechanisms, eligibility conditions, duration and time limits. As methodology, the article uses the MISSOC database, and due to the current lack of comparable information, recommendations for further harmonisation are included. 20 of the EU member states follow the minimum income guaranteed (MIG regulations adopted already during the pre-accession period and updated after the accession phase. Seven types of domestic regulations are in force, among which the most frequent ones are acts and laws (ten countries. Common concepts used are social, and assistance. Provided allowances are mainly focused on elderly people, unemployment benefits, pensions, allowances supporting various house related costs, and benefits for disabled people. In line with 2007, 2010, and 2014 data, the financing of guaranteed minimum resources continues to remain mainly central with a shift in 2014 towards mixed financing (both central and local. The management in 2014 continues to be mainly centrally organised but the local stakeholders are also empowered. The residency is the most frequent eligibility condition. No nationality is required in 24 EU member states, for all allowances (21 countries or for particular ones (three countries. 17 member states require no age conditions. Unlimited guaranteed minimum resources were provided in 2014 as long as the eligibility criteria were met in 23 EU member states.

  4. Key issues

    Cook, N.G.W.


    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  5. Traffic Scheduling in WDM Passive Optical Network with Delay Guarantee


    WDM passive optical network becomes more favorable as the required bandwidth increases, but currently few media access control algorithms adapted to WDM access network. This paper presented a new scheduling algorithm for bandwidth sharing in WDM passive optical networks, which provides per-flow delay guarantee and supports variable-length packets scheduling. Through theoretical analysis and simulation, the end-to-end delay bound and throughput fairness of the algorithm was demonstrated.

  6. The Belgian deposit guarantee scheme in a European perspective

    Ch. Van Nieuwenhuyze; M. D. Zachary


    During the recent financial crisis, the deposit guarantee scheme in Belgium – as in other European countries – played a role in preventing bank runs and restoring confidence : to that end, the intervention ceilings were raised substantially and the scope of the scheme was extended to include certain life insurance policies. Finally, the expansion of the system’s coverage had to be financed by a sharp increase in the contributions from financial institutions. First of all, that measure had a p...

  7. H 2 guaranteed cost control of discrete linear systems

    Colmenares W.


    Full Text Available This paper presents necessary and sufficient conditions for the existence of a quadratically stabilizing output feedback controller which also assures H 2 guaranteed cost performance on a discrete linear uncertain system where the uncertainty is of the norm bounded type. The conditions are presented as a collection of linear matrix inequalities.The solution, however requires a search over a scalar parameter space.

  8. A general framework for performance guaranteed green data center networking

    Wang, Ting; Xia, Yu; Muppala, Jogesh; Hamdi, Mounir; Foufou, Sebti


    From the perspective of resource allocation and routing, this paper aims to save as much energy as possible in data center networks. We present a general framework, based on the blocking island paradigm, to try to maximize the network power conservation and minimize sacrifices of network performance and reliability. The bandwidth allocation mechanism together with power-aware routing algorithm achieve a bandwidth guaranteed tighter network. Besides, our fast efficient heuristics for allocatin...


    Diana-Loredana Jalbă


    Full Text Available In order to ensure the effective protection of human rights and provide for more than theoretical and illusory substantive rights, the need to define the right to a fair trial is emerging, along with the necessity that litigants become aware of the guarantees established by article 6 of the European Convention on Human Rights. Thus, the article aims to approach the ample issue regarding the litigants’ right to a fair civil trial in light of current legal regulations, and in particular, in light of the jurisprudence of the European Court of Human Rights. Given the fact that the right to a fair civil trial involves establishing, throughout the trial, a set of rules of procedure aimed at creating a balance between the parties in the process - the so-called guarantees of a fair trial - in her scientific pursuits, the author analyzes both explicit and implicit guarantees of fair trial, highlighting relevant European standards as well as their degree of implementation in the national (procedural law.

  10. Migratory timing, rate, routes and wintering areas of White-crested Elaenia (Elaenia albiceps chilensis, a key seed disperser for Patagonian forest regeneration.

    Susana Patricia Bravo

    Full Text Available Migratory animals often play key ecological roles within the communities they visit throughout their annual journeys. As a consequence of the links between biomes mediated by migrants, changes in one biome could affect remote areas in unpredictable ways. Migratory routes and timing of most Neotropical austral migrants, which breed at south temperate latitudes of South America and overwinter closer to or within tropical latitudes of South America, have yet to be described in detail. As a result, our understanding about how these birds provide links between South American biomes is almost non-existent. White-crested Elaenia (Elaenia albiceps chilensis is a long-distance austral migrant that breeds in the Patagonian Forest biome and overwinters in tropical South America. Because this small flycatcher plays a key role in the regeneration of this ecosystem, our objective was to describe the annual cycle of White-crested elaenias to evaluate the degree of migratory connectivity between breeding and wintering areas and therefore to determine if there are specific biomes of northern South America linked by elaenias to Patagonian forests. Fifteen individuals were successfully tracked throughout a complete migration cycle using miniature light-level geolocators. All individuals resided and moved through the same general regions. During fall (March-April-May, elaenias were located in the Caatinga and the Atlantic Forest biomes, from Rio de Janeiro to the region near Salvador da Bahia, Brazil. During winter (June-July-Aug., birds were located further inland, within the Cerrado biome. Birds used three different routes during fall migration. Our results indicate that some individuals use a direct route, flying between 500-600 km/day, crossing desert and grasslands, while others took a detour, flying 100-200 km/day through forested areas with refueling opportunities. All birds used the Yunga forest during spring migration, with ten out of 15 individuals

  11. A dynamic re-partitioning strategy based on the distribution of key in Spark

    Zhang, Tianyu; Lian, Xin


    Spark is a memory-based distributed data processing framework, has the ability of processing massive data and becomes a focus in Big Data. But the performance of Spark Shuffle depends on the distribution of data. The naive Hash partition function of Spark can not guarantee load balancing when data is skewed. The time of job is affected by the node which has more data to process. In order to handle this problem, dynamic sampling is used. In the process of task execution, histogram is used to count the key frequency distribution of each node, and then generate the global key frequency distribution. After analyzing the distribution of key, load balance of data partition is achieved. Results show that the Dynamic Re-Partitioning function is better than the default Hash partition, Fine Partition and the Balanced-Schedule strategy, it can reduce the execution time of the task and improve the efficiency of the whole cluster.

  12. A Criteria Standard for Conflict Resolution: A Vision for Guaranteeing the Safety of Self-Separation in NextGen

    Munoz, Cesar; Butler, Ricky; Narkawicz, Anthony; Maddalon, Jeffrey; Hagen, George


    Distributed approaches for conflict resolution rely on analyzing the behavior of each aircraft to ensure that system-wide safety properties are maintained. This paper presents the criteria method, which increases the quality and efficiency of a safety assurance analysis for distributed air traffic concepts. The criteria standard is shown to provide two key safety properties: safe separation when only one aircraft maneuvers and safe separation when both aircraft maneuver at the same time. This approach is complemented with strong guarantees of correct operation through formal verification. To show that an algorithm is correct, i.e., that it always meets its specified safety property, one must only show that the algorithm satisfies the criteria. Once this is done, then the algorithm inherits the safety properties of the criteria. An important consequence of this approach is that there is no requirement that both aircraft execute the same conflict resolution algorithm. Therefore, the criteria approach allows different avionics manufacturers or even different airlines to use different algorithms, each optimized according to their own proprietary concerns.

  13. Changes in Reef Fish Abundances Associated with the Introduction of Indo-Pacific Lionfish to the Florida Keys National Marine Sanctuary: a Twenty Year Time Series.

    Hepner, M.; Muller-Karger, F. E.; Gittings, S.; Stallings, C.


    The Marine Biodiversity Observation Network (MBON) is a partnership between academic, private, and government researchers seeking to understand how marine biodiversity changes over long periods of time. In this context, a study of the multi-agency Reef Visual Census (RVC) data, collected over twenty years in the Florida Keys National Marine Sanctuary (FKNMS), was analyzed to measure possible changes in reef fish abundances as a result of possible predation by lionfish predation or due to related trophic cascading. Lionfish were first sighted in the FKNMS in January 2009, with abundances and frequency of occurrence increasing three to six fold throughout the sanctuary by 2011. Their high consumption rates of smaller fish, coupled with their rapidly increasing densities may be having a significant effect on coral reef fish communities. The study compares the natural variability in reef fish abundances from 1994-2009 in the FKNMS, 15 years prior to the first lionfish detected in the sanctuary, to changes in reef fish abundances 5 years after the invasion. The MBON project also aims to develop environmental DNA (eDNA) technology for conducting biodiversity assessments. eDNA is an emerging technique that seeks to quantify biodiversity in an area by obtaining genetic material directly from environmental samples (soil, sediment, water, etc.) without any obvious signs of biological source material. All marine organisms shed DNA into their surrounding habitat, leaving a "fingerprint." Similar to forensic science, the DNA can be collected from seawater and analyzed to determine what species were recently present. The MBON team is evaluating whether eDNA can be used to adequately monitor reef fish biodiversity in coral reef ecosystems. We will compare species detected in our samples to the taxonomic composition of reef fish communities at the sample site as recorded over the past twenty years in the Reef Visual Census data.

  14. Can the household sector reduce global warming mitigation costs? sensitivity to key parameters in a TIMES techno-economic energy model

    Astudillo, Miguel F.; Vaillancourt, Kathleen; Pineau, Pierre-Olivier; Amor, Ben


    Highlights: •An energy system model of Quebec is combined with building simulation software. •Greenhouse gas emission reductions efforts increase annual electricity peak demand. •Alternative heating tech. And building envelopes can effectively reduce peak demand. •Denser urban developments massively reduced costs of global warming mitigation. •CO 2 emissions from hydropower reservoirs are relevant in global warming mitigation. -- Abstract: The transition to low carbon societies may increase peak electricity demand, which can be costly to supply with renewable energy, whose availability is uncertain. Buildings are often the main cause of peak demand, and they are believed to hold a large unrealised energy-efficiency potential. If realised, this potential could considerably mitigate the transition costs to low carbon societies, reducing average and peak electricity demands. We explore this potential in several cost-optimal global warming (GW) mitigation scenarios using a multi-sector TIMES energy system model of the province of Quebec for the period 2011–2050. Heating and conservation measures in the residential sector are modelled using building simulations and parameters’ values from the literature. The intra-annual availability of renewable energy and electricity imports is derived from time-series analysis. Additionally, the influence of key parameters such as the projections of primary energy demand and emissions from reservoir impoundment is evaluated. Finally, we discuss some of the barriers that could hamper the energy transition and how they can be overcome. Results indicate that peak demand would rise by 30% due to GW mitigation efforts, but it can be effectively reduced by interventions in the residential sector. Heat pumps are the most cost effective heating technology, despite their lower efficiencies in cold climates. Better-insulated building envelopes have an important role in new houses, reducing by 14% the GW mitigation costs and


    Green, Joel D.; Evans, Neal J. II; Rascati, Michelle R. [Department of Astronomy, University of Texas at Austin, 2515 Speedway, Stop C1400, Austin, TX 78712-1205 (United States); Jorgensen, Jes K.; Dionatos, Odysseas; Lindberg, Johan E. [Niels Bohr Institute, University of Copenhagen, DK-2100 Copenhagen (Denmark); Herczeg, Gregory J. [Kavli Institute for Astronomy and Astrophysics, Peking University, Beijing 100871 (China); Kristensen, Lars E.; Yildiz, Umut A.; Van Kempen, Tim A. [Leiden Observatory, Leiden University, P.O. Box 9513, 2300-RA Leiden (Netherlands); Lee, Jeong-Eun [Department of Astronomy and Space Science, Kyung Hee University, Gyeonggi 446-701 (Korea, Republic of); Salyk, Colette [National Optical Astronomy Observatory, 950 North Cherry Avenue, Tucson, AZ 85719 (United States); Meeus, Gwendolyn [Dpt. Fisica Teorica, Universidad Autonoma de Madrid, Campus Cantoblanco, E-28049 Madrid (Spain); Bouwman, Jeroen [Max Planck Institute for Astronomy, D-69117 Heidelberg (Germany); Visser, Ruud; Bergin, Edwin A. [Department of Astronomy, University of Michigan, 500 Church Street, Ann Arbor, MI 48109-1042 (United States); Van Dishoeck, Ewine F.; Karska, Agata; Fedele, Davide [Max-Planck Institute for Extraterrestrial Physics, Postfach 1312, D-85741 Garching (Germany); Dunham, Michael M., E-mail: [Department of Astronomy, Yale University, New Haven, CT 06511 (United States); Collaboration: DIGIT Team1


    We present 50-210 {mu}m spectral scans of 30 Class 0/I protostellar sources, obtained with Herschel-PACS, and 0.5-1000 {mu}m spectral energy distributions, as part of the Dust, Ice, and Gas in Time Key Program. Some sources exhibit up to 75 H{sub 2}O lines ranging in excitation energy from 100 to 2000 K, 12 transitions of OH, and CO rotational lines ranging from J = 14 {yields} 13 up to J = 40 {yields} 39. [O I] is detected in all but one source in the entire sample; among the sources with detectable [O I] are two very low luminosity objects. The mean 63/145 {mu}m [O I] flux ratio is 17.2 {+-} 9.2. The [O I] 63 {mu}m line correlates with L{sub bol}, but not with the time-averaged outflow rate derived from low-J CO maps. [C II] emission is in general not local to the source. The sample L{sub bol} increased by 1.25 (1.06) and T{sub bol} decreased to 0.96 (0.96) of mean (median) values with the inclusion of the Herschel data. Most CO rotational diagrams are characterized by two optically thin components ( = (0.70 {+-} 1.12) x 10{sup 49} total particles). N{sub CO} correlates strongly with L{sub bol}, but neither T{sub rot} nor N{sub CO}(warm)/N{sub CO}(hot) correlates with L{sub bol}, suggesting that the total excited gas is related to the current source luminosity, but that the excitation is primarily determined by the physics of the interaction (e.g., UV-heating/shocks). Rotational temperatures for H{sub 2}O ( = 194 +/- 85 K) and OH ( = 183 +/- 117 K) are generally lower than for CO, and much of the scatter in the observations about the best fit is attributed to differences in excitation conditions and optical depths among the detected lines.

  16. Organic Law Of Judicial Guarantees And Constitutional Control

    Ernesto López Freire


    Full Text Available This paper demonstrates the various unconstitutional and fallacies of the Organic Law of Judicial guarantees and Constitutional Control. For that, there will be a comprehensive collation between the mentioned law and the Constitution of the Republic of Ecuador and force. Through this analysis shows a lack of knowledge of Ecuadorian law or legal science by their authors. This study elucidated, inter alia, the inconsistencies in matters relating to the interpretation of constitutional provisions, full compensation, material and integral; challenge administrative acts, judicial unit.

  17. Guarantee of Criminal Policy as Limited to Criminal Decisionism

    María Belén Bonilla Albán


    Full Text Available The essay explains how the inclusion of the security of public policy in the 2008 Constitution of Ecuador as part of the constitutional state of law and justice or “guarantor state” can become a substantial limit for criminal decisionism, which is usually behind the penal policy in Latin America. Thus, the function of this collateral is to eliminate the huge space of discretion in the management of the most sensitive policy of modern state penal policy. However, the guarantee of public policy is not clear in determining the limits of punitive power; therefore, this paper seeks to explore some of the international human rights.

  18. [Living wills in a nursing home, guaranteeing freedom of expression].

    Marigard Guyader, Céline; Richard, Christian

    The drawing up of a living will in a nursing home for elderly people is a complex process. Not only must the resident think about the end of life, which is not easy, but the institution must be fully aware of the law. Guaranteeing the resident's expression is essential. A study enabled this subject to be reviewed in a nursing home where different players are present around the resident. It enabled professionals to reflect on their practices. Copyright © 2018 Elsevier Masson SAS. All rights reserved.

  19. An Optimal Turkish Private Pension Plan with a Guarantee Feature

    Ayşegül İşcanog̃lu-Çekiç


    Full Text Available The Turkish Private Pension System is an investment system which aims to generate income for future consumption. This is a volunteer system, and the contributions are held in individual portfolios. Therefore, management of the funds is an important issue for both the participants and the insurance company. In this study, we propose an optimal private pension plan with a guarantee feature that is based on Constant Proportion Portfolio Insurance (CPPI. We derive a closed form formula for the optimal strategy with the help of dynamic programming. Moreover, our model is evaluated with numerical examples, and we compare its performance by implementing a sensitivity analysis.

  20. Adaptation of failure scenario based resilience schemes toward availability guarantees

    Scheffel, Matthias


    Various resilience schemes have been proposed to allow for fault-tolerant transport networks. Their common aim is to survive certain failure patterns such as node or span failures by providing alternative transmission paths. However, network operators guarantee the resulting network reliability in terms of service availability to their business customers. A maximum duration of service disruption per year must not be exceeded. We investigate an optimal design of resilient network configurations that adapts to end-to-end availability requirements. We formulate an integer linear program that minimizes the resource utilization and investigate a case study.

  1. The Minimum Price Guarantee Policy before and after Real Plan

    Jackelline Favro


    Full Text Available This study aims to analyze the performance of the Minimum Price Guarantee Policy - MPGPin Brazil for the main agricultural products, during the 1980s and 1990s, and especially the post-Real Plan period. The research has a bibliographic and descriptive nature. The main results showed that the MPGP remains an important tool for ensuring income to farmers and the supply of selected crops in the analyzed period, but there was a reduction of public action for the new MPGP and new private instruments has revealed efficiency

  2. Human and Citizen Rights Guarantees While Providing Information Security

    Serhii Yesimov


    Full Text Available With the development of information and communication technologies, issues of providing information security are becoming more and more aggravated. These are crimes related to the use of electronic computers, systems and computer networks and telecommunication networks, the propaganda of separatism and extremism, etc. While providing information security in the digital environment, the role of technical and legal human rights guarantees, due to technical means of protection, is increasing. Relying on the developers of technical means of protection determines the difference between the aforesaid concepts and the traditional approach to ensuring the protection of human and citizen rights, in which responsibilities are put on information intermediaries, owners of confidential information. Technical guarantees of human rights are a necessary component of ensuring information security, but the effectiveness of the application is provided in conjunction with the legal guarantees of human rights, as evidenced by the tendency to recognize the principles of inviolability of privacy on the basis of design decisions in the law of the European Union as legal acts. Providing information security is a legitimate goal of establishing constraints of human rights, since it can be correlated with the norms of international law. The establishment of constraints of human rights is permissible in order to attain other objectives–ensuring state security, public order, health, rights and freedoms of the person in the information sphere. The legitimacy of this goal is determined by its compliance with the objectives envisaged by international agreements ratified in an established order. The article examines the impact of the use of technical means in the field of providing information security in the aspect of following the fundamental human and civil rights in Ukraine, taking into account the legislation of the European Union and the decision of the European Court

  3. Rapid turns in European renewable energy policy: advocacy and framing of the proposed trading of guarantees of origin

    Nilsson, Maans; Nilsson, Lars J.; Ericsson, Karin


    The EU has assumed ambitious targets and strategies for the promotion of renewable sources of energy (RES) binding to all its member states. This report sets out to examine the proposed EU-wide policy instrument designed to help achieve the targets on renewable electricity and heat - the trading of Guarantees of Origin (GO). It analyses the fate of the GO trading proposal in the European policy-making machinery during 2007 and 2008. It first discusses its origins, key components and points of contention, and then examines key factors behind the policy development leading first to its development and subsequently to its abandonment in 2008. Addressing these factors, the report explores first the near-term policy-making process before and after the proposal on GO trading was tabled in January 2008, focusing on processes in the European bureaucracy and how they were influenced by different interest groups and member state governments. It then takes a step back and looks at how competing policy frames over time have shaped the GO instrument debate. Results show how a strong internal market frame acted as a primary driving force in the Commission throughout the 2000s to promote the GO trading instrument. The subsequent collapse of the GO trading proposal can be largely attributed to a) the lack of a strong lobby in favour of GO, b) the accumulated experience with and institutionalisation of national RES support policy, and c) growing general political concerns for supply security, innovation and competitiveness. In the end, the fall of the GO trading instrument is indicative of how the underlying political battle line between advocates of the European internal market and guardians of national interests has moved in favour of the latter in recent years. (author). refs

  4. Definition of the key target volume in radiosurgical management of arteriovenous malformations: a new dynamic concept based on angiographic circulation time.

    Valle, Ramiro Del; Zenteno, Marco; Jaramillo, José; Lee, Angel; De Anda, Salvador


    The cumulative experience worldwide indicates complete radiosurgical obliteration rates of brain arteriovenous malformations (AVMs) ranging from 35 to 90%. The purpose of this study was to propose a strategy to increase the obliteration rate for AVMs through the dynamic definition of the key target volume (KTV). A prospective series of patients harboring an AVM was assessed using digital subtraction angiography in which a digital counter was used to measure the several stages of the frame-by-frame circulation time. All the patients were analyzed using dynamic measurement planning to define the KTV, corresponding to the volume of the shunt with the least vascular resistance and the earliest venous drainage. All patients underwent catheter-based angiography, a subgroup was additionally assessed by means of a superselective catheterization, and among these a further subgroup received embolization. The shunts were also categorized according to their angioarchitectural type: fistulous, plexiform, or mixed. The authors applied the radiosurgery-based grading system (RBGS) as well to find a correlation with the obliteration rate. This series includes 44 patients treated by radiosurgery; global angiography was performed for all patients, including dynamic measurement planning. Eighty-four percent of them underwent superselective catheterization, and 50% of the total population underwent embolization. In the embolized arm of the study, the pretreatment volume was up to 120 ml. In patients with a single treatment, the mean volume was 8.5 ml, and the median volume was 6.95 +/- 4.56 ml (mean +/- standard deviation), with a KTV of up to 15 ml. For prospectively staged radiosurgery, the mean KTV was 28 ml. The marginal radiation dose was 18-22 Gy, with a mean of dose 20 Gy. The mean RBGS score was 1.70. The overall obliteration rate was 91%, including the repeated radiosurgery group (4 patients), in which 100% showed complete obliteration. The overall permanent deficit was 2 of

  5. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres


    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  6. Field test of a continuous-variable quantum key distribution prototype

    Fossier, S; Debuisschert, T; Diamanti, E; Villing, A; Tualle-Brouri, R; Grangier, P


    We have designed and realized a prototype that implements a continuous-variable quantum key distribution (QKD) protocol based on coherent states and reverse reconciliation. The system uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation. The security of the system is guaranteed against general coherent eavesdropping attacks. The performance of the prototype was tested over preinstalled optical fibres as part of a quantum cryptography network combining different QKD technologies. The stable and automatic operation of the prototype over 57 h yielded an average secret key distribution rate of 8 kbit s -1 over a 3 dB loss optical fibre, including the key extraction process and all quantum and classical communication. This system is therefore ideal for securing communications in metropolitan size networks with high-speed requirements.

  7. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    Molotkov, S. N.


    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ∼ 20%) and dark count probability (p dark ∼ 10 -7 )

  8. 7 CFR 1738.30 - Rural broadband access loans and loan guarantees.


    ... interest at a rate set by the lender consistent with the current applicable market rate for a loan of... Derivative or any Guaranteed-Amount Debt Derivative; or (B) Any holder of the Guaranteed Loan Note or any Guaranteed Loan Portion Note or any Derivative, as the case may be, having a claim to payments on the...

  9. 13 CFR 120.521 - What interest rate applies after SBA purchases its guaranteed portion?


    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What interest rate applies after... 504 Loans Sba's Purchase of A Guaranteed Portion § 120.521 What interest rate applies after SBA purchases its guaranteed portion? When SBA purchases the guaranteed portion of a fixed interest rate loan...

  10. 13 CFR 120.620 - SBA guarantee of a Pool Certificate.


    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false SBA guarantee of a Pool Certificate. 120.620 Section 120.620 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Secondary Market The Sba Guarantee of A Certificate § 120.620 SBA guarantee of a Pool Certificate...

  11. 13 CFR 120.621 - SBA guarantee of an Individual Certificate.


    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false SBA guarantee of an Individual Certificate. 120.621 Section 120.621 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Secondary Market The Sba Guarantee of A Certificate § 120.621 SBA guarantee of an Individual...


    Eugen Dijmarescu


    Full Text Available Deposit Guarantee Schemes (DGS become more visible under the current conditions of the world financial markets. If those have played in the past a rather discreet role for social stability through the function of pay box following a bank failure, the recent crisis put them in a new light, once the guarantee ceiling for eligible deposits grew in order to make for the accumulation of wealth worldwide and the increased risk incurred by the leverage of banking operations. Consequently, the resources accumulated by the DGS from the member banks and their proper management make possible their involvement in pre-emptive actions aimed to avoid bankruptcies via special administration and purchase of assets and assumption of liabilities. These new attributes give DGS a role in the mechanism of financial safety-net, along the supervisors of the market. Hence, an increased preoccupation for applied corporate governance has developed and Core Principles for Effective Deposit Insurance Systems have been adopted by the Basel Committee on Banking Supervision together with International Association of Deposit Insurers. Concurrently, the EU Commission has put forward a process for reviewing the Directives 94/39 and 09/14 EC, in order to make the European DGS more prepared to deal with above mentioned issues and bestow increased confidence upon depositors.

  13. Incentive-compatible guaranteed renewable health insurance premiums.

    Herring, Bradley; Pauly, Mark V


    Theoretical models of guaranteed renewable insurance display front-loaded premium schedules. Such schedules both cover lifetime total claims of low-risk and high-risk individuals and provide an incentive for those who remain low-risk to continue to purchase the policy. Questions have been raised of whether actual individual insurance markets in the US approximate the behavior predicted by these models, both because young consumers may not be able to "afford" front-loading and because insurers may behave strategically in ways that erode the value of protection against risk reclassification. In this paper, the optimal competitive age-based premium schedule for a benchmark guaranteed renewable health insurance policy is estimated using medical expenditure data. Several factors are shown to reduce the amount of front-loading necessary. Indeed, the resulting optimal premium path increases with age. Actual premium paths exhibited by purchasers of individual insurance are close to the optimal renewable schedule we estimate. Finally, consumer utility associated with the feature is examined.

  14. On the Guarantee of the Realization of the Right to Education

    Elena A. Kashtanova


    Full Text Available The article reveals the issues of the essence and content of the guarantee of the realization of the right to education, the system of guarantees for the implementation of constitutional and legal principles and norms, including those that consolidate the system of rights and freedoms of human and citizen. The Author examines the functions of guarantee (stimulating, law enforcement and law enforcement, analyzes types of guaranteesguarantees related to the very right to education and quality of education.​

  15. Key World Energy Statistics



    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  16. Basic income guarantee: a review of implications for oral health.

    Chen, Yi-An; Quiñonez, Carlos


    To: a) Familiarize readers with the concept of a basic income guarantee (BIG) and its different forms; b) Consider how BIG could improve oral health and decrease oral health disparities; c) Motivate readers to advocate for the evaluation of oral health outcomes in BIG experiments. Published articles and book chapters that have analyzed and reviewed data from past BIG pilot projects were examined for their findings on health and socioeconomic outcomes. Our findings suggest various areas and mechanisms whereby BIG can influence oral health-related outcomes, whether through impacts on work, illness and injury, education, a social multiplier effect, expenditure behavior, and/or mental illness and other health outcomes. Our findings illustrate the importance of assessing oral health-related outcomes in future BIG pilot projects. © 2017 American Association of Public Health Dentistry.

  17. Is biomass always a renewable fuel as guaranteed?

    Veski, Rein


    alternative electric energy must be energy which is not produced from oil shale. TheLong-Term Development Plan for the Estonian Fuel and Energy Sector includes such misleading terms as peat, wood and renewable energy resources, biofuels and peat. However, there are also quite correct phrases such as peat, wood and other renewable natural resources, as wood and other biofuels are renewable natural resources. As a rule, wood and wood waste, energy cultures, agricultural, woodpulp and paper industry waste, as well as solid animal breeding and household waste, and also peat are classified as biomass in many countries. Biomass seems to be a more convenient term instead of renewable biofuel. In most statements it is with no doubt classified as renewable resource, while biofuels are not because fossil fuels are also biofuels (or fuels of biological origin) and they are renewable only to a very limited extent. Fossil fuels originated in sapropel and peat, oil and natural gas from dispersed organic matter, too. So, their recovery depends on the speed of accumulation of organic carbon in recent sediments. The recovery should not be a question of what somebody believes in or not. It must not be a 'religious' question but a purely scientific and methodological issue. There is only one condition when a fuel (or biomass as one type of biofuel) is renewable: biomass or biofuel may be considered renewable if they are replenished at a rate which is comparable to the rate at which they are consumed in a country or part of it (on an island, for example). The overused amount is a non-renewable biomass or biofuel. So, the replenishment of biomass or biofuel is not guaranteed. Biomass and other biofuels, including fossil ones, are products of the activity of the sun. There are also other, non-fuel types of energy such as water and wind energy, as well as solar and geothermal energy. They are also considered renewable energy resources as is biomass. All these types of energy (except, may be, the

  18. Guaranteeing the implementation of guarantees of origin: Creating a fair mechanism for renewable electricity generation and trade in europe

    Houwing; Michiel; Vries, Laurens J. de


    With the Renewables Directive (2001/77/EC) the EU has obliged its Member States to implement the Guarantees of Origin (GO) policy instrument into their national renewable electricity support schemes. Compared to formerly existing policy instruments as tradable green certificates, GOs can in a Union broad quota obligation scheme, for example, prove to be of major value in arriving at a more transparent and efficient way of trading renewable electricity. This paper gives an overview of the most important hurdles still to be addressed, mainly being double counting issues and policy interactions. When more clarity is given from the Commission in the future and when more EU Member States implement GOs beyond the minimum requirements, international trading of renewable electricity can become truly feasible. (Author)

  19. Modeling Message Queueing Services with Reliability Guarantee in Cloud Computing Environment Using Colored Petri Nets

    Jing Li


    Full Text Available Motivated by the need for loosely coupled and asynchronous dissemination of information, message queues are widely used in large-scale application areas. With the advent of virtualization technology, cloud-based message queueing services (CMQSs with distributed computing and storage are widely adopted to improve availability, scalability, and reliability; however, a critical issue is its performance and the quality of service (QoS. While numerous approaches evaluating system performance are available, there is no modeling approach for estimating and analyzing the performance of CMQSs. In this paper, we employ both the analytical and simulation modeling to address the performance of CMQSs with reliability guarantee. We present a visibility-based modeling approach (VMA for simulation model using colored Petri nets (CPN. Our model incorporates the important features of message queueing services in the cloud such as replication, message consistency, resource virtualization, and especially the mechanism named visibility timeout which is adopted in the services to guarantee system reliability. Finally, we evaluate our model through different experiments under varied scenarios to obtain important performance metrics such as total message delivery time, waiting number, and components utilization. Our results reveal considerable insights into resource scheduling and system configuration for service providers to estimate and gain performance optimization.

  20. Vertical Handover Algorithm for WBANs in Ubiquitous Healthcare with Quality of Service Guarantees

    Dong Doan Van


    Full Text Available Recently, Wireless Body Area Networks (WBANs have become an emerging technology in healthcare, where patients are equipped withwearable and implantable body sensor nodes to gather sensory information for remote monitoring. The increasing development of coordinator devices on patients enables the internetworking of WBANs in heterogeneous wireless networks to deliver physiological information that is collected at remote terminals in a timely fashion. However, in this type of network, providing a seamless handover with a guaranteed Quality of Service (QoS, especially emergency services, is a challenging task. In this paper, we proposed an effective Multi-Attribute Decision-Making (MADM handover algorithm that guarantees seamless connectivity. A patient’s mobile devices automatically connect to the best network that fulfills the QoS requirements of different types of applications. Additionally, we integrated a Content-Centric Networking (CCN processing module into different wireless networks to reduce packet loss, enhance QoS and avoid unnecessary handovers by leveraging in-network caching to achieve efficient content dissemination for ubiquitous healthcare. Simulation results proved that our proposed approach forthe model with CCN outperforms the model without CCN and Received Signal Strength Vertical Handoff (RSS-VHD in terms of the number of handovers, enhancing QoS, packet loss, and energy efficiency.

  1. Activation/modulation of adaptive immunity emerges simultaneously after 17DD yellow fever first-time vaccination: is this the key to prevent severe adverse reactions following immunization?

    Martins, M A; Silva, M L; Marciano, A P V; Peruhype-Magalhães, V; Eloi-Santos, S M; Ribeiro, j G L; Correa-Oliveira, R; Homma, A; Kroon, E G; Teixeira-Carvalho, A; Martins-Filho, O A


    Over past decades the 17DD yellow fever vaccine has proved to be effective in controlling yellow fever and promises to be a vaccine vector for other diseases, but the cellular and molecular mechanisms by which it elicits such broad-based immunity are still unclear. In this study we describe a detailed phenotypic investigation of major and minor peripheral blood lymphocyte subpopulations aimed at characterizing the kinetics of the adaptive immune response following primary 17DD vaccination. Our major finding is a decreased frequency of circulating CD19+ cells at day 7 followed by emerging activation/modulation phenotypic features (CD19+interleukin(IL)10R+/CD19+CD32+) at day 15. Increased frequency of CD4+human leucocyte antigen D-related(HLA-DR+) at day 7 and CD8+HLA-DR+ at day 30 suggest distinct kinetics of T cell activation, with CD4+ T cells being activated early and CD8+ T cells representing a later event following 17DD vaccination. Up-regulation of modulatory features on CD4+ and CD8+ cells at day 15 seems to be the key event leading to lower frequency of CD38+ T cells at day 30. Taken together, our findings demonstrate the co-existence of phenotypic features associated with activation events and modulatory pathways. Positive correlations between CD4+HLA-DR+ cells and CD4+CD25high regulatory T cells and the association between the type 0 chemokine receptor CCR2 and the activation status of CD4+ and CD8+ cells further support this hypothesis. We hypothesize that this controlled microenviroment seems to be the key to prevent the development of serious adverse events, and even deaths, associated with the 17DD vaccine reported in the literature.

  2. Psychology of nuclear safeguards. [Cannot guarantee preventing diversion, only deter

    Parker, L


    There is an essential confusion in the way we look at safeguards. They cannot guarantee to prevent diversions: at best, they can deter. While successful acts of deterrence pass unnoticed, failures will be widely publicized. Therefore, we will judge safeguards systems not on a fair balance between their successes and failures, but exclusively on what we believe to be their failures. Effectively, we will be demanding an impossibly high standard of performance, and safeguards authorities will be tempted to conceal diversions rather than disappoint our expectations. Perhaps it is appropriate that safeguards are primarily psychological instruments: Parker argues that their essence is credibility, and that this does not necessarily depend on the hard reality of their performance. Brian Johnson claimed (New Scientist, vol 74, p 189) that safeguards have engendered a sense of security by linking the commitment of many states not to develop nuclear weapons, and that the Non-Proliferation Treaty has helped condition domestic political attitudes against starting up nuclear weapons programs. Perhaps the common view that safeguards are legal instruments has served the psychological purpose of supplying a language in which states with widely differing interests can explore the fundamental incompatibility between non-proliferation and the search for convenient energy sources. If this is true then it cannot be said that the NPT is a failure, merely that its success does not correspond to its apparent purposes.


    Adelin Mihai ZĂGĂRIN


    Full Text Available The present article deals with the aspects of motivating administrative acts, both doctrinaire and practical, of jurisprudence. The duty of the administration to motivate its decisions is submitted in the Charter of Fundamental Rights of the European Union, art. 41. In the current European legal order, the rationale for administrative acts is considered and refers to one of the most important conditions of validity of the administrative act. The Romanian Constitution ensures and emphasizes the motivation, as it is imposed by the Charter. The realization of this fundamental right to motivate administrative acts is possible by calling upon a set of values from the administration, such as transparency, professionalism and the imposition of high quality standards. Motivation is achieved where we have a good administration, and whether citizens are, among other things, respected fundamental rights and freedoms, access to information is guaranteed and motivated their decisions. Although administrative normative acts are motivated by the administration, examples that show that individual ones are unmotivated or incompletely motivated are enough, which made the various employers legally answer for the non-motivation of their decisions to terminate work relationships with several of the employees. The motivation of administrative acts is necessary, mandatory and must be done with rigor. It is highlighted that inadequate, incomplete or vicious reasoning may result in suspension or even annulment of the administrative act by the court.


    O.I. Pechonik


    Full Text Available In world banking practice it is considered that it is better to solve the problem of one bank, rather than arouse the mass impressment of deposits, generating the effect of spreading the disease onto the other credit institutions. In our conditions the process of spreading was specifically reflected in flowing the financial resources of people out of the commercial banks into Sberbank, that shortened drawn resources of other banks, lowed their financial steadiness. The decision of this problem demands conducting aim-oriented policy on the safe-keeping of funds of individuals and organizations in all commercial banks. In other words, the system of deposits insurance is needed, which is based on the necessary participation of all banks and credit organizations, drawing money resources into deposits. But the legislation we have nowadays does not allow to provide in full measure the demanded guarantees to depositors, to form real mechanism of bank liquidity crisis and mass impressments of financial resources by the depositors prevention in case of negative economic market or bankruptcy.

  5. Residence time as a key for comprehensive assessment of the relationship between changing land use and nitrates in regional groundwater systems.

    Cao, Yingjie; Tang, Changyuan; Song, Xianfang; Liu, Changming; Zhang, Yinghua


    In this study, an approach is put forward to study the relationship between changing land use and groundwater nitrate contamination in the Sanjiang Plain. This approach emphasizes the importance of groundwater residence time when relating the nitrates to the changing land use. The principles underlying the approach involve the assessment of groundwater residence time by CFCs and the Vogel age model and the reconstruction of the land use at the groundwater recharge time by interpolation. Nitrate trend analysis shows that nitrates have begun to leach into the aquifers since agricultural activities boomed after the 1950s. Hydrochemical analysis implies that the possible process relating to the nitrate reduction in the groundwater is the oxidation of Fe(ii)-silicates. However, the chemical kinetics of the oxidation of Fe(ii)-silicates is slow, so this denitrification process contributes little to the nitrate variations. Stepwise regression shows that the nitrate concentrations of samples had no direct relationship with the land use at the groundwater sampling time, but had a relatively strong relationship with the land use at the groundwater recharge time. Dry land is recognized as the dominant factor contributing to the elevated concentration of nitrates. The nitrogen isotope for nitrate (δ(15)N-NO3) gives a more direct result of the identification of nitrate sources: the use of manure in agricultural activities. Principle component (PC) regression shows that the process of the dry land exploitation is the major process that controls the nitrate contamination in the Sanjiang Plain.

  6. 78 FR 8353 - Rural Broadband Access Loans and Loan Guarantees


    ... outsourcing specialized medical procedures. One study of 24 rural hospitals placed the annual cost of not... a key to economic growth. For rural businesses, broadband gives access to national and international...

  7. Abscisic acid (ABA) and key proteins in its perception and signaling pathways are ancient, but their roles have changed through time.

    Sussmilch, Frances C; Atallah, Nadia M; Brodribb, Timothy J; Banks, Jo Ann; McAdam, Scott A M


    Homologs of the Arabidopsis core abscisic acid (ABA) signaling component OPEN STOMATA1 (OST1) are best known for their role in closing stomata in angiosperm species. We recently characterized a fern OST1 homolog, GAMETOPHYTES ABA INSENSITIVE ON ANTHERDIOGEN 1 (GAIA1), which is not required for stomatal closure in ferns, consistent with physiologic evidence that shows the stomata of these plants respond passively to changes in leaf water status. Instead, gaia1 mutants reveal a critical role in ABA signaling for spore dormancy and sex determination, in a system regulated by antagonism between ABA and the gibberellin (GA)-derived fern hormone antheridiogen (A CE ). ABA and key proteins, including ABA receptors from the PYR/PYL/RCAR family and negative regulators of ABA-signaling from Group A of the type-2C protein phosphatases (PP2Cs), in addition to OST1 homologs, can be found in all terrestrial land plant lineages, ranging from liverworts that lack stomata, to angiosperms. As land plants have evolved and diversified over the past 450 million years, so too have the roles of this important plant hormone and the genes involved in its signaling and perception.


    Sarigul, Hasmet


    Credit guarantee schemes assist banks in lending to SMEs by overcoming collateral problems. The guarantees are used to share the risk between the bank and the guarantee institution in an agreed ratio. Thus, the bank’s risk and operation costs are lowered and its returns increased. This encourages banks to lend to SMEs who are unable to provide adequate collateral. In our study, we investigate the relationship between SMEs, banks and CGSs. We also aimed to explain the functioning of CGSs...

  9. Financial guarantee for decommissioning and nuclear waste management activities at OPG

    Van den Hengel, J.


    This paper provides an overview on the establishment and maintenance of a financial guarantee for decommissioning and nuclear waste management activities at Ontario Power Generation (OPG) in accordance with CNSC requirements. The process and timelines are documented leading to the establishment of the guarantee effective July 31, 2003. Reference plans, cost estimates, funding mechanisms and reporting mechanisms are summarized. The renewal process projected at the end of the 5-year initial financial guarantee period is also included. (author)

  10. Tajik Republican Waste Disposal Site (Radon) is guarantee of weapons of mass destruction nonproliferation

    Krivopuskov, G.S.; Salomov, Dzh.A.


    political economic systems led to RWDS formally remained alone with all its problems. Only in 1994 by Government decision, the RWDS was categorized as high security site. Non-departmental security was organized and in 1997 a police guard was provided to RWDS. In 2001 the Republic of Tajikistan became a member of IAEA. The number of expert missions who visited RWDS revealed a number of shortages and deficiencies in ensuring the security of radioactive wastes. Events occurred on 11 September 2001 aroused worldwide community alarm due to increase of theft cases and illicit trafficking of radioactive materials in many countries of the world. Radioactive wastes disposed in RWDS are characterized by comprehensive variety of chemical, physical and radionuclide composition. Basically, these are worked-out the guarantee period sources of ionizing radiation, radioisotopes facilities, RTG's, fire detectors, contaminated laboratory materials, different facilities, contaminated ground and etc., and were accepted by mass i.e. taking into account physical protection. Radioactive wastes acceptance started with registration of sources of ionizing radiation activity according to their passports issued by manufacturer when Basic Sanitary Rules (OSP-72/80) and Radiation Protection Norms (NRB-76) were approved and implemented. In 2003, Nuclear and Radiation Safety Agency was established under Tajik Academy of Sciences and the issue of ensuring sources of ionizing radiation account and control and their security become the main principle task. Starting from 2003 until present time by the help of IAEA, USA Department of Energy, UK and NRSA, a number of projects are implemented on upgrading physical protection against intruder penetration. While studying the IAEA documents on ensuring security of accumulated radioactive wastes, a number of plans and instructions were elaborated (plan of fast response with attraction of local population, Ministry of Interior Affairs, Committee of Emergency

  11. Ancel Keys: a tribute

    VanItallie Theodore B


    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  12. 7 CFR 1779.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...


    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  13. Tidemark's, the key assets in times of crisis management; Las marcas, activos clade de la gestion en tiempos de crisis

    Brujo, G.


    The financial crisis is challenging all the companies and their main audiences. This article analyzes the brand importance and how in this time of economic recession they become essential for the business, the customers, the products, the services and the competence. Also the authors goes through some examples of brand managing to show how they help to increase the value of the companies and to hide from the adverse situation we are leaving with. (Author) 5 refs.

  14. A Distributed Shared Key Generation Procedure Using Fractional Keys

    Poovendran, Radha; Corson, M. S; Baras, J. S


    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  15. Realization of Human Rights Guarantees in Civil Proceedings in Russia

    Badma V. Sangadzhiev


    Full Text Available Civil legal proceedings are conducted according to the federal laws existing during consideration and permission of a civil case (making of separate legal proceedings or execution of court decrees. In case of lack of the regulation of a procedural law governing the relations which arose during civil legal proceedings, federal courts of the general jurisdiction and magistrate's courts apply the regulation governing the similar relations (analogy of the law. In the absence of such regulation of the judge work proceeding from the general principles of implementation of justice in the Russian Federation (analogy is right. Dispositions of general constitutional guarantees (which don't belong directly to judicial system, however their sense can quite be applied to judicial process of consideration of civil cases contain in the following articles of the Constitution of Russia: 17, 19, 29 and 45. Judicial activities are characterized by the major indicators: quality and efficiency (observance of procedural terms. According to the conventional principles and rules of international law to be an offender without unjustifiable delay constitutes one of the fundamental human rights inseparably linked with the right to fair legal proceeding. In a sense of the constitutional regulation, first, everyone has the right, but isn't obliged to protect the rights, secondly, to protect by all methods which aren't forbidden by the law. It is thought, the last purchases the force and the importance not as ascertaining (or transfer these methods in the law and as availability of real mechanisms of their use by the individual and availability of use.

  16. Roles of Social Movement Organizations for Securing Workers' Safety in Korea: A Case Study of Abolition of the 30-Minute Delivery Guarantee Program in Pizza Delivery Service.

    Park, Ji-Eun; Kim, Myoung-Hee


    Many restaurants in Korea maintain quick-delivery service programs to satisfy customers. This service allows delivery workers limited time to deliver, which frequently put them in danger. Most of the workers are young, work part-time, and are rarely organized into trade unions. In this article, through a case study of the social movement to abolish the 30-minute delivery guarantee program of pizza companies in Korea, we argue that social movements involving social movement organizations (SMOs) and individual citizens could serve as a means to rectify this problem. We show how the SMOs developed and expanded the movement using a framing perspective and how the general public became involved through social media. Data was collected via online searching. Interview scripts from key players of SMOs and unofficial documents they provided were also reviewed. Three SMOs primarily led the movement, successfully forming a frame that emphasized social responsibility. SMOs also utilized social media to link their standing frame with unmobilized citizens and to expand the movement. We identified contributing factors and limitations of the movement and drew lessons that could be applied to other sectors where workers are in vulnerable positions. © The Author(s) 2016.

  17. Paleomagnetism of Jurassic and Cretaceous rocks in central Patagonia: a key to constrain the timing of rotations during the breakup of southwestern Gondwana?

    Geuna, Silvana E.; Somoza, Rubén; Vizán, Haroldo; Figari, Eduardo G.; Rinaldi, Carlos A.


    A paleomagnetic study in Jurassic and Cretaceous rocks from the Cañadón Asfalto basin, central Patagonia, indicates the occurrence of about 25-30° clockwise rotation in Upper Jurassic-lowermost Cretaceous rocks, whereas the overlying mid-Cretaceous rocks do not show evidence of rotation. This constrains the tectonic rotation to be related to a major regional unconformity in Patagonia, which in turn seems to be close in time with the early opening of the South Atlantic Ocean. The sense and probably the timing of this rotation are similar to those of other paleomagnetically detected rotations in different areas of southwestern Gondwana, suggesting a possible relationship between these and major tectonic processes related with fragmentation of the supercontinent. On the other hand, the mid-Cretaceous rocks in the region yield a paleopole located at Lat. 87° South, Long. 159° East, A95=3.8°. This pole position is consistent with coeval high-quality paleopoles of other plates when transferred to South American coordinates, implying it is an accurate determination of the Aptian (circa 116 Ma) geomagnetic field in South America.

  18. Real-time PCR Demonstrates Ancylostoma duodenale Is a Key Factor in the Etiology of Severe Anemia and Iron Deficiency in Malawian Pre-school Children

    Jonker, Femkje A. M.; Calis, Job C. J.; Phiri, Kamija; Brienen, Eric A. T.; Khoffi, Harriet; Brabin, Bernard J.; Verweij, Jaco J.; van Hensbroek, Michael Boele; van Lieshout, Lisette


    Background Hookworm infections are an important cause of (severe) anemia and iron deficiency in children in the tropics. Type of hookworm species (Ancylostoma duodenale or Necator americanus) and infection load are considered associated with disease burden, although these parameters are rarely assessed due to limitations of currently used diagnostic methods. Using multiplex real-time PCR, we evaluated hookworm species-specific prevalence, infection load and their contribution towards severe anemia and iron deficiency in pre-school children in Malawi. Methodology and Findings A. duodenale and N. americanus DNA loads were determined in 830 fecal samples of pre-school children participating in a case control study investigating severe anemia. Using multiplex real-time PCR, hookworm infections were found in 34.1% of the severely anemic cases and in 27.0% of the non-severely anemic controls (panemia (adjusted odds ratio: 2.49 (95%CI 1.16–5.33) and 9.04 (95%CI 2.52–32.47) respectively). Iron deficiency (assessed through bone marrow examination) was positively associated with intensity of A. duodenale infection (adjusted odds ratio: 3.63 (95%CI 1.18–11.20); 16.98 (95%CI 3.88–74.35) and 44.91 (95%CI 5.23–385.77) for low, moderate and high load respectively). Conclusions/Significance This is the first report assessing the association of hookworm load and species differentiation with severe anemia and bone marrow iron deficiency. By revealing a much higher than expected prevalence of A. duodenale and its significant and load-dependent association with severe anemia and iron deficiency in pre-school children in Malawi, we demonstrated the need for quantitative and species-specific screening of hookworm infections. Multiplex real-time PCR is a powerful diagnostic tool for public health research to combat (severe) anemia and iron deficiency in children living in resource poor settings. PMID:22514750

  19. Key plants preserve elements of culture: a study over distance and time of fresh crops in Puerto Rican markets in Hartford, Connecticut, "A moveable feast".

    Taylor, David W; Anderson, Gregory J


    People retain culinary customs when they migrate. We tested this commitment via the study of Puerto Rican fresh produce markets in the continental United States over time, 18 yr, and space, by comparisons with source markets in Puerto Rico (PR). A survey of Puerto Rican markets in Hartford (HT), Connecticut in 1993-1994 was repeated in 2009-2010. A comparative study was made at open-air markets in PR in 2009. Surveys recorded fresh crops, and interviews with vendors and Hartford Puerto Rican residents provided context. We recorded 84 plant crops (64 species; 32 families) for seven categories. The largest category was viandas (fresh, starchy "root" crops and immature fruits), followed by saborizantes (flavorings). In the second HT survey, 80% of the crops were still present. And ∼90% of the HT 1993-1994 crops and ∼75% of the HT 2009-2010 crops were shared with markets in PR. On the basis of our results, we suggest two new concepts. The persistence of these largely tropical foods in a temperate market far removed from tropical PR shows the importance of basic foods as an element of cultural identification. We recognize this stability as an example of "culinary cultural conservation". Second, analysis of these fresh produce markets leads to the conclusion that viandas are the most prominent in diversity, persistence over time and distance, volume, and in terms of consumers' "willingness to pay". Accordingly, we consider the viandas a good example of a "cultural keystone food group", a food group that is emblematic of a community's culinary conservation.

  20. Guaranteed epsilon-optimal treatment plans with the minimum number of beams for stereotactic body radiation therapy

    Yarmand, Hamed; Winey, Brian; Craft, David


    Stereotactic body radiation therapy (SBRT) is characterized by delivering a high amount of dose in a short period of time. In SBRT the dose is delivered using open fields (e.g., beam’s-eye-view) known as ‘apertures’. Mathematical methods can be used for optimizing treatment planning for delivery of sufficient dose to the cancerous cells while keeping the dose to surrounding organs at risk (OARs) minimal. Two important elements of a treatment plan are quality and delivery time. Quality of a plan is measured based on the target coverage and dose to OARs. Delivery time heavily depends on the number of beams used in the plan as the setup times for different beam directions constitute a large portion of the delivery time. Therefore the ideal plan, in which all potential beams can be used, will be associated with a long impractical delivery time. We use the dose to OARs in the ideal plan to find the plan with the minimum number of beams which is guaranteed to be epsilon-optimal (i.e., a predetermined maximum deviation from the ideal plan is guaranteed). Since the treatment plan optimization is inherently a multi-criteria-optimization problem, the planner can navigate the ideal dose distribution Pareto surface and select a plan of desired target coverage versus OARs sparing, and then use the proposed technique to reduce the number of beams while guaranteeing epsilon-optimality. We use mixed integer programming (MIP) for optimization. To reduce the computation time for the resultant MIP, we use two heuristics: a beam elimination scheme and a family of heuristic cuts, known as ‘neighbor cuts’, based on the concept of ‘adjacent beams’. We show the effectiveness of the proposed technique on two clinical cases, a liver and a lung case. Based on our technique we propose an algorithm for fast generation of epsilon-optimal plans. (paper)

  1. 16 CFR 239.2 - Disclosures in warranty or guarantee advertising.


    ... warranty coverage. These examples are for both print and broadcast advertising. These examples are... advertising. 239.2 Section 239.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE ADVERTISING OF WARRANTIES AND GUARANTEES § 239.2 Disclosures in warranty or guarantee...

  2. When Justice Is Up to You. Celebrating America's Guarantee of Trial by Jury.

    National Inst. for Citizen Education in the Law, Washington, DC.

    Featuring a mock trial tested in the District of Columbia, the objective of this manual is to help students learn more about the constitutional guarantee of trial by jury. Prepared as five separate lessons, the manual examines one alternative to the jury system--trial by ordeal; traces the development of the guarantee of trial by jury; explores…

  3. The Impact of Public Guarantees on Bank Risk Taking : Evidence from a Natural Experiment

    Gropp, R.; Grundl, C.; Guttler, A.


    In 2001, government guarantees for savings banks in Germany were removed following a law suit. We use this natural experiment to examine the effect of government guarantees on bank risk taking, using a large data set of matched bank/borrower information. The results suggest that banks whose

  4. 22 CFR 231.05 - Non-impairment of the Guarantee.


    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Non-impairment of the Guarantee. 231.05 Section 231.05 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ARAB REPUBLIC OF EGYPT LOAN GUARANTEES ISSUED UNDER THE EMERGENCY WARTIME SUPPLEMENTAL APPROPRIATIONS ACT OF 2003, PUBLIC LAW 108-11-STANDARD...

  5. Linking Financial Service Providers to Commercial Capital : How Do Guarantees Add Value?

    Alexia Latortue; Jasmina Glisovic-Mezieres


    In microfinance, experimentation with loan guarantees began largely as an attempt to demonstrate to local banks that Microfinance Institutions (MFIs) are creditworthy. Though loan guarantees are far less common than other funding instruments, such as debt, equity, and grants, they are beginning to be used more often. This brief is based on a joint Consultative Group to Assist the Poorest (...

  6. 12 CFR 370.7 - Assessment for the Transaction Account Guarantee Program.


    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Assessment for the Transaction Account Guarantee Program. 370.7 Section 370.7 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.7 Assessment for the...

  7. 14 CFR 272.3 - Places eligible for guaranteed essential air service.


    ... TRANSPORTATION (AVIATION PROCEEDINGS) ECONOMIC REGULATIONS ESSENTIAL AIR SERVICE TO THE FREELY ASSOCIATED STATES § 272.3 Places eligible for guaranteed essential air service. (a) Subject to the provisions of this part... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Places eligible for guaranteed essential...

  8. 78 FR 66841 - Israel Loan Guarantees Issued Under the Emergency Wartime Supplemental Appropriations Act of 2003...


    ... AGENCY FOR INTERNATIONAL DEVELOPMENT 22 CFR Part 230 Israel Loan Guarantees Issued Under the... the Government of Israel on behalf of the State of Israel. Pursuant to the Emergency Wartime... International Development, may issue loan guarantees applicable to sums borrowed by the Government of Israel on...

  9. 12 CFR 370.6 - Assessments under the Debt Guarantee Program.


    ... OF GENERAL POLICY TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.6 Assessments under the Debt Guarantee... participating entity shall ensure that funds in an amount at least equal to the amount of the assessment are... institution shall provide the necessary funds for payment of its assessments. (3) Failure to take all...

  10. 78 FR 691 - Maximum Loan Amount for Business and Industry Guaranteed Loans in Fiscal Year 2013


    ... DEPARTMENT OF AGRICULTURE Rural Business-Cooperative Service Maximum Loan Amount for Business and Industry Guaranteed Loans in Fiscal Year 2013 AGENCY: Rural Business-Cooperative Service, USDA. ACTION... and Industry (B&I) guaranteed loans of $25 million or less under certain circumstances. Due to the...

  11. Public initiatives to support entrepreneurs: Credit guarantees versus co-funding

    Arping, S.; Lóránth, G.; Morrison, A.D.


    We analyze state-sponsored credit guarantees in a setting where entrepreneurs are capital-constrained and subject to moral hazard. In our model, guarantees can raise welfare because they reduce the cost of capital faced by entrepreneurs, and so potentially enhance entrepreneurial effort incentives.

  12. 42 CFR 57.1514 - Loan guarantee and interest subsidy agreements.


    ... GRANTS GRANTS FOR CONSTRUCTION OF TEACHING FACILITIES, EDUCATIONAL IMPROVEMENTS, SCHOLARSHIPS AND STUDENT LOANS Loan Guarantees and Interest Subsidies to Assist in Construction of Teaching Facilities for Health Profession Personnel § 57.1514 Loan guarantee and interest subsidy agreements. For each application for a...

  13. Do not pay for a Danish interest guarantee. The law of the triple blow

    Guillén, Montserrat; Konicz, Agnieszka Karolina; Perch Nielsen, Jens


    We have investigated the performance of pension schemes of with-profit policies containing a guaranteed minimum rate of return and we have found that the price of the guarantee measured in terms of lost returns is enormous. We use simple simulations rather than complex pricing methods to illustrate...... that the price of an interest guarantee is high in pension products that are currently commercialised in the market. We have found that the customer loses up to about 0.75% yearly in the rate of return when an interest guarantee is purchased, compared to the return of an equivalent saving strategy with the same...... risk at the level 95%. This can explain why such arrangements are not widely popular. Our approach can be used to inform clients, who are not experts in modern financial models, the impact of paying for an interest guarantee....

  14. Certain aspects of the accounting of the bank guarantee at the principal and the beneficiary

    L. A. Zimakova


    Full Text Available For any kind of business such category as risks is peculiar. The research of this category was conducted by scientists from the different sides, certain approaches of protection against risks were developed and instruments of decrease in financial risks are offered. The bank guarantee is one of the most demanded instruments of additional financial protection today. Its active using of the commercial organizations courses questions of the organization of the detailed accounting of guarantees at the principal and the beneficiary. A little concerning the historical aspect of the bank guarantee, authors provided the overview of the determinations of "bank guarantee" characterizing it as the banking service providing distribution of responsibility between the guarantor and the principal under certain conditions. Having considered the essence of the legal nature and features of the bank guarantee recommendations about the organization of the disaggregated financial accounting on off-balance accounts were developed. In particular, need of allocation of a currency type as the directions of conducting the analytics providing correctness of reflection of cost criterion is proved. For the purpose of control of timeliness of carrying out calculations it is recommended to allocate guarantees: coincident and in coincident with primary obligation; short-term and long-term. From the point of view of nature of guarantees payment guarantees and guarantees of obligation fulfilment were allocated. These recommendations concern the beneficiary, and lack of accounting entries at a principal generates need of creation of additional registers and analytical reports which forms were offered by authors. The provided recommendations will allow obtaining transparent information on bank guarantees for the purpose of its full disclosure in the financial reporting.

  15. Passive Guaranteed Simulation of Analog Audio Circuits: A Port-Hamiltonian Approach

    Antoine Falaize


    Full Text Available We present a method that generates passive-guaranteed stable simulations of analog audio circuits from electronic schematics for real-time issues. On one hand, this method is based on a continuous-time power-balanced state-space representation structured into its energy-storing parts, dissipative parts, and external sources. On the other hand, a numerical scheme is especially designed to preserve this structure and the power balance. These state-space structures define the class of port-Hamiltonian systems. The derivation of this structured system associated with the electronic circuit is achieved by an automated analysis of the interconnection network combined with a dictionary of models for each elementary component. The numerical scheme is based on the combination of finite differences applied on the state (with respect to the time variable and on the total energy (with respect to the state. This combination provides a discrete-time version of the power balance. This set of algorithms is valid for both the linear and nonlinear case. Finally, three applications of increasing complexities are given: a diode clipper, a common-emitter bipolar-junction transistor amplifier, and a wah pedal. The results are compared to offline simulations obtained from a popular circuit simulator.

  16. L’evolució del garantisme: de les garanties personals a la garantia de l’estat - The Evolution of Constitutional Guarantees: from personal guarantees to guaranteeing the State - La evolución del garantismo: de las garantías personales a la garantía del Estado

    José Esteve Pardo


    Full Text Available La reforma constitucional per a l’estabilitat pressupostària i la contenció del dèficitLa reforma de l’article 135 de la Constitució és un moviment inèdit en el constitucionalisme, ja que per primera vegada s’orienta cap a la protecció del mateix Estat, a la sostenibilitat, davant l’exposició excessiva al crèdit extern. Les garanties constitucionals van ser primer garanties de llibertats personals, després garanties d’institucions de l’Estat o de la societat i ara, per primera vegada, garanties del mateix Estat. The Constitutional Amendment for Budgetary Stability and Deficit RestraintThe amendment of article 135 of the Constitution highlights a constitutionally unprecedented movement toward protection of the State, the State´s self-protection against external credit. Constitutional guarantees were originally guarantees of personal liberties, then guarantees of the institutions of the State or civil society, and are now for the first time self-guarantees of the State.La reforma constitucional para la estabilidad presupuestaria y contención del déficitLa reforma del artículo 135 de la Constitución es un movimiento inédito en el constitucionalismo puesto que por vez primera se orienta a la protección del propio Estado, a su sostenibilidad, ante la excesiva exposición al crédito externo. Las garantías constitucionales fueron primero garantías de libertades personales, luego garantías de instituciones del Estado o de la sociedad y ahora, por vez primera, garantías del propio Estado.

  17. Anonymity-Preserving Public-Key Encryption

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina


    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  18. Efficient Vessel Tracking  with Accuracy Guarantees

    Redoutey, Martin; Scotti, Eric; Jensen, Christian Søndergaard


    Safety and security are top concerns in maritime navigation, particularly as maritime traffic continues to grow and as crew sizes are reduced. The Automatic Identification System (AIS) plays a key role in regard to these concerns. This system, whose objective is in part to identify and locate ves...... accuracies at lower communication costs. The techniques employ movement predictions that are shared between vessels and the VTS. Empirical studies with a prototype implementation and real vessel data demonstrate that the techniques are capable of significantly improving the AIS....

  19. A set-theoretic model reference adaptive control architecture for disturbance rejection and uncertainty suppression with strict performance guarantees

    Arabi, Ehsan; Gruenwald, Benjamin C.; Yucelen, Tansel; Nguyen, Nhan T.


    Research in adaptive control algorithms for safety-critical applications is primarily motivated by the fact that these algorithms have the capability to suppress the effects of adverse conditions resulting from exogenous disturbances, imperfect dynamical system modelling, degraded modes of operation, and changes in system dynamics. Although government and industry agree on the potential of these algorithms in providing safety and reducing vehicle development costs, a major issue is the inability to achieve a-priori, user-defined performance guarantees with adaptive control algorithms. In this paper, a new model reference adaptive control architecture for uncertain dynamical systems is presented to address disturbance rejection and uncertainty suppression. The proposed framework is predicated on a set-theoretic adaptive controller construction using generalised restricted potential functions.The key feature of this framework allows the system error bound between the state of an uncertain dynamical system and the state of a reference model, which captures a desired closed-loop system performance, to be less than a-priori, user-defined worst-case performance bound, and hence, it has the capability to enforce strict performance guarantees. Examples are provided to demonstrate the efficacy of the proposed set-theoretic model reference adaptive control architecture.

  20. An Electronic Commerce Strategy for MTMC’s Guaranteed Traffic Program


    AD-A264 299 SELECTE October 1992 S MAY1 4 1993U C An Electronic Commerce Strategy for MTMC’s Guaranteed Traffic Program MT901R I N1. Augustine...NUMBERS An Electronic Commerce Strategy for MTMC’s Guaranteed Traffic Program C MDA903-85-C -0139 M DA903-90-C-0006 PE 0902198D 6. AUTHOR(S) M...239-1L 299-01 LMI Executive Summary AN ELECTRONIC COMMERCE STRATEGY FOR MTMC’S GUARANTEED TRAFFIC PROGRAM In 1979, the Military Traffic Management

  1. The impact of SMEs’ lending and credit guarantee on bank efficiency in South Korea

    Lien-Wen Liang


    Full Text Available This study examines how small and medium-size enterprises’ (SMEs’ lending and credit guarantee affect Korean banks’ efficiency, by employing the stochastic frontier approach on 14 banks over the period 2001–2010. When lending increases to SMEs, the findings indicate that banks’ cost efficiency decreases due to information asymmetry. However, the increased proportion of credit guarantee can improve their cost efficiency. This proves that South Korea’s credit guarantee system can indeed share SMEs’ credit risk of lending in order to help raise bank efficiency.

  2. The Effects of Wheat Guarantee Price on the Economic Value of Groundwater Resources; the Case Study of Orzoiye Region, Kerman

    S.H. Mosavi


    Full Text Available Introduction: Agriculture as one of main axis of development in Iran is heavily depend on irrigation water. on the other hand, water resources have been under heavy pressure due to rising demand with different uses. Hence, water resources management and optimal water allocation have become increasingly important Undoubtedly, one of the most important tools for optimal allocation of water resources, is the economic valuation of the long-term development strategy of the country. However, the main question is whether the various agricultural policies of the government are to achieve self-sufficiency in the production decisions, in line with the management of water resources? Materials and Methods: To develop an analytical context for responding to above question, in this study, the effect of guaranteed purchase policy of wheat as one of the most supporting government policies, on the economic value of water resources in Orzoiyeh plain of Kerman province was studied. In order to achieve our goals, a dynamic mathematical programming model was used. A number of key questions are involved with the modeling of dynamic situations. Fundamentally, one must ask whether an explicit multiple time period representation is necessary. If so, a number of other questions are relevant. First, the length of the total time period and the starting date must be determined. Second, the length of the time intervals explicitly represented within the total time period must be determined. Third, initial and final inventory conditions must be specified. Fourth, one must decide on activity life, i.e., when a particular activity is begun and how long it lasts. Fifth, the rate of time preference must be determined, i.e., one needs the discount rate at which future returns are considered when compared with current returns. Sixth and finally, one must decide whether to include uncertainty. The sections below present discussion on each of these topics. Dynamic situations may not

  3. Group key management

    Dunigan, T.; Cao, C.


    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  4. Modular Connector Keying Concept

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven


    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  5. World energy demand down for the first time in 30 years. Key findings of the world energy demand in 2009 by Enerdata based its global energy database - 8 June 2010


    Key findings of the world energy demand in 2009 by Enerdata based its global energy database: World energy demand down for the first time in 30 years. The first 2009 world energy industry data, now available in the Enerdata Yearbook, confirms trends identified in May 2010 by Enerdata analysts. The economic and financial crisis resulted in a reduction of world energy demand in 2009 by 1% or 130 Mtoe. It is the first demand decrease in 30 years, and the first decrease in electricity demand since World War II. (authors)

  6. A secure key agreement protocol based on chaotic maps

    Wang Xing-Yuan; Luan Da-Peng


    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  7. The hands-on project office guaranteeing ROI and on-time delivery

    Kesner, Richard M


    THE THREE PILLARS OF IT DELIVERY - PROBLEM RESOLUTION, SERVICE REQUESTS, AND PROJECTSIntroduction The Business Context The Internal Economy for Investing in IT Services and ProjectsThe Three Pillars of IT Delivery Managing Service DeliveryManaging Project Commitments IT Metrics and Reporting Tools THE PROJECT MANAGEMENT OFFICE BUSINESS MODELIntroduction: Revisiting the IT Organization IT Service and Project Delivery RolesThe Role of the Project Management Office: Measuring its ROI The PMO Value Proposition: An Initial ROI Estimate ALIGNMENT AND PLANNING - DOING THE RIGHT THINGS Introduction Ge

  8. Biometry, the safe key

    María Fraile-Hurtado


    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  9. Financial Key Ratios

    Tănase Alin-Eliodor


    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  10. Public Key Cryptography.

    Tapson, Frank


    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  11. Key Management Laboratory

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  12. Public Key Infrastructure Study

    Berkovits, Shimshon


    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  13. A Best Practice for Developing Availability Guarantee Language in Photovoltaic (PV) O&M Agreements.

    Klise, Geoffrey Taylor [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Balfour, John [High Performance PV, Phoenix, AZ (United States)


    This document outlines the foundation for developing language that can be utilized in an Equipment Availability Guarantee, typically included in an O&M services agreement between a PV system or plant owner and an O&M services provider, or operator. Many of the current PV O&M service agreement Availability Guarantees are based on contracts used for traditional power generation, which create challenges for owners and operators due to the variable nature of grid-tied photovoltaic generating technologies. This report documents language used in early PV availability guarantees and presents best practices and equations that can be used to more openly communicate how the reliability of the PV system and plant equipment can be expressed in an availability guarantee. This work will improve the bankability of PV systems by providing greater transparency into the equipment reliability state to all parties involved in an O&M services contract.

  14. Supply guarantee initiatives for nuclear fuel materials and services and their compatibility with the market

    Nagano, Koji


    This paper first discusses where and why those ideas for nuclear fuel supply assurance and guarantee mechanisms came out, and attempts to draw a comparison among the proposed schemes and thereby examine possible steps forward. (author)

  15. 7 CFR 4279.75 - Sale or assignment of guaranteed loan.


    ... borrower's immediate families, officers, directors, stockholders, other owners, or a parent, subsidiary or...) or any successor section will not be guaranteed. (a) Single note system. The entire loan is evidenced...

  16. 7 CFR 4290.820 - Financings in the form of guarantees.


    ...-COOPERATIVE SERVICE AND RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE RURAL BUSINESS INVESTMENT COMPANY...-Types of Financings § 4290.820 Financings in the form of guarantees. (a) General rule. At the request of...

  17. Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

    Hayashi, Masahito; Nakayama, Ryota


    This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett–Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting. (paper)

  18. An Active Queue Management for QoS Guarantee of the High Priority Service Class

    Kim, Hyun Jong; Shim, Jae Chan; Kim, Hwa-Suk; Cho, Kee Seong; Choi, Seong Gon

    In this paper, we propose the active queue management mechanism (Active-WRED) for guaranteeing the quality of the high priority service class (VoIP or IPTV) in the multi-class traffic service environment. In the congestion situation, this mechanism increases the drop probability of the low priority traffic and reduces the drop probability of the high priority traffic; therefore it can guarantee the quality of the high priority service class from the poor quality by the packet loss.

  19. A real-time architecture for time-aware agents.

    Prouskas, Konstantinos-Vassileios; Pitt, Jeremy V


    This paper describes the specification and implementation of a new three-layer time-aware agent architecture. This architecture is designed for applications and environments where societies of humans and agents play equally active roles, but interact and operate in completely different time frames. The architecture consists of three layers: the April real-time run-time (ART) layer, the time aware layer (TAL), and the application agents layer (AAL). The ART layer forms the underlying real-time agent platform. An original online, real-time, dynamic priority-based scheduling algorithm is described for scheduling the computation time of agent processes, and it is shown that the algorithm's O(n) complexity and scalable performance are sufficient for application in real-time domains. The TAL layer forms an abstraction layer through which human and agent interactions are temporally unified, that is, handled in a common way irrespective of their temporal representation and scale. A novel O(n2) interaction scheduling algorithm is described for predicting and guaranteeing interactions' initiation and completion times. The time-aware predicting component of a workflow management system is also presented as an instance of the AAL layer. The described time-aware architecture addresses two key challenges in enabling agents to be effectively configured and applied in environments where humans and agents play equally active roles. It provides flexibility and adaptability in its real-time mechanisms while placing them under direct agent control, and it temporally unifies human and agent interactions.

  20. The Key Lake project


    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  1. Applying Service Performance Guarantees to Reduce Risk Perception in the Purchase and Consumption of Higher Education

    Nooraini Mohamad Sheriff


    Full Text Available The intangible nature of education is one contributor to consumers’ perception of risk prior to their purchase and consumption. This risk includes: functional risk, financial risk, temporal risk, physical risk, psychological risk and social risk. The presence of these risks often makes consumer evaluation prior to purchase and consumption difficult. Invoking a service guarantee is a platform available to enable higher educational institutions to minimize such risk perception so as to induce purchase. Specifically, service guarantee for higher education entails the application of teaching performance guarantee. This form of guarantee focuses on two important customer groups of higher educational institutions namely, students and faculty members, and focuses only on a specific performance aspect such as instructor’s performance. Thus, if students are dissatisfied with an instructor’s performance they are entitled to receive their money back. The imposition of such a teaching performance guarantee would implicate instructor’s accountability for certain aspects of their performance. It also establishes a mechanism to solicit feedback to better understand why and how instructors fail. Consequently, service performance guarantee creates a high level of customer focus and signals instructors’ care towards students

  2. Building Trust in a Guarantee Fund in a Challenging Institutional Environment

    Luciano Quinto Lanz


    Full Text Available Difficult access to credit is a major obstacle to micro, small and medium-sized enterprises (MSMEs survival, especially in emerging countries, affecting their competitiveness. Lack of guarantees is a main reason why banks do not lend to MSMEs. Guarantee schemes provide partial credit guarantees, but often fail to win trust of banks and enterprises. This study analyzes the process of building trust between the Fundo Garantidor para Investimentos (Investment Guarantee Fund, FGI, created in 2009, and banks in Brazil. This trust was hampered by the failure of public guarantee funds created in the 1990’s. This created a challenging institutional environment to the new fund. The methodology employed was a case study, based on a qualitative approach with document analysis, semi-structured interviews and descriptive statistics. The analysis used models for building and repairing trust in inter-organizational relations and international benchmark for governance and effectiveness of guarantee schemes. The analysis showed that the FGI used other emerging countries and developed countries experience to construct adequate governance and succeeded in establishing trust with the banks. The results show that by 2017, 26 banks contract more than 32,000 operations worth 1.9 billion dollars, with additionalities comparable to the international benchmark.

  3. Economic Valuation of Sufficient and Guaranteed Irrigation Water Supply for Paddy Farms of Guilan Province

    Mohammad Kavoosi Kalashami


    Full Text Available Cultivation of the strategic crop of rice highly depends to the existence of sufficient and guaranteed irrigation water, and water shortage stresses have irreparable effects on yield and quality of productions. Decrease of the Sefidrud river inflow in Guilan province which is the main source of supplying irrigation water for 171 thousand hectares under rice cropping area of this province, has been challenged sufficient and guaranteed irrigation water supply in many regions of mentioned province. Hence, in present study estimating the value that paddy farmers place on sufficient and guaranteed irrigation water supply has been considered. Economic valuation of sufficient and guaranteed irrigation water supply improves water resource management policies in demand side. Requested data set were obtained on the base of a survey and are collected from 224 paddy farms in rural regions that faced with irrigation water shortages. Then, using open-ended valuation approach and estimation of Tobit model via ML and two stages Heckman approach, eliciting paddy farmers' willingness to pay for sufficient and guaranteed irrigation water supply has been accomplished. Results revealed that farmers in investigated regions willing to pay 26.49 percent more than present costs of providing irrigation water in order to have sufficient and guaranteed irrigation water.

  4. Litvinov splits into units, Sokolov gets state guarantees

    Alperowicz, N.


    Chemopetrol Litvinov, the largest chemical producer in the Czech Republic, has split its operation into four divisions in a move designed to make the process of privatization easier. Four key production divisions-refinery, petrochemicals, agro, and phenols-will function as independant legal entities. The petrochemical division includes the 450,000-m.t./year steam cracker, plastics production units, ethanol ethylbenzene, and oxo alcohols. Units producing ammonia, urea, carbon dioxide, and carbon black are in the division. Sources at Litvinov say a modified proposal to buy the company's refining operations has been received form a consortium composed of Agip, Conoco, and Total. The parties are discussing issues such as prices of intermediates and investment programs. Although Western partners have not shown interest in the steam cracker, Amoco is looking at the possibility of buying a stake in the polypropylene plant; Neste is considering a stake in polyethylene; and PCD is looking at a stake in both plastics, on a minority basis initially but with options to extend. The potential partners propose to expand capacity in line with market developments. Litinov is considering transferring the cracker into the refining division


    Locks and Keys Service


    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  6. 7 CFR 3575.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...


    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  7. Nonperiodic inspections to guarantee a prescribed level of reliability

    Newby, M.J.; Barker, C.T.; Vonta, F.; Nikulin, M; Limnios, N.; Huber-Carol, C.


    A cost-optimal nonperiodic inspection policy is derived for complex multicomponent systems. The model takes into consideration the degradation of all the components in the system with the use of a Bessel process with drift. The inspection times are determined by a deterministic function and depend

  8. Project Guarantee 1985. Final repository for high-level radioactive wastes: The system of safety barriers



    Final disposal of radioactive waste involves preventing the waste from returning from the repository location into the biosphere by means of successively arranged containment measures known as safety barriers. In the present volume NGB 85-04 of the series of reports for Project 'Guarantee' 1985, the safety barrier system for the type C repository for high-level waste is described. The barrier parameters which are relevant for safety analysis are quantified and associated error limits and data scatter are given. The aim of the report is to give a summary documentation of the safety analysis input data and their scientific background. For secure containment of radioactive waste safety barriers are used which effectively limit the release of radioactive material from the repository (release barriers) and effectively retard the entry of the original radioactive material into the biosphere (time barriers). Safety barriers take the form of both technically constructed containment measures and the siting of the repository in suitable geological formations. The technical safety barrier system in the case of high-level waste comprises: the waste solidification matrix (borosilicate glass), massive steel canisters, encasement of the waste canisters, encasement of the waste canisters in highly compacted bentonite, sealing of vacant storage space and access routes on repository closure. The natural geological safety barriers - the host rock and overlying formations provide sufficiently long deep groundwater flow times from the repository location to the earth's surface and for additional lengthening of radionuclide migration times by means of various chemical and physical retardation mechanisms. The stability of the geological formations is so great that hydrogeological system is protected for a sufficient length of time from deterioration caused, in particular, by erosion. Observations in the final section of the report indicate that input data for the type C repository safety


    Ciumas Cristina


    Full Text Available One of the most interesting life insurance products to have emerged in recent years in the Romanian insurance market has been the unit-linked contract. Unit-linked insurance products are life insurance policies with investment component. A unit-linked life insurance has two important components: protection and investment. The protection component refers to the insured sum in case of the occurrence of insured risks and the investment component refers to the policyholders’ account that represents the present value of the units from the chosen investment funds. Due to the financial instability caused by the Global Crisis and the amplification of market competitiveness, insurers from international markets have started to incorporate guarantees in unit-linked products. So a unit- linked life insurance policy with an asset value guarantee is an insurance policy whose benefit payable on death or at maturity consists of the greater of some guaranteed amount and the value of the units from the investment funds. One of the most challenging issues concerns the pricing of minimum death benefit and maturity benefit guarantees and the establishing of proper reserves for these guarantees. Insurers granting guarantees of this type must estimate the cost and include the cost in the premium. An important component of the activity carried out by the insurance companies is the investment of the premiums paid by policyholders in various types of assets, in order to obtain higher yields than those guaranteed by the insurance contracts, while providing the necessary liquidity for the payment of insurance claims in case of occurrence of the assumed risks. So the guaranteed benefits can be broadly matched or immunized with various types of financial assets, especially with fixed-interest instruments. According to Romanian legislation which regulates the unit-linked life insurance market, unit-linked life insurance contracts pass most of the investment risk to the

  10. A QoS-Guaranteed Coverage Precedence Routing Algorithm for Wireless Sensor Networks

    Jiun-Chuan Lin


    Full Text Available For mission-critical applications of wireless sensor networks (WSNs involving extensive battlefield surveillance, medical healthcare, etc., it is crucial to have low-power, new protocols, methodologies and structures for transferring data and information in a network with full sensing coverage capability for an extended working period. The upmost mission is to ensure that the network is fully functional providing reliable transmission of the sensed data without the risk of data loss. WSNs have been applied to various types of mission-critical applications. Coverage preservation is one of the most essential functions to guarantee quality of service (QoS in WSNs. However, a tradeoff exists between sensing coverage and network lifetime due to the limited energy supplies of sensor nodes. In this study, we propose a routing protocol to accommodate both energy-balance and coverage-preservation for sensor nodes in WSNs. The energy consumption for radio transmissions and the residual energy over the network are taken into account when the proposed protocol determines an energy-efficient route for a packet. The simulation results demonstrate that the proposed protocol is able to increase the duration of the on-duty network and provide up to 98.3% and 85.7% of extra service time with 100% sensing coverage ratio comparing with LEACH and the LEACH-Coverage-U protocols, respectively.

  11. Guaranteeing robustness of structural condition monitoring to environmental variability

    Van Buren, Kendra; Reilly, Jack; Neal, Kyle; Edwards, Harry; Hemez, François


    Advances in sensor deployment and computational modeling have allowed significant strides to be recently made in the field of Structural Health Monitoring (SHM). One widely used SHM strategy is to perform a vibration analysis where a model of the structure's pristine (undamaged) condition is compared with vibration response data collected from the physical structure. Discrepancies between model predictions and monitoring data can be interpreted as structural damage. Unfortunately, multiple sources of uncertainty must also be considered in the analysis, including environmental variability, unknown model functional forms, and unknown values of model parameters. Not accounting for these sources of uncertainty can lead to false-positives or false-negatives in the structural condition assessment. To manage the uncertainty, we propose a robust SHM methodology that combines three technologies. A time series algorithm is trained using "baseline" data to predict the vibration response, compare predictions to actual measurements collected on a potentially damaged structure, and calculate a user-defined damage indicator. The second technology handles the uncertainty present in the problem. An analysis of robustness is performed to propagate this uncertainty through the time series algorithm and obtain the corresponding bounds of variation of the damage indicator. The uncertainty description and robustness analysis are both inspired by the theory of info-gap decision-making. Lastly, an appropriate "size" of the uncertainty space is determined through physical experiments performed in laboratory conditions. Our hypothesis is that examining how the uncertainty space changes throughout time might lead to superior diagnostics of structural damage as compared to only monitoring the damage indicator. This methodology is applied to a portal frame structure to assess if the strategy holds promise for robust SHM. (Publication approved for unlimited, public release on October-28

  12. Security of practical quantum key distribution systems

    Jain, Nitin


    This thesis deals with practical security aspects of quantum key distribution (QKD) systems. At the heart of the theoretical model of any QKD system lies a quantum-mechanical security proof that guarantees perfect secrecy of messages - based on certain assumptions. However, in practice, deviations between the theoretical model and the physical implementation could be exploited by an attacker to break the security of the system. These deviations may arise from technical limitations and operational imperfections in the physical implementation and/or unrealistic assumptions and insufficient constraints in the theoretical model. In this thesis, we experimentally investigate in depth several such deviations. We demonstrate the resultant vulnerabilities via proof-of-principle attacks on a commercial QKD system from ID Quantique. We also propose countermeasures against the investigated loopholes to secure both existing and future QKD implementations.

  13. Why Shade Coffee Does Not Guarantee Biodiversity Conservation.

    César Tejeda-Cruz


    Full Text Available Over the past decade, various strategies have emerged to address critical habitat losses through agricultural expansion. The promotion of shade-grown, premium-priced coffee has been highlighted as one alternative. Our research, based on interviews with farmers in Chiapas, disputes some of the assumptions made by shade coffee campaigners. Results revealed a predisposition to converting forest to shade coffee production due to the socioeconomic challenges farmers face and the potential for increasing incomes. To ensure that their well-being is improved at the same time as reducing environmental impacts, there is clearly a need to provide more detailed information on who is responsible for enforcing certification criteria and how this should take place.

  14. Key World Energy Statistics 2012



    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  15. Improved Anonymity for Key-trees

    Veugen, P.J.M.; Beye, M.


    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  16. Design of stability-guaranteed fuzzy logic controller for nuclear steam generators

    Cho, Byung Hak


    rule tables according to given learning parameters. Although the FLC introduced above can guarantee the stability of the control system, the FLC have a structural handicap that the number of rules to be determined goes numerous by adding new input variables. Thus the number of input variables are normally limited by two, or separated rules are developed for the other major variables. This means that the FLC cannot use all of the available information necessary to make the control system robust. In order to overcome these difficulties, a robust fuzzy logic gain scheduler (robust FLGS) is designed based on the synthesis of fuzzy logic inference and H ∞ technique which is one of the most commonly used one in the field of robust control system design. The robust FLGS has a set of robust control gains in a gain pool. The fuzzy inference engine chooses one of the most desirable control gain considering the S/G operatin condition. The robust gains in the gain pool are determined by the time domain H ∞ control technique such that both of the weighted H ∞ norms of the two transfer functions are minimized. One of the transfer functions is from the steam flow disturbance to the mass capacity portion of S/G level, and the other is from the steam flow disturbance to the reverse dynamics of S/G. The robustness of FLGS in the face of S/G parameter variation is checked. The result shows that the robust FLGS with H ∞ control gain is stable as long as the sign of S/G parameter is not changed due to variation. The FLGS rules are automatically generated using a genetic algorithm (GA). The genetic algorithm (GA) gives a set the gain scheduling rules that reflect given performance design specification well. The computer simulation confirms that the proposed controller shows both of guaranteed stability and good performance in terms of small overshoot and fast settling time in spite of S/G parameter variations and steam flow disturbances

  17. Community oral health literacy: improving use of oral-health care guarantee in children aged 6.

    Marco Cornejo-Ovalle


    Full Text Available The assessment of comprehensive oral health care for children aged 6 (GES-6years showed low utilization of this guarantee, with lower use for children from municipal public schools. The empowerment and health literacy of parents improve their role as oral-health promoters for their children. Objective: To implement and to assess a strategy of empowerment and health literacy of the community about their guaranteed health rights to increase the use of GES-6years. Methods: A mixed design. Using qualitative methodology we will design a communication tool, culturally and socially appropriate to be sent to the beneficiary community of this guarantee. Using a nonrandomized community trial, this instrument designed to empower and improve oral health literacy on GES-6 guarantee, will be sent as personalized letter (intervention signed by the mayor of the municipality with a message aimed to children beneficiaries for GES -6years and another addressed to their parents/guardians. Schools would be selected from clusters (communes of the two regions selected for convenience. Communes will be randomly selected amog those whose authorities agree to participate, and will be selected as for intervention or control. Data analysis will assess the differences in the prevalence of use of this guarantee among children from municipal schools belonging to the intervention or control arm.


    Emilian CIONGARU


    Full Text Available The principle of ensuring the legal bases of the State functioning is the fundamental principle of law which actually settles down the principle of separation of powers: legislative, executive and judicial power. Over the time, the principle of separation of powers, although in practice its enforcement experienced more than two centuries, it hasn’t expressed itself in a pure form, not even in the most advanced democracies. Whether it is approached the thesis of a more flexible or more rigid separation of powers or the thesis on certain exceptions to those two situations specific to certain political regimes, the principle of separation of powers is the fundamental mechanism in ensuring a balance of powers and preventing the establishment of a dictatorial or authoritarian regime. The complex content of the rule of law consists of: the rule of law regency; the capitalization on the actual size of the fundamental rights and freedoms; the achievement of the balance/mutual cooperation of public authorities and the performance of free access to justice. If the form of State organization of the political power of the people is done by several groups or categories of State bodies with functions and features clearly defined and characterized by organizational and functional autonomy, as well as mutual balance and collaboration, it is emerging the principle of separation of the State powers balance.

  19. Project Guarantee 1985. Final repository for low- and intermediate level radioactive wastes: Safety report



    Storage of radioactive waste must delay the return of radionuclides to the biosphere for a long period of time and must maintain the release rates at a sufficiently low level for all time. This is achieved with the aid of a series of safety barriers which consist, on the one hand, of technical barriers in the repository and, on the other hand , of natural geological barriers as they occur at the repository location. In order to assess the efficiency of the barriers, the working methods of the technical barriers and the host rock must be understood. This understanding is transferred into quantitative models in order to calculate the safety of the repository. The individual barriers and the methods used to modelling their functions were described in volume NGB 85-07 of the Project Guarantee 1985 report series and the data necessary for modelling were given. The models and data are used in the safety analysis, the results of which are contained in the present report. Safety considerations show that models are available in Switzerland which allow, in principle, an assessment of the long-term behaviour of a repository for low- and intermediate-level waste. The evaluation of earlier studies and experimental work, suitable laboratory measurements and results from field research enable compilation of a representative data-set so that the requirements for quantitative statements on safety of final disposal are met from this side also. The safety calculations show that the radiation doses calculated for a base case scenario with realistic/conservative parameter values are negligibly low. Also, radiation doses which are clearly under the protection standard of 10 mrem per year result for conservative values and the cumulation of several conservative assumptions. Even assuming exposure of the repository by erosion, a radiotoxicity of the soil formed results which is under natural values

  20. Key World Energy Statistics 2013



    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  1. Key China Energy Statistics 2012

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)


    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED ( This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  2. Key China Energy Statistics 2011

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)


    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED ( This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  3. Towards an integral analysis of stereotypes: Challenging the standard guarantee of impartiality

    Laura Clérico


    Full Text Available The use of stereotypes to the detriment of the discriminated group should imply questioning the standard guarantee of judicial impartiality. Even taking the analysis of stereotypes seriously, the depth of its consequences has not been sufficiently taken into account in the constitutional and human rights argumentation because it has not challenged with all intensity the standard way in which the guarantee of impartiality is conceived and applied in legal practice and even by the regional court for the protection of human rights. I will defend two central theses: (1 the use of stereotypes necessarily impacts on the analysis of the guarantee of impartiality and (2 impartiality must get rid of the presumption of impartiality.

  4. Asset securitization and rate of return: A study on letters of guarantee

    Wu, Binghui


    Using the theory of asset securitization, we analyze the feasibility of the securitization of letters of guarantee in theory. In the process of constructing the model of rate of return of securities backed by letters of guarantee, we propose two indices: the risk probability of asset-backed securities and the loss rate of asset-backed securities to analyze the cash flow of securities. On the basis of no arbitrage principle, the expression of rate of return of securities backed by letters of guarantee is put forward. In order to study the relationship between the rate of return of securities and other influential factor in the model, a simulation experiment is designed. The experiment results show that (i) an increasing risk probability of cash flow or a short maturity date also make the return rate of securities increase and (ii) the return rate of securities is higher in economic boom than that in economic recession when other parameters remain unchanged.

  5. The structure and economic significance of government guarantees in Croatia and the European Union

    Marko Primorac


    Full Text Available In the aftermath of the financial crisis, when countries are facing difficulties in raising the amounts of revenue needed to cover the expenditure side of the budget, fiscal risks can pose a significant threat to the sustainability of public finance. This became particularly evident in the case of public enterprises and their liabilities, which often increased public debt because of difficulties in meeting their financial obligations. The aim of this paper is to evaluate fiscal risks from government guarantees in Croatia and the European Union in general. Moreover, the paper aims to analyse the dynamics of the value and structure of government guarantees in Croatia in the period from 2009 to first half of 2015. Particular emphasis is placed on the impact of government guarantees on direct public debt in the context of methodological changes in the registration of public debt.




    Full Text Available The letter of guarantee is frequently used in the domestic and international commercial activity, first of all, for the safety offered for securing the contractual obligations without blocking the pecuniary funds and, second of all, due to the existing uniform international regulations that correspond to the needs supporting the occurrence of these types of autonomous securities.In Romania, the lack of legal policing of the letter of guarantee has created practical difficulties and offered judges the possibility to "make the law" in the litigations generated by the enforcement or by the suspension of enforcement of these contractual securities.This work analysis the regulation of the letter of guarantee provided in the New Civil Code from the perspective of its harmonization with the Uniform Rules of the International Chamber of Commerce in Paris and with the Draft Common Frame of Reference in the matter of the European private law.

  7. Designing area optimized application-specific network-on-chip architectures while providing hard QoS guarantees.

    Sajid Gul Khawaja

    Full Text Available With the increase of transistors' density, popularity of System on Chip (SoC has increased exponentially. As a communication module for SoC, Network on Chip (NoC framework has been adapted as its backbone. In this paper, we propose a methodology for designing area-optimized application specific NoC while providing hard Quality of Service (QoS guarantees for real time flows. The novelty of the proposed system lies in derivation of a Mixed Integer Linear Programming model which is then used to generate a resource optimal Network on Chip (NoC topology and architecture while considering traffic and QoS requirements. We also present the micro-architectural design features used for enabling traffic and latency guarantees and discuss how the solution adapts for dynamic variations in the application traffic. The paper highlights the effectiveness of proposed method by generating resource efficient NoC solutions for both industrial and benchmark applications. The area-optimized results are generated in few seconds by proposed technique, without resorting to heuristics, even for an application with 48 traffic flows.

  8. Administrative Circular No. 13 (Rev. 4) - Guarantees for representatives of the personnel

    Department Head Office - HR Department


    Administrative Circular No. 13 (Rev. 4) entitled "Guarantees for representatives of the personnel", approved by the Director-General following discussion in the Standing Concertation Committee meeting on 22 March 2016, will be available on 1st September 2016 via the following link:   This revised circular cancels and replaces Administrative Circular No. 13 (Rev. 3) also entitled "Guarantees for representatives of the personnel" of January 2014. This document contains a single change to reflect the terminology under the new career structure: the term "career path" is replaced by "grade". This circular will enter into force on 1st September 2016.

  9. European beef consumers' interest in a beef eating-quality guarantee

    Verbeke, Wim; Van Wezemael, Lyn; de Barcellos, Marcia Dutra


    and Germany to assess their opinions about beef muscle profiling and their interest in a beef eating-quality guarantee. Findings indicate that both concepts are well accepted by European beef consumers, although not unconditional. Besides acknowledging the opportunity to purchase beef with guaranteed...... tenderness, consumers express some reserve related to the possible upgrading of lower value cuts, too much standardisation, and the fact that tenderness is to some extent subjective. They further require the system to be simple, sufficiently documented and independent-party controlled. The insights obtained...

  10. Key Facts about Tularemia

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  11. Key technologies book


    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  12. The Key Lake project

    Glattes, G.


    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de


    B. Lakshmi


    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  14. Getting more than contractually guaranteed. Five years energy conservation contracting in the clinic Bremerhaven; Mehr bekommen als vertraglich garantiert. Fuenf Jahre Energiespar-Contracting im Klinikum Bremerhaven

    Breuer, Juergen [Klinikum Bremerhaven-Reinkenheide (Germany); Habel, Birger; Harneit, Maurice; Kahmann, Lars [Siemens AG, Region Nord (Germany). Building Technologies Div.


    Most hospitals in Germany virtually throw their money out the window - for heat that could be produced more efficiently, for air that would not be worked up or for coldness which is produced at the wrong place at the wrong time and with low efficiency. Quite different in the Hospital Bremerhaven-Reinkenheide (Bremerhaven, Federal Republic of Germany): In 2004, the hospital administration decided for energetic modernization of building systems based on energy performance contracting with 25% of guaranteed conservation.

  15. Project Guarantee 1985. Repository for low- and intermediate-level radioactive waste: construction and operation



    A constructional engineering project study aimed at clarification of the feasibility of a repository for low- and intermediate-level radioactive waste (type B repository) has been carried out; the study is based on a model data-set derived from the geological, rock mechanical and topographical characterictics of one of Nagra's planned exploration areas. Final storage is effected in subterranean rock caverns accessed by horizontal tunnel. The reception area also is sited below the surface. Storage is conceived in such a way that, after closure of the repository, maintenance and supervision can be dispensed with and a guarantee of high long-term safety can nevertheless be provided. The envisaged repository consists of an entry tunnel for road vehicles and a reception area with a series of caverns for receiving waste, for additional technical facilities and for the production of the concrete back-fill material. The connecting tunnel is serviced by a tunnel railway and the actual repository area consists of several storage caverns. The repository is intended to accomodate a total of 200'000 m3 of solidified low- and intermediate-level waste. Valanginian marl is assumed as the host rock, although it would also be basically possible to house the proposed installations in other host rocks. The excavated material will total around 1'000'000 m3. The construction time for the whole installation is estimated as about 7 years and a working team of around 30 people will be required for the estimated 60-year operational duration. The project described in the present report justifies the conclusion that construction of a repository for low-and intermediate-level radioactive waste is feasible with present-day technology. This conclusion takes into consideration quantitative and operational constraints as well as geological and hydrogeological data relevant to constructional engineering. The latter are derived from a model data-set based on a specific locality

  16. Expert assessment of preventive measures in the zone of guaranteed voluntary resettlement.

    Ozerova, I I; Prilipko, V A; Myshkovska, A A


    An expert evaluation of preventive measures focused on population health maintenance in the zone of guaranteed voluntary resettlement taking into account the limitations of the provisions of certain articles of the Law of Ukraine on the clean-up of the Chornobyl disaster aftermath. The research survey was applied using a peer review method. The three-level (national, regional, district) expert workgroup was involved been employed within recovery of the Chornobyl disaster aftermath. Professional experience of minimum 10 years, corresponding profile and current position were the requirements for selection. A simple streamlining the values of paired or consistent comparison was applied on the primary empirical data. The arrangements made in recent years by the Cabinet of Ministers of Ukraine and ministries engaged in clean-up and recovery from the Chornobyl nuclear power plant accident are ineffective. Costs from the Fund for the implementation of measures to clean-up the consequences of the Chornobyl disaster and social protection are reduced. There is no consensus among experts regarding some constraint of an action of certain articles of the Law of Ukraine "On the status and social protection of citizens affected by the Chornobyl disaster" on the principles of social protection and healthcare of the population living in contaminated areas. In addressing the social and health consequences of the Chornobyl disaster the Verkhovna Rada of Ukraine just for a long time has passes no amendment to the legislation on the subject. At that there are several restrictions in force for a large number of articles of the existing laws that were adopted in 1991. The mentioned above exacerbates social strain and destroys the "citizen-state relationship". The extreme need has emerged in a comprehensive public review of existing laws with involvement of multidisciplinary group of experts to a "round table" to justify the draft laws. Ozerova Ju. Ju., Prylypko V. A., Myshkovska A. A

  17. The impact of new technologies in balancing private and family life with working time

    Teresa Coelho Moreira


    The work-life balance is a fundamental issue for all the workers and it is linked to many others, such as quality of work, female participation in the labour market, gender equality and active ageing.Among the new challenges of contemporary society, a key role is played by the introduction in the workplaces of new digital and computer technologies, which may change working-time arrangement and, at the same time, guarantee more flexibility in working-time.On the one hand, this phenomenon can l...

  18. 13 CFR 120.210 - What percentage of a loan may SBA guarantee?


    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What percentage of a loan may SBA guarantee? 120.210 Section 120.210 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS... percent, except as otherwise authorized by law. [61 FR 3235, Jan. 31, 1996, as amended at 68 FR 51680, Aug...

  19. 76 FR 30904 - Rural Utilities Service Telecommunications Loan and Loan Guarantee Program


    ..., this new approach will give our customers increased flexibility to find and deploy technology that... DEPARTMENT OF AGRICULTURE Rural Utilities Service Rural Utilities Service Telecommunications Loan and Loan Guarantee Program AGENCY: Rural Utilities Service, USDA. ACTION: Notice of elimination of the...

  20. Pricing Rate of Return Guarantees in Regular Premium Unit Linked Insurance

    Schrager, D.F.; Pelsser, A.


    We derive general pricing formulas for Rate of Return Guarantees in Regular Premium Unit Linked Insurance under stochastic interest rates. Our main contribution focusses on the effect of stochastic interest rates. First, we show the effect of stochastic interest rates can be interpreted as, what is

  1. Strategy for introduction of quality guarantee in the supporting infrastructure to nucleoenergetics for a mixed association

    Jimenez, P.; Fernandez, R.


    The work consists in raising and proposing and integral strategy for the assimilation of the quality guarantee by all national enterprises, companies and institutions that participate in the nucleoenergetics program and specially for a mixed association to conclude the construction, starting-up and operation of Juragua nuclear power plants

  2. 7 CFR 1980.443 - Collateral, personal and corporate guarantees and other requirements.


    ... the concurrence of FmHA or its successor agency under Public Law 103-354. (b) Personal and corporate... 7 Agriculture 14 2010-01-01 2009-01-01 true Collateral, personal and corporate guarantees and... (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM...

  3. 22 CFR 213.3 - Loans, guarantees, sovereign and interagency claims.


    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Loans, guarantees, sovereign and interagency claims. 213.3 Section 213.3 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT CLAIMS COLLECTION... thereof, or any public international organization; (d) Claims where the CFO determines that the...

  4. 75 FR 5902 - Guarantees for Bonds and Notes Issued for Electrification or Telephone Purposes


    ... Submission Form,'' must be completed. (If you click on the hyperlink of the docket when the search returns it.... 3. Amend Sec. 1720.3 by adding the definition of ``Eligible Loan'' to read as follows: Sec. 1720.3 Definitions. * * * * * Eligible Loan means a loan that a guaranteed lender extends to a borrower for up to 100...

  5. Fair Valuation of Guaranteed Contracts : The Interaction Between Assets and Liabilities

    Charlier, E.; Kleynen, R.H.M.A.


    In this paper we study the investment behavior of an insurance company consisting of policy and equity holders and issuing fair valued guaranteed contracts.Building up on the work of Briys and De Varenne (1997) and De Munnik and Schotman (1994) an intertemporal stochastic asset model and an interest

  6. 13 CFR 107.1600 - SBA authority to issue and guarantee Trust Certificates.


    ... ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Funding... guarantee by SBA of such TC is limited to the principal and interest due on the Debentures or the Redemption... to arrange public or private fundings of Leverage. SBA in its discretion may arrange for public or...

  7. 77 FR 21793 - Notice of Proposed Information Collection for Public Comment; Loan Guarantee for Indian Housing


    ... Number: 2577-0200. Description of the need for the information and proposed use: The information is... service areas. Mortgage lenders approved by HUD provide borrower and lender information to HUD for... Information Collection for Public Comment; Loan Guarantee for Indian Housing AGENCY: Office of the Assistant...

  8. 13 CFR 108.820 - Financings in the form of guarantees.


    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Financings in the form of... VENTURE CAPITAL (âNMVCâ) PROGRAM Financing of Small Businesses by NMVC Companies Structuring Nmvc Company's Financing of Eligible Small Businesses § 108.820 Financings in the form of guarantees. (a) General...

  9. 13 CFR 107.820 - Financings in the form of guarantees.


    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Financings in the form of... BUSINESS INVESTMENT COMPANIES Financing of Small Businesses by Licensees Structuring Licensee's Financing of Eligible Small Businesses: Types of Financing § 107.820 Financings in the form of guarantees. At...

  10. An Initial Econometric Consideration of Supply and Demand in the Guaranteed Student Loan Program.

    Bayus, Barry; Kendis, Kurt


    In this econometric model of the Guaranteed Student Loan Program (GSLP), supply is related to banks' liquidity and yield curves, all lenders' economic costs and returns, and Student Loan Marketing Association activity. GSLP demand is based on loan costs, family debt position, and net student need for financial aid. (RW)

  11. 75 FR 17303 - Section 108 Community Development Loan Guarantee Program: Participation of States as Borrowers...


    ... with access to long-term (up to 20-year) fixed-rate loans at relatively low interest rates to finance certain categories of eligible CDBG projects. Historically, section 108 guarantee authority has been... local governments in nonentitlement areas. The July 22, 2009, interim rule implemented the expansion of...

  12. PESTEL Model Analysis and Legal Guarantee of Tourism Environmental Protection in China

    Zhiyong, Xian


    On the basis of summarizing the general situation of tourism environmental protection in China, this paper analyses the macro factors of tourism environmental protection by using PESTEL model. On this basis, this paper explores the improvement paths of tourism environmental protection based on PESTEL model. Finally, it puts forward the legal guarantee suggestion of tourism environment protection.

  13. Economic valuation of a toll road concession with traffic guarantees and the abandonment option

    Frances Fischberg Blank


    Full Text Available Abstract Governments worldwide have been encouraging private participation in transportation infrastructure. To increase the feasibility of a project, public-private partnership (PPP may include guarantees or other support to reduce the risks for private investors. It is necessary to value these opportunities under a real options framework and thereby analyze the project's economic feasibility and risk allocation. However, within this structure, sponsors have an implicit option to abandon the project that should be simultaneously valued. Thus, this article proposes a hypothetical toll road concession in Brazil with a minimum traffic guarantee, a maximum traffic ceiling, and an implicit abandonment option. Different combinations of the minimum and maximum levels are presented, resulting in very high or even negative value added to the net present value (NPV. The abandonment option impacts the level of guarantee to be given. Governments should calibrate an optimal level of guarantees to avoid unnecessarily high costs, protect the returns of the sponsor, and lower the probability of abandonment.

  14. 13 CFR 120.520 - Purchase of 7(a) loan guarantees.


    ... condition of the collateral, plans for any type of loan workout or loan restructuring, existing liquidation activities including the sale of loan collateral, or the status of ongoing foreclosure proceedings. The... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Purchase of 7(a) loan guarantees...

  15. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.


    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...

  16. Fire fighting. Measures to guarantee the safety of the radioactive installations

    Orta Aguilera, R.


    The work relates the incidence of the aspects related to the fire prevention and fighting as well as the activities of rescue and saving in the radioactive facilities, with the objective of guaranteeing a strict safety regime of all installations along the country so as to reduce to the minimum the risk for the personnel, the population and the environment

  17. 24 CFR 573.5 - Underwriting standards and availability of loan guarantee assistance.


    ... acceptable financial risk under HUD's generally applicable loan underwriting standards based on the following: (1) The Borrower's ability to pay debt service; and (2) The value of the collateral assigned or... insufficient to make the guarantee an acceptable financial risk, or if the proposed interest rates or fees are...

  18. QoS-Guaranteed Admission Control for OFDMA-based Systems

    Ramkumar, Venkata; Anggorojati, Bayu; Lucian, Stefan P. Andrei


    This paper proposes a novel admission control (AC) algorithm for guaranteed quality of service (QoS) to all users. The proposed solution provides better utilization of system capacity using adaptive modulation (AM). A scheduler based on a per user priority function is also given in this paper. Th...

  19. 7 CFR 762.129 - Percent of guarantee and maximum loss.


    ... loss. (a) General. The percent of guarantee will not exceed 90 percent based on the credit risk to the lender and the Agency both before and after the transaction. The Agency will determine the percentage of... PLP lenders will not be less than 80 percent. (d) Maximum loss. The maximum amount the Agency will pay...

  20. 75 FR 65615 - Conditional Commitment for a Federal Loan Guarantee for Project Financing for Southwest Intertie...


    ... DEPARTMENT OF ENERGY Conditional Commitment for a Federal Loan Guarantee for Project Financing for... based on the analysis in the Final Environmental Impact Statement for Project Financing for Southwest... support of debt financing for transmission infrastructure investment projects located in the United States...

  1. Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks

    Azarderskhsh Reza


    Full Text Available Information security in infrastructureless wireless sensor networks (WSNs is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in order to monitor, gather, disseminate, and provide the sensed data to the command node. Various studies have focused on key establishment schemes in homogeneous WSNs. However, recent research has shown that achieving survivability in WSNs requires a hierarchy and heterogeneous infrastructure. In this paper, to address security issues in the heterogeneous WSNs, we propose a secure clustering scheme along with a deterministic pairwise key management scheme based on public key cryptography. The proposed security mechanism guarantees that any two sensor nodes located in the same cluster and routing path can directly establish a pairwise key without disclosing any information to other nodes. Through security performance evaluation, it is shown that the proposed scheme guarantees node-to-node authentication, high resiliency against node capture, and minimum memory space requirement.

  2. Comparison is key.

    Stone, Mark H; Stenner, A Jackson


    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  3. Keyed shear joints

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  4. Cryptographic Key Management System

    No, author


    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  5. Turn key contracts

    Feretic, D.


    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  6. Key numbers: Energy


    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  7. Key performance indicators

    Zwetsloot, G.I.J.M.


    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  8. Locks and Keys Service

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  9. Fully Device-Independent Quantum Key Distribution

    Vazirani, Umesh; Vidick, Thomas


    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  10. Symmetric autocompensating quantum key distribution

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.


    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  11. [Key informers. When and How?].

    Martín González, R


    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  12. Semantic Keys and Reading

    Zev bar-Lev


    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  13. Randomness determines practical security of BB84 quantum key distribution

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu


    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.


    Lee, Jeong-Eun; Lee, Seokho [Department of Astronomy and Space Science, Kyung Hee University, Yongin-shi, Kyungki-do 449-701 (Korea, Republic of); Lee, Jinhee [Department of Physics and Astronomy, The University of Georgia, Athens, GA 30602-2451 (United States); Evans II, Neal J.; Green, Joel D., E-mail: [Department of Astronomy, University of Texas at Austin, 2515 Speedway, Stop C1400, Austin, TX 78712-1205 (United States)


    Six low-mass embedded sources (L1489, L1551-IRS5, TMR1, TMC1-A, L1527, and TMC1) in Taurus have been observed with Herschel-PACS to cover the full spectrum from 50 to 210 μm as part of the Herschel key program, ''Dust, Ice, and Gas In Time''. The relatively low intensity of the interstellar radiation field surrounding Taurus minimizes contamination of the [C II] emission associated with the sources by diffuse emission from the cloud surface, allowing study of the [C II] emission from the source. In several sources, the [C II] emission is distributed along the outflow, as is the [O I] emission. The atomic line luminosities correlate well with each other, as do the molecular lines, but the atomic and molecular lines correlate poorly. The relative contribution of CO to the total gas cooling is constant at ∼30%, while the cooling fraction by H{sub 2}O varies from source to source, suggesting different shock properties resulting in different photodissociation levels of H{sub 2}O. The gas with a power-law temperature distribution with a moderately high density can reproduce the observed CO fluxes, indicative of CO close to LTE. However, H{sub 2}O is mostly subthermally excited. L1551-IRS5 is the most luminous source (Ł{sub bol} = 24.5 L {sub ☉}) and the [O I] 63.1 μm line accounts for more than 70% of its FIR line luminosity, suggesting complete photodissociation of H{sub 2}O by a J shock. In L1551-IRS5, the central velocity shifts of the [O I] line, which exceed the wavelength calibration uncertainty (∼70 km s{sup –1}) of PACS, are consistent with the known redshifted and blueshifted outflow direction.

  15. Establishing Key Performance Indicators : Case company X

    Singh, Jatinder


    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  16. Proposal for the diagnosis and monitoring of quality, based on key performance indicators, that may lead to generate improvements in the Servicio de Radiologia of Hospital Mexico

    Brenes Acosta, Carolina; Cortes Barquero, Jorge


    Key performance indicators are proposed for the diagnosis, monitoring of quality and to generate improvements in the Servicio de Radiologia of Hospital Mexico. Critical performance key indicators are identified for service improvement. A method for collection of information is proposed of the individual production of medical assistants from Servicio de Radiologia of Hospital Mexico. Waiting times for patients in the ultrasound are measured in the Radiology Service, as indicator of patient experience and level of service. The satisfaction of treating physicians and their perception about the level quality of the service provided are identified with respect to the reports generated by the Departamento de Radiologia of Hospital Mexico. A peer review system is established to measure the clinical performance of the studies. A structured radiological report template is proposed for radiological practice in the Hospital Mexico, to facilitate its reading and guarantee a minimum standard of quality in information [es

  17. Physician Appraisals: Key Challenges

    Klich Jacek


    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  18. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Harada, H; Katsuura, T; Kikuchi, Y


    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  19. Key papers in prostate cancer.

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit


    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  20. NAGRADATA. Code key. Geology

    Mueller, W.H.; Schneider, B.; Staeuble, J.


    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  1. Using Multiple Paths in NoCs for Guaranteed Resource Allocation and Improved Best Effort Performance in NoCs.

    Ovadia, I.; Ha, Y.; Corporaal, H.


    Networks-on-Chips (NoCs) provide communication platforms to Systems-on-Chips (SoCs). In NoCs, channels are generally shared between traffic flows, resulting in contention. However, certain flows require delivery guarantees. Differentiated quality-of-service (QoS) is achieved by providing guaranteed

  2. How to gain additional knowledge in the situation when university degrees (no longer guarantee suitable employment

    Ana Krajnc


    Full Text Available There were a number of reason for a shortage of educated people in the post-war time. The state planned and dictated acce- lerated development of industry. There was a lack of skilled workers. The war had interrupted education of many individuals and there the casualties among intellectuals were greater than in the rest of population. The demand for qualified workers, recorded by employment agencies, exceeded the supply. As a result, education of adults in practice expanded rapidly. Prac- titioners required professional support and suitable literature. In 1956 the first lectures in andragogy were delivered within the framework of pedadgogy studies at the Faculty of Philo- sophy in Zagreb. In the years to follow, Prof Mihajlo Ogrizovi9, founder of the study subject, published the first works on andragogy Metode obrazovanja odraslih (Adult Education Methodology and Problemi andragogije (Problems of Andra- gogy. In 1960 the Chair of Andragogy was set up at the Faculty of Philosophy in Belgrade (Prof DuOan Savi9evi9, Borivoj Samolov:ev. My decision to get engaged in research into adult education was made while I was working at the Institute of Sociology (1967 and joined the first international comparative research study in this country, Education of Adults, Social Mobility and Social Participation. Lectures in General Andragogy and Andragogical Didactics began in Ljubljana in the Pedagogy Department of the Faculty of Philosophy in 1972. In 1976 the study of andragogy became o special course of study within the Department. In 1993/94 andragogy was introduced as an independent study. The Ministry of Education and Sport confirmed the new study programme within the framework of the European TEMPUS project. The new study programmes were devised under the influence of the best-known world institutes for adult education (The Andragogy Department of Montreal University, the European Bureau for Adult Education in London, Wellington College in Oxford

  3. Performance Guaranteed Inertia Emulation forDiesel-Wind System Feed Microgrid via ModelReference Control

    Melin, Alexander M. [ORNL; Zhang, Yichen [University of Tennessee, Knoxville (UTK), Department of Electrical Engineering and Computer Science; Djouadi, Seddik [University of Tennessee, Knoxville (UTK), Department of Electrical Engineering and Computer Science; Olama, Mohammed M. [ORNL


    In this paper, a model reference control based inertia emulation strategy is proposed. Desired inertia can be precisely emulated through this control strategy so that guaranteed performance is ensured. A typical frequency response model with parametrical inertia is set to be the reference model. A measurement at a specific location delivers the information of disturbance acting on the diesel-wind system to the referencemodel. The objective is for the speed of the diesel-wind system to track the reference model. Since active power variation is dominantly governed by mechanical dynamics and modes, only mechanical dynamics and states, i.e., a swing-engine-governor system plus a reduced-order wind turbine generator, are involved in the feedback control design. The controller is implemented in a three-phase diesel-wind system feed microgrid. The results show exact synthetic inertia is emulated, leading to guaranteed performance and safety bounds.

  4. GRS - Guarantee of results for grid-connected solar photovoltaic systems; GRS - Garantierte Resultate von Solarstromanlagen

    Meier, Ch.; Frei, R.


    This final report for the Swiss Federal Office of Energy describes the development of a performance guarantee for the power delivered by grid-connected photovoltaic (PV) power plant. This is important for investors, who need to be able to calculate the price of the energy produced by the PV plant. The report examines the results of various case studies and experience gained with GRS contracts developed in different countries including Switzerland, the Netherlands, France and Germany. The problems encountered, which provided feedback for the further development of the contract presented in the report, are discussed. The model contract, which proposes a framework which provides many possible variations and adaptations, is presented in detail. Various problem areas such as guaranteed energy yield, meteorological references, correction methods, failure detection, dispute settlement and many other points are covered.

  5. Decentralized guaranteed cost static output feedback vibration control for piezoelectric smart structures

    Jiang, Jian-ping; Li, Dong-xu


    This paper is devoted to the study of the decentralized guaranteed cost static output feedback vibration control for piezoelectric smart structures. A smart panel with collocated piezoelectric actuators and velocity sensors is modeled using a finite element method, and then the size of the model is reduced in the state space using the modal Hankel singular value. The necessary and sufficient conditions of decentralized guaranteed cost static output feedback control for the reduced system have been presented. The decentralized and centralized static output feedback matrices can be obtained from solving two linear matrix inequalities. A comparison between centralized control and decentralized control is performed in order to investigate their effectiveness in suppressing vibration of a smart panel. Numerical results show that when the system is subjected to initial displacement or white noise disturbance, the decentralized and centralized controls are both very effective and the control results are very close


    E. V. Sinicyna


    Full Text Available Organization of the health system of theRussian Federationin the conditions of limited fi nancial resources needed to develop and implement new methods and management mechanisms. Conducted a study in the article allowed to formulate the basic problems of development management of medical organizations and off er possible solutions through the formation of the fi nancial basis for government guarantees of health care inRussia. The article deals with the current reform in the Russian budget-insurance model of health care fi nancing, reveals the content and direction of the program of state guarantees of medical care in the new fi nancing mechanism of public services. Development and implementation of a new funding system in the management of medical organization will help to reduce costs, improve staff effi ciency, improve the quality of public health services.

  7. Manet key management via Mobile Ficlke Key protocol (MFK ...

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  8. The Removal of the Judge as a Guarantee of Fair Criminal Justice

    Yury V. Derishev


    Full Text Available The article is devoted to the institution of the removal of a judge in criminal trial proceedings, which is regarded as the most important guarantees of fair criminal justice. Based on the definition of the nature and content of the mechanism for the removal of a judge, the Authors offer an analysis of the problems of the application of law that accompany its implementation in modern criminal proceedings

  9. Real promise or false hope: DOE's title XVII loan Guarantee

    Massouh, Jennifer F.; Cannon, George D. Jr.; Logan, Suzanne M.; Schwartz, David L.


    While the American Recovery and Reinvestment Act of 2009 expanded the DOE loan guarantee program to include certain ''shovel-ready'' projects, and appropriated $6 billion to cover the credit subsidy cost associated with these projects, it failed to resolve some of the most pressing problems facing the program. Here are some recommendations that may finally get some shovels in the ground. (author)

  10. Compositional Synthesis of Controllers from Scenario-Based Assume-Guarantee Specifications

    Greenyer, Joel; Kindler, Ekkart


    Modern software-intensive systems often consist of multiple components that interact to fulfill complex functions in sometimes safety-critical situations. During the design, it is crucial to specify the system's requirements formally and to detect inconsistencies as early as possible in order to ...... present, in this paper, a novel assume-guarantee-style compositional synthesis technique for MSD specifications. We provide evaluation results underlining the benefit of our approach and formally justify its correctness....

  11. Blanket guarantee, deposit insurance, and risk-shifting incentive: evidence from Indonesia

    Kariastanto, Bayu


    Indonesia established a deposit insurance system to maintain stability in its banking sector after the abolishment of blanket guarantees in 2005. Since the insurance premiums are fixed and flat, deposit insurance may create an incentive for banks to take more risks and transfer the risks to the deposit insurer. Using an option pricing based model of deposit insurance, we compute the fair deposit insurance premiums for all banks listed on the Indonesian stock exchange. We find evidence that ba...

  12. Proposal of a control and quality guarantee program in radiotherapy and radiodiagnosis

    Tovar Rodas, J.A.


    In Guatemala, as regards guarantee and control of quality in the radiotherapy and radiodiagnostic areas, doesn't have until the moment, properly established, an action plan to carry out in systematic form, a program that it satisfies the design requirements and operation in an installation of this nature. However, it is well-known that the techniques that involve the employment of the ionizing radiations are powerful tools for their applications in industry, investigation and medicine; their use should be optimized and the associate risks should be evaluated to prevent them and to limit them. At the moment, the first actions of a guarantee program and quality control are carried out in the radiotherapy area for the intervention of the Secondary Laboratory of Dosimetric Calibration, but the quick growth of this area and the high number of radiodiagnosis facilities that work in the country, they outline the necessity to develop a methodology that solves the problem that is presented by the lack of controls of quality in these practices partly. The present work, presents in first plane the objectives, antecedents, forms of development, available resources and the necessities that are had in each area for the setting in march of the Quality Guarantee Program in Radiotherapy and of the Quality Control Program in Radiodiagnosis

  13. Guarantee Funds of Credits in Romania - Necessity, Features and Networking - II

    Georgeta Dragomir


    Full Text Available In the current context, marked by financial crisis, economic recession, lack of liquidity andlow capitalization, the access tofinancing is more difficult, mainly due to the lack, insufficiency orlimited availability of guarantees. Guarantee funds represent an innovative solution, proven by theEuropean economies and recently launched in Romania. Taking over the international experience inorder to facilitate the SMEs’ access to financial resources has become a necessity in Romania, whichwas reflected by the creation of three specialized financial institutions in granting guarantees domain.These are bodies with private or publiccapital, which relate, based on agreements with commercialbanks. After a period of exposure to major risks from the lack of regulatory activity, the guaranteefunds, along with other non-banking financial institutions are absolutely governed by rules oftheNRB, according to the banking law and special laws. The analysis in this paper is based on the studyof several official documents, reports of specialized bodies, statistics and examples of good practice,summarized and interpreted in through comparison and developments. The aim is to identify anumber of issues that may lead to sensitize the responsible factors-public authorities, creditinstitutions, and specialists-to come up with new practical solutions that would stimulate thefinancing processof small entrepreneurs.

  14. Analysis of Aluminum Resource Supply Structure and Guarantee Degree in China Based on Sustainable Perspective

    Shaoli Liu


    Full Text Available Aluminum is a strategic mineral resource, and China’s aluminum production and consumption is fairly large. However, its supply guarantee is uncertain because of a high dependency on external raw materials. This uncertainty may expand, so finding a way to reduce the uncertainty of aluminum resource supply is especially important. This paper applies the SFA method to analyze the aluminum flows in mainland China from 1996 to 2014, and establishes a supply structure model to measure its supply guarantee degree. The results claim that: (1 China’s aluminum production can satisfy demand and even create a surplus; (2 Domestic self-productive primary and secondary aluminum increased at an annual rate of 12% and 24%; (3 The proportion of self-productive secondary aluminum in the supply structure increased from 7.7% in 1996 to 12.8% in 2014, while that of primary aluminum decreased from 79.6% to 42.8%; (4 The total supply guarantee degree decreased from 87.3% to 55.6% in this period. These results provide a feasible way to solve this plight: the proportion of secondary aluminum in the supply structure should be enhanced, and an efficient aluminum resource recycling system needs to be established as soon as possible to ensure its sustainable supply.

  15. Guaranteed cost control of polynomial fuzzy systems via a sum of squares approach.

    Tanaka, Kazuo; Ohtake, Hiroshi; Wang, Hua O


    This paper presents the guaranteed cost control of polynomial fuzzy systems via a sum of squares (SOS) approach. First, we present a polynomial fuzzy model and controller that are more general representations of the well-known Takagi-Sugeno (T-S) fuzzy model and controller, respectively. Second, we derive a guaranteed cost control design condition based on polynomial Lyapunov functions. Hence, the design approach discussed in this paper is more general than the existing LMI approaches (to T-S fuzzy control system designs) based on quadratic Lyapunov functions. The design condition realizes a guaranteed cost control by minimizing the upper bound of a given performance function. In addition, the design condition in the proposed approach can be represented in terms of SOS and is numerically (partially symbolically) solved via the recent developed SOSTOOLS. To illustrate the validity of the design approach, two design examples are provided. The first example deals with a complicated nonlinear system. The second example presents micro helicopter control. Both the examples show that our approach provides more extensive design results for the existing LMI approach.

  16. The Social and Consumer Standards and Guarantees in Ukraine: the Current Structural and Dynamic Characteristics

    Kolesov Oleksandr S.


    Full Text Available The article attempts to generalize the theoretical approaches to the social guarantees and standards as economic categories. The classification of social guarantees is provided. The dynamic parameters for development of the social and consumer standards adopted in Ukraine were considered. An evaluation of the real poverty level under the system of criteria was carried out. The inconsistency of methods for the poverty evaluation adopted by the Ministry of Social Policy of Ukraine and contradiction of its individual indicators has been indicated. The structural characteristics of the population’s income have been determined. The relevance of the existing social guarantees to their real value in today’s economic conditions have been analyzed. Tendencies of falling of the welfare level of population, resulting in a decline in the consumer demand and a narrowing of the domestic market for goods and services, have been identified. The need to take measures to stimulate small businesses, to overcome corruption, and to deregulate the economy has been indicated.

  17. Keys to Successful EPIQ Business Demonstrator Implementation

    Shoikova, Elena; Denishev, Vladislav


    Shoikova, E., & Denishev, V. (2009). Keys to Successful EPIQ Business Demonstrator Implementation. Paper presented at the 'Open workshop of TENCompetence - Rethinking Learning and Employment at a Time of Economic Uncertainty-event'. November, 19, 2009, Manchester, United Kingdom: TENCompetence.

  18. A Mirage or a Rural Life Line? Analysing the impact of Mahatma Gandhi Rural Employment Guarantee Act on Women Beneficiaries of Assam

    Rituparna Bhattacharyya


    Full Text Available The National Rural Employment Guarantee Act (NREGA, launched in February 2006 was renamed in October 02, 2009 as the Mahatma Gandhi National Rural Employment Guarantee Act (henceforth, MGNREGA. It is an anti-poverty flagship programme of the Government of India. The key purpose of MGNREGA is to enhance wage employment in the rural areas by providing at least 100 days of guaranteed employment to every household in a financial year.  The MGNREGA implementation status report for the financial year 2012-2013 unfolds that the programme has already provided employment to 44.9 million households across 28 districts and five union territories. Hence, it is becoming increasingly difficult to ignore the impact of MGNREGA on women beneficiaries. A plethora of research argues that MGNREGA, which promotes inclusive growth, is a vehicle of change, a lifeline for rural women. So far, however, there has been very little discussion about the impact of MGNREGA on women beneficiaries of Assam. This research is an attempt to examine the participation of women in MGNREGA, Assam. It critically looks at the issues, problems and challenges confronted by the women while working at MGNREGA. Written from a feminist perspective on gender, poverty and women’s empowerment, the research seeks to address the problems of the women beneficiaries through their lived experiences. For this, we conducted in-depth interviews with the women beneficiaries in the months of August and September, 2009 in four remote areas namely, Burka, Chandrapur, Barbhang and Muguriya, the first two situated in Kamrup, while the third and the fourth in Barpeta districts of Assam, where the programme of MGNREGA is on-going. The findings of the research suggest measures so that the programme can be made more effective in the long run.

  19. Key aspects congenital infection

    Yu. V. Lobzin


    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  20. Key figures. Year 2006


    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  1. Key figures. Year 2005


    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  2. The Public-Key-Infrastructure of the Radiological Society of Germany

    Schuetze, B.; Kaemmerer, M.; Klos, G.; Mildenberger, P.


    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law

  3. The Public-Key-Infrastructure of the Radiological Society of Germany

    Schuetze, B. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)]. E-mail:; Kaemmerer, M. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Klos, G. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Mildenberger, P. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)


    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law.

  4. Drawing a Link—Women’s Empowerment and Mahatma Gandhi National Rural Employment Guarantee Act: A Study Conducted in the Goalpara District, Assam

    Dr Manisha Bhattacharyya


    Full Text Available This article reports on an empirical research that examined the extent of economic empowerment gained by women engaged in Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA in the district of Goalpara, Assam. The key objective of the MGNREGA is to provide social security to rural households by guaranteeing 100 days of paid employment in public works within a year. Based on nine variables (education, land ownership, ownership of other assets, control over income contributed by a woman to her family, control over the income of the family, savings, access to credit, social participation, cash income earned from income generating activities and calculated using empowerment index, the research compared the magnitude of women’s empowerment before and after getting involved in MGNREGA. The findings suggest that while MGNREGA is an important leap to ensuring economic empowerment to rural women, but the scheme has not been implemented properly in the district—women and men not getting 100 days of employment, irregular mode of payment, very slow progress and poor quality in public works.

  5. Key Concepts in Microbial Oceanography

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A


    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site( This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  6. Smooth Phase Interpolated Keying

    Borah, Deva K.


    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  7. RSA Key Development Using Fingerprint Image on Text Message

    Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti


    Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.

  8. Dynamic Group Diffie-Hellman Key Exchange under standard assumptions

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David


    Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public-private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model

  9. La progettazione di nuovi spazi educativi per l’infanzia: da Ellen Key a Maria Montessori

    Tiziana Pironi


    Full Text Available The essay presents a comparison between the thought of Ellen Key and that of Maria Montessori. Changes that involved the role of women, caught in its interdependence with the development of new educational practices, were the center of the theoretical contribution of Ellen Key. Maria Montessori believed that only women work outside the home would guarantee the economic independence necessary to form a union on sentiment rather than on utilitarian calculations and therefore she did not seem to share the concerns of the Key on an increasingly massive female entry into the world of work. The paper offers an updated reflection on the work of two scholars of education.

  10. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    Guo, Ying; Shi, Ronghua [School of Information Science and Engineering, Central South University, Changsha 410083 (China); Zeng, Guihua [Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030 (China)], E-mail:, E-mail:, E-mail:


    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  11. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    Guo, Ying; Shi, Ronghua; Zeng, Guihua


    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  12. Global Environmental Governance as a Regulatory and Guarantee Criterion for Environmental Justice

    Denise Schmitt Siqueira Garcia


    Full Text Available This article deals with the theme of Global Environmental Governance to the achievement of Environmental Justice, presenting as general objective to analyze the importance of the first in its public, business and civil society spheres for the regulation and guarantee of the second. Noting up at the end that the Environmental Justice, as a common humanitarian problem, presents itself as the main objective of Global Environmental Governance. In the methodology was adopted the inductive method, having been applied the techniques of the referent, category, operational concepts, bibliographical research and file.

  13. The Guarantee Contract as a Typical Warranty Business in Brazilian Civil Law

    Fábio Siebeneichler de Andrade


    Full Text Available This paper deals with the guarantee contract, which is one of the most important forms of legal assurance business. It is one of the most widely used businesses in Brazilian negotiating practice. In this sense, considering the fact that Brazilian Private Law has gone through a renovation, by virtue of legislation such as the Civil Code of 2002 and the Consumer Protection Code, which welcomed the principle of good faith and social function of the contract, it is necessary to examine this important contract and check if it’s discipline is appropriate to the new contractual principles.

  14. National Rural Employment Guarantee Scheme, poverty and prices in rural India.

    Gaiha, Raghav; Kulkarni, Vani S; Pandey, Manoj K; Imai, Katsushi S


    The objective of this analysis is mainly to construct an intuitive measure of the performance of the National Rural Employment Guarantee Scheme (NREGS) in India. The focus is on divergence between demand and supply at the district level. Some related issues addressed are: (i) whether the gap between demand and supply responds to poverty; and (ii) whether recent hikes in NREGS wages are inflationary. Our analysis confirms responsiveness of the positive gap between demand and supply to poverty. Also, apprehensions expressed about the inflationary potential of recent hikes in NREGS wages have been confirmed. More importantly, higher NREGS wages are likely to undermine self-selection of the poor in it.

  15. Major risks and financial guarantees provided by the State in France

    Brassard, Guy


    France's system for indemnifying damage from natural catastrophe is exemplary, whether for floods, storms, or subsidence. However, France is not equipped with the financial capacity to deal with the damage resulting from an exceptional disaster, such as an earthquake on the Mediterranean coast, or a nuclear meltdown. Major catastrophes could be a significant risk to the financial stability of the State today, because the State is in fact the ultimate insurer of its citizens and its institutions. It would be wise to built up reserves in order to enhance the financial resources of the State and to provide a uniform guarantee covering major risks, whatever the cause of the damage may be. (author)

  16. Quality Guarantee in the services that the LSCD of Guatemala lends

    Dieguez Davila, L.


    It is of supreme importance that the instruments used in the radiological protection, as well as those used in clinical dosimetry, maintain trazability to primary patterns; this way it is guaranteed that the used magnitudes are reproducible in the secondary laboratories. This premise is important, however, it is indispensable that the laboratories can establish the necessary procedures in writing to make the mensurations that are involved in the calibrations and the other services characteristic of a secondary laboratory. The present work demonstrates as all the lent services in the secondary laboratory of dosimetric calibration of Guatemala are carried out by means of the procedures of quality demanded at international level

  17. A coherent and effective system to guarantee the quality of a radiotherapy service from the point of view of the unit of hospital radio physics

    Esposito, R. D.; Planes Meseguer, D.; Dorado Rodriguez, M. P.


    The technological advances that have been introduced in modern radiotherapy services involve, on the one hand, an improvement in accuracy of treatments and, on the other hand, the necessity of implementation of an extensive set of controls that guarantee quality in all phases]. A system of consistent quality, detailed and, at the same time, practical is necessary due to the interdisciplinary nature of these services. In this paper we describe the implementation of a system on our service, focusing on the aspects of Radio physics. (Author)

  18. We Don’t Want to Be Officially Certified! Reasons and Implications of the Participatory Guarantee Systems

    Mamen Cuéllar-Padilla


    Full Text Available Official organic regulation in Europe is based on the third-party certification system to guarantee organic products. Many critics and dissatisfactions have motivated the emergence of other guarantee systems, based on an intense implication of producers and, in some cases, consumers and other local actors, involved in localised agri-food systems. They are called Participatory Guarantee Systems (PGS, and are not recognised as valid guarantee systems by the official organic regulation. In the present paper, we analyse the main differences between the PGS and the third party certification system, deepening on their differentiated social and political implications. We conclude that the procedures behind PGS generate numerous positive impacts in the territories related to local producers (and consumers empowerment and localised agri-food systems drive, while their implications make them not considered as a substitute to third party certification system, unless certain conditions of social consolidated groups and agroecological and food sovereignty perspective of food system take place.

  19. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F


    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  20. Key to good fit: body measurement problems specific to key ...

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  1. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  2. Finite key analysis in quantum cryptography

    Meyer, T.


    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  3. Oral and public confrontation as guarantee of a democratic constitutional criminal procedure

    Thiago Miranda Minagé


    Full Text Available Understanding the criminal process under the aegis of a Democratic State of Law requires, in addition to a critical re-reading of institutes already consolidated in a specific system model, it is still necessary to abandon them when they have legitimacy. It should be understood that the role to be played by the parties through the contradictory is fundamental and will never be possible without the support of orality and publicity of the acts. In order to control the observance of procedural safeguards, it is necessary to establish the contradictory as true guarantor of procedural guarantees. In order to do so, only the respective guarantees will be effective, when, all and any probative production is developed publicly and orally, through a procedural rite previously established in the law. To this end, the present work begins with an analysis of the inquisitive system and its permanent interference in our current criminal process, proposing an overcoming of the current system, which is the accusatory, in view of its inability to contain inquisitive interference, proposing a new Vision of system as a way of perfecting what was then valid, based on the premise of a change of the unifying principle in order to enhance the oral and publicity of the acts.

  4. Design of stability-guaranteed fuzzy logic controller for nuclear steam generators

    Cho, B.H.; No, H.C.


    A fuzzy logic controller (FLC) and a fuzzy logic filter (FLF), which have a special type of fuzzifier, inference engine, and defuzzifier, are applied to the water level control of a nuclear steam generator (S/G). It is shown that arbitrary two-input, single-output linear controllers can be adequately expressed by this FLC. A procedure to construct stability-guaranteed FLC rules is proposed. It contains the following steps: (1) the stable sector of linear feedback gains is obtained from the suboptimal concept based on LQR theory and the Lyapunov's stability criteria; (2) the stable sector of linear gains is mapped into two linear rule tables that are used as limits for the FLC rules; and (3) the construction of an FLC rule table is done by choosing certain rules that lie between these limits. This type of FLC guarantees asymptotic stability of the control system. The FLF generates a feedforward signal of S/G feedwater from the steam flow measurement using a fuzzy concept. Through computer simulation, it is found that the FLC with the FLF works better than a well-tuned PID controller with variable gains to reduce swell/shrink phenomena, especially for the water level deviation and abrupt steam flow disturbances that are typical in the existing power plants


    Cristian Bichi


    Full Text Available This paper compares the Romanian and EU deposit insurance legislation in order to identify the changes, which are needed in order to obtain a full compatibility of the national regulations in the field of deposit protection with the corresponding European rules. The first part outlines the main features of the EU Directive 94/19/EEC on deposit guarantee schemes in order to find out to what extent Romania is bound to incorporate the relevant acquis communautaire into its national legislation. It results that the directive contains explicit harmonization provisions as regards the minimum level of protection (EUR 20,000, depositor co-insurance, types of depositors, instruments and currencies to be covered, nature of coverage, status of branches from EU and non-EU countries, the compensation period and information to depositors. The directive does not provide for the harmonization of the financial and administrative structure of the deposit guarantee schemes, Romania being free to choose from a wider range of options. The second part examines the legal environment of deposit protection in Romania. The third part identifies the measures to be taken by the Romanian authorities in order to fill in the remaining regulatory gaps in the area of deposit insurance. Finally, the fourth part contains the conclusions.

  6. Takagi-Sugeno fuzzy model identification for turbofan aero-engines with guaranteed stability

    Ruichao LI


    Full Text Available This paper is concerned with identifying a Takagi-Sugeno (TS fuzzy model for turbofan aero-engines working under the maximum power status (non-afterburning. To establish the fuzzy system, theoretical contributions are made as follows. First, by fixing antecedent parameters, the estimation of consequent parameters in state-space representations is formulated as minimizing a quadratic cost function. Second, to avoid obtaining unstable identified models, a new theorem is proposed to transform the prior-knowledge of stability into constraints. Then based on the aforementioned work, the identification problem is synthesized as a constrained quadratic optimization. By solving the constrained optimization, a TS fuzzy system is identified with guaranteed stability. Finally, the proposed method is applied to the turbofan aero-engine using simulation data generated from an aerothermodynamics component-level model. Results show the identified fuzzy model achieves a high fitting accuracy while stabilities of the overall fuzzy system and all its local models are also guaranteed. Keywords: Constrained optimization, Fuzzy system, Stability, System identification, Turbofan engine

  7. Optimal physiological structure of small neurons to guarantee stable information processing

    Zeng, S. Y.; Zhang, Z. Z.; Wei, D. Q.; Luo, X. S.; Tang, W. Y.; Zeng, S. W.; Wang, R. F.


    Spike is the basic element for neuronal information processing and the spontaneous spiking frequency should be less than 1 Hz for stable information processing. If the neuronal membrane area is small, the frequency of neuronal spontaneous spiking caused by ion channel noise may be high. Therefore, it is important to suppress the deleterious spontaneous spiking of the small neurons. We find by simulation of stochastic neurons with Hodgkin-Huxley-type channels that the leakage system is critical and extremely efficient to suppress the spontaneous spiking and guarantee stable information processing of the small neurons. However, within the physiological limit the potassium system cannot do so. The suppression effect of the leakage system is super-exponential, but that of the potassium system is quasi-linear. With the minor physiological cost and the minimal consumption of metabolic energy, a slightly lower reversal potential and a relatively larger conductance of the leakage system give the optimal physiological structure to suppress the deleterious spontaneous spiking and guarantee stable information processing of small neurons, dendrites and axons.

  8. ADMIT: a toolbox for guaranteed model invalidation, estimation and qualitative-quantitative modeling.

    Streif, Stefan; Savchenko, Anton; Rumschinski, Philipp; Borchers, Steffen; Findeisen, Rolf


    Often competing hypotheses for biochemical networks exist in the form of different mathematical models with unknown parameters. Considering available experimental data, it is then desired to reject model hypotheses that are inconsistent with the data, or to estimate the unknown parameters. However, these tasks are complicated because experimental data are typically sparse, uncertain, and are frequently only available in form of qualitative if-then observations. ADMIT (Analysis, Design and Model Invalidation Toolbox) is a MatLab(TM)-based tool for guaranteed model invalidation, state and parameter estimation. The toolbox allows the integration of quantitative measurement data, a priori knowledge of parameters and states, and qualitative information on the dynamic or steady-state behavior. A constraint satisfaction problem is automatically generated and algorithms are implemented for solving the desired estimation, invalidation or analysis tasks. The implemented methods built on convex relaxation and optimization and therefore provide guaranteed estimation results and certificates for invalidity. ADMIT, tutorials and illustrative examples are available free of charge for non-commercial use at

  9. ADMIT: a toolbox for guaranteed model invalidation, estimation and qualitative–quantitative modeling

    Streif, Stefan; Savchenko, Anton; Rumschinski, Philipp; Borchers, Steffen; Findeisen, Rolf


    Summary: Often competing hypotheses for biochemical networks exist in the form of different mathematical models with unknown parameters. Considering available experimental data, it is then desired to reject model hypotheses that are inconsistent with the data, or to estimate the unknown parameters. However, these tasks are complicated because experimental data are typically sparse, uncertain, and are frequently only available in form of qualitative if–then observations. ADMIT (Analysis, Design and Model Invalidation Toolbox) is a MatLabTM-based tool for guaranteed model invalidation, state and parameter estimation. The toolbox allows the integration of quantitative measurement data, a priori knowledge of parameters and states, and qualitative information on the dynamic or steady-state behavior. A constraint satisfaction problem is automatically generated and algorithms are implemented for solving the desired estimation, invalidation or analysis tasks. The implemented methods built on convex relaxation and optimization and therefore provide guaranteed estimation results and certificates for invalidity. Availability: ADMIT, tutorials and illustrative examples are available free of charge for non-commercial use at Contact: PMID:22451270

  10. A Conflict-Free Low-Jitter Guaranteed-Rate MAC Protocol for Base-Station Communications in Wireless Mesh Networks

    Szymanski, T. H.

    A scheduling algorithm and MAC protocol which provides low-jitter guaranteed-rate (GR) communications between base-stations (BS) in a Wireless Mesh Network (WMN) is proposed. The protocol can provision long-term multimedia services such as VOIP, IPTV, or Video-on-Demand. The time-axis is partitioned into scheduling frames with F time-slots each. A directional antennae scheme is used to provide each directed link with a fixed transmission rate. A protocol such as IntServ is used to provision resources along an end-to-end path of BSs for GR sessions. The Guaranteed Rates between the BSs are then specified in a doubly stochastic traffic rate matrix, which is recursively decomposed to yield a low-jitter GR frame transmission schedule. In the resulting schedule, the end-to-end delay and jitter are small and bounded, and the cell loss rate due to primary scheduling conflicts is zero. For dual-channel WMNs, the MAC protocol can achieve 100% utilization, as well as near-minimal queueing delays and near minimal delay jitter. The scheduling time complexity is O(NFlogNF), where N is the number of BSs. Extensive simulation results are presented.

  11. Simultaneous transmission for an encrypted image and a double random-phase encryption key

    Yuan, Sheng; Zhou, Xin; Li, Da-Hai; Zhou, Ding-Fu


    We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.

  12. Experimental investigation of quantum key distribution with position and momentum of photon pairs

    Almeida, M.P.; Walborn, S.P.; Souto Ribeiro, P.H.


    We investigate the utility of Einstein-Podolsky-Rosen correlations of the position and momentum of photon pairs from parametric down-conversion in the implementation of a secure quantum key distribution protocol. We show that security is guaranteed by the entanglement between down-converted pairs, and can be checked by either direct comparison of Alice and Bob's measurement results or evaluation of an inequality of the sort proposed by Mancini et al. [Phys. Rev. Lett. 88, 120401 (2002)

  13. An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

    Zaher, Ashraf A. [Physics Department, Science College, Kuwait University, P.O. Box 5969, Safat 13060 (Kuwait)], E-mail:


    In this paper, a secure communication technique, using a chaotic system with a single adjustable parameter and a single observable time series, is proposed. The chosen chaotic system, which is a variant of the famous Rikitake model, has a special structure for which the adjustable parameter appears in the dynamic equation of the observable time series. This particular structure is used to build a synchronization-based state observer that is decoupled from the adaptive parameter identifier. A local Lyapunov function is used to design the parameter identifier, with an adjustable convergence rate that guarantees the stability of the overall system. A two-channel transmission method is used to exemplify the suggested technique where the secret message is encoded using a nonlinear function of both the chaotic states and the adjustable parameter of the chaotic system that acts as a secret key. Simulations show that, at the receiver, the signal can be efficiently retrieved only if the secret key is known, even when both the receiver and the transmitter are in perfect synchronization. The proposed technique is demonstrated to have improved security and privacy against intruders, when compared to other techniques reported in the literature, while being simple to implement using both analog and digital hardware. In addition, the chosen chaotic system is shown to be flexible in accommodating the transmission of signals with variable bandwidths, which promotes the superiority and versatility of the suggested secure communication technique.

  14. An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

    Zaher, Ashraf A.


    In this paper, a secure communication technique, using a chaotic system with a single adjustable parameter and a single observable time series, is proposed. The chosen chaotic system, which is a variant of the famous Rikitake model, has a special structure for which the adjustable parameter appears in the dynamic equation of the observable time series. This particular structure is used to build a synchronization-based state observer that is decoupled from the adaptive parameter identifier. A local Lyapunov function is used to design the parameter identifier, with an adjustable convergence rate that guarantees the stability of the overall system. A two-channel transmission method is used to exemplify the suggested technique where the secret message is encoded using a nonlinear function of both the chaotic states and the adjustable parameter of the chaotic system that acts as a secret key. Simulations show that, at the receiver, the signal can be efficiently retrieved only if the secret key is known, even when both the receiver and the transmitter are in perfect synchronization. The proposed technique is demonstrated to have improved security and privacy against intruders, when compared to other techniques reported in the literature, while being simple to implement using both analog and digital hardware. In addition, the chosen chaotic system is shown to be flexible in accommodating the transmission of signals with variable bandwidths, which promotes the superiority and versatility of the suggested secure communication technique.

  15. Synchronization in Quantum Key Distribution Systems

    Anton Pljonkin


    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  16. Facilitating working mothers' ability to breastfeed: global trends in guaranteeing breastfeeding breaks at work, 1995-2014.

    Atabay, Efe; Moreno, Gonzalo; Nandi, Arijit; Kranz, Gabriella; Vincent, Ilona; Assi, Tina-Marie; Winfrey, Elise Marie Vaughan; Earle, Alison; Raub, Amy; Heymann, S Jody


    Mothers who work away from home tend to stop breastfeeding earlier than their nonworking counterparts due to workplace barriers. Barriers to breastfeeding discriminate against women and may lead to inequities in children's health outcomes. Guaranteeing paid breastfeeding breaks at work is 1 mechanism that can improve mothers' opportunity to breastfeed in the workplace. This study aimed to assess the trends in the share of countries guaranteeing breastfeeding breaks in the workplace and paid maternal leave that lasts until the infant is 6 months old (the World Health Organization recommended duration for exclusive breastfeeding), between 1995 and 2014. Legislation and secondary source data were collected and reviewed for 193 United Nations member states. Legislation was analyzed for content on breastfeeding breaks and maternal leave guarantees. Fifty-one countries (26.7%) in 2014 did not guarantee breastfeeding breaks in any form and 4 countries provided only unpaid breaks or breaks that did not cover the first 6 months of life; since 1995, around 15 countries (10.2%) legislated for such a policy. In 2014, out of 55 countries that did not guarantee paid breastfeeding breaks for the first 6 months after birth, 7 countries guaranteed paid maternal leave for the same duration; 48 countries (25.1%) provided neither paid maternal leave nor paid breastfeeding breaks. Progress in the number of countries guaranteeing breastfeeding breaks at work is modest. Adopting measures to facilitate breastfeeding at work can be a critical opportunity for countries to increase breastfeeding rates among the growing number of women in the labor force. © The Author(s) 2014.

  17. Applying WHO's 'workforce indicators of staffing need' (WISN) method to calculate the health worker requirements for India's maternal and child health service guarantees in Orissa State.

    Hagopian, Amy; Mohanty, Manmath K; Das, Abhijit; House, Peter J


    In one district of Orissa state, we used the World Health Organization's Workforce Indicators of Staffing Need (WISN) method to calculate the number of health workers required to achieve the maternal and child health 'service guarantees' of India's National Rural Health Mission (NRHM). We measured the difference between this ideal number and current staffing levels. We collected census data, routine health information data and government reports to calculate demand for maternal and child health services. By conducting 54 interviews with physicians and midwives, and six focus groups, we were able to calculate the time required to perform necessary health care tasks. We also interviewed 10 new mothers to cross-check these estimates at a global level and get assessments of quality of care. For 18 service centres of Ganjam District, we found 357 health workers in our six cadre categories, to serve a population of 1.02 million. Total demand for the MCH services guaranteed under India's NRHM outpaced supply for every category of health worker but one. To properly serve the study population, the health workforce supply should be enhanced by 43 additional physicians, 15 nurses and 80 nurse midwives. Those numbers probably under-estimate the need, as they assume away geographic barriers. Our study established time standards in minutes for each MCH activity promised by the NRHM, which could be applied elsewhere in India by government planners and civil society advocates. Our calculations indicate significant numbers of new health workers are required to deliver the services promised by the NRHM.

  18. The key found

    Agata Stankowka


    Full Text Available Poetycka antropologia Julii Hartwig [Julia Hartwig’s poetic anthropology] written by Marcin Terlecki is a book that fills the yawning gap in our literary understanding of the twentieth century Polish poetry and constitutes the first attempt at a comprehensive and detailed presentation of the lyrical works by J. Hartwig. The modern collection in which the work appears allow M. Terlecki to reveal the poetess’ fundamental insights dominating and underlying her world outlook and epistemological views. This, in turn, puts him in a position to give an explanation to the logic embedded in the evolution under scrutiny. M. Terlecki convincingly supports his own argument concerning J. Hartwig’s poetic reception of the world proving the thesis that its fundamentals are deeply rooted in the anthropological perspective. Terlecki differentiates the latter into three basic categories. First, there is “strangeness/alienation”, which results in the need for self-definition (determination of one’s nature and basic qualities. Then, “identity”, whose reflection turns out to be not only what is different in its external shape, but also what is different inside — within the plane of one’s own culture, biography and personality. And, finally, “empathy”, born out of questions on a feasibility of contact with what is different, alien and absent. The three categories, connected by the logic of anthropological vision, are presented as basic and fundamental for the subsequent stages in Hartwig’s poetical output. At the same time, they reveal themselves as axes of anthropological reading material provided by the author — for the discussed book is the author’s own research project on “poetic anthropology”.


    Ledyaeva Ol'ga Mikhaylovna


    Full Text Available Several approaches that underlie urban politics are discussed in the paper. They include neo-liberalism, political economy discourse, elitist/pluralist debates, and postmodernism. The neoliberal approach focuses on the limited role of the state and individual responsibility. The legal framework protects both the rights and responsibilities of individuals and regulates the operation of the market. It is the market that fosters individual choices and provides goods and services by virtue of the processes which are flexible, efficient and transparent. The political economy approaches (regulation theory, public choice theory, neo-Marxism explain urban politics via the analysis of national and international economic processes and changes in contemporary capitalism. Changes in national and international economies determine what solutions are possible. The discourse has been influenced by the debate on globalization of capital and labour markets. Modern elitism and neopluralism are represented by theories of "growth machines" and "urban regimes". The former focuses on bargaining alliances between political and business leaders in order to manage the urban system and to promote its growth. The latter develops neopluralist explanations of power within local communities with an emphasis on the fragmented nature of the government where local authorities lack comprehensive governing powers. Postmodernism views the city as the site of the crisis of late capitalism which leads to segregation of neighbourhoods onto prosperous areas and ghettoes. In contrast to the modern city, the postmodern city is not defined by its industrial base; rather, it is determined by its consumerist environment of malls and museums, characterized by revivalist architecture. At the same time, the suburban shopping mall and a motorway network make nonsense of the idea of the city as a unique and well-defined space. These and other approaches encompass a wide spectrum of possibilities

  20. Advertising Via Mobile Terminals - Delivering Context Sensitive and Personalized Advertising While Guaranteeing Privacy

    Bulander, Rebecca; Decker, Michael; Schiefer, Gunther; Kölmel, Bernhard

    Mobile terminals like cellular phones and PDAs are a promising target platform for mobile advertising: The devices are widely spread, are able to present interactive multimedia content and offer as almost permanently carried along personal communication devices a high degree of reachability. But particular because of the latter feature it is important to pay great attention to privacy aspects and avoidance of spam-messages when designing an application for mobile advertising. Furthermore the limited user interface of mobile devices is a special challenge. The following article describes the solution approach for mobile advertising developed within the project MoMa, which was funded by the Federal Ministry of Economics and Labour of Germany (BMWA). MoMa enables highly personalized and context sensitive mobile advertising while guaranteeing data protection. To achieve this we have to distinguish public and private context information.

  1. Guaranteed Unresolved Point Source Emission and the Gamma-ray Background

    Pavlidou, Vasiliki; Siegal-Gaskins, Jennifer M.; Brown, Carolyn; Fields, Brian D.; Olinto, Angela V.


    The large majority of EGRET point sources remain without an identified low-energy counterpart, and a large fraction of these sources are most likely extragalactic. Whatever the nature of the extragalactic EGRET unidentified sources, faint unresolved objects of the same class must have a contribution to the diffuse extragalactic gamma-ray background (EGRB). Understanding this component of the EGRB, along with other guaranteed contributions from known sources (blazars and normal galaxies), is essential if we are to use this emission to constrain exotic high-energy physics. Here, we follow an empirical approach to estimate whether the contribution of unresolved unidentified sources to the EGRB is likely to be important. Additionally, we discuss how upcoming GLAST observations of EGRET unidentified sources, their fainter counterparts, and the Galactic and extragalactic diffuse backgrounds, will shed light on the nature of the EGRET unidentified sources even without any positional association of such sources with low-energy counterparts

  2. Truss topology optimization with discrete design variables — Guaranteed global optimality and benchmark examples

    Achtziger, Wolfgang; Stolpe, Mathias


    this problem is well-studied for continuous bar areas, we consider in this study the case of discrete areas. This problem is of major practical relevance if the truss must be built from pre-produced bars with given areas. As a special case, we consider the design problem for a single available bar area, i.......e., a 0/1 problem. In contrast to the heuristic methods considered in many other approaches, our goal is to compute guaranteed globally optimal structures. This is done by a branch-and-bound method for which convergence can be proven. In this branch-and-bound framework, lower bounds of the optimal......-integer problems. The main intention of this paper is to provide optimal solutions for single and multiple load benchmark examples, which can be used for testing and validating other methods or heuristics for the treatment of this discrete topology design problem....

  3. Small Body GN&C Research Report: A Robust Model Predictive Control Algorithm with Guaranteed Resolvability

    Acikmese, Behcet A.; Carson, John M., III


    A robustly stabilizing MPC (model predictive control) algorithm for uncertain nonlinear systems is developed that guarantees the resolvability of the associated finite-horizon optimal control problem in a receding-horizon implementation. The control consists of two components; (i) feedforward, and (ii) feedback part. Feed-forward control is obtained by online solution of a finite-horizon optimal control problem for the nominal system dynamics. The feedback control policy is designed off-line based on a bound on the uncertainty in the system model. The entire controller is shown to be robustly stabilizing with a region of attraction composed of initial states for which the finite-horizon optimal control problem is feasible. The controller design for this algorithm is demonstrated on a class of systems with uncertain nonlinear terms that have norm-bounded derivatives, and derivatives in polytopes. An illustrative numerical example is also provided.

  4. [Thermolabile drugs: pharmacist intervention as a guarantee of cold chain maintenance].

    Ricote-Lobera, I; Santos-Mena, B; Fraile-Gil, S; Ortiz-Martín, B; Hidalgo-Correas, F J; García-Díaz, B


    To determine whether pharmacist is able to guarantee cold chain maintenance of thermolabile drugs during transport using the available information in the reception process and to compare these results with those obtained in a subsequent intervention phase, in which the manufacturing laboratories were contacted. Intervention study, prospective and comparative"before-after". It was analyzed the storage conditions during transport of all thermolabile drugs received in a 400-bed hospital for 3 months, excluding those from clinical trials. The intervention allowed to ensure cold chain maintenance in 76,5% (n = 488) of received drugs, representing an increase of 41,8% (IC 95% 36,7-46,6%; p cold chain maintenance of received thermolabile drugs without temperature monitoring device (64,6%). Reports requested from laboratories allowed to increase significantly that percentage. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  5. Interior point algorithms: guaranteed optimality for fluence map optimization in IMRT

    Aleman, Dionne M [Department of Mechanical and Industrial Engineering, University of Toronto, 5 King' s College Road, Toronto, ON M5S 3G8 (Canada); Glaser, Daniel [Division of Optimization and Systems Theory, Department of Mathematics, Royal Institute of Technology, Stockholm (Sweden); Romeijn, H Edwin [Department of Industrial and Operations Engineering, University of Michigan, Ann Arbor, MI 48109-2117 (United States); Dempsey, James F, E-mail: aleman@mie.utoronto.c, E-mail: romeijn@umich.ed, E-mail: [ViewRay, Inc. 2 Thermo Fisher Way, Village of Oakwood, OH 44146 (United States)


    One of the most widely studied problems of the intensity-modulated radiation therapy (IMRT) treatment planning problem is the fluence map optimization (FMO) problem, the problem of determining the amount of radiation intensity, or fluence, of each beamlet in each beam. For a given set of beams, the fluences of the beamlets can drastically affect the quality of the treatment plan, and thus it is critical to obtain good fluence maps for radiation delivery. Although several approaches have been shown to yield good solutions to the FMO problem, these solutions are not guaranteed to be optimal. This shortcoming can be attributed to either optimization model complexity or properties of the algorithms used to solve the optimization model. We present a convex FMO formulation and an interior point algorithm that yields an optimal treatment plan in seconds, making it a viable option for clinical applications.

  6. An empirical investigation on factors influencing on insurance issued by export guarantee funds

    Naser Azad


    Full Text Available This paper attempts to find important factors influencing on insurance issued by export guarantee funds. The study uses factor analysis to detect important factors based on a questionnaire in Likert scale. The study has determined four factors including risk management, customer oriented, quality management and trade management. The first factor is associated with risk management and it includes four sub-factors. The factors include being responsive, reliability, service quality and customer detection and reliability plays the most important factor. The second factor is associated with being customer oriented where the factor includes four components including cost recognition, access, marketing knowledge and the level of management training. The third factor is associated with quality management, which includes four variables including responsiveness, reliability, quality of services and customer recognition. Finally, the last factor is associated with trade management, which includes three variables including trade risk, insurance premium and currency.

  7. Differentiated protection services with failure probability guarantee for workflow-based applications

    Zhong, Yaoquan; Guo, Wei; Jin, Yaohui; Sun, Weiqiang; Hu, Weisheng


    A cost-effective and service-differentiated provisioning strategy is very desirable to service providers so that they can offer users satisfactory services, while optimizing network resource allocation. Providing differentiated protection services to connections for surviving link failure has been extensively studied in recent years. However, the differentiated protection services for workflow-based applications, which consist of many interdependent tasks, have scarcely been studied. This paper investigates the problem of providing differentiated services for workflow-based applications in optical grid. In this paper, we develop three differentiated protection services provisioning strategies which can provide security level guarantee and network-resource optimization for workflow-based applications. The simulation demonstrates that these heuristic algorithms provide protection cost-effectively while satisfying the applications' failure probability requirements.

  8. Using Kalman Filter to Guarantee QoS Robustness of Web Server


    The exponential growth of the Internet coupled with the increasing popularity of dynamically generated content on the World Wide Web, has created the need for more and faster Web servers capable of serving the over 100 million Internet users. To converge the control method has emerged as a promising technique to solve the Web QoS problem. In this paper, a model of adaptive session is presented and a session flow self-regulating algorism based on Kalman Filter are proposed towards Web Server. And a Web QoS self-regulating scheme is advanced. To attain the goal of on-line system identification, the optimized estimation of QoS parameters is fulfilled by utilizing Kalman Filter in full domain. The simulation results shows that the proposed scheme can guarantee the QoS with both robustness and stability .

  9. Tracking performance and global stability guaranteed neural control of uncertain hypersonic flight vehicle

    Tao Teng


    Full Text Available In this article, a global adaptive neural dynamic surface control with predefined tracking performance is developed for a class of hypersonic flight vehicles, whose accurate dynamics is hard to obtain. The control scheme developed in this paper overcomes the limitations of neural approximation region by employing a switching mechanism which incorporates an additional robust controller outside the neural approximation region to pull the transient state variables back when they overstep the neural approximation region, such that globally uniformly ultimately bounded stability can be guaranteed. Especially, the developed global adaptive neural control also improves the tracking performance by introducing an error transformation mechanism, such that both transient and steady-state performance can be shaped according to the predefined bounds. Simulation studies on the hypersonic flight vehicle validate that the designed controller has good velocity modulation and velocity stability performance.

  10. Interior point algorithms: guaranteed optimality for fluence map optimization in IMRT

    Aleman, Dionne M; Glaser, Daniel; Romeijn, H Edwin; Dempsey, James F


    One of the most widely studied problems of the intensity-modulated radiation therapy (IMRT) treatment planning problem is the fluence map optimization (FMO) problem, the problem of determining the amount of radiation intensity, or fluence, of each beamlet in each beam. For a given set of beams, the fluences of the beamlets can drastically affect the quality of the treatment plan, and thus it is critical to obtain good fluence maps for radiation delivery. Although several approaches have been shown to yield good solutions to the FMO problem, these solutions are not guaranteed to be optimal. This shortcoming can be attributed to either optimization model complexity or properties of the algorithms used to solve the optimization model. We present a convex FMO formulation and an interior point algorithm that yields an optimal treatment plan in seconds, making it a viable option for clinical applications.

  11. Status of assessment tools on the performance guarantee contents of backfill, bulkhead, tunnel and pit

    Kawakami, Susumu; Fujita, Tomoo; Yui, Mikazu


    In order to contribute to the safety standards and guidelines which a regulator will decide, a state-of-the-art assessment method is investigated and summarized in tables about performance guarantee contents of backfill, bulkhead, tunnel (access, main, connecting, disposal) and disposal pit. In addition, examples of assessment tools are described. In this report, summary of (1) basic properties of bentonite, including swelling, mechanical and hydraulic properties, (2) long-term behavior of bentonite, including extrusion/erosion into host rock, and alteration, (3) effect of high pH plume from cementitious material and (4) mechanical stability of the near-field is described. Check points, assessment methods for (based on the data obtained from the experimental results, the estimation value obtained from empirical equations and database, and the modeling calculations) and latest results of these R and D programs were also summarized. (author)

  12. Communication Framework for Tele-rehabilitation Systems with QoS Guarantee

    Dandanov Nikolay


    Full Text Available Nowadays, there is great interest in developing telemedicine technologies. These technologies will provide health care from distance swiftly and lightly, as well as reduce the expenses for activities, such as rehabilitation. Telemedicine applications are possible due to the advances in information technologies and the ever-expanding communication network infrastructure. The network characteristics bandwidth, packet loss, latency, jitter and policies are crucial for the performance of tele-rehabilitation systems. Because in tele-rehabilitation human lives are at stake, guaranteeing the Quality of Service (QoS is important. In this paper, an approach for assuring the QoS for information transmission in tele-rehabilitation systems is proposed.

  13. Guaranteed cost control of mobile sensor networks with Markov switching topologies.

    Zhao, Yuan; Guo, Ge; Ding, Lei


    This paper investigates the consensus seeking problem of mobile sensor networks (MSNs) with random switching topologies. The network communication topologies are composed of a set of directed graphs (or digraph) with a spanning tree. The switching of topologies is governed by a Markov chain. The consensus seeking problem is addressed by introducing a global topology-aware linear quadratic (LQ) cost as the performance measure. By state transformation, the consensus problem is transformed to the stabilization of a Markovian jump system with guaranteed cost. A sufficient condition for global mean-square consensus is derived in the context of stochastic stability analysis of Markovian jump systems. A computational algorithm is given to synchronously calculate both the sub-optimal consensus controller gains and the sub-minimum upper bound of the cost. The effectiveness of the proposed design method is illustrated by three numerical examples. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  14. Is radiation protection for the unborn child guaranteed by radiation protection for female workers?

    Nosske, C.; Karcher, K.


    ICRP Publication 88 recommends doses to embryo and fetus from intakes of radionuclides by the mother for various intake scenarios. Mainly by answering the question 'Is radiation protection for the unborn child guaranteed by radiation protection for female workers?' it has been assessed if the intake scenarios given in ICRP Publication 88 are adequate for radiation protection purposes. This is generally the case, but the consideration of an additional chronic intake scenario for early pregnancy would be helpful. It is demonstrated that following chronic intake by inhalation, for most radionuclides radiation protection for (female) workers is also adequate for protection of the unborn child, considered as a member of the public. However, there are a number of radionuclides for which possible intakes in routine operations should be more restricted (up to 1% of the annual limits on intake for workers in the case of nickel isotopes) to ensure radiation protection for the unborn child. (author)

  15. Final disposal of radioactive wastes in Switzerland: concept and overview of Project Guarantee 1985



    The validity of the operational licences of the existing Swiss nuclear power plants (NPP) Beznau I and II, Muehleberg, Goesgen and Leibstadt after 31st. December 1985 is, because of official requirements, dependent on the demonstration of permanent, safe management and final disposal of radioactive waste. For this purpose, the NPP companies have to prepare a so-called guarantee project and present this to the Bundesrat for review. The appropriate investigations and research have been carried out by Nagra (National Cooperative for the Storage of Radioactive Waste). The 1985 Project Gewaehr (Guarantee) is described in an eight volume report NGB 85-01 to 85-08 and individual research projects are reported on in separate NTB-series reference reports. The present volume NGB 85-01 takes the form of a self-contained project overview in which the concepts for nuclear waste management are described, the contents of the remaining volumes NGB 85-02 to 85-08 are summarized and Project conclusions are drawn from Project Gewaehr 1985. Project Gewaehr 1985 covers two repository types: Type C repository for high-level and certain alpha-containing intermediate-level waste, and Type B repository for all remaining intermediate- and low-level waste. The Project shows in detail that technical feasibility of final disposal can be assumed given presently available methods, that the technical safety barriers show a high level of efficiency and that suitable geological options are available to ensure long-term safety in Switzerland as the concept is defined by official requirements. The Project safety analyses show that the chosen disposal concepts assure the protection of mankind and the environment under all realistically anticipated conditions

  16. Finite-key-size effect in a commercial plug-and-play QKD system

    Chaiwongkhot, Poompong; Sajeed, Shihan; Lydersen, Lars; Makarov, Vadim


    A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted-key. We also derive a key-rate equation that is specific for this system. This equation provides bounds above the upper bound of secure key under finite-key-size analysis. From this equation and our experimental data, we show that the keys that have been distilled from the smaller sifted-key size fall above our bound. Thus, their security is not covered by finite-key-size analysis. Experimentally, we could consistently force the system to generate the key outside of the bound. We also test manufacturer’s software update. Although all the keys after the patch fall under our bound, their security cannot be guaranteed under this analysis. Our methodology can be used for security certification and standardization of QKD systems.

  17. New weak keys in simplified IDEA

    Hafman, Sari Agustini; Muhafidzah, Arini


    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  18. Studies on the performance guarantee for the engineering barrier system on geological disposal of high-level radioactive waste

    Kawakami, Susumu; Sugita, Yutaka; Kurihara, Yuji; Jintoku, Takashi; Taniguti, Naoki; Yui, Mikazu; Tanai, Kenji; Shibata, Masahiro; Honma, Nobuyuki


    In order to contribute to the safety standards and guidelines upon which a administration decides, examination for clarifying how to reflect the result obtained by future R and D was performed. From a viewpoint of the long-term safety on geological disposal, the items which should guarantee the performance of each element which constitutes disposal institutions (by this report, they are the overpack and the buffer material) were extracted, and it was shown what a performance guarantee is concretely offered about these items. Furthermore, based on the H12 report as a situation of present R and D for a method of a performance guarantee, the subjects considered that a future R and D is required were extracted. Moreover, the items of a safety standard and guideline were assumed, and the relation between these items and a performance guarantee items was arranged. One arrangement for clarifying whether to be reflected in the safety regulations and guidelines whose R and D subjects extracted from the performance guarantee items was shown. (author)

  19. Plan 2008. Costs starting in 2010 for the radioactive residual products from nuclear power. Basis for fees and guarantees in 2010 and 2011


    calculations. The quantity of spent nuclear fuel and radioactive waste to be disposed of is l inked to the operating time of the reactors, and this fee-determining operating time is stipulated in the regulatory framework. The fee calculation is then based on the electricity production that is expected during the same time. The fee-determining operating time should be 40 years for the reactors that are currently in operation. A minimum limit is stipulated entailing that a remaining operating time of at least six years shall be applied unless there is reason to assume that operation may cease before then. Aside from the payment of fees, a reactor owner must pledge two kinds of guarantees. One guarantee must cover the fees that have not yet been paid and that relate to the remaining fee-determining operating time. This guarantee declines gradually as the reactor's operating time approaches 34 years but then levels out at a minimum time of six years as described above. The basis for this guarantee is called the financing amount. The calculation is done in principle as for the fee basis, but the costs are limited to management and disposal of the waste products that exist when the calculation starts (31 December 2009). The second guarantee pertains to the case where it can be assumed that the assets in the Nuclear Waste Fund will not suffice due to unplanned events, at the same time as the option of increasing the fee payments and adjusting the aforementioned guarantee is for some reason not available. The basis for this guarantee is called the supplementary amount.

  20. Identifying tier one key suppliers.

    Wicks, Steve


    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  1. Security for Key Management Interfaces

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan


    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  2. Guarantee-bond: main concepts and overview of its application within the bidding process involving inactive areas with marginal accumulations of petroleum and natural gas; Seguro-garantia: conceituacao e panorama de sua aplicacao no processo licitatorio envolvendo areas inativas com acumulacoes marginais

    Eduardo, Antonio Sergio; Herrmann, Hildebrando [Universidade ERstadual de Campinas (UNICAMP), SP (Brazil); Ferreira, Doneivan Fernandes [Universidade Federal da Bahia (UFBA), Salvador, BA (Brazil)


    The Brazilian Petroleum Agency has been working on the adoption of an efficient financial guarantee system in order to ensure the fulfillment of contractual obligations in upstream-related activities. This process is aimed at: creating incentives for responsible behavior in the industry; attending current demands from society for efficiency and transparency; attending to industries demands for the maintenance of investment flows within the sector; safeguarding the government against financial liabilities caused by irresponsible or insolvent concessionaires; and keeping the sector attractive and competitive for small and medium companies. Within the bidding process for the concession of inactive areas with marginal accumulations, ANP requires two kinds of guarantees: a bidding guarantee, and a PTI guarantee (for obligations under the Initial Work Program-PTI). In both cases, the ANP allows two kinds of financial instruments: 'Seguros-Garantia' and 'Letters of Credit'. According to bidding rules, guarantees must be presented before the bidding process. This instrument ensures that the winner will sign the concession contract. The PTI guarantee ensures performance in a timely fashion. This paper describes and analyzes the instrument 'Seguro-Garantia', its evolution, existing categories, and applicability. (author)

  3. Diversity and representativeness: two key factors

    Staff Association


    In the past few weeks many of you have filled out the questionnaire for preparing the upcoming Five-yearly review. Similarly, Staff Association members have elected their delegates to the Staff Council for the coming two years. Once again we would like to thank all those who have taken the time and effort to make their voice heard on these two occasions. Elections to the Staff Council Below we publish the new Staff Council with its forty delegates who will represent in 2014 and 2015 all CERN staff in the discussions with Management and Member States in the various bodies and committees. Therefore it is important that the Staff Council represents as far as possible the diversity of the CERN population. By construction, the election process with its electoral colleges and two-step voting procedure guarantees that all Departments, even the small ones, and the various staff categories are correctly represented. Figure 1 shows the participation rate in the elections. The average rate is just above 52 %, with ...

  4. An evaluation of dose/unit area and time as key factors influencing the elicitation capacity of methylchloroisothiazolinone/methylisothiazolinone (MCI/MI) in MCI/MI-allergic patients

    Zachariae, Claus; Lerbaek, Anne; McNamee, Pauline M


    Methylchloroisothiazolinone and methylisothiazolinone (MCI/MI) contact allergy affects 1-3% of patch-tested patients in European centres. The aim of the present study was to evaluate the importance of the factors--time and concentration (dose/per unit area)--in the elicitation capacity by means...... (2 p.p.m.) of MCI/MI/unit area of the skin for 4 weeks. After a wash-out period of at least 4 weeks, the subjects were exposed to 0.094 microg/cm2 (7.5 p.p.m.) of MCI/MI/unit area of the skin for 4 weeks. The study showed the importance of both time and exposure in the elicitation process...

  5. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    Zorgui, Marwen


    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  6. [The current situation regarding guarantees of legal rights to social welfare and nursing care in Japan: based on an analysis of adjudications spanning the period 1960 to 2005].

    Matsuzawa, Akemi; Tamiya, Nanako; Wakino, Koutaro


    To clarify whether people who need social care are legally guaranteed a "right to receive nursing-care services" as a living right in Japan. Using the database "Judicial Information System on CD-ROM" and journals which cover judicial precedents, such as "Supreme Court Reports" and "Judicial Reports", we searched for adjudications from 1960 to 2005 with 'living rights' as key words. The complete content of these adjudications was ascertained by reference to the journals. We then assessed whether a "right to receive nursing-care services" was specifically discussed in each of the adjudications by determining how the courts interpreted Article 25 of the Constitution in the verdicts and whether or not there was specific discussion of legal rights in each case. Of 210 adjudications extracted from the database, 23 (11.0%) specifically discussed the right to some sort of social security. No specific reference was made in the remaining 187 decisions (89.0%), and plaintiffs' claims were rejected. Whereas the "right to nursing care" was specifically discussed in no decisions before 1992, it was discussed in 4 decisions (40.0%) from 1993 onwards, resulting in plaintiffs' demands being partly granted. The content of the decisions covered issues that included anxiety about future nursing care, the practice of nursing homes of placing several elderly people in one room, ill-defined standards and low pay for home nursing-care workers, provision of nursing-care services based on the assumption that nursing care would be provided by family members, and self-determination and independence of the severely handicapped. A "right to receive nursing-care services" has not been fully guaranteed in the legal sense. However, such a right, included as a living right, is a primary right with a constitutional basis. Although this right has been specifically discussed in only a minority of adjudications, there has been a recent tendency for more emphasis. Both elderly and handicapped persons

  7. The Impact of Financial Support System on Technology Innovation: A Case of Technology Guarantee System in Korea

    Woo-Seok Jang


    Full Text Available We analyzed the impact of financial support system on technological innovation of small and medium manufacturing firms in Korea, with a special interest in technology guarantee system. This was done using a sample of 1,014 Korean manufacturing firms of which 43% were venture companies. Our study provides two important conclusions. First, the result of empirical analysis indicates that financial support systems have a significant influence on both product innovation and process innovation of SMEs in Korea. Second, a more important conclusion of this research is that technology guarantee system impacts on product innovation; however not on process innovation. This result implies that technology guarantee system attaches more importance to technological innovations related with product development than to those related with process enhancement.

  8. Billions at stake in climate finance: four key lessons

    Newell, Peter [University of East Anglia (United Kingdom); Roberts, J. Timmons [Brown University (United States); Boyd, Emily [University of Leeds (United Kingdom); Huq, Saleemul


    How can we break through the impasse on the road to Copenhagen? As the climate talks stall over the size of emissions cuts and who pays for them, it is increasingly clear that funding will be key to breaking the deadlock. Guaranteeing adequate levels of climate finance will be a deal maker or breaker for the poorest nations as the December summit approaches. But on the brink of a new chapter in climate funding, with unprecedented flows at stake, donor countries need to learn from decades of aid experience – mistakes as well as successes. Failure to do this risks wasting a great opportunity to kickstart low-carbon, climate-resilient development for the world's poor.

  9. Using Time-Driven Activity-Based Costing as a Key Component of the Value Platform: A Pilot Analysis of Colonoscopy, Aortic Valve Replacement and Carpal Tunnel Release Procedures.

    Martin, Jacob A; Mayhew, Christopher R; Morris, Amanda J; Bader, Angela M; Tsai, Mitchell H; Urman, Richard D


    Time-driven activity-based costing (TDABC) is a methodology that calculates the costs of healthcare resources consumed as a patient moves along a care process. Limited data exist on the application of TDABC from the perspective of an anesthesia provider. We describe the use of TDABC, a bottom-up costing strategy and financial outcomes for three different medical-surgical procedures. In each case, a multi-disciplinary team created process maps describing the care delivery cycle for a patient encounter using the TDABC methodology. Each step in a process map delineated an activity required for delivery of patient care. The resources (personnel, equipment and supplies) associated with each step were identified. A per minute cost for each resource expended was generated, known as the capacity cost rate, and multiplied by its time requirement. The total cost for an episode of care was obtained by adding the cost of each individual resource consumed as the patient moved along a clinical pathway. We built process maps for colonoscopy in the gastroenterology suite, calculated costs of an aortic valve replacement by comparing surgical aortic valve replacement (SAVR) versus transcatheter aortic valve replacement (TAVR) techniques, and determined the cost of carpal tunnel release in an operating room versus an ambulatory procedure room. TDABC is central to the value-based healthcare platform. Application of TDABC provides a framework to identify process improvements for health care delivery. The first case demonstrates cost-savings and improved wait times by shifting some of the colonoscopies scheduled with an anesthesiologist from the main hospital to the ambulatory facility. In the second case, we show that the deployment of an aortic valve via the transcatheter route front loads the costs compared to traditional, surgical replacement. The last case demonstrates significant cost savings to the healthcare system associated with re-organization of staff required to execute a

  10. Using Time-Driven Activity-Based Costing as a Key Component of the Value Platform: A Pilot Analysis of Colonoscopy, Aortic Valve Replacement and Carpal Tunnel Release Procedures

    Martin, Jacob A.; Mayhew, Christopher R.; Morris, Amanda J.; Bader, Angela M.; Tsai, Mitchell H.; Urman, Richard D.


    Background Time-driven activity-based costing (TDABC) is a methodology that calculates the costs of healthcare resources consumed as a patient moves along a care process. Limited data exist on the application of TDABC from the perspective of an anesthesia provider. We describe the use of TDABC, a bottom-up costing strategy and financial outcomes for three different medical-surgical procedures. Methods In each case, a multi-disciplinary team created process maps describing the care delivery cycle for a patient encounter using the TDABC methodology. Each step in a process map delineated an activity required for delivery of patient care. The resources (personnel, equipment and supplies) associated with each step were identified. A per minute cost for each resource expended was generated, known as the capacity cost rate, and multiplied by its time requirement. The total cost for an episode of care was obtained by adding the cost of each individual resource consumed as the patient moved along a clinical pathway. Results We built process maps for colonoscopy in the gastroenterology suite, calculated costs of an aortic valve replacement by comparing surgical aortic valve replacement (SAVR) versus transcatheter aortic valve replacement (TAVR) techniques, and determined the cost of carpal tunnel release in an operating room versus an ambulatory procedure room. Conclusions TDABC is central to the value-based healthcare platform. Application of TDABC provides a framework to identify process improvements for health care delivery. The first case demonstrates cost-savings and improved wait times by shifting some of the colonoscopies scheduled with an anesthesiologist from the main hospital to the ambulatory facility. In the second case, we show that the deployment of an aortic valve via the transcatheter route front loads the costs compared to traditional, surgical replacement. The last case demonstrates significant cost savings to the healthcare system associated with re

  11. Anonymity for key-trees with adaptive adversaries

    Beye, M.; Veugen, P.J.M.


    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen

  12. Privacy for Key-Trees with Adaptive Adversaries

    Beye, M.; Veugen, P.J.M.


    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen

  13. Service Level Agreement for the QoS Guaranteed Mobile IPTV Services over Mobile WiMAX Networks

    Chowdhury, Mostafa Zaman; Trung, Bui Minh; Jang, Yeong Min; Kim, Young-Il; Ryu, Won


    While mobile IPTV services are supported through the mobile WiMAX networks, there must need some guaranteed bandwidth for the IPTV services especially if IPTV and non-IPTV services are simultaneously supported by the mobile WiMAX networks. The quality of an IPTV service definitely depends on the allocated bandwidth for that channel. However, due to the high quality IPTV services and to support of huge non-IPTV traffic over mobile WiMAX networks, it is not possible to guarantee the sufficient ...

  14. Model plant Key Measurement Points

    Schneider, R.A.


    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  15. Constitutional principles of the state policy in the area of guaranteeing the ownership

    Ю. С. Гаєвська


    Full Text Available Problem’s setting. The economic rights and freedoms, namely the ownership have an important place in the economic system. Improvement of legal regulation concerning the state policy in the area of the ownership requires detailed regulation at the constitutional level, because of the high level of corruption and crime rate in economic relations. These negative consequences are primarily provoked by low level of democratic procedures’ efficiency and the mechanism of realizing economic rights. Analysis of recent research and publications. Some aspects of this issue have been the matter of studies of a number of Ukrainian and foreign scholars. The notion of the state policy was studied in the works of: V. Tertychka, O. Kucherenko, P. Fris, etc. Issues concerning the state policy in the economic sphere were the interest of: V. Ustimenko, V. Mamutov, V. Selivanov, O. Skupinskyi, D. Zadykhailo, Yu. Bysiah, I. Kresin and others. The objective of this paper is to determine the general principles of the state policy in the area of guaranteeing the ownership, to establish their content, place and significance for the economic system and to formulate the definition of the concept of the state policy in the area of the ownership. The main part: Development and realization of the constructive state policy in the economic sphere will lead to the stabilization of economic relations; reduce violations of the economic rights granted by the Constitution; increase the trust of public to the state apparatus; increasing the public sense of security by the state. Constitutional acts become the major legal factor in social, state and legal development. The Constitution is a source of the state economic policy; it has the policy character and performs the predictive function. The scholars repeatedly note that there is the necessity to amend the constitutional provisions of the Main Law relating to the economic system, including the allocation of a separate section

  16. Breaking chaotic shift key communication via adaptive key identification

    Ren Haipeng; Han Chongzhao; Liu Ding


    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  17. Feasibility of satellite quantum key distribution

    Bonato, Cristian; Tomaello, Andrea; Da Deppo, Vania; Naletto, Giampiero; Villoresi, Paolo


    In this paper we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected e...

  18. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng


    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  19. Key parameters controlling radiology departments

    Busch, Hans-Peter


    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  20. Finite key analysis in quantum cryptography

    Meyer, T.


    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  1. Dynamic Learning from Adaptive Neural Control of Uncertain Robots with Guaranteed Full-State Tracking Precision

    Min Wang


    Full Text Available A dynamic learning method is developed for an uncertain n-link robot with unknown system dynamics, achieving predefined performance attributes on the link angular position and velocity tracking errors. For a known nonsingular initial robotic condition, performance functions and unconstrained transformation errors are employed to prevent the violation of the full-state tracking error constraints. By combining two independent Lyapunov functions and radial basis function (RBF neural network (NN approximator, a novel and simple adaptive neural control scheme is proposed for the dynamics of the unconstrained transformation errors, which guarantees uniformly ultimate boundedness of all the signals in the closed-loop system. In the steady-state control process, RBF NNs are verified to satisfy the partial persistent excitation (PE condition. Subsequently, an appropriate state transformation is adopted to achieve the accurate convergence of neural weight estimates. The corresponding experienced knowledge on unknown robotic dynamics is stored in NNs with constant neural weight values. Using the stored knowledge, a static neural learning controller is developed to improve the full-state tracking performance. A comparative simulation study on a 2-link robot illustrates the effectiveness of the proposed scheme.

  2. Design of stability-guaranteed neurofuzzy logic controller for nuclear steam generators

    Cho, B.H.; No, H.C.


    A neurofuzzy logic controller (NFLC), which is implemented by using a multilayer neural network with special types of fuzzifier, inference engine and defuzzifier, is applied to the water level control of a nuclear steam generator (SG). This type of NFLC has the structural advantage that arbitrary two-input, single-output linear controllers can be adequately mapped into a set of specific control rules of the NFLC. In order to design a stability-guaranteed NFLC, the stable sector of the given linear gain is obtained from Lyapunov's stability criteria. Then this sector is mapped into two linear rule tables that are used as the limits of NFLC control rules. The automatic generation of NFLC rule tables is accomplished by using the back-error-propagation (BEP) algorithm. There are two separate paths for the error back propagation in the SG. One considers the level dynamics depending on the tank capacity and the other takes into account the reverse dynamics of the SG. The amounts of error back propagated through these paths show opposite effects in the BEP algorithm from each other for the swell-shrink phenomenon. Through computer simulation it is found that the BEP algorithm adequately generates NFLC rule tables according to given learning parameters. (orig.)

  3. Statistical-QoS Guaranteed Energy Efficiency Optimization for Energy Harvesting Wireless Sensor Networks.

    Gao, Ya; Cheng, Wenchi; Zhang, Hailin


    Energy harvesting, which offers a never-ending energy supply, has emerged as a prominent technology to prolong the lifetime and reduce costs for the battery-powered wireless sensor networks. However, how to improve the energy efficiency while guaranteeing the quality of service (QoS) for energy harvesting based wireless sensor networks is still an open problem. In this paper, we develop statistical delay-bounded QoS-driven power control policies to maximize the effective energy efficiency (EEE), which is defined as the spectrum efficiency under given specified QoS constraints per unit harvested energy, for energy harvesting based wireless sensor networks. For the battery-infinite wireless sensor networks, our developed QoS-driven power control policy converges to the Energy harvesting Water Filling (E-WF) scheme and the Energy harvesting Channel Inversion (E-CI) scheme under the very loose and stringent QoS constraints, respectively. For the battery-finite wireless sensor networks, our developed QoS-driven power control policy becomes the Truncated energy harvesting Water Filling (T-WF) scheme and the Truncated energy harvesting Channel Inversion (T-CI) scheme under the very loose and stringent QoS constraints, respectively. Furthermore, we evaluate the outage probabilities to theoretically analyze the performance of our developed QoS-driven power control policies. The obtained numerical results validate our analysis and show that our developed optimal power control policies can optimize the EEE over energy harvesting based wireless sensor networks.

  4. A NEPA follow-up study of DOE loan guarantee fuel ethanol plants

    Hunsaker, D.B. Jr.; Eddlemon, G.K.; Miller, R.L.; Webb, J.W.


    This study was implemented to examine and characterize the actual environmental impacts of three fuel ethanol plants constructed under the US Department of Energy, Office of Alcohol Fuels Loan Guarantee Program, and to compare actual impacts with those predicted about six years ago in environmental assessments (EAs) prepared for these facilities. The objective of the program, established under the Energy Security Act of 1980, was to conserve petroleum resources by promoting the use of fuel ethanol in motor vehicles. The plants were designed to produce fuel-grade ethanol for blending with gasoline and reflect differentfeedstocks, processes, fuel sources, and site locations. Although two of the facilities as constructed differed substantially from those assessed previously, actual environmental impacts generally occurred in the areas predicted by the EAs. Major impacts not anticipated include odor from air emissions, effects of wastewater discharge on operation of a municipal sewage treatment plant, possible classification of treated wastewater from a molasses-based process as a nuisance, and habitat losses from both vegetation removal and unforeseen construction of barge terminals. In all cases, impacts were judged to be not significantn the final outcome, either because plant management (or other involved parties) took corrective action or because the resources affected in these particular cases were not important. Mitigation measures reliedon in the EAs to limit adverse impacts to insignificant levels were implemented and were required by permit condition, law, or regulation. Future follow-up studies would benefit from the availability of ambientmonitoring data to more thoroughly characterize actual impacts

  5. Good laboratory practices guarantee biosafety in the Sierra Leone-China friendship biosafety laboratory.

    Wang, Qin; Zhou, Wei-Min; Zhang, Yong; Wang, Huan-Yu; Du, Hai-Jun; Nie, Kai; Song, Jing-Dong; Xiao, Kang; Lei, Wen-Wen; Guo, Jian-Qiang; Wei, He-Jiang; Cai, Kun; Wang, Yan-Hai; Wu, Jiang; Kamara, Gerard; Kamara, Idrissa; Wei, Qiang; Liang, Mi-Fang; Wu, Gui-Zhen; Dong, Xiao-Ping


    The outbreak of Ebola virus disease (EVD) in West Africa between 2014 and 2015 was the largest EDV epidemic since the identification of Ebola virus (EBOV) in 1976, and the countries most strongly affected were Sierra Leone, Guinea, and Liberia. The Sierra Leone-China Friendship Biological Safety Laboratory (SLE-CHN Biosafety Lab), a fixed Biosafety Level 3 laboratory in the capital city of Sierra Leone, was established by the Chinese government and has been active in EBOV detection since 11 March 2015. Complete management and program documents were created for the SLE-CHN Biosafety Lab, and it was divided into four zones (the green, yellow, brown, and red zones) based on the risk assessment. Different types of safe and appropriate personnel protection equipment (PPE) are used in different zones of the laboratory, and it fully meets the Biosafety Level 3 laboratory standards of the World Health Organization. Good preparedness, comprehensive risk assessment and operation documents, appropriate PPE, effective monitoring and intensive training, together with well-designed and reasonable laboratory sectioning are essential for guaranteeing biosafety.


    Nicolae, GRADINARU


    Full Text Available In a market economy there are needed certain rules for products, services and commercial practices in order to satisfy consumer's requirements, while ensuring the free movement of goods and services as well as fair competition. The seller is obliged to deliver to the consumer only products which are in accordance with the contract of sale. In case of non-conformity, the consumer is entitled to have the goods brought into conformity free of charge by repair or replacement, or an appropriate price reduction or rescission of the contract for those goods. Consumer policy in the European Union enables European citizens to shop safely in all Member States. Because the internal market must guarantee the free movement of goods, persons, services and capital, there was a need for a common set of minimum rules of consumer protection valid regardless of where the purchase of goods is made in the Community. When a customer has purchased a product, the Community legislation requires that the product he receives corresponds to what he, the buyer, expressly or implicitly agreed to buy, that is to what is provided in the contract between seller and consumer. Obviously, the product must be used in a normal way.


    Roxana Anca Adam


    Full Text Available Unsecured creditors in the insolvency of the debtor's creditors are those who do not have collateral security against the debtor's assets and who are not accompanied by liens privileges whose claims are current at the opening proceedings and claims us for current activities during observation. In the matter of the bankruptcy secured creditors set for secured debts are claims receiving collateral on the debtor's property, whether it is the primary obligor or third party guarantee to persons benefiting from collateral. The secured creditor's secured claim in the insolvency procedure is given by the value of collateral assessment arising after the opening of insolvency proceedings the debtor. These special legal provisions contained in the bankruptcy, derogating from the common law, they often generate different practical situations and have created jurisprudence. In judicial practice of insolvency have encountered situations where the creditor security budget, which requires to be entered in the final table of the debtor in the category of secured creditors, the debt claim, warranty claims for his claim is the universality of the debtor's assets. The study on which we focused includes analysis of these categories of claims in insolvency proceedings and the solutions adopted in judicial practice.

  8. Automated Assume-Guarantee Reasoning for Omega-Regular Systems and Specifications

    Chaki, Sagar; Gurfinkel, Arie


    We develop a learning-based automated Assume-Guarantee (AG) reasoning framework for verifying omega-regular properties of concurrent systems. We study the applicability of non-circular (AGNC) and circular (AG-C) AG proof rules in the context of systems with infinite behaviors. In particular, we show that AG-NC is incomplete when assumptions are restricted to strictly infinite behaviors, while AG-C remains complete. We present a general formalization, called LAG, of the learning based automated AG paradigm. We show how existing approaches for automated AG reasoning are special instances of LAG.We develop two learning algorithms for a class of systems, called infinite regular systems, that combine finite and infinite behaviors. We show that for infinity-regular systems, both AG-NC and AG-C are sound and complete. Finally, we show how to instantiate LAG to do automated AG reasoning for infinite regular, and omega-regular, systems using both AG-NC and AG-C as proof rules

  9. Seamless interworking architecture for WBAN in heterogeneous wireless networks with QoS guarantees.

    Khan, Pervez; Ullah, Niamat; Ullah, Sana; Kwak, Kyung Sup


    The IEEE 802.15.6 standard is a communication standard optimized for low-power and short-range in-body/on-body nodes to serve a variety of medical, consumer electronics and entertainment applications. Providing high mobility with guaranteed Quality of Service (QoS) to a WBAN user in heterogeneous wireless networks is a challenging task. A WBAN uses a Personal Digital Assistant (PDA) to gather data from body sensors and forwards it to a remote server through wide range wireless networks. In this paper, we present a coexistence study of WBAN with Wireless Local Area Networks (WLAN) and Wireless Wide Area Networks (WWANs). The main issue is interworking of WBAN in heterogenous wireless networks including seamless handover, QoS, emergency services, cooperation and security. We propose a Seamless Interworking Architecture (SIA) for WBAN in heterogenous wireless networks based on a cost function. The cost function is based on power consumption and data throughput costs. Our simulation results show that the proposed scheme outperforms typical approaches in terms of throughput, delay and packet loss rate.

  10. 78 FR 20317 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...


    ... supplying information that competitors could use to compete with companies in the United States. DATES... or Financial Guarantee in Excess of $100 Million: AP087223XX and AP087223XA AGENCY: Export-Import...''), that Ex-Im Bank has received an application for final commitment for a long-term loan or financial...

  11. 48 CFR 1812.7000 - Prohibition on guaranteed customer bases for new commercial space hardware or services.


    ... customer bases for new commercial space hardware or services. 1812.7000 Section 1812.7000 Federal... PLANNING ACQUISITION OF COMMERCIAL ITEMS Commercial Space Hardware or Services 1812.7000 Prohibition on guaranteed customer bases for new commercial space hardware or services. Public Law 102-139, title III...

  12. 76 FR 60475 - Issuance of a Loan Guarantee to Tonopah Solar Energy, LLC, for the Crescent Dunes Solar Energy...


    ... DEPARTMENT OF ENERGY Issuance of a Loan Guarantee to Tonopah Solar Energy, LLC, for the Crescent Dunes Solar Energy Project AGENCY: U.S. Department of Energy. ACTION: Record of decision. SUMMARY: The U... and Reinvestment Act of 2009 (Recovery Act), to Tonopah Solar Energy, LLC (TSE), for construction and...

  13. 76 FR 54454 - Issuance of Loan Guarantee to Genesis Solar, LLC, for the Genesis Solar Energy Project


    ... DEPARTMENT OF ENERGY Issuance of Loan Guarantee to Genesis Solar, LLC, for the Genesis Solar... Energy Project (GSEP), a 250-megawatt (MW) nominal capacity solar power generating facility on.../Final Environmental Impact Statement for the Genesis Solar Energy Project, Riverside County, California...

  14. 7 CFR 1810.1 - Information concerning interest rates, amortization, guarantee fee, annual charge, and fixed period.


    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Information concerning interest rates, amortization... UTILITIES SERVICE, AND FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE GENERAL REGULATIONS INTEREST RATES, TERMS, CONDITIONS, AND APPROVAL AUTHORITY Interest Rates, Amortization, Guarantee Fee, Annual Charge...

  15. 76 FR 62052 - Issuance of a Loan Guarantee to First Solar, Inc., for the Desert Sunlight Solar Farm Project


    ... DEPARTMENT OF ENERGY Issuance of a Loan Guarantee to First Solar, Inc., for the Desert Sunlight Solar Farm Project AGENCY: U.S. Department of Energy. ACTION: Record of decision. SUMMARY: The U.S... The proposed DSSFP is a photovoltaic solar electrical generating facility using commercial, thin-film...

  16. 78 FR 67144 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...


    ... EXPORT-IMPORT BANK [Public Notice 2013-0050] Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100 Million: AP086418XX AGENCY: Export-Import Bank of the United...) of the Charter of the Export-Import Bank of the United States (``Ex-Im Bank''), that Ex-Im Bank has...

  17. Guaranteed Student Loan Amendments of 1976. Ninety-fourth Congress, Second Session. Report No. 94-1232.

    Congress of the U.S., Washington, DC. House.

    A report on the Guaranteed Student Loan Amendments (H.R. 14070) to Title IV of the Higher Education Act of 1965 considers the problems behind and implications of the loan program. Chief among the problems are the default rate, access to loans, the schools as lenders, and the role of the states in administering the program. Changes recommended…

  18. 75 FR 3197 - Notice of a Public Meeting on Administration of the Business and Industry Guaranteed Loan Program


    ... DEPARTMENT OF AGRICULTURE Rural Business-Cooperative Service Notice of a Public Meeting on Administration of the Business and Industry Guaranteed Loan Program AGENCY: Rural Business-Cooperative Service, USDA. ACTION: Notice of public meeting. SUMMARY: The Rural Business-Cooperative Service (RBS), an...

  19. 78 FR 69850 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...


    ..., rail and port facilities in Australia. To the extent that Ex-Im Bank is reasonably aware, the item(s... EXPORT-IMPORT BANK [Public Notice: 2013-0054] Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100 Million: AP086750XX AGENCY: Export-Import Bank of the...

  20. 78 FR 33090 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...


    ...-haul passenger service from Australia to other countries. To the extent that Ex-Im Bank is reasonably... EXPORT-IMPORT BANK [Public Notice 2013-0030] Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100 Million: AP087980XX AGENCY: Export-Import Bank of the United...