WorldWideScience

Sample records for guaranteed time key

  1. Guaranteed Cost Finite-Time Control of Discrete-Time Positive Impulsive Switched Systems

    Directory of Open Access Journals (Sweden)

    Leipo Liu

    2018-01-01

    Full Text Available This paper considers the guaranteed cost finite-time boundedness of discrete-time positive impulsive switched systems. Firstly, the definition of guaranteed cost finite-time boundedness is introduced. By using the multiple linear copositive Lyapunov function (MLCLF and average dwell time (ADT approach, a state feedback controller is designed and sufficient conditions are obtained to guarantee that the corresponding closed-loop system is guaranteed cost finite-time boundedness (GCFTB. Such conditions can be solved by linear programming. Finally, a numerical example is provided to show the effectiveness of the proposed method.

  2. Waiting time guarantee - an update

    DEFF Research Database (Denmark)

    Socha, Karolina; Bech, Mickael

    2008-01-01

    The rule of extended free choice of hospital, in force since 2002, provides patients with an option to choose a private hospital if the public system is unable to provide a treatment within the guaranteed waiting time of one month. In June 2008 the Government declared in their yearly budget agree...

  3. Guaranteed cost control of time-delay chaotic systems

    International Nuclear Information System (INIS)

    Park, Ju H.; Kwon, O.M.

    2006-01-01

    This article studies a guaranteed cost control problem for a class of time-delay chaotic systems. Attention is focused on the design of memory state feedback controllers such that the resulting closed-loop system is asymptotically stable and an adequate level of performance is also guaranteed. Using the Lyapunov method and LMI (linear matrix inequality) framework, two criteria for the existence of the controller are derived in terms of LMIs. A numerical example is given to illustrate the proposed method

  4. Guaranteed Cost Finite-Time Control of Fractional-Order Positive Switched Systems

    Directory of Open Access Journals (Sweden)

    Leipo Liu

    2017-01-01

    Full Text Available The problem of guaranteed cost finite-time control of fractional-order positive switched systems (FOPSS is considered in this paper. Firstly, a new cost function is defined. Then, by constructing linear copositive Lyapunov functions and using the average dwell time (ADT approach, a state feedback controller and a static output feedback controller are constructed, respectively, and sufficient conditions are derived to guarantee that the corresponding closed-loop systems are guaranteed cost finite-time stable (GCFTS. Such conditions can be easily solved by linear programming. Finally, two examples are given to illustrate the effectiveness of the proposed method.

  5. Low-cost guaranteed-throughput communication ring for real-time streaming MPSoCs

    NARCIS (Netherlands)

    Dekens, B.H.J.; Kurtin, Philip Sebastian; Bekooij, Marco Jan Gerrit; Smit, Gerardus Johannes Maria

    2013-01-01

    Connection-oriented guaranteed-throughput mesh-based networks on chip have been proposed as a replacement for buses in real-time embedded multiprocessor systems such as software defined radios. Even with attractive features like throughput and latency guarantees they are not always used because

  6. Optimal Guaranteed Service Time and Service Level Decision with Time and Service Level Sensitive Demand

    Directory of Open Access Journals (Sweden)

    Sangjun Park

    2014-01-01

    Full Text Available We consider a two-stage supply chain with one supplier and one retailer. The retailer sells a product to customer and the supplier provides a product in a make-to-order mode. In this case, the supplier’s decisions on service time and service level and the retailer’s decision on retail price have effects on customer demand. We develop optimization models to determine the optimal retail price, the optimal guaranteed service time, the optimal service level, and the optimal capacity to maximize the expected profit of the whole supply chain. The results of numerical experiments show that it is more profitable to determine the optimal price, the optimal guaranteed service time, and the optimal service level simultaneously and the proposed model is more profitable in service level sensitive market.

  7. Mahanaxar: quality of service guarantees in high-bandwidth, real-time streaming data storage

    Energy Technology Data Exchange (ETDEWEB)

    Bigelow, David [Los Alamos National Laboratory; Bent, John [Los Alamos National Laboratory; Chen, Hsing-Bung [Los Alamos National Laboratory; Brandt, Scott [UCSC

    2010-04-05

    Large radio telescopes, cyber-security systems monitoring real-time network traffic, and others have specialized data storage needs: guaranteed capture of an ultra-high-bandwidth data stream, retention of the data long enough to determine what is 'interesting,' retention of interesting data indefinitely, and concurrent read/write access to determine what data is interesting, without interrupting the ongoing capture of incoming data. Mahanaxar addresses this problem. Mahanaxar guarantees streaming real-time data capture at (nearly) the full rate of the raw device, allows concurrent read and write access to the device on a best-effort basis without interrupting the data capture, and retains data as long as possible given the available storage. It has built in mechanisms for reliability and indexing, can scale to meet arbitrary bandwidth requirements, and handles both small and large data elements equally well. Results from our prototype implementation shows that Mahanaxar provides both better guarantees and better performance than traditional file systems.

  8. Guarantee of remaining life time. Integrity of mechanical components and control of ageing phenomena

    International Nuclear Information System (INIS)

    Schuler, X.; Herter, K.H.; Koenig, G.

    2012-01-01

    The life time of safety relevant systems, structures and components (SSC) of Nuclear Power Plants (NPP) is determined by two main principles. First of all the required quality has to be produced during the design and fabrication process. This means that quality has to be produced and can't be improved by excessive inspections (Basis Safety - quality through production principle). The second one is assigned to the initial quality which has to be maintained during operation. This concerns safe operation during the total life time (life time management), safety against ageing phenomena (AM - ageing management) as well as proof of integrity (e.g. break preclusion or avoidance of fracture for SSC with high safety relevance). Initiated by the Fukushima Dai-ichi event in Japan in spring 2011 for German NPP's Long Term Operation (LTO) is out of question. In June 2011 legislation took decision to phase-out from nuclear by 2022. As a fact safe operation shall be guaranteed for the remaining life time. Within this technical framework the ageing management is a key element. Depending on the safety-relevance of the SSC under observation including preventive maintenance various tasks are required in particular to clarify the mechanisms which contribute systemspecifically to the damage of the components and systems and to define their controlling parameters which have to be monitored and checked. Appropriate continuous or discontinuous measures are to be considered in this connection. The approach to ensure a high standard of quality in operation for the remaining life time and the management of the technical and organizational aspects are demonstrated and explained. The basis for ageing management to be applied to NNPs is included in Nuclear Safety Standard 1403 which describes the ageing management procedures. For SSC with high safety relevance a verification analysis for rupture preclusion (proof of integrity, integrity concept) shall be performed (Nuclear Safety Standard 3206

  9. On QoS guarantee in MPLS network with software deadline awareness

    Science.gov (United States)

    Gao, Yu; Jin, Yaohui; Cheng, Hong; Yu, Yingdi; Sun, Weiqiang; Guo, Wei; Hu, Weisheng

    2007-11-01

    With the increasing number of internet users, more and more real-time services are added into the network, such as IPTV, online-video, Voice over IP, etc. As we know, throughput is a highly important performance criterion for scheduling algorithms of networks. Besides throughput, these growing real-time services are very sensitive to delay variance termed as jitter. Therefore, high performance scheduling algorithm should achieve good performance in terms of throughput, delay, jitter and fairness together. Scheduling algorithm with deadline-awareness employed in packet switching plays a key role in QoS guarantees. Although traditional hard-deadline can provide guarantee on in-node delay-deadline criteria, the end-to-end delay-deadline criteria cannot be guaranteed due to the characteristic of hard-deadline, while the delay-deadline guaranteed throughput is low. Thus, soft-deadline scheduling algorithm has been proposed. In this paper, we investigate and compare the classical hard-deadline and soft-deadline switching algorithm. A new scheme "Bonus System" is proposed in order to realize the idea of soft-deadline switching algorithm. Bonus System based on soft-deadline is compared with classical Early-Deadline First scheme based on hard-deadline, which shows that Bonus System has better performance in End-to-End deadline guarantee.

  10. The Banking Counter-Guarantee. Juridical Regime

    Directory of Open Access Journals (Sweden)

    Postolache Rada

    2009-06-01

    Full Text Available Not so much studied by the specialised literature, the banking counter-guarantee may beconfounded with the other types of guarantee which frequently go with the guaranteed obligation –simple guarantee, collateral guarantee, the confirmation of the guarantee. The counter-guarantee may bean independent or accessory obligation, as the case may be, exclusively governed by its text, accordingto the parties’ will. At the same time, it is a complex juridical act, a contract whose contents cannot beset apart from the contracts connected form an “economic” point of view. The counter-guarantee is theresult of the banking practice and is generated by the need to make amends for the flaws generated bythe direct guarantee. The present research is focused on the analysis of the banking practice, normativeacts, jurisprudence and banking juridical literature.

  11. Study of Allocation Guaranteed Time Slot Wireless Body Area Networks Based on IEEE 802.15.4

    Science.gov (United States)

    Yundra, E.; Harsono, G. D.

    2018-04-01

    This paper aims to determine the size of the Guaranteed Time Slot (GTS) on the super frame structure required for each sensor as well as to know the performance of the GTS resized system compared to the GTS standard on IEEE 802.15.4. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called allocation Guaranteed Time Slot (ALGATIS). ALGATIS is expected to effectively allocate guaranteed time slot to the requested sensors, it adjusts the length of the slot in super frame duration based on the length of the packet data. This article presents a simulation experiment of IEEE 802.15.4, especially for star network, to predict the throughput of networks and average energy consumption. The simulation experiments show that the performance of ALGATIS is better than that of IEEE 802.15.4 standard in term of the throughput of networks and average energy consumption

  12. Statistical methods for elimination of guarantee-time bias in cohort studies: a simulation study

    Directory of Open Access Journals (Sweden)

    In Sung Cho

    2017-08-01

    Full Text Available Abstract Background Aspirin has been considered to be beneficial in preventing cardiovascular diseases and cancer. Several pharmaco-epidemiology cohort studies have shown protective effects of aspirin on diseases using various statistical methods, with the Cox regression model being the most commonly used approach. However, there are some inherent limitations to the conventional Cox regression approach such as guarantee-time bias, resulting in an overestimation of the drug effect. To overcome such limitations, alternative approaches, such as the time-dependent Cox model and landmark methods have been proposed. This study aimed to compare the performance of three methods: Cox regression, time-dependent Cox model and landmark method with different landmark times in order to address the problem of guarantee-time bias. Methods Through statistical modeling and simulation studies, the performance of the above three methods were assessed in terms of type I error, bias, power, and mean squared error (MSE. In addition, the three statistical approaches were applied to a real data example from the Korean National Health Insurance Database. Effect of cumulative rosiglitazone dose on the risk of hepatocellular carcinoma was used as an example for illustration. Results In the simulated data, time-dependent Cox regression outperformed the landmark method in terms of bias and mean squared error but the type I error rates were similar. The results from real-data example showed the same patterns as the simulation findings. Conclusions While both time-dependent Cox regression model and landmark analysis are useful in resolving the problem of guarantee-time bias, time-dependent Cox regression is the most appropriate method for analyzing cumulative dose effects in pharmaco-epidemiological studies.

  13. The unethical focus on access: a study of medical ethics and the waiting-time guarantee.

    Science.gov (United States)

    Karlberg, H I; Brinkmo, B-M

    2009-03-01

    All civilized societies favour ethical principles of equity. In healthcare, these principles generally focus on needs for medical care. Methods for establishing priorities among such needs are instrumental in this process. In this study, we analysed whether rules on access to healthcare, waiting-time guarantees, conflict with ethical principles of distributive justice. We interviewed directors, managers and other decision-makers of various healthcare providers of hospitals, primary care organizations and purchasing offices. We also conducted focus group interviews with professionals from a number of distinct medical areas. Our informants and their co-workers were reasonably familiar with the ethical platforms for priority-setting established by the Swedish parliament, giving the sickest patients complete priority. However, to satisfy the waiting-time guarantees, the informants often had to make priority decisions contrary to the ethical principles by favouring access before needs to keep waiting times within certain limits. The common opinion was that the waiting-time guarantee leads to crowding-out effects, overruling the ethical principles based on needs. For more than a decade, the interpretation in Sweden of the equitable principle based on medical needs has been distorted through political decisions, leading to healthcare providers giving priority to access rather than needs for care.

  14. Robust Guaranteed Cost Observer Design for Singular Markovian Jump Time-Delay Systems with Generally Incomplete Transition Probability

    Directory of Open Access Journals (Sweden)

    Yanbo Li

    2014-01-01

    Full Text Available This paper is devoted to the investigation of the design of robust guaranteed cost observer for a class of linear singular Markovian jump time-delay systems with generally incomplete transition probability. In this singular model, each transition rate can be completely unknown or only its estimate value is known. Based on stability theory of stochastic differential equations and linear matrix inequality (LMI technique, we design an observer to ensure that, for all uncertainties, the resulting augmented system is regular, impulse free, and robust stochastically stable with the proposed guaranteed cost performance. Finally, a convex optimization problem with LMI constraints is formulated to design the suboptimal guaranteed cost filters for linear singular Markovian jump time-delay systems with generally incomplete transition probability.

  15. Non-fragile guaranteed cost control for uncertain neutral dynamic systems with time-varying delays in state and control input

    International Nuclear Information System (INIS)

    Lien, C.-H.

    2007-01-01

    This article considers non-fragile guaranteed cost control problem for a class of uncertain neutral system with time-varying delays in both state and control input. Delay-dependent criteria are proposed to guarantee the robust stabilization of systems. Linear matrix inequality (LMI) optimization approach is used to solve the non-fragile guaranteed cost control problem. Non-fragile guaranteed cost control for unperturbed neutral system is considered in the first step. Robust non-fragile guaranteed cost control for uncertain neutral system is designed directly from the unperturbed condition. An efficient approach is proposed to design the non-fragile guaranteed cost control for uncertain neutral systems. LMI toolbox of Matlab is used to implement the proposed results. Finally, a numerical example is illustrated to show the usefulness of the proposed results

  16. Quality guaranteed theory

    International Nuclear Information System (INIS)

    Hwang, Ui Cheol

    1988-08-01

    This book tells of introduction of quality guaranteed theory like definition of quality and quality management, quality guaranteed, requirement of quality guaranteed, contrast of QA and QC, quality of guaranteed object, activity of quality guaranteed, set-up of quality that is naturally supposed such as quality guaranteed in plan and design, check of quality guaranteed, order of claim processing and cases of claim management.

  17. Delay-Dependent Guaranteed Cost Control of an Interval System with Interval Time-Varying Delay

    Directory of Open Access Journals (Sweden)

    Xiao Min

    2009-01-01

    Full Text Available This paper concerns the problem of the delay-dependent robust stability and guaranteed cost control for an interval system with time-varying delay. The interval system with matrix factorization is provided and leads to less conservative conclusions than solving a square root. The time-varying delay is assumed to belong to an interval and the derivative of the interval time-varying delay is not a restriction, which allows a fast time-varying delay; also its applicability is broad. Based on the Lyapunov-Ktasovskii approach, a delay-dependent criterion for the existence of a state feedback controller, which guarantees the closed-loop system stability, the upper bound of cost function, and disturbance attenuation lever for all admissible uncertainties as well as out perturbation, is proposed in terms of linear matrix inequalities (LMIs. The criterion is derived by free weighting matrices that can reduce the conservatism. The effectiveness has been verified in a number example and the compute results are presented to validate the proposed design method.

  18. 75 FR 4707 - Continuous Construction-Permanent Loan Guarantees Under the Section 538 Guaranteed Rural Rental...

    Science.gov (United States)

    2010-01-29

    ... permanent financing phase of a project. In addition to the proposed form of guarantee, the Agency will... financing phase of the project. This third form of guarantee is being proposed in response to input from... requests. * * * * * Lease-up period. The period of time that begins when the first unit in the project...

  19. 7 CFR 1720.14 - Nature of guarantee; acceleration of guaranteed bonds.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Nature of guarantee; acceleration of guaranteed bonds. 1720.14 Section 1720.14 Agriculture Regulations of the Department of Agriculture (Continued) RURAL... TELEPHONE PURPOSES § 1720.14 Nature of guarantee; acceleration of guaranteed bonds. (a) Any guarantee...

  20. Computation Offloading for Frame-Based Real-Time Tasks under Given Server Response Time Guarantees

    Directory of Open Access Journals (Sweden)

    Anas S. M. Toma

    2014-11-01

    Full Text Available Computation offloading has been adopted to improve the performance of embedded systems by offloading the computation of some tasks, especially computation-intensive tasks, to servers or clouds. This paper explores computation offloading for real-time tasks in embedded systems, provided given response time guarantees from the servers, to decide which tasks should be offloaded to get the results in time. We consider frame-based real-time tasks with the same period and relative deadline. When the execution order of the tasks is given, the problem can be solved in linear time. However, when the execution order is not specified, we prove that the problem is NP-complete. We develop a pseudo-polynomial-time algorithm for deriving feasible schedules, if they exist.  An approximation scheme is also developed to trade the error made from the algorithm and the complexity. Our algorithms are extended to minimize the period/relative deadline of the tasks for performance maximization. The algorithms are evaluated with a case study for a surveillance system and synthesized benchmarks.

  1. The Risk Management of Minimum Return Guarantees

    Directory of Open Access Journals (Sweden)

    Antje Mahayni

    2008-05-01

    Full Text Available Contracts paying a guaranteed minimum rate of return and a fraction of a positive excess rate, which is specified relative to a benchmark portfolio, are closely related to unit-linked life-insurance products and can be considered as alternatives to direct investment in the underlying benchmark. They contain an embedded power option, and the key issue is the tractable and realistic hedging of this option, in order to rigorously justify valuation by arbitrage arguments and prevent the guarantees from becoming uncontrollable liabilities to the issuer. We show how to determine the contract parameters conservatively and implement robust risk-management strategies.

  2. Delay-Dependent Guaranteed Cost H∞ Control of an Interval System with Interval Time-Varying Delay

    Directory of Open Access Journals (Sweden)

    Zhongke Shi

    2009-01-01

    Full Text Available This paper concerns the problem of the delay-dependent robust stability and guaranteed cost H∞ control for an interval system with time-varying delay. The interval system with matrix factorization is provided and leads to less conservative conclusions than solving a square root. The time-varying delay is assumed to belong to an interval and the derivative of the interval time-varying delay is not a restriction, which allows a fast time-varying delay; also its applicability is broad. Based on the Lyapunov-Ktasovskii approach, a delay-dependent criterion for the existence of a state feedback controller, which guarantees the closed-loop system stability, the upper bound of cost function, and disturbance attenuation lever for all admissible uncertainties as well as out perturbation, is proposed in terms of linear matrix inequalities (LMIs. The criterion is derived by free weighting matrices that can reduce the conservatism. The effectiveness has been verified in a number example and the compute results are presented to validate the proposed design method.

  3. Implementation of Guaranteed Services in the MANGO Clockless Network-on-Chip

    DEFF Research Database (Denmark)

    Bjerregaard, Tobias; Sparsø, Jens

    2006-01-01

    (clockless implementation, standard socket access points, and guaranteed communication services) make MANGO suitable for a modular SoC design flow is explained. Among the advantages of using clockless circuit techniques are inherent global timing closure, low forward latency in pipelines, and zero dynamic......Shared, segmented, on-chip interconnection networks, known as networks-on-chip (NoC), may become the preferred way of interconnecting intellectual property (IP) cores in future giga-scale system-on-chip (SoC) designs. A NoC can provide the required communication bandwidth while accommodating...... the effects of scaling microchip technologies. Equally important, a NoC facilitates a truly modular and scalable design flow. The MANGO (message-passing asynchronous network-on-chip providing guaranteed services over open core protocol (OCP) interfaces) NoC is presented, and how its key characteristics...

  4. Marketing service guarantees for health care.

    Science.gov (United States)

    Levy, J S

    1999-01-01

    The author introduces the concept of service guarantees for application in health care and differentiates between explicit, implicit, and conditional vs. unconditional types of guarantees. An example of an unconditional guarantee of satisfaction is provided by the hospitality industry. Firms conveying an implicit guarantee are those with outstanding reputations for products such as luxury automobiles, or ultimate customer service, like Nordstrom. Federal Express and Domino's Pizza offer explicit guarantees of on-time delivery. Taking this concept into efforts to improve health care delivery involves a number of caveats. Customers invited to use exceptional service cards may use these to record either satisfaction or dissatisfaction. The cards need to provide enough specific information about issues so that "immediate action could be taken to improve processes." Front-line employees should be empowered to respond to complaints in a meaningful way to resolve the problem before the client leaves the premises.

  5. Strategic design of cost savings guarantee in energy performance contracting under uncertainty

    International Nuclear Information System (INIS)

    Deng, Qianli; Jiang, Xianglin; Cui, Qingbin; Zhang, Limao

    2015-01-01

    Highlights: • A methodology is proposed to assist Energy Service Companies to maintain competitiveness in winning bids. • Uncertainties within the energy cost savings are modeled stochastically using the Monte-Carlo simulation. • A strategic energy savings guarantee design curve is derived, where all points return as appropriate guarantees. • A campus case is presented to demonstrate the applicability for finding appropriate guaranteed savings value. - Abstract: Among the key barriers to profit in Energy Performance Contracting (EPC) are uncertainties about attaining the realized energy cost savings and potential disputes over the guaranteed cost savings. In this paper, a methodology has been proposed to assist the Energy Service Company (ESCO): (1) to evaluate the risk threshold if the guarantee has already been made, and (2) to determine the guarantee design, if the guarantee has not been made yet, that not only promises the ESCO’s profitability from EPC but also maintains its competitiveness to win the bid. Uncertainties within the energy cost savings are modeled stochastically using Monte-Carlo simulation, taking both the energy price fluctuation and the facility performance variability into account. Based on that, a strategic energy savings guarantee design curve is derived, that all the points on it would return as appropriate guarantees. Finally, a campus case is presented to demonstrate the applicability for finding the appropriate guaranteed savings value. This method is also worth popularizing in similar performance-based projects

  6. Monitoring Assumptions in Assume-Guarantee Contracts

    Directory of Open Access Journals (Sweden)

    Oleg Sokolsky

    2016-05-01

    Full Text Available Pre-deployment verification of software components with respect to behavioral specifications in the assume-guarantee form does not, in general, guarantee absence of errors at run time. This is because assumptions about the environment cannot be discharged until the environment is fixed. An intuitive approach is to complement pre-deployment verification of guarantees, up to the assumptions, with post-deployment monitoring of environment behavior to check that the assumptions are satisfied at run time. Such a monitor is typically implemented by instrumenting the application code of the component. An additional challenge for the monitoring step is that environment behaviors are typically obtained through an I/O library, which may alter the component's view of the input format. This transformation requires us to introduce a second pre-deployment verification step to ensure that alarms raised by the monitor would indeed correspond to violations of the environment assumptions. In this paper, we describe an approach for constructing monitors and verifying them against the component assumption. We also discuss limitations of instrumentation-based monitoring and potential ways to overcome it.

  7. SYSTEM OF GUARANTEED RESOLUTION OF DYNAMIC CONFLICTS OF AIRCRAFTS IN REAL TIME

    Directory of Open Access Journals (Sweden)

    Svitlana Pavlova

    2017-03-01

    Full Text Available Purpose: The present work is devoted to improving of flight safety in civil aviation by creating and implementing a new system of resolution of dynamic conflict of aircrafts. The developed system is aimed at ensuring a guaranteed level of safety when resolution of rarefied conflict situations of aircraft in real-time. Methods: The proposed system is based on a new method of conflict resolution of aircraft on the basis of the theory of invariance. Results: The development of the system of conflict resolution of aircraft in real time and the implementation of the respective algorithms such control will ensure effective prevention of dangerous approaches. Discussion: The system is implemented as single unified equipment using satellite and radar navigation systems that will ensure the positioning of aircraft in real time. Provided that the system should be installed on all aircraft and integrated on board to properly ensure its functionality and interact with navigation systems.

  8. A Network-Attached Storage System Supporting Guaranteed QoS

    Institute of Scientific and Technical Information of China (English)

    KONG Hua-feng; YU Sheng-sheng; LU Hong-wei

    2005-01-01

    We propose a network-attached storage system that can support guaranteed Quality of Service (QoS), called POPNet Storage. The special policy of date access and disk scheduling is enable users to access files quickly and directly with guaranteed QoS in the POPNet Storage. The POPNet Storage implements a measurement-based admission control algorithm (PSMBAC) to determine whether to admit a new data access request stream and admit as many requests as possible while meeting the QoS guarantees to its clients. The data reconstruction algorithms in the POPNet Storage also put more emphasis on data availability and guaranteed QoS, thus it is designed to complete the data recovery as soon as possible and at the same time provide the guaranteed QoS for high-priority data access. The experiment results show that the POPNet Storage can provide more significant performance, reliability, and guaranteed QoS than conventional storage systems.

  9. Communication key using delay times in time-delayed chaos synchronization

    International Nuclear Information System (INIS)

    Kim, Chil-Min; Kye, Won-Ho; Rim, Sunghwan; Lee, Soo-Young

    2004-01-01

    We propose an efficient key scheme, which can generate a great number of communication keys, for communication using chaos synchronization. We have attained the keys from delay times of time-delay coupled chaotic systems. We explain the scheme and the efficiency by coupling Henon and logistic maps and illustrate them by coupling Navier-Stokes and Lorenz equations as a continuous system

  10. Legal Status of Credit Bank Guarantee in Indonesia’s Legal Guarantee

    Directory of Open Access Journals (Sweden)

    Erma Defiana Putriyanti

    2017-07-01

    Full Text Available The aim of this research is to analyze  about the legal status of the letter hiring as collateral for bank loans in the Indonesian security law. The method of this research is a normative juridical. The results of this research indicate that the decree hiring is not included in the objects that can be bound by pledge, fiduciary, and mortgage then hiring decree hiring is not included in the personal guarantee and corporate guarantee. Although the hiring decree is issued by a legitimate institution, the institution is not bound by an agreement between the debtor debts with the bank but when the decree was used as security for the bank. Hiring letter is not also included in the general collateral. Decree hiring is not an object and does not qualify as material that can be used as general collateral. The conclusion of this research is that the position of the decree hiring as collateral for bank loans is a new form of guarantee which is not included in the general guarantees and the specific ones. This shows that the system of legal guarantees in Indonesia is not pure anymore embrace a closed system, but has started shifting into an open system.

  11. Switching Fuzzy Guaranteed Cost Control for Nonlinear Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Linqin Cai

    2014-01-01

    Full Text Available This paper deals with the problem of guaranteed cost control for a class of nonlinear networked control systems (NCSs with time-varying delay. A guaranteed cost controller design method is proposed to achieve the desired control performance based on the switched T-S fuzzy model. The switching mechanism is introduced to handle the uncertainties of NCSs. Based on Lyapunov functional approach, some sufficient conditions for the existence of state feedback robust guaranteed cost controller are presented. Simulation results show that the proposed method is effective to guarantee system’s global asymptotic stability and quality of service (QoS.

  12. Cryptographic robustness of a quantum cryptography system using phase-time coding

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2008-01-01

    A cryptographic analysis is presented of a new quantum key distribution protocol using phase-time coding. An upper bound is obtained for the error rate that guarantees secure key distribution. It is shown that the maximum tolerable error rate for this protocol depends on the counting rate in the control time slot. When no counts are detected in the control time slot, the protocol guarantees secure key distribution if the bit error rate in the sifted key does not exceed 50%. This protocol partially discriminates between errors due to system defects (e.g., imbalance of a fiber-optic interferometer) and eavesdropping. In the absence of eavesdropping, the counts detected in the control time slot are not caused by interferometer imbalance, which reduces the requirements for interferometer stability.

  13. Corporate Bond Guarantees and The Value of Financial Flexibility

    NARCIS (Netherlands)

    Altieri, M.; Massa, M; Manconi, A

    2016-01-01

    We examine the effects of the decision of parent companies to guarantee bonds issued by their subsidiaries. The market value of the parent firm’s outstanding bonds drops five times more when it issues a guarantee for subsidiary debt than when it issues a new bond in its own name. This effect is

  14. BANK GUARANTEES

    OpenAIRE

    Vasile NEME

    2012-01-01

    The present study propose the analyse of the irrevocable commitment of a bank entity towards a determined person, through which guarantees a certain legal conduct of its client, and, in case of breach, assumes the payment obligation of a determined amount of money. This kind of legal technique it is called bank guarantee and in the usual business language it is called “Letter of Bank Guarantee”. The determined reason to choose this scientific initiative it is the frequency of this kind of fin...

  15. Convergence Guaranteed Nonlinear Constraint Model Predictive Control via I/O Linearization

    Directory of Open Access Journals (Sweden)

    Xiaobing Kong

    2013-01-01

    Full Text Available Constituting reliable optimal solution is a key issue for the nonlinear constrained model predictive control. Input-output feedback linearization is a popular method in nonlinear control. By using an input-output feedback linearizing controller, the original linear input constraints will change to nonlinear constraints and sometimes the constraints are state dependent. This paper presents an iterative quadratic program (IQP routine on the continuous-time system. To guarantee its convergence, another iterative approach is incorporated. The proposed algorithm can reach a feasible solution over the entire prediction horizon. Simulation results on both a numerical example and the continuous stirred tank reactors (CSTR demonstrate the effectiveness of the proposed method.

  16. Event-Triggered Asynchronous Guaranteed Cost Control for Markov Jump Discrete-Time Neural Networks With Distributed Delay and Channel Fading.

    Science.gov (United States)

    Yan, Huaicheng; Zhang, Hao; Yang, Fuwen; Zhan, Xisheng; Peng, Chen

    2017-08-18

    This paper is concerned with the guaranteed cost control problem for a class of Markov jump discrete-time neural networks (NNs) with event-triggered mechanism, asynchronous jumping, and fading channels. The Markov jump NNs are introduced to be close to reality, where the modes of the NNs and guaranteed cost controller are determined by two mutually independent Markov chains. The asynchronous phenomenon is considered, which increases the difficulty of designing required mode-dependent controller. The event-triggered mechanism is designed by comparing the relative measurement error with the last triggered state at the process of data transmission, which is used to eliminate dispensable transmission and reduce the networked energy consumption. In addition, the signal fading is considered for the effect of signal reflection and shadow in wireless networks, which is modeled by the novel Rice fading models. Some novel sufficient conditions are obtained to guarantee that the closed-loop system reaches a specified cost value under the designed jumping state feedback control law in terms of linear matrix inequalities. Finally, some simulation results are provided to illustrate the effectiveness of the proposed method.

  17. Financial guarantees and public debt in South Africa

    Directory of Open Access Journals (Sweden)

    Ogutu Miruka

    2015-09-01

    Full Text Available A few years since the worst of the Euro sovereign debt crisis, many nations, from Cyprus to Ireland, including South Africa are re-visiting their public debt management to avert or lessen the impact of similar such happenings in the future. There are a number of studies on risk assessments of fiscal sustainability; however, few focus on contingent liabilities and even fewer on financial guarantees. In South Africa, financial guarantees have consistently comprised just above or below 50% of all contingent liabilities since the early days of majoritarian rule. In lieu of this, the paper analyses the risks posed by financial guarantees to fiscal sustainability in South Africa. We estimate the effect of financial guarantees on public debt in South Africa via the Engle Granger and causality model with quarterly time series data obtained from the South African Reserve Bank (SARB as well as the National Treasury. The data covers the April 1997 to December 2011 period. All econometric methods were executed using the statistical software package E-Views 7. We found that no long run relationship exists between national net loan debt and financial guarantees in South Africa. The pass rate of financial guarantees significantly affects its present value. The pass rate of financial guarantees has a predicting ability in determining the present value of national net loan debt. These findings may be contrary to what would be expected in the case of South Africa considering that the country is managing the issuance of financial guarantees prudently and that at present levels, there is no need for a radical policy shift. The study therefore offers a lesson to similar merging economies on the good governance of contingent liabilities.

  18. 27 CFR 6.61 - Guaranteeing loans.

    Science.gov (United States)

    2010-04-01

    ... OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Guaranteeing Loans § 6.61 Guaranteeing loans. The act by an industry member of guaranteeing any loan or the repayment of any financial...

  19. 7 CFR 1720.9 - Guarantee Agreement.

    Science.gov (United States)

    2010-01-01

    ... bonds. (b) The guaranteed bonds shall refer to the guarantee agreement as controlling the terms of the... the holder of the guaranteed bonds; (11) Claim procedures; (12) What constitutes a failure by the...

  20. Massive M2M Access with Reliability Guarantees in LTE Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2015-01-01

    Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arriva...

  1. Do Job Security Guarantees Work?

    OpenAIRE

    Alex Bryson; Lorenzo Cappellari; Claudio Lucifora

    2004-01-01

    We investigate the effect of employer job security guarantees on employee perceptions of job security. Using linked employer-employee data from the 1998 British Workplace Employee Relations Survey, we find job security guarantees reduce employee perceptions of job insecurity. This finding is robust to endogenous selection of job security guarantees by employers engaging in organisational change and workforce reductions. Furthermore, there is no evidence that increased job security through job...

  2. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  3. 29 CFR 4022.3 - Guaranteed benefits.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Guaranteed benefits. 4022.3 Section 4022.3 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION COVERAGE AND BENEFITS BENEFITS PAYABLE IN TERMINATED SINGLE-EMPLOYER PLANS General Provisions; Guaranteed Benefits § 4022.3 Guaranteed...

  4. 20 CFR 404.230 - Guaranteed alternative.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Guaranteed alternative. 404.230 Section 404... INSURANCE (1950- ) Computing Primary Insurance Amounts Guaranteed Alternative for People Reaching Age 62 After 1978 But Before 1984 § 404.230 Guaranteed alternative. (a) General. If you reach age 62 after 1978...

  5. Optimal design of uptime-guarantee contracts under IGFR valuations and convex costs

    OpenAIRE

    Hezarkhni, Behzad

    2016-01-01

    An uptime-guarantee contract commits a service provider to maintain the functionality of a customer’s equipment at least for certain fraction of working time during a contracted period. This paper addresses the optimal design of uptime-guarantee contracts for the service provider when the customer’s valuation of a contract with a given guaranteed uptime level has an Increasing Generalized Failure Rate (IGFR) distribution. We first consider the case where the service provider proposes only one...

  6. Government guarantees and public debt in Croatia

    Directory of Open Access Journals (Sweden)

    Anto Bajo

    2011-09-01

    Full Text Available Government fi nancial and performance guarantees have been issued in Croatia since 1996, to support funding and ensure favourable borrowing conditions in the fi nancial market for companies in majority state ownership. However, government guarantees have rarely been part of defi ned strategies and goals of public debt and risk management. Despite their steady growth, the structure of active guarantees and their infl uence on Croatian public debt are still unknown. This paper analyses the amount and structure of state guarantees, their maturities and the authority and accountability for their management, and it compares the structure of guarantees in terms of economic sectors. The main objective of the paper is to determine the infl uence of government guarantees on the public debt growth.

  7. Self-guaranteed measurement-based quantum computation

    Science.gov (United States)

    Hayashi, Masahito; Hajdušek, Michal

    2018-05-01

    In order to guarantee the output of a quantum computation, we usually assume that the component devices are trusted. However, when the total computation process is large, it is not easy to guarantee the whole system when we have scaling effects, unexpected noise, or unaccounted for correlations between several subsystems. If we do not trust the measurement basis or the prepared entangled state, we do need to be worried about such uncertainties. To this end, we propose a self-guaranteed protocol for verification of quantum computation under the scheme of measurement-based quantum computation where no prior-trusted devices (measurement basis or entangled state) are needed. The approach we present enables the implementation of verifiable quantum computation using the measurement-based model in the context of a particular instance of delegated quantum computation where the server prepares the initial computational resource and sends it to the client, who drives the computation by single-qubit measurements. Applying self-testing procedures, we are able to verify the initial resource as well as the operation of the quantum devices and hence the computation itself. The overhead of our protocol scales with the size of the initial resource state to the power of 4 times the natural logarithm of the initial state's size.

  8. Guarantees come to professional service firms.

    Science.gov (United States)

    Hart, C W; Schlesinger, L A; Maher, D

    1992-01-01

    Can lawyers, doctors, investment bankers, accountants, and consultants guarantee their work? Your money back if not absolutely delighted? Some professional service firms are doing exactly that, and they believe they are gaining not only satisfied customers but higher market share and improved service quality. The authors discuss the benefits and risks of unconditional and more limited guarantees. Firms that address this issue proactively now, they argue, will be less likely to rush into poorly considered guarantees later.

  9. Robust guaranteed cost tracking control of quadrotor UAV with uncertainties.

    Science.gov (United States)

    Xu, Zhiwei; Nian, Xiaohong; Wang, Haibo; Chen, Yinsheng

    2017-07-01

    In this paper, a robust guaranteed cost controller (RGCC) is proposed for quadrotor UAV system with uncertainties to address set-point tracking problem. A sufficient condition of the existence for RGCC is derived by Lyapunov stability theorem. The designed RGCC not only guarantees the whole closed-loop system asymptotically stable but also makes the quadratic performance level built for the closed-loop system have an upper bound irrespective to all admissible parameter uncertainties. Then, an optimal robust guaranteed cost controller is developed to minimize the upper bound of performance level. Simulation results verify the presented control algorithms possess small overshoot and short setting time, with which the quadrotor has ability to perform set-point tracking task well. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  10. 78 FR 63158 - Information Collection; Guaranteed Farm Loan Program

    Science.gov (United States)

    2013-10-23

    ... DEPARTMENT OF AGRICULTURE Farm Service Agency Information Collection; Guaranteed Farm Loan Program... collection associated with the Guaranteed Farm Loan Program. The amended estimate adds the merger of the information collection for the Land Contract Guarantee Program (0560-0279) into the Guaranteed Farm Loan...

  11. The pricing of bank debt guarantees

    NARCIS (Netherlands)

    Arping, S.

    2009-01-01

    We analyze the optimal pricing of government-sponsored bank debt guarantees within the context of an asset substitution framework. We show that the desirability of fair pricing of guarantees depends on the degree of transparency of the banking sector: in relatively opaque banking systems, fair

  12. 22 CFR 231.04 - Guarantee eligibility.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Guarantee eligibility. 231.04 Section 231.04 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ARAB REPUBLIC OF EGYPT LOAN GUARANTEES ISSUED UNDER THE EMERGENCY WARTIME SUPPLEMENTAL APPROPRIATIONS ACT OF 2003, PUBLIC LAW 108-11-STANDARD TERMS AND...

  13. Understanding consumer response to service guarantees

    International Nuclear Information System (INIS)

    Taylor, E.L.; Cole, J.M.

    1999-01-01

    Whether the goal is customer loyalty to a competitive energy service provider or customer satisfaction with monopoly distribution services, service guarantees must be seen as one way a company can communicate with its customers about the relationship it has (or wants) with them. In short, service guarantees must be evaluated as part of a company's overall brand management strategy. To do this, a conceptual framework within which to develop and link models of service delivery and brand management is needed. This means seeing both as examples of inference management. In this article the authors first interpret findings from their research on utility service guarantees in light of the model of service delivery proposed by Smith, Bolton, and Wagner. The authors then situate this model within their own model of utility brand management. The resulting approach can be used by a utility to evaluate whether and how to adopt service guarantees as part of its overall branding strategy

  14. Understanding consumer response to service guarantees

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, E.L.; Cole, J.M.

    1999-10-01

    Whether the goal is customer loyalty to a competitive energy service provider or customer satisfaction with monopoly distribution services, service guarantees must be seen as one way a company can communicate with its customers about the relationship it has (or wants) with them. In short, service guarantees must be evaluated as part of a company's overall brand management strategy. To do this, a conceptual framework within which to develop and link models of service delivery and brand management is needed. This means seeing both as examples of inference management. In this article the authors first interpret findings from their research on utility service guarantees in light of the model of service delivery proposed by Smith, Bolton, and Wagner. The authors then situate this model within their own model of utility brand management. The resulting approach can be used by a utility to evaluate whether and how to adopt service guarantees as part of its overall branding strategy.

  15. Monitoring and Evaluation of Cultivated Land Irrigation Guarantee Capability with Remote Sensing

    Science.gov (United States)

    Zhang, C., Sr.; Huang, J.; Li, L.; Wang, H.; Zhu, D.

    2015-12-01

    Abstract: Cultivated Land Quality Grade monitoring and evaluation is an important way to improve the land production capability and ensure the country food safety. Irrigation guarantee capability is one of important aspects in the cultivated land quality monitoring and evaluation. In the current cultivated land quality monitoring processing based on field survey, the irrigation rate need much human resources investment in long investigation process. This study choses Beijing-Tianjin-Hebei as study region, taking the 1 km × 1 km grid size of cultivated land unit with a winter wheat-summer maize double cropping system as study object. A new irrigation capacity evaluation index based on the ratio of the annual irrigation requirement retrieved from MODIS data and the actual quantity of irrigation was proposed. With the years of monitoring results the irrigation guarantee capability of study area was evaluated comprehensively. The change trend of the irrigation guarantee capability index (IGCI) with the agricultural drought disaster area in rural statistical yearbook of Beijing-Tianjin-Hebei area was generally consistent. The average of IGCI value, the probability of irrigation-guaranteed year and the weighted average which controlled by the irrigation demand index were used and compared in this paper. The experiment results indicate that the classification result from the present method was close to that from irrigation probability in the gradation on agriculture land quality in 2012, with overlap of 73% similar units. The method of monitoring and evaluation of cultivated land IGCI proposed in this paper has a potential in cultivated land quality level monitoring and evaluation in China. Key words: remote sensing, evapotranspiration, MODIS cultivated land quality, irrigation guarantee capability Authors: Chao Zhang, Jianxi Huang, Li Li, Hongshuo Wang, Dehai Zhu China Agricultural University zhangchaobj@gmail.com

  16. 22 CFR 231.03 - The Guarantee.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false The Guarantee. 231.03 Section 231.03 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ARAB REPUBLIC OF EGYPT LOAN GUARANTEES ISSUED UNDER THE EMERGENCY WARTIME SUPPLEMENTAL APPROPRIATIONS ACT OF 2003, PUBLIC LAW 108-11-STANDARD TERMS AND CONDITIONS...

  17. 19 CFR 351.506 - Loan guarantees.

    Science.gov (United States)

    2010-04-01

    ... Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE ANTIDUMPING AND COUNTERVAILING DUTIES Identification and Measurement of Countervailable Subsidies § 351.506 Loan guarantees. (a) Benefit—(1) In general. In the case of a loan guarantee, a benefit exists to the extent that the total amount a firm pays for...

  18. 77 FR 58991 - State-Level Guarantee Fee Pricing

    Science.gov (United States)

    2012-09-25

    ... FEDERAL HOUSING FINANCE AGENCY [No. 2012-N-13] State-Level Guarantee Fee Pricing AGENCY: Federal... guarantee fee pricing by state. FHFA's proposal described here would adjust the upfront fees that the... final state-level guarantee fee pricing method, FHFA expects to direct the Enterprises to implement the...

  19. 13 CFR 107.1720 - Characteristics of SBA's guarantee.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Characteristics of SBA's guarantee. 107.1720 Section 107.1720 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS... Characteristics of SBA's guarantee. If SBA agrees to guarantee a Licensee's Debentures or Participating Securities...

  20. REGIONAL RECIPROCAL GUARANTEE SOCIETIES IN VENEZUELA

    Directory of Open Access Journals (Sweden)

    Orlando J. Canelones

    2014-11-01

    Full Text Available This research aims to describe the operation of services offered by the Regional Mutual Guarantee Societies (SGRs in Venezuela, and to present synthetically, the rudiments for constitution, as well as the legal basis that must rule them, through conducting an executive summary of the Law of the National System of Reciprocal Guarantees for Small and Medium Business and the Promotion, Constitution and Functioning Rules of National Mutual Funds and Guarantees and SGRs.  The methodology used in this research is documentary, through a literature review and exploration that allowed inferences about the importance of Regional SGRs in Venezuela, as financing alternative

  1. Minimum Price Guarantees In a Consumer Search Model

    NARCIS (Netherlands)

    M.C.W. Janssen (Maarten); A. Parakhonyak (Alexei)

    2009-01-01

    textabstractThis paper is the first to examine the effect of minimum price guarantees in a sequential search model. Minimum price guarantees are not advertised and only known to consumers when they come to the shop. We show that in such an environment, minimum price guarantees increase the value of

  2. Pricing unit-linked insurance with guaranteed benefit

    Science.gov (United States)

    Iqbal, M.; Novkaniza, F.; Novita, M.

    2017-07-01

    Unit-linked insurance is an investment-linked insurance, that is, the given benefit is the premium investment out-come. Recently, the most widely marketed insurance in the industry is unit-linked insurance with guaranteed benefit. With guaranteed benefit applied, the insurance benefits form is similar to the payoff form of European call option. Thereby, pricing European call option is involved in pricing unit-linked insurance with guaranteed benefit. The dynamics of investment outcome is assumed to follow stochastic interest rate. Hence, change of measure methods is used in pricing unit-linked insurance. The discount factor with stochastic interest rate needs to be modified as well to be zero coupon bond price. Eventually, the insurance premium is calculated by equivalence principle with guaranteed benefit and insurance period explicitly given.

  3. Modelling the guaranteed QoS for wireless sensor networks: a network calculus approach

    Directory of Open Access Journals (Sweden)

    Yu Jianping

    2011-01-01

    Full Text Available Abstract Wireless sensor networks (WSNs became one of the high technology domains during the last 10 years. Real-time applications for them make it necessary to provide the guaranteed quality of service (QoS. The main contributions of this article are a system skeleton and a guaranteed QoS model that are suitable for the WSNs. To do it, we develop a sensor node model based on virtual buffer sharing and present a two-layer scheduling model using the network calculus. With the system skeleton, we develop a guaranteed QoS model, such as the upper bounds on buffer queue length/delay/effective bandwidth, and single-hop/multi-hops delay/jitter/effective bandwidth. Numerical results show the system skeleton and the guaranteed QoS model are scalable for different types of flows, including the self-similar traffic flows, and the parameters of flow regulators and service curves of sensor nodes affect them. Our proposal leads to buffer dimensioning, guaranteed QoS support and control in the WSNs.

  4. NCA & Credit Guarantees

    African Journals Online (AJOL)

    stooppn

    purposes of the National Credit Act; what the definition of a credit guarantee set out ...... Scholtz et al National Credit Act in para 8.2.4; Scott et al Law of Commerce ..... Eitelberg E "Autonomy of Documentary Credit Undertakings in South African.

  5. Guaranteed Cost Fault-Tolerant Control for Networked Control Systems with Sensor Faults

    Directory of Open Access Journals (Sweden)

    Qixin Zhu

    2015-01-01

    Full Text Available For the large scale and complicated structure of networked control systems, time-varying sensor faults could inevitably occur when the system works in a poor environment. Guaranteed cost fault-tolerant controller for the new networked control systems with time-varying sensor faults is designed in this paper. Based on time delay of the network transmission environment, the networked control systems with sensor faults are modeled as a discrete-time system with uncertain parameters. And the model of networked control systems is related to the boundary values of the sensor faults. Moreover, using Lyapunov stability theory and linear matrix inequalities (LMI approach, the guaranteed cost fault-tolerant controller is verified to render such networked control systems asymptotically stable. Finally, simulations are included to demonstrate the theoretical results.

  6. Financial Management: Emergency Steel Loan Guarantee Program

    National Research Council Canada - National Science Library

    2001-01-01

    In a February 1, 2001 letter, you expressed concerns about repayments of federally guaranteed loans by borrowers under the Emergency Steel Loan Guarantee Program and the effect of the program on the U.S. steel industry...

  7. The Canadian Nuclear Safety Commission's financial guarantee requirements

    International Nuclear Information System (INIS)

    Ferch, R.

    2006-01-01

    The Nuclear Safety and Control Act gives the Canadian Nuclear Safety Commission (CNSC) the legal authority to require licensees to provide financial guarantees in order to meet the purposes of the Act. CNSC policy and guidance with regard to financial guarantees is outlined, and the current status of financial guarantee requirements as applied to various CNSC licensees is described. (author)

  8. Robust levitation control for maglev systems with guaranteed bounded airgap.

    Science.gov (United States)

    Xu, Jinquan; Chen, Ye-Hwa; Guo, Hong

    2015-11-01

    The robust control design problem for the levitation control of a nonlinear uncertain maglev system is considered. The uncertainty is (possibly) fast time-varying. The system has magnitude limitation on the airgap between the suspended chassis and the guideway in order to prevent undesirable contact. Furthermore, the (global) matching condition is not satisfied. After a three-step state transformation, a robust control scheme for the maglev vehicle is proposed, which is able to guarantee the uniform boundedness and uniform ultimate boundedness of the system, regardless of the uncertainty. The magnitude limitation of the airgap is guaranteed, regardless of the uncertainty. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  9. The traceability of renewable energies: the guarantees of origin

    International Nuclear Information System (INIS)

    2017-03-01

    The guarantee of origin has been initially designed by the European Union as a mechanism of support for renewable energies. It is an electronic document which allows an electric power provider to guarantee to its client the origin of the energy it sells him. This document presents the legal background of this guarantee, briefly describes the life cycle of this guarantee, proposes a brief discussion of recent legal evolutions, and briefly discusses its future

  10. 78 FR 48135 - Information Collection; Guaranteed Farm Loan Program

    Science.gov (United States)

    2013-08-07

    ... Information Collection; Guaranteed Farm Loan Program AGENCY: Farm Service Agency, USDA. ACTION: Notice... revision of a currently approved information collection associated with the Guaranteed Farm Loan Program. This information collection is used to make and service loans guaranteed by FSA to eligible farmers and...

  11. 10 CFR 609.10 - Loan Guarantee Agreement.

    Science.gov (United States)

    2010-01-01

    ... accepted accounting principles and practices. The non-guaranteed portion (if any) of any Guaranteed... examination, to any pertinent books, documents, papers, and records of the Borrower, Eligible Lender or other... transferring Eligible Lender was performing these functions and transfer such functions to the new Eligible...

  12. Field test of a continuous-variable quantum key distribution prototype

    International Nuclear Information System (INIS)

    Fossier, S; Debuisschert, T; Diamanti, E; Villing, A; Tualle-Brouri, R; Grangier, P

    2009-01-01

    We have designed and realized a prototype that implements a continuous-variable quantum key distribution (QKD) protocol based on coherent states and reverse reconciliation. The system uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation. The security of the system is guaranteed against general coherent eavesdropping attacks. The performance of the prototype was tested over preinstalled optical fibres as part of a quantum cryptography network combining different QKD technologies. The stable and automatic operation of the prototype over 57 h yielded an average secret key distribution rate of 8 kbit s -1 over a 3 dB loss optical fibre, including the key extraction process and all quantum and classical communication. This system is therefore ideal for securing communications in metropolitan size networks with high-speed requirements.

  13. Security Guarantees and Nuclear Non-Proliferation

    International Nuclear Information System (INIS)

    Bruno Tertrais

    2011-01-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  14. Security Guarantees and Nuclear Non-Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bruno Tertrais

    2011-07-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  15. 42 CFR 417.937 - Loan and loan guarantee provisions.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Loan and loan guarantee provisions. 417.937 Section... HEALTH CARE PREPAYMENT PLANS Administration of Outstanding Loans and Loan Guarantees § 417.937 Loan and loan guarantee provisions. (a) Disbursement of loan proceeds. The principal amount of any loan made or...

  16. Assume-Guarantee Abstraction Refinement Meets Hybrid Systems

    Science.gov (United States)

    Bogomolov, Sergiy; Frehse, Goran; Greitschus, Marius; Grosu, Radu; Pasareanu, Corina S.; Podelski, Andreas; Strump, Thomas

    2014-01-01

    Compositional verification techniques in the assume- guarantee style have been successfully applied to transition systems to efficiently reduce the search space by leveraging the compositional nature of the systems under consideration. We adapt these techniques to the domain of hybrid systems with affine dynamics. To build assumptions we introduce an abstraction based on location merging. We integrate the assume-guarantee style analysis with automatic abstraction refinement. We have implemented our approach in the symbolic hybrid model checker SpaceEx. The evaluation shows its practical potential. To the best of our knowledge, this is the first work combining assume-guarantee reasoning with automatic abstraction-refinement in the context of hybrid automata.

  17. 12 CFR 370.12 - Payment on the guarantee.

    Science.gov (United States)

    2010-01-01

    ... TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.12 Payment on the guarantee. (a) Claims for Deposits in... depositors for funds in a noninterest-bearing transaction account in an insured depository institution that...

  18. 13 CFR 120.400 - Loan Guarantee Agreements.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Loan Guarantee Agreements. 120.400 Section 120.400 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Lenders § 120... specific proposed loan that a Lender may submit. The existence of a Loan Guarantee Agreement does not limit...

  19. Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Azarderskhsh Reza

    2011-01-01

    Full Text Available Information security in infrastructureless wireless sensor networks (WSNs is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in order to monitor, gather, disseminate, and provide the sensed data to the command node. Various studies have focused on key establishment schemes in homogeneous WSNs. However, recent research has shown that achieving survivability in WSNs requires a hierarchy and heterogeneous infrastructure. In this paper, to address security issues in the heterogeneous WSNs, we propose a secure clustering scheme along with a deterministic pairwise key management scheme based on public key cryptography. The proposed security mechanism guarantees that any two sensor nodes located in the same cluster and routing path can directly establish a pairwise key without disclosing any information to other nodes. Through security performance evaluation, it is shown that the proposed scheme guarantees node-to-node authentication, high resiliency against node capture, and minimum memory space requirement.

  20. 77 FR 38015 - Community Programs Guaranteed Loans

    Science.gov (United States)

    2012-06-26

    ... section. This is based upon the Agency's experience to date in financing this type of project and the... sections, in order to clarify the types of projects that are eligible for a Community Facilities Guaranteed... Program by limiting the risk to the guaranteed loan portfolio. RHS is seeking to prohibit the financing of...

  1. Improvements Needed in Administration of the Guaranteed Student Loan Program.

    Science.gov (United States)

    General Accounting Office, Washington, DC.

    This report identifies improvements needed in administration of the guaranteed student loan program. Improvements needed are based on the fact that that lenders are not informed when student borrowers drop out of school. Alternatives for providing lenders with timely information on enrollment terminations are indicated. Additional administrative…

  2. Coverage and Rate of Downlink Sequence Transmissions with Reliability Guarantees

    DEFF Research Database (Denmark)

    Park, Jihong; Popovski, Petar

    2017-01-01

    Real-time distributed control is a promising application of 5G in which communication links should satisfy certain reliability guarantees. In this letter, we derive closed-form maximum average rate when a device (e.g. industrial machine) downloads a sequence of n operational commands through cell...

  3. CREDIT SYSTEM AND CREDIT GUARANTEE PROGRAMS

    OpenAIRE

    Turgay GECER

    2012-01-01

    Credit system is an integrated architecture consisted of financial information, credit rating, credit risk management, receivables and credit insurance systems, credit derivative markets and credit guarantee programs. The main purpose of the credit system is to provide the functioning of all credit channels and to make it easy to access of credit sources demanded by all of real and legal persons in any economic system. Credit guarantee program, the one of prominent elements of the credit syst...

  4. A Unified Pricing of Variable Annuity Guarantees under the Optimal Stochastic Control Framework

    Directory of Open Access Journals (Sweden)

    Pavel V. Shevchenko

    2016-07-01

    Full Text Available In this paper, we review pricing of the variable annuity living and death guarantees offered to retail investors in many countries. Investors purchase these products to take advantage of market growth and protect savings. We present pricing of these products via an optimal stochastic control framework and review the existing numerical methods. We also discuss pricing under the complete/incomplete financial market models, stochastic mortality and optimal/sub-optimal policyholder behavior, and in the presence of taxes. For numerical valuation of these contracts in the case of simple risky asset process, we develop a direct integration method based on the Gauss-Hermite quadratures with a one-dimensional cubic spline for calculation of the expected contract value, and a bi-cubic spline interpolation for applying the jump conditions across the contract cashflow event times. This method is easier to implement and faster when compared to the partial differential equation methods if the transition density (or its moments of the risky asset underlying the contract is known in closed form between the event times. We present accurate numerical results for pricing of a Guaranteed Minimum Accumulation Benefit (GMAB guarantee available on the market that can serve as a numerical benchmark for practitioners and researchers developing pricing of variable annuity guarantees to assess the accuracy of their numerical implementation.

  5. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  6. What Guarantees Should Society Offer Its Youth?

    Science.gov (United States)

    Brooks, Chris

    2014-01-01

    Criticising the concept of a "youth guarantee" as it was understood by the OECD in the 1990s and recently again by the European Community, the author argues that just more schooling and training will not help, let alone guarantee a future for disadvantaged, unemployed young people. Rather any policy that wants to help youth to become…

  7. Nonfragile Guaranteed Cost Control and Optimization for Interconnected Systems of Neutral Type

    Directory of Open Access Journals (Sweden)

    Heli Hu

    2013-01-01

    Full Text Available The design and optimization problems of the nonfragile guaranteed cost control are investigated for a class of interconnected systems of neutral type. A novel scheme, viewing the interconnections with time-varying delays as effective information but not disturbances, is developed to decrease the conservatism. Many techniques on decomposing and magnifying the matrices are utilized to obtain the guaranteed cost of the considered system. Also, an algorithm is proposed to solve the nonlinear problem of the interconnected matrices. Based on this algorithm, the minimization of the guaranteed cost of the considered system is obtained by optimization. Further, the state feedback control is extended to the case in which the underlying system is dependent on uncertain parameters. Finally, two numerical examples are given to illustrate the proposed method, and some comparisons are made to show the advantages of the schemes of dealing with the interconnections.

  8. "Financial Innovation and Risk Management: The Cross-Guarantee Solution"

    OpenAIRE

    Bert Ely

    1995-01-01

    The cross-guarantee concept, which is summarized below, will eliminate the regulatory moral hazard that electronic technology has greatly exacerbated in recent years. The paper concludes by outlining the many benefits cross-guarantees will bring to the financial system as well as the structural and international implications of using cross-guarantees to bring market-driven regulation to the financial services sector of the American economy.

  9. Customer intentions to invoke service guarantees: Do excellence in service recovery, type of guarantee, and cultural orientation matter?

    OpenAIRE

    Van Vaerenbergh, Yves; De Keyser, Arne; Larivière, Bart

    2014-01-01

    Purpose – Many service providers feel confident about their service quality and thus offer service guarantees to their customers. Yet service failures are inevitable. As guarantees can only be invoked when customers report service failures, firms are given the opportunity to redress the original failure potentially influencing customer outcomes. The purpose of this paper is to provide the first empirical investigation of whether excellence in service recovery affects customers’ intentions to ...

  10. On the Guarantee of the Realization of the Right to Education

    Directory of Open Access Journals (Sweden)

    Elena A. Kashtanova

    2017-05-01

    Full Text Available The article reveals the issues of the essence and content of the guarantee of the realization of the right to education, the system of guarantees for the implementation of constitutional and legal principles and norms, including those that consolidate the system of rights and freedoms of human and citizen. The Author examines the functions of guarantee (stimulating, law enforcement and law enforcement, analyzes types of guaranteesguarantees related to the very right to education and quality of education.​

  11. Implementation of a financial guarantee policy at the CNSC

    International Nuclear Information System (INIS)

    Barker, R.

    2011-01-01

    The Canadian Nuclear Safety Commission (CNSC) was established in 2000 under the Nuclear Safety and Control Act (NSCA) to replace the Atomic Energy Control Board (AECB). Prior to the coming in force of the NSCA, financial guarantees associated with licensed activities were not prescribed in the Atomic Energy Control Act or its regulations. Under the NSCA, the Commission Tribunal 'the Commission' was given authority to impose conditions in licences requiring financial guarantees from licensees. Other provisions of the NSCA provided information on the application of financial guarantees and for refunds when decommissioning obligations had been met. Since 2000, the application of financial guarantees has been primarily focussed on licences issued pursuant to the Class I Nuclear Facilities Regulations and the Uranium Mines and Mills Regulations. This was to assure that the requirements for financial guarantees were initially directed at the high risk, complex facilities licensed by the CNSC. However, all licensees have not yet been required to provide a financial guarantee for all licensed facilities, activities or licence types. Additionally, CNSC expectations in relation to when financial guarantees, associated decommissioning plans and cost estimates need to be reviewed, updated and submitted, and what they should entail have been evolving, indicating a need for a clear CNSC policy on the subject. Consequently, the CNSC is proceeding with the development of a financial guarantee policy and implementation plan to assure that generators of nuclear waste will have the financial resources available to decommission nuclear facilities, operations and devices and that this activity will not fall to government as a future liability. This program will require approval by the Commission, planned for 2012. This paper will further describe this policy and its possible outcomes. (author)

  12. 13 CFR 120.613 - Secondary Participation Guarantee Agreement.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Secondary Participation Guarantee Agreement. 120.613 Section 120.613 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Secondary Market Certificates § 120.613 Secondary Participation Guarantee Agreement. When a Lender...

  13. 48 CFR 52.247-60 - Guaranteed Shipping Characteristics.

    Science.gov (United States)

    2010-10-01

    ... Characteristics. 52.247-60 Section 52.247-60 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION....247-60 Guaranteed Shipping Characteristics. As prescribed in 47.305-16(b)(1), insert the following clause: Guaranteed Shipping Characteristics (DEC 1989) (a) The offeror is requested to complete...

  14. 13 CFR 120.621 - SBA guarantee of an Individual Certificate.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false SBA guarantee of an Individual Certificate. 120.621 Section 120.621 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Secondary Market The Sba Guarantee of A Certificate § 120.621 SBA guarantee of an Individual...

  15. A dynamic re-partitioning strategy based on the distribution of key in Spark

    Science.gov (United States)

    Zhang, Tianyu; Lian, Xin

    2018-05-01

    Spark is a memory-based distributed data processing framework, has the ability of processing massive data and becomes a focus in Big Data. But the performance of Spark Shuffle depends on the distribution of data. The naive Hash partition function of Spark can not guarantee load balancing when data is skewed. The time of job is affected by the node which has more data to process. In order to handle this problem, dynamic sampling is used. In the process of task execution, histogram is used to count the key frequency distribution of each node, and then generate the global key frequency distribution. After analyzing the distribution of key, load balance of data partition is achieved. Results show that the Dynamic Re-Partitioning function is better than the default Hash partition, Fine Partition and the Balanced-Schedule strategy, it can reduce the execution time of the task and improve the efficiency of the whole cluster.

  16. 13 CFR 120.620 - SBA guarantee of a Pool Certificate.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false SBA guarantee of a Pool Certificate. 120.620 Section 120.620 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Secondary Market The Sba Guarantee of A Certificate § 120.620 SBA guarantee of a Pool Certificate...

  17. 7 CFR 4279.149 - Personal and corporate guarantee.

    Science.gov (United States)

    2010-01-01

    ... guarantees are part of the collateral for the loan, but are not considered in determining whether a loan is... documents to the Agency's satisfaction that collateral, equity, cashflow, and profitability indicate an... guarantee form. When warranted by an Agency assessment of potential financial risk, Agency approved...

  18. Constitutional judges (guarantee of the Constitution and responsibility

    Directory of Open Access Journals (Sweden)

    Francisco Javier Ansuátegui Roig

    2012-06-01

    Full Text Available My aim in this paper is to propose a reflection on the position and the importance that the constitutional judge has in the legal systems of contemporary constitutionalism. The figure of the judge responsible of protecting the Constitution is a key institution, without which we cannot understand the laws of constitutional democracies, their current lines of development, and the guarantee of rights and freedoms that constitute the normative core of these systems. Moreover, the reflection on the exercise of the powers of the judge, its scope and its justification is an important part of contemporary legal discussion, still relevant, albeit not exclusively - in the field of legal philosophy. The object of attention of my reflection is the judge who has the power of judicial review, in a scheme of defense of the Constitution, regardless the specific ways of this defense.

  19. 12 CFR 370.4 - Transaction Account Guarantee Program.

    Science.gov (United States)

    2010-01-01

    ... GENERAL POLICY TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.4 Transaction Account Guarantee Program. (a) In addition to the coverage afforded to depositors under 12 CFR Part 330, a depositor's funds in a noninterest... determining whether funds are in a noninterest-bearing transaction account for purposes of this section, the...

  20. Resilient guaranteed cost control of a power system.

    Science.gov (United States)

    Soliman, Hisham M; Soliman, Mostafa H; Hassan, Mohammad F

    2014-05-01

    With the development of power system interconnection, the low-frequency oscillation is becoming more and more prominent which may cause system separation and loss of energy to consumers. This paper presents an innovative robust control for power systems in which the operating conditions are changing continuously due to load changes. However, practical implementation of robust control can be fragile due to controller inaccuracies (tolerance of resistors used with operational amplifiers). A new design of resilient (non-fragile) robust control is given that takes into consideration both model and controller uncertainties by an iterative solution of a set of linear matrix inequalities (LMI). Both uncertainties are cast into a norm-bounded structure. A sufficient condition is derived to achieve the desired settling time for damping power system oscillations in face of plant and controller uncertainties. Furthermore, an improved controller design, resilient guaranteed cost controller, is derived to achieve oscillations damping in a guaranteed cost manner. The effectiveness of the algorithm is shown for a single machine infinite bus system, and then, it is extended to multi-area power system.

  1. Legal basis and administrative departments for securing and guaranteeing the energy supply

    International Nuclear Information System (INIS)

    Besslich, W.

    1979-01-01

    The headline is no game with the words. It distinguishes between the securing of the supply in times of peace and the guarantee in times of defense during war which is a popular topic again and follows a linguistic term by the Bundesrat of 1915 which was kept alive up to day. (orig.) [de

  2. 14 CFR 1300.23 - Participation in guaranteed loans.

    Science.gov (United States)

    2010-01-01

    ... lender may distribute the risk of a portion of a loan guaranteed under the program by sale of... transferred in whole or in part; (2) The lender remains solely responsible for the administration of the loan... loans guaranteed under the program: (1) Eligible lenders; (2) Private investment funds and insurance...

  3. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  4. 7 CFR 2201.28 - Participation in guaranteed Loans.

    Science.gov (United States)

    2010-01-01

    ... Participation in guaranteed Loans. (a) Subject to paragraphs (b), (c) and (d) of this section, a Lender may distribute the risk of a portion of a Loan guaranteed under the Program by sale of participations therein if... in part as a result of the sale of such participations; (2) The Lender remains solely responsible for...

  5. PRICING AND ASSESSING UNIT-LINKED INSURANCE CONTRACTS WITH INVESTMENT GUARANTEES

    Directory of Open Access Journals (Sweden)

    Ciumas Cristina

    2014-07-01

    Full Text Available One of the most interesting life insurance products to have emerged in recent years in the Romanian insurance market has been the unit-linked contract. Unit-linked insurance products are life insurance policies with investment component. A unit-linked life insurance has two important components: protection and investment. The protection component refers to the insured sum in case of the occurrence of insured risks and the investment component refers to the policyholders’ account that represents the present value of the units from the chosen investment funds. Due to the financial instability caused by the Global Crisis and the amplification of market competitiveness, insurers from international markets have started to incorporate guarantees in unit-linked products. So a unit- linked life insurance policy with an asset value guarantee is an insurance policy whose benefit payable on death or at maturity consists of the greater of some guaranteed amount and the value of the units from the investment funds. One of the most challenging issues concerns the pricing of minimum death benefit and maturity benefit guarantees and the establishing of proper reserves for these guarantees. Insurers granting guarantees of this type must estimate the cost and include the cost in the premium. An important component of the activity carried out by the insurance companies is the investment of the premiums paid by policyholders in various types of assets, in order to obtain higher yields than those guaranteed by the insurance contracts, while providing the necessary liquidity for the payment of insurance claims in case of occurrence of the assumed risks. So the guaranteed benefits can be broadly matched or immunized with various types of financial assets, especially with fixed-interest instruments. According to Romanian legislation which regulates the unit-linked life insurance market, unit-linked life insurance contracts pass most of the investment risk to the

  6. OPTIMAL GUARANTEED SERVICES TIMED TOKEN (OGSTT ...

    African Journals Online (AJOL)

    eobe

    transmission time, as required by the hard real-time tasks, but also high ... The network and message models are presented in ... node has a unique number in the range 0, 1, 2…N-1. For each .... To overcome this, an integer U is added to the ...

  7. IMPROVING THE PROVISION OF STATE GUARANTEES UNDER CREDITS OR BONDED LOANS RAISED FOR INVESTMENT PROJECTS IMPLEMENTATION

    Directory of Open Access Journals (Sweden)

    Lola D. Sanginova

    2015-01-01

    Full Text Available Importance: Under current conditions, the Russian economy needs investment resources to ensure sustainable social and economic development. One of instruments of state-financing backing that can be used to support capital intensive, economically viable, financially and socially efficient investment projects that create "growing points" are state guarantees of theRussian Federation.Objective: The objective of this study is to identify possible ways to improve the requirements and procedures of providing state guarantees of theRussian Federationwhich contribute to the increase in the quantity and quality of investment projects of high social importance. Methods: Through the use of general scientific methods, analysis and synthesis, induction and deduction the possibility of creating a more attractive environment for principals is analyzed, measures to reduce the risk for public legal entities in providing state guarantees of theRussian Federationunder credits or bonded loans raised for investment projects implementation.Results: Principles of state guarantee support that ensure the interests of both the principals and the guarantor are defined. The basic directions for improving the mechanism how state guarantees of theRussian Federationsupport investment projects are justified. These directions include increasing availability of obtaining state guarantee support by lowering the cost of investment projects for which the state guarantees may be provided; reducing time of decision making on granting a state guarantee; increasing the creditors’ responsibility for a qualitative assessment of the creditworthiness of principals and investment projects; changing the methodology for assessing the social efficiency of investment projects; increasing the information transparency of provided state guarantees of the Russian Federation.Conclusions: The main result of this study is that under current conditions of economic turbulence state guarantees of the

  8. Administrative Circular No. 13 (Rev. 3) - Guarantees for representatives of the personnel

    CERN Multimedia

    2014-01-01

    Administrative Circular No. 13 (Rev. 3) entitled “Guarantees for representatives of the personnel”, approved by the Director-General following discussion at the Standing Concertation Committee meeting of 5 December 2013 and entering into force on 1 January 2014, is available on the intranet site of the Human Resources Department (see here).   This circular is applicable to all members of the personnel. It cancels and replaces Administrative Circular No. 13 (Rev. 2) entitled “Guarantees for members of the personnel holding representative office” of November 1992. The circular was revised in order to adapt the time given to the representatives of the personnel to perform their elective mandate and to ensure more transparency in their activities, by indicating, inter alia, the percentage of time worked in the framework of their mandate, as well as the training, activities and ensuing results. Department Head Office HR Department

  9. The Public-Key-Infrastructure of the Radiological Society of Germany

    International Nuclear Information System (INIS)

    Schuetze, B.; Kaemmerer, M.; Klos, G.; Mildenberger, P.

    2006-01-01

    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law

  10. The Public-Key-Infrastructure of the Radiological Society of Germany

    Energy Technology Data Exchange (ETDEWEB)

    Schuetze, B. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)]. E-mail: schuetze@medizin-informatik.org; Kaemmerer, M. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Klos, G. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Mildenberger, P. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)

    2006-03-15

    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law.

  11. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2008-01-01

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ∼ 20%) and dark count probability (p dark ∼ 10 -7 )

  12. QoE Guarantee Scheme Based on Cooperative Cognitive Cloud and Opportunistic Weight Particle Swarm

    Directory of Open Access Journals (Sweden)

    Weihang Shi

    2015-01-01

    Full Text Available It is well known that the Internet application of cloud services may be affected by the inefficiency of cloud computing and inaccurate evaluation of quality of experience (QoE seriously. In our paper, based on construction algorithms of cooperative cognitive cloud platform and optimization algorithm of opportunities weight particle swarm clustering, the QoE guarantee mechanism was proposed. The mechanism, through the sending users of requests and the cognitive neighbor users’ cooperation, combined the cooperation of subcloud platforms and constructed the optimal cloud platform with the different service. At the same time, the particle swarm optimization algorithm could be enhanced dynamically according to all kinds of opportunity request weight, which could optimize the cooperative cognitive cloud platform. Finally, the QoE guarantee scheme was proposed with the opportunity weight particle swarm optimization algorithm and collaborative cognitive cloud platform. The experimental results show that the proposed mechanism compared is superior to the QoE guarantee scheme based on cooperative cloud and QoE guarantee scheme based on particle swarm optimization, compared with optimization fitness and high cloud computing service execution efficiency and high throughput performance advantages.

  13. Investment Guarantees in the South African Life Insurance Industry ...

    African Journals Online (AJOL)

    This paper explores the risks faced by South African life insurance companies arising from the provision of investment guarantees in products sold. The current thinking and practice of the larger South African life insurance companies regarding investment guarantees is set out following their responses to a survey.

  14. Stand alone photovoltaic systems: guarantee of results

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-31

    This study aims to provide a guarantee of results for system performance for users of stand-alone photovoltaic (PV) systems, which have no back-up generator. The appropriate main performance criterion for PV systems is that a specified load is supplied with power either continuously or intermittently whenever the load requires power. A methodology to evaluate the power availability of stand-alone PV systems has been developed as part of the project, which encompasses power losses due to weather variations. The guarantee of results produced allows users to compare system designs from different manufacturers. (UK)

  15. 22 CFR 231.05 - Non-impairment of the Guarantee.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Non-impairment of the Guarantee. 231.05 Section 231.05 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ARAB REPUBLIC OF EGYPT LOAN GUARANTEES ISSUED UNDER THE EMERGENCY WARTIME SUPPLEMENTAL APPROPRIATIONS ACT OF 2003, PUBLIC LAW 108-11-STANDARD...

  16. 7 CFR 1493.430 - Application for a payment guarantee.

    Science.gov (United States)

    2010-01-01

    ... (includes upward loading tolerance, if any); (12) Guaranteed value; (13) Guarantee fee; (14) The term length... (including packaging, if any); (8) Mean quantity, contract loading tolerance and, if the exporter chooses, a request for CCC to reserve coverage up to the maximum quantity permitted by the contract loading tolerance...

  17. 76 FR 31217 - Single Family Housing Guaranteed Loan Program

    Science.gov (United States)

    2011-05-31

    ... Farm Service Agency 7 CFR Part 1980 RIN 0575-AC83 Single Family Housing Guaranteed Loan Program... the Rural Housing Service (RHS) Section 502 Single Family Housing Guaranteed Loan Program (SFHGLP) by eliminating the lender's published Department of Veterans Affairs (VA) rate for first mortgage loans with no...

  18. 7 CFR 1738.30 - Rural broadband access loans and loan guarantees.

    Science.gov (United States)

    2010-01-01

    ... interest at a rate set by the lender consistent with the current applicable market rate for a loan of... Derivative or any Guaranteed-Amount Debt Derivative; or (B) Any holder of the Guaranteed Loan Note or any Guaranteed Loan Portion Note or any Derivative, as the case may be, having a claim to payments on the...

  19. How a Guaranteed Annual Income Could Put Food Banks Out of Business

    Directory of Open Access Journals (Sweden)

    J.C. Herbert Emery

    2013-12-01

    the burden on the public health-care system. Canadian governments already spend billions of dollars on the downstream effects of poverty, but scant emphasis is put on programs targeting poverty’s roots. There is no evidence, where smaller-scale experiments have been tried, to show that a guaranteed income program creates a serious problem with negative incentives and discourages people from working who otherwise might. But because this is a common worry with working-age guaranteed income eligibility, phasing in the program gradually, by lowering eligibility a few years at a time, will allow ongoing investigation and analysis of the effects, before the program is rolled out on a large scale. The tremendous impact that guaranteed incomes have had on reducing poverty and improving health among seniors is something for which Canadians can be rightly proud. So much so that it is incumbent upon us to investigate whether Canada could use the same policy tools to drastically reduce poverty and improve health among Canadians of all ages.

  20. GMG: A Guaranteed, Efficient Global Optimization Algorithm for Remote Sensing.

    Energy Technology Data Exchange (ETDEWEB)

    D' Helon, CD

    2004-08-18

    The monocular passive ranging (MPR) problem in remote sensing consists of identifying the precise range of an airborne target (missile, plane, etc.) from its observed radiance. This inverse problem may be set as a global optimization problem (GOP) whereby the difference between the observed and model predicted radiances is minimized over the possible ranges and atmospheric conditions. Using additional information about the error function between the predicted and observed radiances of the target, we developed GMG, a new algorithm to find the Global Minimum with a Guarantee. The new algorithm transforms the original continuous GOP into a discrete search problem, thereby guaranteeing to find the position of the global minimum in a reasonably short time. The algorithm is first applied to the golf course problem, which serves as a litmus test for its performance in the presence of both complete and degraded additional information. GMG is further assessed on a set of standard benchmark functions and then applied to various realizations of the MPR problem.

  1. Bank guarantee in Serbian and European legal systems

    Directory of Open Access Journals (Sweden)

    Pajtić Bojan L.

    2015-01-01

    Full Text Available The paper analyses a bank guarantee as an institute derived from a surety contract. By issuing a bank guarantee the bank commits to the creditor that it will fulfill valid and due liabilities of a debtor, in the event of default by the debtor. This collateral demonstrates significant advantages as compared to other personal assets, particularly with regards to a higher level of protection to creditors in contractual relations. Due to the aforementioned benefit the institute has been increasingly applied in legal dealings, both in our and other legal systems. In the paper, I will point out normative solutions in terms of regulation of a bank guarantee as a specific legal activity in which there is no accessoriness, which is not the case with security. This research particularly focuses on the comparative legal analysis of this collateral.

  2. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  3. 78 FR 79253 - CCC Export Credit Guarantee (GSM-102) Program and Facility Guarantee Program (FGP)

    Science.gov (United States)

    2013-12-27

    ... been worked out in advance of the exporter's application for the payment guarantee. Foreign Financial... country of domicile must provide financial statements in accordance with prevailing accounting standards... smaller U.S. exporters. Changes are also intended to improve CCC's financial management of the program...

  4. 7 CFR 4290.1600 - Secretary's authority to issue and guarantee Trust Certificates.

    Science.gov (United States)

    2010-01-01

    ... INVESTMENT COMPANY (âRBICâ) PROGRAM Financial Assistance for RBICs (Leverage) Funding Leverage by Use of... the timely payment of the principal and interest thereon. Any such guarantee of such TC is limited to... any TC. (b) Authority to arrange public or private fundings of Leverage. The Secretary in his or her...

  5. Learning from label proportions in brain-computer interfaces: Online unsupervised learning with guarantees

    Science.gov (United States)

    Verhoeven, Thibault; Schmid, Konstantin; Müller, Klaus-Robert; Tangermann, Michael; Kindermans, Pieter-Jan

    2017-01-01

    Objective Using traditional approaches, a brain-computer interface (BCI) requires the collection of calibration data for new subjects prior to online use. Calibration time can be reduced or eliminated e.g., by subject-to-subject transfer of a pre-trained classifier or unsupervised adaptive classification methods which learn from scratch and adapt over time. While such heuristics work well in practice, none of them can provide theoretical guarantees. Our objective is to modify an event-related potential (ERP) paradigm to work in unison with the machine learning decoder, and thus to achieve a reliable unsupervised calibrationless decoding with a guarantee to recover the true class means. Method We introduce learning from label proportions (LLP) to the BCI community as a new unsupervised, and easy-to-implement classification approach for ERP-based BCIs. The LLP estimates the mean target and non-target responses based on known proportions of these two classes in different groups of the data. We present a visual ERP speller to meet the requirements of LLP. For evaluation, we ran simulations on artificially created data sets and conducted an online BCI study with 13 subjects performing a copy-spelling task. Results Theoretical considerations show that LLP is guaranteed to minimize the loss function similar to a corresponding supervised classifier. LLP performed well in simulations and in the online application, where 84.5% of characters were spelled correctly on average without prior calibration. Significance The continuously adapting LLP classifier is the first unsupervised decoder for ERP BCIs guaranteed to find the optimal decoder. This makes it an ideal solution to avoid tedious calibration sessions. Additionally, LLP works on complementary principles compared to existing unsupervised methods, opening the door for their further enhancement when combined with LLP. PMID:28407016

  6. Doubts raised on the validity of construction and payment guarantees

    African Journals Online (AJOL)

    A construction company had been liquidated and the employer had called up the guarantee .... Due to the small size of the target populations in both the quantitative and qualitative ..... contingent liability that remains in terms of the guarantee.

  7. Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

    International Nuclear Information System (INIS)

    Hayashi, Masahito; Nakayama, Ryota

    2014-01-01

    This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett–Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting. (paper)

  8. Development Concept of Guaranteed Verification Electric Power System Simulation Tools and Its Realization

    Directory of Open Access Journals (Sweden)

    Gusev Alexander

    2015-01-01

    Full Text Available The analysis of existing problem reliability and verification of widespread electric power systems (EPS simulation tools is presented in this article. Everything simulation tools are based on the using of numerical methods for ordinary differential equations. Described the concept of guaranteed verification EPS simulation tools and the structure of its realization are based using the Simulator having properties of continuous , without decomposition three-phase EPS simulation in real time and on an unlimited range with guaranteed accuracy. The information from the Simulator can be verified by using data only quasi-steady-state regime received from the SCADA and such Simulator can be applied as the standard model for verification any EPS simulation tools.

  9. Public initiatives to support entrepreneurs: Credit guarantees versus co-funding

    NARCIS (Netherlands)

    Arping, S.; Lóránth, G.; Morrison, A.D.

    2008-01-01

    We analyze state-sponsored credit guarantees in a setting where entrepreneurs are capital-constrained and subject to moral hazard. In our model, guarantees can raise welfare because they reduce the cost of capital faced by entrepreneurs, and so potentially enhance entrepreneurial effort incentives.

  10. 42 CFR 57.1514 - Loan guarantee and interest subsidy agreements.

    Science.gov (United States)

    2010-10-01

    ... GRANTS GRANTS FOR CONSTRUCTION OF TEACHING FACILITIES, EDUCATIONAL IMPROVEMENTS, SCHOLARSHIPS AND STUDENT LOANS Loan Guarantees and Interest Subsidies to Assist in Construction of Teaching Facilities for Health Profession Personnel § 57.1514 Loan guarantee and interest subsidy agreements. For each application for a...

  11. Building Trust in a Guarantee Fund in a Challenging Institutional Environment

    Directory of Open Access Journals (Sweden)

    Luciano Quinto Lanz

    2017-09-01

    Full Text Available Difficult access to credit is a major obstacle to micro, small and medium-sized enterprises (MSMEs survival, especially in emerging countries, affecting their competitiveness. Lack of guarantees is a main reason why banks do not lend to MSMEs. Guarantee schemes provide partial credit guarantees, but often fail to win trust of banks and enterprises. This study analyzes the process of building trust between the Fundo Garantidor para Investimentos (Investment Guarantee Fund, FGI, created in 2009, and banks in Brazil. This trust was hampered by the failure of public guarantee funds created in the 1990’s. This created a challenging institutional environment to the new fund. The methodology employed was a case study, based on a qualitative approach with document analysis, semi-structured interviews and descriptive statistics. The analysis used models for building and repairing trust in inter-organizational relations and international benchmark for governance and effectiveness of guarantee schemes. The analysis showed that the FGI used other emerging countries and developed countries experience to construct adequate governance and succeeded in establishing trust with the banks. The results show that by 2017, 26 banks contract more than 32,000 operations worth 1.9 billion dollars, with additionalities comparable to the international benchmark.

  12. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  13. Probabilistic double guarantee kidnapping detection in SLAM.

    Science.gov (United States)

    Tian, Yang; Ma, Shugen

    2016-01-01

    For determining whether kidnapping has happened and which type of kidnapping it is while a robot performs autonomous tasks in an unknown environment, a double guarantee kidnapping detection (DGKD) method has been proposed. The good performance of DGKD in a relative small environment is shown. However, a limitation of DGKD is found in a large-scale environment by our recent work. In order to increase the adaptability of DGKD in a large-scale environment, an improved method called probabilistic double guarantee kidnapping detection is proposed in this paper to combine probability of features' positions and the robot's posture. Simulation results demonstrate the validity and accuracy of the proposed method.

  14. 16 CFR 239.2 - Disclosures in warranty or guarantee advertising.

    Science.gov (United States)

    2010-01-01

    ... warranty coverage. These examples are for both print and broadcast advertising. These examples are... advertising. 239.2 Section 239.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE ADVERTISING OF WARRANTIES AND GUARANTEES § 239.2 Disclosures in warranty or guarantee...

  15. Financial guarantee for decommissioning and nuclear waste management activities at OPG

    International Nuclear Information System (INIS)

    Van den Hengel, J.

    2006-01-01

    This paper provides an overview on the establishment and maintenance of a financial guarantee for decommissioning and nuclear waste management activities at Ontario Power Generation (OPG) in accordance with CNSC requirements. The process and timelines are documented leading to the establishment of the guarantee effective July 31, 2003. Reference plans, cost estimates, funding mechanisms and reporting mechanisms are summarized. The renewal process projected at the end of the 5-year initial financial guarantee period is also included. (author)

  16. Several Guaranteed Descent Conjugate Gradient Methods for Unconstrained Optimization

    Directory of Open Access Journals (Sweden)

    San-Yang Liu

    2014-01-01

    Full Text Available This paper investigates a general form of guaranteed descent conjugate gradient methods which satisfies the descent condition gkTdk≤-1-1/4θkgk2  θk>1/4 and which is strongly convergent whenever the weak Wolfe line search is fulfilled. Moreover, we present several specific guaranteed descent conjugate gradient methods and give their numerical results for large-scale unconstrained optimization.

  17. Honeywell starts energy-management service: savings guaranteed; BOSS replaced

    Energy Technology Data Exchange (ETDEWEB)

    Schwartz, R.

    1983-01-24

    Honeywell Inc. guarantees that its new Honeywell Service Link Operation (HSLO), a time-sharing service, will produce greater energy savings than its monthly fees. There are no front-end costs because the central computer is located at the supplier's Atlanta site, making energy management cost-affordable for facilities as small as 25,000 square feet. HSLO replaces Honeywell's Building Operations Service System (BOSS) that has a minimum-size requirement of 100,000 square feet. BOSS customers will be automatically changed to HSLO at no charge. All 21 regional computer centers will be available to users. Johnson Controls, Inc. also operates a time-sharing operation called Total Automated Building Services (TABS). (DCK)

  18. The pricing of bank debt guarantees

    NARCIS (Netherlands)

    Arping, S.

    2010-01-01

    We analyze the desirability of fair pricing of government guarantees for bank liabilities. Fair pricing is desirable only if the banking sector is sufficiently transparent. In opaque banking systems, fair pricing may exacerbate banks' incentive to take excessive risks.

  19. ACCESS TO FINANCE FOR SMEs BY CREDIT GUARANTEE SCHEMES IN TURKEY

    OpenAIRE

    Sarigul, Hasmet

    2013-01-01

    Credit guarantee schemes assist banks in lending to SMEs by overcoming collateral problems. The guarantees are used to share the risk between the bank and the guarantee institution in an agreed ratio. Thus, the bank’s risk and operation costs are lowered and its returns increased. This encourages banks to lend to SMEs who are unable to provide adequate collateral. In our study, we investigate the relationship between SMEs, banks and CGSs. We also aimed to explain the functioning of CGSs...

  20. 12 CFR 370.6 - Assessments under the Debt Guarantee Program.

    Science.gov (United States)

    2010-01-01

    ... OF GENERAL POLICY TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.6 Assessments under the Debt Guarantee... participating entity shall ensure that funds in an amount at least equal to the amount of the assessment are... institution shall provide the necessary funds for payment of its assessments. (3) Failure to take all...

  1. L’evolució del garantisme: de les garanties personals a la garantia de l’estat - The Evolution of Constitutional Guarantees: from personal guarantees to guaranteeing the State - La evolución del garantismo: de las garantías personales a la garantía del Estado

    Directory of Open Access Journals (Sweden)

    José Esteve Pardo

    2013-06-01

    Full Text Available La reforma constitucional per a l’estabilitat pressupostària i la contenció del dèficitLa reforma de l’article 135 de la Constitució és un moviment inèdit en el constitucionalisme, ja que per primera vegada s’orienta cap a la protecció del mateix Estat, a la sostenibilitat, davant l’exposició excessiva al crèdit extern. Les garanties constitucionals van ser primer garanties de llibertats personals, després garanties d’institucions de l’Estat o de la societat i ara, per primera vegada, garanties del mateix Estat. The Constitutional Amendment for Budgetary Stability and Deficit RestraintThe amendment of article 135 of the Constitution highlights a constitutionally unprecedented movement toward protection of the State, the State´s self-protection against external credit. Constitutional guarantees were originally guarantees of personal liberties, then guarantees of the institutions of the State or civil society, and are now for the first time self-guarantees of the State.La reforma constitucional para la estabilidad presupuestaria y contención del déficitLa reforma del artículo 135 de la Constitución es un movimiento inédito en el constitucionalismo puesto que por vez primera se orienta a la protección del propio Estado, a su sostenibilidad, ante la excesiva exposición al crédito externo. Las garantías constitucionales fueron primero garantías de libertades personales, luego garantías de instituciones del Estado o de la sociedad y ahora, por vez primera, garantías del propio Estado.

  2. An Electronic Commerce Strategy for MTMC’s Guaranteed Traffic Program

    Science.gov (United States)

    1992-10-01

    AD-A264 299 SELECTE October 1992 S MAY1 4 1993U C An Electronic Commerce Strategy for MTMC’s Guaranteed Traffic Program MT901R I N1. Augustine...NUMBERS An Electronic Commerce Strategy for MTMC’s Guaranteed Traffic Program C MDA903-85-C -0139 M DA903-90-C-0006 PE 0902198D 6. AUTHOR(S) M...239-1L 299-01 LMI Executive Summary AN ELECTRONIC COMMERCE STRATEGY FOR MTMC’S GUARANTEED TRAFFIC PROGRAM In 1979, the Military Traffic Management

  3. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Directory of Open Access Journals (Sweden)

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  4. 78 FR 64175 - Hashemite Kingdom of Jordan Loan Guarantees Issued Under the Further Continuing Appropriations...

    Science.gov (United States)

    2013-10-28

    ... procedures and standard terms and conditions applicable to loan guarantees to be issued for the benefit of... Definitions. 233.03 The Guarantee. 233.04 Guarantee eligibility. 233.05 Non-impairment of the Guarantee. 233... Default; Application for Compensation; payment. 233.09 No acceleration of Eligible Notes. [[Page 64176...

  5. A Novel Real-Time Reference Key Frame Scan Matching Method

    Directory of Open Access Journals (Sweden)

    Haytham Mohamed

    2017-05-01

    Full Text Available Unmanned aerial vehicles represent an effective technology for indoor search and rescue operations. Typically, most indoor missions’ environments would be unknown, unstructured, and/or dynamic. Navigation of UAVs in such environments is addressed by simultaneous localization and mapping approach using either local or global approaches. Both approaches suffer from accumulated errors and high processing time due to the iterative nature of the scan matching method. Moreover, point-to-point scan matching is prone to outlier association processes. This paper proposes a low-cost novel method for 2D real-time scan matching based on a reference key frame (RKF. RKF is a hybrid scan matching technique comprised of feature-to-feature and point-to-point approaches. This algorithm aims at mitigating errors accumulation using the key frame technique, which is inspired from video streaming broadcast process. The algorithm depends on the iterative closest point algorithm during the lack of linear features which is typically exhibited in unstructured environments. The algorithm switches back to the RKF once linear features are detected. To validate and evaluate the algorithm, the mapping performance and time consumption are compared with various algorithms in static and dynamic environments. The performance of the algorithm exhibits promising navigational, mapping results and very short computational time, that indicates the potential use of the new algorithm with real-time systems.

  6. Guaranteed epsilon-optimal treatment plans with the minimum number of beams for stereotactic body radiation therapy

    International Nuclear Information System (INIS)

    Yarmand, Hamed; Winey, Brian; Craft, David

    2013-01-01

    Stereotactic body radiation therapy (SBRT) is characterized by delivering a high amount of dose in a short period of time. In SBRT the dose is delivered using open fields (e.g., beam’s-eye-view) known as ‘apertures’. Mathematical methods can be used for optimizing treatment planning for delivery of sufficient dose to the cancerous cells while keeping the dose to surrounding organs at risk (OARs) minimal. Two important elements of a treatment plan are quality and delivery time. Quality of a plan is measured based on the target coverage and dose to OARs. Delivery time heavily depends on the number of beams used in the plan as the setup times for different beam directions constitute a large portion of the delivery time. Therefore the ideal plan, in which all potential beams can be used, will be associated with a long impractical delivery time. We use the dose to OARs in the ideal plan to find the plan with the minimum number of beams which is guaranteed to be epsilon-optimal (i.e., a predetermined maximum deviation from the ideal plan is guaranteed). Since the treatment plan optimization is inherently a multi-criteria-optimization problem, the planner can navigate the ideal dose distribution Pareto surface and select a plan of desired target coverage versus OARs sparing, and then use the proposed technique to reduce the number of beams while guaranteeing epsilon-optimality. We use mixed integer programming (MIP) for optimization. To reduce the computation time for the resultant MIP, we use two heuristics: a beam elimination scheme and a family of heuristic cuts, known as ‘neighbor cuts’, based on the concept of ‘adjacent beams’. We show the effectiveness of the proposed technique on two clinical cases, a liver and a lung case. Based on our technique we propose an algorithm for fast generation of epsilon-optimal plans. (paper)

  7. 13 CFR 115.18 - Refusal to issue further guarantees; suspension and termination of PSB status.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Refusal to issue further guarantees; suspension and termination of PSB status. 115.18 Section 115.18 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SURETY BOND GUARANTEE Provisions for All Surety Bond Guarantees § 115.18 Refusal to issue further guarantees; suspension...

  8. 12 CFR 370.7 - Assessment for the Transaction Account Guarantee Program.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Assessment for the Transaction Account Guarantee Program. 370.7 Section 370.7 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.7 Assessment for the...

  9. 14 CFR 272.3 - Places eligible for guaranteed essential air service.

    Science.gov (United States)

    2010-01-01

    ... TRANSPORTATION (AVIATION PROCEEDINGS) ECONOMIC REGULATIONS ESSENTIAL AIR SERVICE TO THE FREELY ASSOCIATED STATES § 272.3 Places eligible for guaranteed essential air service. (a) Subject to the provisions of this part... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Places eligible for guaranteed essential...

  10. Implementation of a Wireless Time Distribution Testbed Protected with Quantum Key Distribution

    Energy Technology Data Exchange (ETDEWEB)

    Bonior, Jason D [ORNL; Evans, Philip G [ORNL; Sheets, Gregory S [ORNL; Jones, John P [ORNL; Flynn, Toby H [ORNL; O' Neil, Lori Ross [Pacific Northwest National Laboratory (PNNL); Hutton, William [Pacific Northwest National Laboratory (PNNL); Pratt, Richard [Pacific Northwest National Laboratory (PNNL); Carroll, Thomas E. [Pacific Northwest National Laboratory (PNNL)

    2017-01-01

    Secure time transfer is critical for many timesensitive applications. the Global Positioning System (GPS) which is often used for this purpose has been shown to be susceptible to spoofing attacks. Quantum Key Distribution offers a way to securely generate encryption keys at two locations. Through careful use of this information it is possible to create a system that is more resistant to spoofing attacks. In this paper we describe our work to create a testbed which utilizes QKD and traditional RF links. This testbed will be used for the development of more secure and spoofing resistant time distribution protocols.

  11. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Ying; Shi, Ronghua [School of Information Science and Engineering, Central South University, Changsha 410083 (China); Zeng, Guihua [Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030 (China)], E-mail: sdguoying@gmail.com, E-mail: rhshi@mail.edu.com, E-mail: ghzeng@sjtu.edu.cn

    2010-04-15

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  12. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    International Nuclear Information System (INIS)

    Guo, Ying; Shi, Ronghua; Zeng, Guihua

    2010-01-01

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  13. A New Quantum Key Distribution Scheme Based on Frequency and Time Coding

    International Nuclear Information System (INIS)

    Chang-Hua, Zhu; Chang-Xing, Pei; Dong-Xiao, Quan; Jing-Liang, Gao; Nan, Chen; Yun-Hui, Yi

    2010-01-01

    A new scheme of quantum key distribution (QKD) using frequency and time coding is proposed, in which the security is based on the frequency-time uncertainty relation. In this scheme, the binary information sequence is encoded randomly on either the central frequency or the time delay of the optical pulse at the sender. The central frequency of the single photon pulse is set as ω 1 for bit 0 and set as ω 2 for bit 1 when frequency coding is selected. However, the single photon pulse is not delayed for bit 0 and is delayed in τ for 1 when time coding is selected. At the receiver, either the frequency or the time delay of the pulse is measured randomly, and the final key is obtained after basis comparison, data reconciliation and privacy amplification. With the proposed method, the effect of the noise in the fiber channel and environment on the QKD system can be reduced effectively

  14. Guaranteeing CERN’s excellence: consolidate experience

    CERN Multimedia

    Staff Association

    2014-01-01

    For its missions CERN requires staff with solid experience in all its domains of activity The Organization has several missions: fundamental research, technical developments and innovation, training the several hundreds of associates, fellows and students, while at the same time taking care of more than 10000 users. In order to guarantee excellence in all of these areas, CERN has to put in place an efficient personnel policy. Such a policy must allow the Organization to recruit collaborators with the highest competence from all Member States, and to keep and motivate them during their entire professional career. But, more importantly, the Organization has to be able to count on a stable workforce. It needs staff with experience gained over a long period in the fields of accelerators, detectors, and operating procedures, if it is to fulfil successfully its important mission of training and knowledge transfer, which is very much appreciated by our Member states, since it highlights a visible return on invest...

  15. 13 CFR 120.521 - What interest rate applies after SBA purchases its guaranteed portion?

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What interest rate applies after... 504 Loans Sba's Purchase of A Guaranteed Portion § 120.521 What interest rate applies after SBA purchases its guaranteed portion? When SBA purchases the guaranteed portion of a fixed interest rate loan...

  16. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  17. Guaranteed convergence of the Hough transform

    Science.gov (United States)

    Soffer, Menashe; Kiryati, Nahum

    1995-01-01

    The straight-line Hough Transform using normal parameterization with a continuous voting kernel is considered. It transforms the colinearity detection problem to a problem of finding the global maximum of a two dimensional function above a domain in the parameter space. The principle is similar to robust regression using fixed scale M-estimation. Unlike standard M-estimation procedures the Hough Transform does not rely on a good initial estimate of the line parameters: The global optimization problem is approached by exhaustive search on a grid that is usually as fine as computationally feasible. The global maximum of a general function above a bounded domain cannot be found by a finite number of function evaluations. Only if sufficient a-priori knowledge about the smoothness of the objective function is available, convergence to the global maximum can be guaranteed. The extraction of a-priori information and its efficient use are the main challenges in real global optimization problems. The global optimization problem in the Hough Transform is essentially how fine should the parameter space quantization be in order not to miss the true maximum. More than thirty years after Hough patented the basic algorithm, the problem is still essentially open. In this paper an attempt is made to identify a-priori information on the smoothness of the objective (Hough) function and to introduce sufficient conditions for the convergence of the Hough Transform to the global maximum. An image model with several application dependent parameters is defined. Edge point location errors as well as background noise are accounted for. Minimal parameter space quantization intervals that guarantee convergence are obtained. Focusing policies for multi-resolution Hough algorithms are developed. Theoretical support for bottom- up processing is provided. Due to the randomness of errors and noise, convergence guarantees are probabilistic.

  18. Finite-key-size effect in a commercial plug-and-play QKD system

    Science.gov (United States)

    Chaiwongkhot, Poompong; Sajeed, Shihan; Lydersen, Lars; Makarov, Vadim

    2017-12-01

    A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted-key. We also derive a key-rate equation that is specific for this system. This equation provides bounds above the upper bound of secure key under finite-key-size analysis. From this equation and our experimental data, we show that the keys that have been distilled from the smaller sifted-key size fall above our bound. Thus, their security is not covered by finite-key-size analysis. Experimentally, we could consistently force the system to generate the key outside of the bound. We also test manufacturer’s software update. Although all the keys after the patch fall under our bound, their security cannot be guaranteed under this analysis. Our methodology can be used for security certification and standardization of QKD systems.

  19. Certain aspects of the accounting of the bank guarantee at the principal and the beneficiary

    Directory of Open Access Journals (Sweden)

    L. A. Zimakova

    2016-01-01

    Full Text Available For any kind of business such category as risks is peculiar. The research of this category was conducted by scientists from the different sides, certain approaches of protection against risks were developed and instruments of decrease in financial risks are offered. The bank guarantee is one of the most demanded instruments of additional financial protection today. Its active using of the commercial organizations courses questions of the organization of the detailed accounting of guarantees at the principal and the beneficiary. A little concerning the historical aspect of the bank guarantee, authors provided the overview of the determinations of "bank guarantee" characterizing it as the banking service providing distribution of responsibility between the guarantor and the principal under certain conditions. Having considered the essence of the legal nature and features of the bank guarantee recommendations about the organization of the disaggregated financial accounting on off-balance accounts were developed. In particular, need of allocation of a currency type as the directions of conducting the analytics providing correctness of reflection of cost criterion is proved. For the purpose of control of timeliness of carrying out calculations it is recommended to allocate guarantees: coincident and in coincident with primary obligation; short-term and long-term. From the point of view of nature of guarantees payment guarantees and guarantees of obligation fulfilment were allocated. These recommendations concern the beneficiary, and lack of accounting entries at a principal generates need of creation of additional registers and analytical reports which forms were offered by authors. The provided recommendations will allow obtaining transparent information on bank guarantees for the purpose of its full disclosure in the financial reporting.

  20. GUARANTEES OF THE RIGHT TO A FAIR CIVIL TRIAL

    Directory of Open Access Journals (Sweden)

    Diana-Loredana Jalbă

    2015-11-01

    Full Text Available In order to ensure the effective protection of human rights and provide for more than theoretical and illusory substantive rights, the need to define the right to a fair trial is emerging, along with the necessity that litigants become aware of the guarantees established by article 6 of the European Convention on Human Rights. Thus, the article aims to approach the ample issue regarding the litigants’ right to a fair civil trial in light of current legal regulations, and in particular, in light of the jurisprudence of the European Court of Human Rights. Given the fact that the right to a fair civil trial involves establishing, throughout the trial, a set of rules of procedure aimed at creating a balance between the parties in the process - the so-called guarantees of a fair trial - in her scientific pursuits, the author analyzes both explicit and implicit guarantees of fair trial, highlighting relevant European standards as well as their degree of implementation in the national (procedural law.

  1. Do not pay for a Danish interest guarantee. The law of the triple blow

    DEFF Research Database (Denmark)

    Guillén, Montserrat; Konicz, Agnieszka Karolina; Perch Nielsen, Jens

    2013-01-01

    We have investigated the performance of pension schemes of with-profit policies containing a guaranteed minimum rate of return and we have found that the price of the guarantee measured in terms of lost returns is enormous. We use simple simulations rather than complex pricing methods to illustrate...... that the price of an interest guarantee is high in pension products that are currently commercialised in the market. We have found that the customer loses up to about 0.75% yearly in the rate of return when an interest guarantee is purchased, compared to the return of an equivalent saving strategy with the same...... risk at the level 95%. This can explain why such arrangements are not widely popular. Our approach can be used to inform clients, who are not experts in modern financial models, the impact of paying for an interest guarantee....

  2. Randomness determines practical security of BB84 quantum key distribution

    Science.gov (United States)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  3. 7 CFR 1720.8 - Issuance of the guarantee.

    Science.gov (United States)

    2010-01-01

    ... accounting firm or federal banking regulator, annual consolidated financial statements audited by an... financial covenants, and events of default and remedies; (3) Prior to the issuance of the guarantee, the...

  4. Demonstration Of The Violation Of Bell Inequality In Quantum Key Distribution

    International Nuclear Information System (INIS)

    Dermez, R.

    2010-01-01

    Today, the data privacy has become very important. Quantum Key Distribution (QKD) system is developed in this area. QKD, coding technique with single-use method of encoding used keys (information and messages) security guarantees. The system is based on Quantum Mechanics (The Certainty Principle). However, in some cases for quantum communication, QKD are limited. In determining this limit Bell Inequality (CHSH Inequality, 1969) is used. Bell inequality shows a violation of Quantum Key Distribution. In this study, using the program of Matematica 6, QKD through bilateral quantum system (system with two qubits) has been investigating the leak case and the violations. We showed leakage and violations in these figures via the calculations results in Matematica program.

  5. 7 CFR 1779.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  6. The impact of new technologies in balancing private and family life with working time

    OpenAIRE

    Teresa Coelho Moreira

    2017-01-01

    The work-life balance is a fundamental issue for all the workers and it is linked to many others, such as quality of work, female participation in the labour market, gender equality and active ageing.Among the new challenges of contemporary society, a key role is played by the introduction in the workplaces of new digital and computer technologies, which may change working-time arrangement and, at the same time, guarantee more flexibility in working-time.On the one hand, this phenomenon can l...

  7. Incentive-compatible guaranteed renewable health insurance premiums.

    Science.gov (United States)

    Herring, Bradley; Pauly, Mark V

    2006-05-01

    Theoretical models of guaranteed renewable insurance display front-loaded premium schedules. Such schedules both cover lifetime total claims of low-risk and high-risk individuals and provide an incentive for those who remain low-risk to continue to purchase the policy. Questions have been raised of whether actual individual insurance markets in the US approximate the behavior predicted by these models, both because young consumers may not be able to "afford" front-loading and because insurers may behave strategically in ways that erode the value of protection against risk reclassification. In this paper, the optimal competitive age-based premium schedule for a benchmark guaranteed renewable health insurance policy is estimated using medical expenditure data. Several factors are shown to reduce the amount of front-loading necessary. Indeed, the resulting optimal premium path increases with age. Actual premium paths exhibited by purchasers of individual insurance are close to the optimal renewable schedule we estimate. Finally, consumer utility associated with the feature is examined.

  8. Dynamic Group Diffie-Hellman Key Exchange under standard assumptions

    International Nuclear Information System (INIS)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2002-01-01

    Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public-private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model

  9. European beef consumers' interest in a beef eating-quality guarantee

    DEFF Research Database (Denmark)

    Verbeke, Wim; Van Wezemael, Lyn; de Barcellos, Marcia Dutra

    2010-01-01

    and Germany to assess their opinions about beef muscle profiling and their interest in a beef eating-quality guarantee. Findings indicate that both concepts are well accepted by European beef consumers, although not unconditional. Besides acknowledging the opportunity to purchase beef with guaranteed...... tenderness, consumers express some reserve related to the possible upgrading of lower value cuts, too much standardisation, and the fact that tenderness is to some extent subjective. They further require the system to be simple, sufficiently documented and independent-party controlled. The insights obtained...

  10. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  11. Backup key generation model for one-time password security protocol

    Science.gov (United States)

    Jeyanthi, N.; Kundu, Sourav

    2017-11-01

    The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.

  12. 12 CFR 370.3 - Debt Guarantee Program.

    Science.gov (United States)

    2010-01-01

    ... convertible debt to be issued, (C) The mandatory conversion date, (D) The conversion rate (i.e., the total... exchange rate in effect on the date that the debt is funded. (c) Calculation and reporting responsibility... guarantee expires on the earliest of the mandatory conversion date for mandatory convertible debt, the...

  13. 48 CFR 52.228-1 - Bid Guarantee.

    Science.gov (United States)

    2010-10-01

    ... as accepted. (c) The amount of the bid guarantee shall be ____ percent of the bid price or $____, whichever is less. (d) If the successful bidder, upon acceptance of its bid by the Government within the period specified for acceptance, fails to execute all contractual documents or furnish executed bond(s...

  14. 78 FR 46528 - Surety Bond Guarantee Program

    Science.gov (United States)

    2013-08-01

    ... 2013, Public Law 112-239, 126 Stat. 1632: (1) Increasing the contract amount for which SBA is... remedies under contract law, the Act, and the regulations in this part, SBA is relieved of liability in...), including the provisions that increase the contract amounts for which SBA is authorized to guarantee bonds...

  15. Towards an integral analysis of stereotypes: Challenging the standard guarantee of impartiality

    Directory of Open Access Journals (Sweden)

    Laura Clérico

    2018-05-01

    Full Text Available The use of stereotypes to the detriment of the discriminated group should imply questioning the standard guarantee of judicial impartiality. Even taking the analysis of stereotypes seriously, the depth of its consequences has not been sufficiently taken into account in the constitutional and human rights argumentation because it has not challenged with all intensity the standard way in which the guarantee of impartiality is conceived and applied in legal practice and even by the regional court for the protection of human rights. I will defend two central theses: (1 the use of stereotypes necessarily impacts on the analysis of the guarantee of impartiality and (2 impartiality must get rid of the presumption of impartiality.

  16. 42 CFR 57.1507 - Limitations applicable to loan guarantee.

    Science.gov (United States)

    2010-10-01

    ... FOR CONSTRUCTION OF TEACHING FACILITIES, EDUCATIONAL IMPROVEMENTS, SCHOLARSHIPS AND STUDENT LOANS Loan Guarantees and Interest Subsidies to Assist in Construction of Teaching Facilities for Health Profession...

  17. Chaotic Image Encryption Based on Running-Key Related to Plaintext

    Directory of Open Access Journals (Sweden)

    Cao Guanghui

    2014-01-01

    Full Text Available In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack.

  18. Chaotic image encryption based on running-key related to plaintext.

    Science.gov (United States)

    Guanghui, Cao; Kai, Hu; Yizhi, Zhang; Jun, Zhou; Xing, Zhang

    2014-01-01

    In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack.

  19. 32 CFR 151.7 - Fair trial guarantees.

    Science.gov (United States)

    2010-07-01

    ... MILITARY JUSTICE STATUS OF FORCES POLICIES AND INFORMATION § 151.7 Fair trial guarantees. The following is... competent interpreter when the accused does not understand the language in which the trial is conducted and does not have counsel proficient in the language both of the court and of the accused. (p) Accused is...

  20. Linking Financial Service Providers to Commercial Capital : How Do Guarantees Add Value?

    OpenAIRE

    Alexia Latortue; Jasmina Glisovic-Mezieres

    2008-01-01

    In microfinance, experimentation with loan guarantees began largely as an attempt to demonstrate to local banks that Microfinance Institutions (MFIs) are creditworthy. Though loan guarantees are far less common than other funding instruments, such as debt, equity, and grants, they are beginning to be used more often. This brief is based on a joint Consultative Group to Assist the Poorest (...

  1. Interface Input/Output Automata: Splitting Assumptions from Guarantees

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand; Nyman, Ulrik; Wasowski, Andrzej

    2006-01-01

    's \\IOAs [11], relying on a context dependent notion of refinement based on relativized language inclusion. There are two main contributions of the work. First, we explicitly separate assumptions from guarantees, increasing the modeling power of the specification language and demonstrating an interesting...

  2. A Criteria Standard for Conflict Resolution: A Vision for Guaranteeing the Safety of Self-Separation in NextGen

    Science.gov (United States)

    Munoz, Cesar; Butler, Ricky; Narkawicz, Anthony; Maddalon, Jeffrey; Hagen, George

    2010-01-01

    Distributed approaches for conflict resolution rely on analyzing the behavior of each aircraft to ensure that system-wide safety properties are maintained. This paper presents the criteria method, which increases the quality and efficiency of a safety assurance analysis for distributed air traffic concepts. The criteria standard is shown to provide two key safety properties: safe separation when only one aircraft maneuvers and safe separation when both aircraft maneuver at the same time. This approach is complemented with strong guarantees of correct operation through formal verification. To show that an algorithm is correct, i.e., that it always meets its specified safety property, one must only show that the algorithm satisfies the criteria. Once this is done, then the algorithm inherits the safety properties of the criteria. An important consequence of this approach is that there is no requirement that both aircraft execute the same conflict resolution algorithm. Therefore, the criteria approach allows different avionics manufacturers or even different airlines to use different algorithms, each optimized according to their own proprietary concerns.

  3. Semi-device-independent security of one-way quantum key distribution

    OpenAIRE

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being 'device-independent'. Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are non-characterized, but t...

  4. A Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT and Key Coloumnar Transposition (KCT Method

    Directory of Open Access Journals (Sweden)

    Pryo Utomo

    2017-06-01

    Full Text Available One Time Pad (OTP is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext will be generated more difficult to be known. In the Key and Plaintext Insertion (KPI Method, we modify the OTP algorithm by adding the key insertion in the plaintext that has been splitted. Meanwhile in the Key Coloumnar Transposition (KCT Method, we modify the OTP algorithm by dividing the key into some parts in matrix of rows and coloumns. Implementation of the algorithms using PHP programming language.

  5. Economic Valuation of Sufficient and Guaranteed Irrigation Water Supply for Paddy Farms of Guilan Province

    Directory of Open Access Journals (Sweden)

    Mohammad Kavoosi Kalashami

    2014-08-01

    Full Text Available Cultivation of the strategic crop of rice highly depends to the existence of sufficient and guaranteed irrigation water, and water shortage stresses have irreparable effects on yield and quality of productions. Decrease of the Sefidrud river inflow in Guilan province which is the main source of supplying irrigation water for 171 thousand hectares under rice cropping area of this province, has been challenged sufficient and guaranteed irrigation water supply in many regions of mentioned province. Hence, in present study estimating the value that paddy farmers place on sufficient and guaranteed irrigation water supply has been considered. Economic valuation of sufficient and guaranteed irrigation water supply improves water resource management policies in demand side. Requested data set were obtained on the base of a survey and are collected from 224 paddy farms in rural regions that faced with irrigation water shortages. Then, using open-ended valuation approach and estimation of Tobit model via ML and two stages Heckman approach, eliciting paddy farmers' willingness to pay for sufficient and guaranteed irrigation water supply has been accomplished. Results revealed that farmers in investigated regions willing to pay 26.49 percent more than present costs of providing irrigation water in order to have sufficient and guaranteed irrigation water.

  6. The impact of SMEs’ lending and credit guarantee on bank efficiency in South Korea

    Directory of Open Access Journals (Sweden)

    Lien-Wen Liang

    2017-12-01

    Full Text Available This study examines how small and medium-size enterprises’ (SMEs’ lending and credit guarantee affect Korean banks’ efficiency, by employing the stochastic frontier approach on 14 banks over the period 2001–2010. When lending increases to SMEs, the findings indicate that banks’ cost efficiency decreases due to information asymmetry. However, the increased proportion of credit guarantee can improve their cost efficiency. This proves that South Korea’s credit guarantee system can indeed share SMEs’ credit risk of lending in order to help raise bank efficiency.

  7. Simultaneous transmission for an encrypted image and a double random-phase encryption key

    Science.gov (United States)

    Yuan, Sheng; Zhou, Xin; Li, Da-Hai; Zhou, Ding-Fu

    2007-06-01

    We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.

  8. A set-theoretic model reference adaptive control architecture for disturbance rejection and uncertainty suppression with strict performance guarantees

    Science.gov (United States)

    Arabi, Ehsan; Gruenwald, Benjamin C.; Yucelen, Tansel; Nguyen, Nhan T.

    2018-05-01

    Research in adaptive control algorithms for safety-critical applications is primarily motivated by the fact that these algorithms have the capability to suppress the effects of adverse conditions resulting from exogenous disturbances, imperfect dynamical system modelling, degraded modes of operation, and changes in system dynamics. Although government and industry agree on the potential of these algorithms in providing safety and reducing vehicle development costs, a major issue is the inability to achieve a-priori, user-defined performance guarantees with adaptive control algorithms. In this paper, a new model reference adaptive control architecture for uncertain dynamical systems is presented to address disturbance rejection and uncertainty suppression. The proposed framework is predicated on a set-theoretic adaptive controller construction using generalised restricted potential functions.The key feature of this framework allows the system error bound between the state of an uncertain dynamical system and the state of a reference model, which captures a desired closed-loop system performance, to be less than a-priori, user-defined worst-case performance bound, and hence, it has the capability to enforce strict performance guarantees. Examples are provided to demonstrate the efficacy of the proposed set-theoretic model reference adaptive control architecture.

  9. Comparative Analysis of Minimum Income Guaranteed Schemes within the Member States of the European Union

    Directory of Open Access Journals (Sweden)

    Simona Maria Stănescu

    2015-09-01

    Full Text Available The commitment of the European Union (EU Member States towards accomplishing the commonly agreed goals (1997 European Employment Strategy, Lisbon 2000, and Europe 2020 is supported by a continuous assessment of domestic social policy tendencies. From this perspective, the main goal of the paper is to comparatively analyse the last safety net for the most vulnerable people. The screening of guaranteed minimum resources provides an overview of the applicable statutory basis, schemes in place, types of social benefits concerned, financing and organisation mechanisms, eligibility conditions, duration and time limits. As methodology, the article uses the MISSOC database, and due to the current lack of comparable information, recommendations for further harmonisation are included. 20 of the EU member states follow the minimum income guaranteed (MIG regulations adopted already during the pre-accession period and updated after the accession phase. Seven types of domestic regulations are in force, among which the most frequent ones are acts and laws (ten countries. Common concepts used are social, and assistance. Provided allowances are mainly focused on elderly people, unemployment benefits, pensions, allowances supporting various house related costs, and benefits for disabled people. In line with 2007, 2010, and 2014 data, the financing of guaranteed minimum resources continues to remain mainly central with a shift in 2014 towards mixed financing (both central and local. The management in 2014 continues to be mainly centrally organised but the local stakeholders are also empowered. The residency is the most frequent eligibility condition. No nationality is required in 24 EU member states, for all allowances (21 countries or for particular ones (three countries. 17 member states require no age conditions. Unlimited guaranteed minimum resources were provided in 2014 as long as the eligibility criteria were met in 23 EU member states.

  10. The observable defects and the proper functioning guarantee in trading

    Directory of Open Access Journals (Sweden)

    Jorge Oviedo Albán

    2014-12-01

    Full Text Available This paper discusses two legal mechanisms for buyer´s protection contained in the Colombian Commercial Code, parallel to building regulations, because of hidden defects in the sale, which are: guarantee by observable defects at delivery and guarantee for proper functioning. The author analyzes the poor way such actions are enshrined in the Code as a consequence of a fragmented and dispersed regime for defective compliance actions in the laws of Private Law. This paper proposes a reinterpretation of such actions from the perspective of the lack of conformity that is based on a unified system of remedies for breach, concepts embodied in modern instruments of contract law.

  11. 29 CFR 541.604 - Minimum guarantee plus extras.

    Science.gov (United States)

    2010-07-01

    ... DEFINING AND DELIMITING THE EXEMPTIONS FOR EXECUTIVE, ADMINISTRATIVE, PROFESSIONAL, COMPUTER AND OUTSIDE SALES EMPLOYEES Salary Requirements § 541.604 Minimum guarantee plus extras. (a) An employer may provide... commission on sales. An exempt employee also may receive a percentage of the sales or profits of the employer...

  12. Hacking on decoy-state quantum key distribution system with partial phase randomization

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  13. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  14. A Best Practice for Developing Availability Guarantee Language in Photovoltaic (PV) O&M Agreements.

    Energy Technology Data Exchange (ETDEWEB)

    Klise, Geoffrey Taylor [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Balfour, John [High Performance PV, Phoenix, AZ (United States)

    2015-11-01

    This document outlines the foundation for developing language that can be utilized in an Equipment Availability Guarantee, typically included in an O&M services agreement between a PV system or plant owner and an O&M services provider, or operator. Many of the current PV O&M service agreement Availability Guarantees are based on contracts used for traditional power generation, which create challenges for owners and operators due to the variable nature of grid-tied photovoltaic generating technologies. This report documents language used in early PV availability guarantees and presents best practices and equations that can be used to more openly communicate how the reliability of the PV system and plant equipment can be expressed in an availability guarantee. This work will improve the bankability of PV systems by providing greater transparency into the equipment reliability state to all parties involved in an O&M services contract.

  15. CONSIDERATIONS REGARDING THE GUARANTEEING OF HUMAN RIGHTS IN ROMANIA

    Directory of Open Access Journals (Sweden)

    ELENA PARASCHIV

    2012-05-01

    Full Text Available In our country existed and exists still a constant concern to respect and guarantee human rights and fundamental freedoms, especially after 1989, when Romania became a member or acceding to international or regional treaties and conventions enshrining such rights. Taking into consideration the importance of respecting human rights, we consider that is necessary to research how they are secured in Romania, because only when these guarantees are known by their beneficiaries and those involved in their protection, actions which affect these values of humanity can be avoided. In human rights, rules of international law have priority over those entered in the domestic law if they contain provisions which may be interpreted differently on the same matter, unless the Constitution or national laws contain more favourable provisions.

  16. When Justice Is Up to You. Celebrating America's Guarantee of Trial by Jury.

    Science.gov (United States)

    National Inst. for Citizen Education in the Law, Washington, DC.

    Featuring a mock trial tested in the District of Columbia, the objective of this manual is to help students learn more about the constitutional guarantee of trial by jury. Prepared as five separate lessons, the manual examines one alternative to the jury system--trial by ordeal; traces the development of the guarantee of trial by jury; explores…

  17. 7 CFR 3575.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  18. 7 CFR 1493.40 - Application for payment guarantee.

    Science.gov (United States)

    2010-01-01

    ... and allowances, if any. (11) Port value (includes upward loading tolerance, if any). (12) Guaranteed..., contract loading tolerance and, if necessary, a request for CCC to reserve coverage up to the maximum quantity permitted by the contract loading tolerance. (9) Unit sales price of the commodity, or a mechanism...

  19. A Conflict-Free Low-Jitter Guaranteed-Rate MAC Protocol for Base-Station Communications in Wireless Mesh Networks

    Science.gov (United States)

    Szymanski, T. H.

    A scheduling algorithm and MAC protocol which provides low-jitter guaranteed-rate (GR) communications between base-stations (BS) in a Wireless Mesh Network (WMN) is proposed. The protocol can provision long-term multimedia services such as VOIP, IPTV, or Video-on-Demand. The time-axis is partitioned into scheduling frames with F time-slots each. A directional antennae scheme is used to provide each directed link with a fixed transmission rate. A protocol such as IntServ is used to provision resources along an end-to-end path of BSs for GR sessions. The Guaranteed Rates between the BSs are then specified in a doubly stochastic traffic rate matrix, which is recursively decomposed to yield a low-jitter GR frame transmission schedule. In the resulting schedule, the end-to-end delay and jitter are small and bounded, and the cell loss rate due to primary scheduling conflicts is zero. For dual-channel WMNs, the MAC protocol can achieve 100% utilization, as well as near-minimal queueing delays and near minimal delay jitter. The scheduling time complexity is O(NFlogNF), where N is the number of BSs. Extensive simulation results are presented.

  20. Applying Service Performance Guarantees to Reduce Risk Perception in the Purchase and Consumption of Higher Education

    Directory of Open Access Journals (Sweden)

    Nooraini Mohamad Sheriff

    2006-12-01

    Full Text Available The intangible nature of education is one contributor to consumers’ perception of risk prior to their purchase and consumption. This risk includes: functional risk, financial risk, temporal risk, physical risk, psychological risk and social risk. The presence of these risks often makes consumer evaluation prior to purchase and consumption difficult. Invoking a service guarantee is a platform available to enable higher educational institutions to minimize such risk perception so as to induce purchase. Specifically, service guarantee for higher education entails the application of teaching performance guarantee. This form of guarantee focuses on two important customer groups of higher educational institutions namely, students and faculty members, and focuses only on a specific performance aspect such as instructor’s performance. Thus, if students are dissatisfied with an instructor’s performance they are entitled to receive their money back. The imposition of such a teaching performance guarantee would implicate instructor’s accountability for certain aspects of their performance. It also establishes a mechanism to solicit feedback to better understand why and how instructors fail. Consequently, service performance guarantee creates a high level of customer focus and signals instructors’ care towards students

  1. RSA Key Development Using Fingerprint Image on Text Message

    Science.gov (United States)

    Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti

    2017-12-01

    Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.

  2. The Impact of Public Guarantees on Bank Risk Taking : Evidence from a Natural Experiment

    NARCIS (Netherlands)

    Gropp, R.; Grundl, C.; Guttler, A.

    2010-01-01

    In 2001, government guarantees for savings banks in Germany were removed following a law suit. We use this natural experiment to examine the effect of government guarantees on bank risk taking, using a large data set of matched bank/borrower information. The results suggest that banks whose

  3. Economic valuation of a toll road concession with traffic guarantees and the abandonment option

    Directory of Open Access Journals (Sweden)

    Frances Fischberg Blank

    2016-03-01

    Full Text Available Abstract Governments worldwide have been encouraging private participation in transportation infrastructure. To increase the feasibility of a project, public-private partnership (PPP may include guarantees or other support to reduce the risks for private investors. It is necessary to value these opportunities under a real options framework and thereby analyze the project's economic feasibility and risk allocation. However, within this structure, sponsors have an implicit option to abandon the project that should be simultaneously valued. Thus, this article proposes a hypothetical toll road concession in Brazil with a minimum traffic guarantee, a maximum traffic ceiling, and an implicit abandonment option. Different combinations of the minimum and maximum levels are presented, resulting in very high or even negative value added to the net present value (NPV. The abandonment option impacts the level of guarantee to be given. Governments should calibrate an optimal level of guarantees to avoid unnecessarily high costs, protect the returns of the sponsor, and lower the probability of abandonment.

  4. THE LETTER OF GUARANTEE FROM THE PERSPECTIVE OF THE NEW CIVIL CODE

    Directory of Open Access Journals (Sweden)

    LUMINITA TULEASCA

    2011-04-01

    Full Text Available The letter of guarantee is frequently used in the domestic and international commercial activity, first of all, for the safety offered for securing the contractual obligations without blocking the pecuniary funds and, second of all, due to the existing uniform international regulations that correspond to the needs supporting the occurrence of these types of autonomous securities.In Romania, the lack of legal policing of the letter of guarantee has created practical difficulties and offered judges the possibility to "make the law" in the litigations generated by the enforcement or by the suspension of enforcement of these contractual securities.This work analysis the regulation of the letter of guarantee provided in the New Civil Code from the perspective of its harmonization with the Uniform Rules of the International Chamber of Commerce in Paris and with the Draft Common Frame of Reference in the matter of the European private law.

  5. Fully Device-Independent Quantum Key Distribution

    Science.gov (United States)

    Vazirani, Umesh; Vidick, Thomas

    2014-10-01

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  6. 13 CFR 400.214 - Participations in guaranteed loans.

    Science.gov (United States)

    2010-01-01

    ...) Subject to paragraphs (b), (c) and (d) of this section, a Lender may distribute the risk of a portion of a... the Guarantee is assigned, conveyed, sold, or transferred in whole or in part; (2) The Lender remains... Lenders; (2) Private investment funds and insurance companies that do not usually invest in commercial...

  7. Detector dead-time effects and paralyzability in high-speed quantum key distribution

    International Nuclear Information System (INIS)

    Rogers, Daniel J; Bienfang, Joshua C; Nakassis, Anastase; Xu Hai; Clark, Charles W

    2007-01-01

    Recent advances in quantum key distribution (QKD) have given rise to systems that operate at transmission periods significantly shorter than the dead times of their component single-photon detectors. As systems continue to increase in transmission rate, security concerns associated with detector dead times can limit the production rate of sifted bits. We present a model of high-speed QKD in this limit that identifies an optimum transmission rate for a system with given link loss and detector response characteristics

  8. Facilitating working mothers' ability to breastfeed: global trends in guaranteeing breastfeeding breaks at work, 1995-2014.

    Science.gov (United States)

    Atabay, Efe; Moreno, Gonzalo; Nandi, Arijit; Kranz, Gabriella; Vincent, Ilona; Assi, Tina-Marie; Winfrey, Elise Marie Vaughan; Earle, Alison; Raub, Amy; Heymann, S Jody

    2015-02-01

    Mothers who work away from home tend to stop breastfeeding earlier than their nonworking counterparts due to workplace barriers. Barriers to breastfeeding discriminate against women and may lead to inequities in children's health outcomes. Guaranteeing paid breastfeeding breaks at work is 1 mechanism that can improve mothers' opportunity to breastfeed in the workplace. This study aimed to assess the trends in the share of countries guaranteeing breastfeeding breaks in the workplace and paid maternal leave that lasts until the infant is 6 months old (the World Health Organization recommended duration for exclusive breastfeeding), between 1995 and 2014. Legislation and secondary source data were collected and reviewed for 193 United Nations member states. Legislation was analyzed for content on breastfeeding breaks and maternal leave guarantees. Fifty-one countries (26.7%) in 2014 did not guarantee breastfeeding breaks in any form and 4 countries provided only unpaid breaks or breaks that did not cover the first 6 months of life; since 1995, around 15 countries (10.2%) legislated for such a policy. In 2014, out of 55 countries that did not guarantee paid breastfeeding breaks for the first 6 months after birth, 7 countries guaranteed paid maternal leave for the same duration; 48 countries (25.1%) provided neither paid maternal leave nor paid breastfeeding breaks. Progress in the number of countries guaranteeing breastfeeding breaks at work is modest. Adopting measures to facilitate breastfeeding at work can be a critical opportunity for countries to increase breastfeeding rates among the growing number of women in the labor force. © The Author(s) 2014.

  9. Pricing and Hedging Guaranteed Returns on Mix Funds

    NARCIS (Netherlands)

    Vellekoop, M.H.; van de Kamp, A.A.; Post, B.A.

    2006-01-01

    Abstract In this paper we propose a valuation and hedging strategy for a guaranteed minimal rate of return on a mix fund, which participates in both bonds and stocks. For the case where a fixed amount of money is invested, we show that a European put option on the mix fund replicates the cash flows

  10. Asset securitization and rate of return: A study on letters of guarantee

    Science.gov (United States)

    Wu, Binghui

    2018-01-01

    Using the theory of asset securitization, we analyze the feasibility of the securitization of letters of guarantee in theory. In the process of constructing the model of rate of return of securities backed by letters of guarantee, we propose two indices: the risk probability of asset-backed securities and the loss rate of asset-backed securities to analyze the cash flow of securities. On the basis of no arbitrage principle, the expression of rate of return of securities backed by letters of guarantee is put forward. In order to study the relationship between the rate of return of securities and other influential factor in the model, a simulation experiment is designed. The experiment results show that (i) an increasing risk probability of cash flow or a short maturity date also make the return rate of securities increase and (ii) the return rate of securities is higher in economic boom than that in economic recession when other parameters remain unchanged.

  11. 7 CFR 4279.75 - Sale or assignment of guaranteed loan.

    Science.gov (United States)

    2010-01-01

    ... borrower's immediate families, officers, directors, stockholders, other owners, or a parent, subsidiary or...) or any successor section will not be guaranteed. (a) Single note system. The entire loan is evidenced...

  12. DEPOSIT GUARANTEE SCHEMES JOIN FINANCIAL SAFETY-NET

    Directory of Open Access Journals (Sweden)

    Eugen Dijmarescu

    2011-03-01

    Full Text Available Deposit Guarantee Schemes (DGS become more visible under the current conditions of the world financial markets. If those have played in the past a rather discreet role for social stability through the function of pay box following a bank failure, the recent crisis put them in a new light, once the guarantee ceiling for eligible deposits grew in order to make for the accumulation of wealth worldwide and the increased risk incurred by the leverage of banking operations. Consequently, the resources accumulated by the DGS from the member banks and their proper management make possible their involvement in pre-emptive actions aimed to avoid bankruptcies via special administration and purchase of assets and assumption of liabilities. These new attributes give DGS a role in the mechanism of financial safety-net, along the supervisors of the market. Hence, an increased preoccupation for applied corporate governance has developed and Core Principles for Effective Deposit Insurance Systems have been adopted by the Basel Committee on Banking Supervision together with International Association of Deposit Insurers. Concurrently, the EU Commission has put forward a process for reviewing the Directives 94/39 and 09/14 EC, in order to make the European DGS more prepared to deal with above mentioned issues and bestow increased confidence upon depositors.

  13. Human and Citizen Rights Guarantees While Providing Information Security

    Directory of Open Access Journals (Sweden)

    Serhii Yesimov

    2018-05-01

    Full Text Available With the development of information and communication technologies, issues of providing information security are becoming more and more aggravated. These are crimes related to the use of electronic computers, systems and computer networks and telecommunication networks, the propaganda of separatism and extremism, etc. While providing information security in the digital environment, the role of technical and legal human rights guarantees, due to technical means of protection, is increasing. Relying on the developers of technical means of protection determines the difference between the aforesaid concepts and the traditional approach to ensuring the protection of human and citizen rights, in which responsibilities are put on information intermediaries, owners of confidential information. Technical guarantees of human rights are a necessary component of ensuring information security, but the effectiveness of the application is provided in conjunction with the legal guarantees of human rights, as evidenced by the tendency to recognize the principles of inviolability of privacy on the basis of design decisions in the law of the European Union as legal acts. Providing information security is a legitimate goal of establishing constraints of human rights, since it can be correlated with the norms of international law. The establishment of constraints of human rights is permissible in order to attain other objectives–ensuring state security, public order, health, rights and freedoms of the person in the information sphere. The legitimacy of this goal is determined by its compliance with the objectives envisaged by international agreements ratified in an established order. The article examines the impact of the use of technical means in the field of providing information security in the aspect of following the fundamental human and civil rights in Ukraine, taking into account the legislation of the European Union and the decision of the European Court

  14. A real-time architecture for time-aware agents.

    Science.gov (United States)

    Prouskas, Konstantinos-Vassileios; Pitt, Jeremy V

    2004-06-01

    This paper describes the specification and implementation of a new three-layer time-aware agent architecture. This architecture is designed for applications and environments where societies of humans and agents play equally active roles, but interact and operate in completely different time frames. The architecture consists of three layers: the April real-time run-time (ART) layer, the time aware layer (TAL), and the application agents layer (AAL). The ART layer forms the underlying real-time agent platform. An original online, real-time, dynamic priority-based scheduling algorithm is described for scheduling the computation time of agent processes, and it is shown that the algorithm's O(n) complexity and scalable performance are sufficient for application in real-time domains. The TAL layer forms an abstraction layer through which human and agent interactions are temporally unified, that is, handled in a common way irrespective of their temporal representation and scale. A novel O(n2) interaction scheduling algorithm is described for predicting and guaranteeing interactions' initiation and completion times. The time-aware predicting component of a workflow management system is also presented as an instance of the AAL layer. The described time-aware architecture addresses two key challenges in enabling agents to be effectively configured and applied in environments where humans and agents play equally active roles. It provides flexibility and adaptability in its real-time mechanisms while placing them under direct agent control, and it temporally unifies human and agent interactions.

  15. 7 CFR 1980.488 - Guaranteed industrial development bond issues.

    Science.gov (United States)

    2010-01-01

    ... industrial plants for lease to private businesses engaged in industrial manufacturing and does not provide... 7 Agriculture 14 2010-01-01 2009-01-01 true Guaranteed industrial development bond issues. 1980..., DEPARTMENT OF AGRICULTURE (CONTINUED) PROGRAM REGULATIONS (CONTINUED) GENERAL Business and Industrial Loan...

  16. 7 CFR 4290.820 - Financings in the form of guarantees.

    Science.gov (United States)

    2010-01-01

    ...-COOPERATIVE SERVICE AND RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE RURAL BUSINESS INVESTMENT COMPANY...-Types of Financings § 4290.820 Financings in the form of guarantees. (a) General rule. At the request of...

  17. Two-party quantum key agreement protocol with four-particle entangled states

    Science.gov (United States)

    He, Yefeng; Ma, Wenping

    2016-09-01

    Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  18. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources

    International Nuclear Information System (INIS)

    Li, Hong-Wei; Wang, Shuang; Huang, Jing-Zheng; Chen, Wei; Yin, Zhen-Qiang; Li, Fang-Yi; Zhou, Zheng; Liu, Dong; Zhang, Yang; Guo, Guang-Can; Han, Zheng-Fu; Bao, Wan-Su

    2011-01-01

    It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost of only increasing the quantum bit error rate from 1.3 to 1.4%.

  19. La progettazione di nuovi spazi educativi per l’infanzia: da Ellen Key a Maria Montessori

    Directory of Open Access Journals (Sweden)

    Tiziana Pironi

    2011-11-01

    Full Text Available The essay presents a comparison between the thought of Ellen Key and that of Maria Montessori. Changes that involved the role of women, caught in its interdependence with the development of new educational practices, were the center of the theoretical contribution of Ellen Key. Maria Montessori believed that only women work outside the home would guarantee the economic independence necessary to form a union on sentiment rather than on utilitarian calculations and therefore she did not seem to share the concerns of the Key on an increasingly massive female entry into the world of work. The paper offers an updated reflection on the work of two scholars of education.

  20. Further improvements in competitive guarantees for QoS buffering

    NARCIS (Netherlands)

    Bansal, N.; Fleischer, L.K.; Kimbrel, T.; Mahdian, M.; Schieber, B.; Sviridenko, M.; Diaz, J.; Karhumäki, J.; Lepistö, A.; Sannella, D.

    2004-01-01

    We study the behavior of algorithms for buffering packets weighted by different levels of Quality of Service (QoS) guarantees in a single queue. Buffer space is limited, and packet loss occurs when the buffer overflows. We describe a modification of the previously proposed ``preemptive greedy{''}

  1. Stabilization with guaranteed safety using Control Lyapunov–Barrier Function

    NARCIS (Netherlands)

    Romdlony, Muhammad Zakiyullah; Jayawardhana, Bayu

    2016-01-01

    We propose a novel nonlinear control method for solving the problem of stabilization with guaranteed safety for nonlinear systems. The design is based on the merging of the well-known Control Lyapunov Function (CLF) and the recent concept of Control Barrier Function (CBF). The proposed control

  2. Toward sensitive document release with privacy guarantees

    OpenAIRE

    David Sánchez; Montserrat Batet

    2017-01-01

    Toward sensitive document release with privacy guarantees DOI: 10.1016/j.engappai.2016.12.013 URL: http://www.sciencedirect.com/science/article/pii/S0952197616302408 Filiació URV: SI Inclòs a la memòria: SI Privacy has become a serious concern for modern Information Societies. The sensitive nature of much of the data that are daily exchanged or released to untrusted parties requires that responsible organizations undertake appropriate privacy protection measures. Nowadays, much...

  3. Drawing a Link—Women’s Empowerment and Mahatma Gandhi National Rural Employment Guarantee Act: A Study Conducted in the Goalpara District, Assam

    Directory of Open Access Journals (Sweden)

    Dr Manisha Bhattacharyya

    2016-03-01

    Full Text Available This article reports on an empirical research that examined the extent of economic empowerment gained by women engaged in Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA in the district of Goalpara, Assam. The key objective of the MGNREGA is to provide social security to rural households by guaranteeing 100 days of paid employment in public works within a year. Based on nine variables (education, land ownership, ownership of other assets, control over income contributed by a woman to her family, control over the income of the family, savings, access to credit, social participation, cash income earned from income generating activities and calculated using empowerment index, the research compared the magnitude of women’s empowerment before and after getting involved in MGNREGA. The findings suggest that while MGNREGA is an important leap to ensuring economic empowerment to rural women, but the scheme has not been implemented properly in the district—women and men not getting 100 days of employment, irregular mode of payment, very slow progress and poor quality in public works.

  4. Designing area optimized application-specific network-on-chip architectures while providing hard QoS guarantees.

    Directory of Open Access Journals (Sweden)

    Sajid Gul Khawaja

    Full Text Available With the increase of transistors' density, popularity of System on Chip (SoC has increased exponentially. As a communication module for SoC, Network on Chip (NoC framework has been adapted as its backbone. In this paper, we propose a methodology for designing area-optimized application specific NoC while providing hard Quality of Service (QoS guarantees for real time flows. The novelty of the proposed system lies in derivation of a Mixed Integer Linear Programming model which is then used to generate a resource optimal Network on Chip (NoC topology and architecture while considering traffic and QoS requirements. We also present the micro-architectural design features used for enabling traffic and latency guarantees and discuss how the solution adapts for dynamic variations in the application traffic. The paper highlights the effectiveness of proposed method by generating resource efficient NoC solutions for both industrial and benchmark applications. The area-optimized results are generated in few seconds by proposed technique, without resorting to heuristics, even for an application with 48 traffic flows.

  5. QoS-Guaranteed Admission Control for OFDMA-based Systems

    DEFF Research Database (Denmark)

    Ramkumar, Venkata; Anggorojati, Bayu; Lucian, Stefan P. Andrei

    2010-01-01

    This paper proposes a novel admission control (AC) algorithm for guaranteed quality of service (QoS) to all users. The proposed solution provides better utilization of system capacity using adaptive modulation (AM). A scheduler based on a per user priority function is also given in this paper. Th...

  6. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  7. Vertical Handover Algorithm for WBANs in Ubiquitous Healthcare with Quality of Service Guarantees

    Directory of Open Access Journals (Sweden)

    Dong Doan Van

    2017-03-01

    Full Text Available Recently, Wireless Body Area Networks (WBANs have become an emerging technology in healthcare, where patients are equipped withwearable and implantable body sensor nodes to gather sensory information for remote monitoring. The increasing development of coordinator devices on patients enables the internetworking of WBANs in heterogeneous wireless networks to deliver physiological information that is collected at remote terminals in a timely fashion. However, in this type of network, providing a seamless handover with a guaranteed Quality of Service (QoS, especially emergency services, is a challenging task. In this paper, we proposed an effective Multi-Attribute Decision-Making (MADM handover algorithm that guarantees seamless connectivity. A patient’s mobile devices automatically connect to the best network that fulfills the QoS requirements of different types of applications. Additionally, we integrated a Content-Centric Networking (CCN processing module into different wireless networks to reduce packet loss, enhance QoS and avoid unnecessary handovers by leveraging in-network caching to achieve efficient content dissemination for ubiquitous healthcare. Simulation results proved that our proposed approach forthe model with CCN outperforms the model without CCN and Received Signal Strength Vertical Handoff (RSS-VHD in terms of the number of handovers, enhancing QoS, packet loss, and energy efficiency.

  8. Community oral health literacy: improving use of oral-health care guarantee in children aged 6.

    Directory of Open Access Journals (Sweden)

    Marco Cornejo-Ovalle

    2013-08-01

    Full Text Available The assessment of comprehensive oral health care for children aged 6 (GES-6years showed low utilization of this guarantee, with lower use for children from municipal public schools. The empowerment and health literacy of parents improve their role as oral-health promoters for their children. Objective: To implement and to assess a strategy of empowerment and health literacy of the community about their guaranteed health rights to increase the use of GES-6years. Methods: A mixed design. Using qualitative methodology we will design a communication tool, culturally and socially appropriate to be sent to the beneficiary community of this guarantee. Using a nonrandomized community trial, this instrument designed to empower and improve oral health literacy on GES-6 guarantee, will be sent as personalized letter (intervention signed by the mayor of the municipality with a message aimed to children beneficiaries for GES -6years and another addressed to their parents/guardians. Schools would be selected from clusters (communes of the two regions selected for convenience. Communes will be randomly selected amog those whose authorities agree to participate, and will be selected as for intervention or control. Data analysis will assess the differences in the prevalence of use of this guarantee among children from municipal schools belonging to the intervention or control arm.

  9. Guarantee Funds of Credits in Romania - Necessity, Features and Networking - II

    Directory of Open Access Journals (Sweden)

    Georgeta Dragomir

    2011-12-01

    Full Text Available In the current context, marked by financial crisis, economic recession, lack of liquidity andlow capitalization, the access tofinancing is more difficult, mainly due to the lack, insufficiency orlimited availability of guarantees. Guarantee funds represent an innovative solution, proven by theEuropean economies and recently launched in Romania. Taking over the international experience inorder to facilitate the SMEs’ access to financial resources has become a necessity in Romania, whichwas reflected by the creation of three specialized financial institutions in granting guarantees domain.These are bodies with private or publiccapital, which relate, based on agreements with commercialbanks. After a period of exposure to major risks from the lack of regulatory activity, the guaranteefunds, along with other non-banking financial institutions are absolutely governed by rules oftheNRB, according to the banking law and special laws. The analysis in this paper is based on the studyof several official documents, reports of specialized bodies, statistics and examples of good practice,summarized and interpreted in through comparison and developments. The aim is to identify anumber of issues that may lead to sensitize the responsible factors-public authorities, creditinstitutions, and specialists-to come up with new practical solutions that would stimulate thefinancing processof small entrepreneurs.

  10. The fiduciary guarantee in the Romanian and European legal context

    Directory of Open Access Journals (Sweden)

    Cornelia Lefter

    2016-12-01

    Full Text Available The importance of the fiduciary guarantee has not reached its full potential in the Romanian market, nor in the European area. The ongoing “dispute” between the fiduciary operations (familiar to the continental law and the trust (with its common -law heritage seems to be won by the latter. However, considering the express provisions on the fiduciary operations in the Romanian Civil Code entered into force in 2011, similar to the introduction of the same legal instrument in the French Civil Code in 2007, could give a boost to this ancient tool, present from the Roman era. Even if the European legal framework do not provide many rules on this institution, however, the Financial Collateral Directive raised many questions on how the fiduciary guarantees can be used in practice, and contributed to the change that followed in this area.

  11. 78 FR 691 - Maximum Loan Amount for Business and Industry Guaranteed Loans in Fiscal Year 2013

    Science.gov (United States)

    2013-01-04

    ... DEPARTMENT OF AGRICULTURE Rural Business-Cooperative Service Maximum Loan Amount for Business and Industry Guaranteed Loans in Fiscal Year 2013 AGENCY: Rural Business-Cooperative Service, USDA. ACTION... and Industry (B&I) guaranteed loans of $25 million or less under certain circumstances. Due to the...

  12. Experimental investigation of quantum key distribution with position and momentum of photon pairs

    International Nuclear Information System (INIS)

    Almeida, M.P.; Walborn, S.P.; Souto Ribeiro, P.H.

    2005-01-01

    We investigate the utility of Einstein-Podolsky-Rosen correlations of the position and momentum of photon pairs from parametric down-conversion in the implementation of a secure quantum key distribution protocol. We show that security is guaranteed by the entanglement between down-converted pairs, and can be checked by either direct comparison of Alice and Bob's measurement results or evaluation of an inequality of the sort proposed by Mancini et al. [Phys. Rev. Lett. 88, 120401 (2002)

  13. 78 FR 66841 - Israel Loan Guarantees Issued Under the Emergency Wartime Supplemental Appropriations Act of 2003...

    Science.gov (United States)

    2013-11-07

    ... AGENCY FOR INTERNATIONAL DEVELOPMENT 22 CFR Part 230 Israel Loan Guarantees Issued Under the... the Government of Israel on behalf of the State of Israel. Pursuant to the Emergency Wartime... International Development, may issue loan guarantees applicable to sums borrowed by the Government of Israel on...

  14. We Don’t Want to Be Officially Certified! Reasons and Implications of the Participatory Guarantee Systems

    Directory of Open Access Journals (Sweden)

    Mamen Cuéllar-Padilla

    2018-04-01

    Full Text Available Official organic regulation in Europe is based on the third-party certification system to guarantee organic products. Many critics and dissatisfactions have motivated the emergence of other guarantee systems, based on an intense implication of producers and, in some cases, consumers and other local actors, involved in localised agri-food systems. They are called Participatory Guarantee Systems (PGS, and are not recognised as valid guarantee systems by the official organic regulation. In the present paper, we analyse the main differences between the PGS and the third party certification system, deepening on their differentiated social and political implications. We conclude that the procedures behind PGS generate numerous positive impacts in the territories related to local producers (and consumers empowerment and localised agri-food systems drive, while their implications make them not considered as a substitute to third party certification system, unless certain conditions of social consolidated groups and agroecological and food sovereignty perspective of food system take place.

  15. Administrative Circular No. 13 (Rev. 4) - Guarantees for representatives of the personnel

    CERN Multimedia

    Department Head Office - HR Department

    2016-01-01

    Administrative Circular No. 13 (Rev. 4) entitled "Guarantees for representatives of the personnel", approved by the Director-General following discussion in the Standing Concertation Committee meeting on 22 March 2016, will be available on 1st September 2016 via the following link: https://cds.cern.ch/record/2208527.   This revised circular cancels and replaces Administrative Circular No. 13 (Rev. 3) also entitled "Guarantees for representatives of the personnel" of January 2014. This document contains a single change to reflect the terminology under the new career structure: the term "career path" is replaced by "grade". This circular will enter into force on 1st September 2016.

  16. 22 CFR 213.3 - Loans, guarantees, sovereign and interagency claims.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Loans, guarantees, sovereign and interagency claims. 213.3 Section 213.3 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT CLAIMS COLLECTION... thereof, or any public international organization; (d) Claims where the CFO determines that the...

  17. An Active Queue Management for QoS Guarantee of the High Priority Service Class

    Science.gov (United States)

    Kim, Hyun Jong; Shim, Jae Chan; Kim, Hwa-Suk; Cho, Kee Seong; Choi, Seong Gon

    In this paper, we propose the active queue management mechanism (Active-WRED) for guaranteeing the quality of the high priority service class (VoIP or IPTV) in the multi-class traffic service environment. In the congestion situation, this mechanism increases the drop probability of the low priority traffic and reduces the drop probability of the high priority traffic; therefore it can guarantee the quality of the high priority service class from the poor quality by the packet loss.

  18. The structure and economic significance of government guarantees in Croatia and the European Union

    Directory of Open Access Journals (Sweden)

    Marko Primorac

    2016-03-01

    Full Text Available In the aftermath of the financial crisis, when countries are facing difficulties in raising the amounts of revenue needed to cover the expenditure side of the budget, fiscal risks can pose a significant threat to the sustainability of public finance. This became particularly evident in the case of public enterprises and their liabilities, which often increased public debt because of difficulties in meeting their financial obligations. The aim of this paper is to evaluate fiscal risks from government guarantees in Croatia and the European Union in general. Moreover, the paper aims to analyse the dynamics of the value and structure of government guarantees in Croatia in the period from 2009 to first half of 2015. Particular emphasis is placed on the impact of government guarantees on direct public debt in the context of methodological changes in the registration of public debt.

  19. Time-division multiplexing vs network calculus: A comparison

    DEFF Research Database (Denmark)

    Puffitsch, Wolfgang; Sørensen, Rasmus Bo; Schoeberl, Martin

    2015-01-01

    that time-division multiplexing leads to better worst-case latencies, while network calculus supports higher bandwidths. Furthermore, time-division multiplexing leads to a simpler hardware implementation, while dynamically scheduled networks-on-chip allow the integration of best-effort traffic in the on......Networks-on-chip are increasingly common in modern multicore architectures. However, general-purpose networks-on-chip are not always well suited for real-time applications that require bandwidth and latency guarantees. Two approaches to provide real-time guarantees have emerged: time......-chip network in a more natural way....

  20. Guaranteed cost control of polynomial fuzzy systems via a sum of squares approach.

    Science.gov (United States)

    Tanaka, Kazuo; Ohtake, Hiroshi; Wang, Hua O

    2009-04-01

    This paper presents the guaranteed cost control of polynomial fuzzy systems via a sum of squares (SOS) approach. First, we present a polynomial fuzzy model and controller that are more general representations of the well-known Takagi-Sugeno (T-S) fuzzy model and controller, respectively. Second, we derive a guaranteed cost control design condition based on polynomial Lyapunov functions. Hence, the design approach discussed in this paper is more general than the existing LMI approaches (to T-S fuzzy control system designs) based on quadratic Lyapunov functions. The design condition realizes a guaranteed cost control by minimizing the upper bound of a given performance function. In addition, the design condition in the proposed approach can be represented in terms of SOS and is numerically (partially symbolically) solved via the recent developed SOSTOOLS. To illustrate the validity of the design approach, two design examples are provided. The first example deals with a complicated nonlinear system. The second example presents micro helicopter control. Both the examples show that our approach provides more extensive design results for the existing LMI approach.

  1. [Packaging: the guarantee of medicinal quality].

    Science.gov (United States)

    Chaumeil, J-C

    2003-01-01

    Primary packaging guarantees the pharmaceutical quality of the medicinal preparation received by the patient. Glass bottles containing parenteral solutions for example ensure that sterility, quality and optimal stability are preserved until administration. Recent innovations in materials research has lead to improvements in parenteral infusions. Multicompartmental bags, allowing extemporaneous mixtures without opening the container, constitute an extremely beneficial advance for the patient, allowing administration of mixtures with solutions and emulsions which would be unstable if stored. Metered dose pressurized inhalers are an excellent example of drug administration devices designed specifically to ensure quality and bioavailability. These examples illustrate the important role of primary packaging and demonstrate the usefulness of research and development in this area.

  2. 13 CFR 107.820 - Financings in the form of guarantees.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Financings in the form of... BUSINESS INVESTMENT COMPANIES Financing of Small Businesses by Licensees Structuring Licensee's Financing of Eligible Small Businesses: Types of Financing § 107.820 Financings in the form of guarantees. At...

  3. Multi-party Semi-quantum Key Agreement with Delegating Quantum Computation

    Science.gov (United States)

    Liu, Wen-Jie; Chen, Zhen-Yu; Ji, Sai; Wang, Hai-Bin; Zhang, Jun

    2017-10-01

    A multi-party semi-quantum key agreement (SQKA) protocol based on delegating quantum computation (DQC) model is proposed by taking Bell states as quantum resources. In the proposed protocol, the participants only need the ability of accessing quantum channel and preparing single photons {|0〉, |1〉, |+〉, |-〉}, while the complicated quantum operations, such as the unitary operations and Bell measurement, will be delegated to the remote quantum center. Compared with previous quantum key agreement protocols, this client-server model is more feasible in the early days of the emergence of quantum computers. In order to prevent the attacks from outside eavesdroppers, inner participants and quantum center, two single photon sequences are randomly inserted into Bell states: the first sequence is used to perform the quantum channel detection, while the second is applied to disorder the positions of message qubits, which guarantees the security of the protocol.

  4. Studies on the performance guarantee for the engineering barrier system on geological disposal of high-level radioactive waste

    International Nuclear Information System (INIS)

    Kawakami, Susumu; Sugita, Yutaka; Kurihara, Yuji; Jintoku, Takashi; Taniguti, Naoki; Yui, Mikazu; Tanai, Kenji; Shibata, Masahiro; Honma, Nobuyuki

    2003-03-01

    In order to contribute to the safety standards and guidelines upon which a administration decides, examination for clarifying how to reflect the result obtained by future R and D was performed. From a viewpoint of the long-term safety on geological disposal, the items which should guarantee the performance of each element which constitutes disposal institutions (by this report, they are the overpack and the buffer material) were extracted, and it was shown what a performance guarantee is concretely offered about these items. Furthermore, based on the H12 report as a situation of present R and D for a method of a performance guarantee, the subjects considered that a future R and D is required were extracted. Moreover, the items of a safety standard and guideline were assumed, and the relation between these items and a performance guarantee items was arranged. One arrangement for clarifying whether to be reflected in the safety regulations and guidelines whose R and D subjects extracted from the performance guarantee items was shown. (author)

  5. Security of practical quantum key distribution systems

    Energy Technology Data Exchange (ETDEWEB)

    Jain, Nitin

    2015-02-24

    This thesis deals with practical security aspects of quantum key distribution (QKD) systems. At the heart of the theoretical model of any QKD system lies a quantum-mechanical security proof that guarantees perfect secrecy of messages - based on certain assumptions. However, in practice, deviations between the theoretical model and the physical implementation could be exploited by an attacker to break the security of the system. These deviations may arise from technical limitations and operational imperfections in the physical implementation and/or unrealistic assumptions and insufficient constraints in the theoretical model. In this thesis, we experimentally investigate in depth several such deviations. We demonstrate the resultant vulnerabilities via proof-of-principle attacks on a commercial QKD system from ID Quantique. We also propose countermeasures against the investigated loopholes to secure both existing and future QKD implementations.

  6. Passive Guaranteed Simulation of Analog Audio Circuits: A Port-Hamiltonian Approach

    Directory of Open Access Journals (Sweden)

    Antoine Falaize

    2016-09-01

    Full Text Available We present a method that generates passive-guaranteed stable simulations of analog audio circuits from electronic schematics for real-time issues. On one hand, this method is based on a continuous-time power-balanced state-space representation structured into its energy-storing parts, dissipative parts, and external sources. On the other hand, a numerical scheme is especially designed to preserve this structure and the power balance. These state-space structures define the class of port-Hamiltonian systems. The derivation of this structured system associated with the electronic circuit is achieved by an automated analysis of the interconnection network combined with a dictionary of models for each elementary component. The numerical scheme is based on the combination of finite differences applied on the state (with respect to the time variable and on the total energy (with respect to the state. This combination provides a discrete-time version of the power balance. This set of algorithms is valid for both the linear and nonlinear case. Finally, three applications of increasing complexities are given: a diode clipper, a common-emitter bipolar-junction transistor amplifier, and a wah pedal. The results are compared to offline simulations obtained from a popular circuit simulator.

  7. Time to refine key climate policy models

    Science.gov (United States)

    Barron, Alexander R.

    2018-05-01

    Ambition regarding climate change at the national level is critical but is often calibrated with the projected costs — as estimated by a small suite of energy-economic models. Weaknesses in several key areas in these models will continue to distort policy design unless collectively addressed by a diversity of researchers.

  8. Practical performance of real-time shot-noise measurement in continuous-variable quantum key distribution

    Science.gov (United States)

    Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Zeng, Guihua

    2018-01-01

    In a practical continuous-variable quantum key distribution (CVQKD) system, real-time shot-noise measurement (RTSNM) is an essential procedure for preventing the eavesdropper exploiting the practical security loopholes. However, the performance of this procedure itself is not analyzed under the real-world condition. Therefore, we indicate the RTSNM practical performance and investigate its effects on the CVQKD system. In particular, due to the finite-size effect, the shot-noise measurement at the receiver's side may decrease the precision of parameter estimation and consequently result in a tight security bound. To mitigate that, we optimize the block size for RTSNM under the ensemble size limitation to maximize the secure key rate. Moreover, the effect of finite dynamics of amplitude modulator in this scheme is studied and its mitigation method is also proposed. Our work indicates the practical performance of RTSNM and provides the real secret key rate under it.

  9. 13 CFR 108.820 - Financings in the form of guarantees.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Financings in the form of... VENTURE CAPITAL (âNMVCâ) PROGRAM Financing of Small Businesses by NMVC Companies Structuring Nmvc Company's Financing of Eligible Small Businesses § 108.820 Financings in the form of guarantees. (a) General...

  10. Proposal of a control and quality guarantee program in radiotherapy and radiodiagnosis

    International Nuclear Information System (INIS)

    Tovar Rodas, J.A.

    1998-01-01

    In Guatemala, as regards guarantee and control of quality in the radiotherapy and radiodiagnostic areas, doesn't have until the moment, properly established, an action plan to carry out in systematic form, a program that it satisfies the design requirements and operation in an installation of this nature. However, it is well-known that the techniques that involve the employment of the ionizing radiations are powerful tools for their applications in industry, investigation and medicine; their use should be optimized and the associate risks should be evaluated to prevent them and to limit them. At the moment, the first actions of a guarantee program and quality control are carried out in the radiotherapy area for the intervention of the Secondary Laboratory of Dosimetric Calibration, but the quick growth of this area and the high number of radiodiagnosis facilities that work in the country, they outline the necessity to develop a methodology that solves the problem that is presented by the lack of controls of quality in these practices partly. The present work, presents in first plane the objectives, antecedents, forms of development, available resources and the necessities that are had in each area for the setting in march of the Quality Guarantee Program in Radiotherapy and of the Quality Control Program in Radiodiagnosis

  11. Stability Analysis and H∞ Model Reduction for Switched Discrete-Time Time-Delay Systems

    Directory of Open Access Journals (Sweden)

    Zheng-Fan Liu

    2014-01-01

    Full Text Available This paper is concerned with the problem of exponential stability and H∞ model reduction of a class of switched discrete-time systems with state time-varying delay. Some subsystems can be unstable. Based on the average dwell time technique and Lyapunov-Krasovskii functional (LKF approach, sufficient conditions for exponential stability with H∞ performance of such systems are derived in terms of linear matrix inequalities (LMIs. For the high-order systems, sufficient conditions for the existence of reduced-order model are derived in terms of LMIs. Moreover, the error system is guaranteed to be exponentially stable and an H∞ error performance is guaranteed. Numerical examples are also given to demonstrate the effectiveness and reduced conservatism of the obtained results.

  12. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  13. 13 CFR 120.520 - Purchase of 7(a) loan guarantees.

    Science.gov (United States)

    2010-01-01

    ... condition of the collateral, plans for any type of loan workout or loan restructuring, existing liquidation activities including the sale of loan collateral, or the status of ongoing foreclosure proceedings. The... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Purchase of 7(a) loan guarantees...

  14. Billions at stake in climate finance: four key lessons

    Energy Technology Data Exchange (ETDEWEB)

    Newell, Peter [University of East Anglia (United Kingdom); Roberts, J. Timmons [Brown University (United States); Boyd, Emily [University of Leeds (United Kingdom); Huq, Saleemul

    2009-11-15

    How can we break through the impasse on the road to Copenhagen? As the climate talks stall over the size of emissions cuts and who pays for them, it is increasingly clear that funding will be key to breaking the deadlock. Guaranteeing adequate levels of climate finance will be a deal maker or breaker for the poorest nations as the December summit approaches. But on the brink of a new chapter in climate funding, with unprecedented flows at stake, donor countries need to learn from decades of aid experience – mistakes as well as successes. Failure to do this risks wasting a great opportunity to kickstart low-carbon, climate-resilient development for the world's poor.

  15. Semi-device-independent security of one-way quantum key distribution

    International Nuclear Information System (INIS)

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being ''device-independent.'' Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are noncharacterized, but the dimensionality of the quantum systems used in the protocol is assumed to be bounded. Our security proof relies on the analogies between one-way QKD, dimension witnesses, and random-access codes.

  16. Error-correcting pairs for a public-key cryptosystem

    International Nuclear Information System (INIS)

    Pellikaan, Ruud; Márquez-Corbella, Irene

    2017-01-01

    Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t -bounded decoding algorithms which is achieved in the case the code has a t -error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t -ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t -error correcting pair. (paper)

  17. H 2 guaranteed cost control of discrete linear systems

    Directory of Open Access Journals (Sweden)

    Colmenares W.

    2000-01-01

    Full Text Available This paper presents necessary and sufficient conditions for the existence of a quadratically stabilizing output feedback controller which also assures H 2 guaranteed cost performance on a discrete linear uncertain system where the uncertainty is of the norm bounded type. The conditions are presented as a collection of linear matrix inequalities.The solution, however requires a search over a scalar parameter space.

  18. 78 FR 13999 - Maximum Interest Rates on Guaranteed Farm Loans

    Science.gov (United States)

    2013-03-04

    ..., cost-plus, flat-rate, or market based) to price guaranteed loans, provided the rates do not exceed the... (LIBOR) or the 5-year Treasury note rate, unless the lender uses a formal written risk-based pricing... cost in the form of a lower interest rate than the borrower would otherwise receive. Therefore, the FSA...

  19. 7 CFR 762.129 - Percent of guarantee and maximum loss.

    Science.gov (United States)

    2010-01-01

    ... loss. (a) General. The percent of guarantee will not exceed 90 percent based on the credit risk to the lender and the Agency both before and after the transaction. The Agency will determine the percentage of... PLP lenders will not be less than 80 percent. (d) Maximum loss. The maximum amount the Agency will pay...

  20. Organic Law Of Judicial Guarantees And Constitutional Control

    Directory of Open Access Journals (Sweden)

    Ernesto López Freire

    2013-01-01

    Full Text Available This paper demonstrates the various unconstitutional and fallacies of the Organic Law of Judicial guarantees and Constitutional Control. For that, there will be a comprehensive collation between the mentioned law and the Constitution of the Republic of Ecuador and force. Through this analysis shows a lack of knowledge of Ecuadorian law or legal science by their authors. This study elucidated, inter alia, the inconsistencies in matters relating to the interpretation of constitutional provisions, full compensation, material and integral; challenge administrative acts, judicial unit.

  1. Modeling Message Queueing Services with Reliability Guarantee in Cloud Computing Environment Using Colored Petri Nets

    Directory of Open Access Journals (Sweden)

    Jing Li

    2015-01-01

    Full Text Available Motivated by the need for loosely coupled and asynchronous dissemination of information, message queues are widely used in large-scale application areas. With the advent of virtualization technology, cloud-based message queueing services (CMQSs with distributed computing and storage are widely adopted to improve availability, scalability, and reliability; however, a critical issue is its performance and the quality of service (QoS. While numerous approaches evaluating system performance are available, there is no modeling approach for estimating and analyzing the performance of CMQSs. In this paper, we employ both the analytical and simulation modeling to address the performance of CMQSs with reliability guarantee. We present a visibility-based modeling approach (VMA for simulation model using colored Petri nets (CPN. Our model incorporates the important features of message queueing services in the cloud such as replication, message consistency, resource virtualization, and especially the mechanism named visibility timeout which is adopted in the services to guarantee system reliability. Finally, we evaluate our model through different experiments under varied scenarios to obtain important performance metrics such as total message delivery time, waiting number, and components utilization. Our results reveal considerable insights into resource scheduling and system configuration for service providers to estimate and gain performance optimization.

  2. Using Multiple Paths in NoCs for Guaranteed Resource Allocation and Improved Best Effort Performance in NoCs.

    NARCIS (Netherlands)

    Ovadia, I.; Ha, Y.; Corporaal, H.

    2005-01-01

    Networks-on-Chips (NoCs) provide communication platforms to Systems-on-Chips (SoCs). In NoCs, channels are generally shared between traffic flows, resulting in contention. However, certain flows require delivery guarantees. Differentiated quality-of-service (QoS) is achieved by providing guaranteed

  3. Rapid turns in European renewable energy policy: advocacy and framing of the proposed trading of guarantees of origin

    Energy Technology Data Exchange (ETDEWEB)

    Nilsson, Maans; Nilsson, Lars J.; Ericsson, Karin

    2008-10-15

    The EU has assumed ambitious targets and strategies for the promotion of renewable sources of energy (RES) binding to all its member states. This report sets out to examine the proposed EU-wide policy instrument designed to help achieve the targets on renewable electricity and heat - the trading of Guarantees of Origin (GO). It analyses the fate of the GO trading proposal in the European policy-making machinery during 2007 and 2008. It first discusses its origins, key components and points of contention, and then examines key factors behind the policy development leading first to its development and subsequently to its abandonment in 2008. Addressing these factors, the report explores first the near-term policy-making process before and after the proposal on GO trading was tabled in January 2008, focusing on processes in the European bureaucracy and how they were influenced by different interest groups and member state governments. It then takes a step back and looks at how competing policy frames over time have shaped the GO instrument debate. Results show how a strong internal market frame acted as a primary driving force in the Commission throughout the 2000s to promote the GO trading instrument. The subsequent collapse of the GO trading proposal can be largely attributed to a) the lack of a strong lobby in favour of GO, b) the accumulated experience with and institutionalisation of national RES support policy, and c) growing general political concerns for supply security, innovation and competitiveness. In the end, the fall of the GO trading instrument is indicative of how the underlying political battle line between advocates of the European internal market and guardians of national interests has moved in favour of the latter in recent years. (author). refs

  4. Pricing Rate of Return Guarantees in Regular Premium Unit Linked Insurance

    NARCIS (Netherlands)

    Schrager, D.F.; Pelsser, A.

    2004-01-01

    We derive general pricing formulas for Rate of Return Guarantees in Regular Premium Unit Linked Insurance under stochastic interest rates. Our main contribution focusses on the effect of stochastic interest rates. First, we show the effect of stochastic interest rates can be interpreted as, what is

  5. The Social and Consumer Standards and Guarantees in Ukraine: the Current Structural and Dynamic Characteristics

    Directory of Open Access Journals (Sweden)

    Kolesov Oleksandr S.

    2017-04-01

    Full Text Available The article attempts to generalize the theoretical approaches to the social guarantees and standards as economic categories. The classification of social guarantees is provided. The dynamic parameters for development of the social and consumer standards adopted in Ukraine were considered. An evaluation of the real poverty level under the system of criteria was carried out. The inconsistency of methods for the poverty evaluation adopted by the Ministry of Social Policy of Ukraine and contradiction of its individual indicators has been indicated. The structural characteristics of the population’s income have been determined. The relevance of the existing social guarantees to their real value in today’s economic conditions have been analyzed. Tendencies of falling of the welfare level of population, resulting in a decline in the consumer demand and a narrowing of the domestic market for goods and services, have been identified. The need to take measures to stimulate small businesses, to overcome corruption, and to deregulate the economy has been indicated.

  6. A Work-Demand Analysis Compatible with Preemption-Aware Scheduling for Power-Aware Real-Time Tasks

    Directory of Open Access Journals (Sweden)

    Da-Ren Chen

    2013-01-01

    Full Text Available Due to the importance of slack time utilization for power-aware scheduling algorithms,we propose a work-demand analysis method called parareclamation algorithm (PRA to increase slack time utilization of the existing real-time DVS algorithms. PRA is an online scheduling for power-aware real-time tasks under rate-monotonic (RM policy. It can be implemented and fully compatible with preemption-aware or transition-aware scheduling algorithms without increasing their computational complexities. The key technique of the heuristics method doubles the analytical interval and turns the deferrable workload out the potential slack time. Theoretical proofs show that PRA guarantees the task deadlines in a feasible RM schedule and takes linear time and space complexities. Experimental results indicate that the proposed method combining the preemption-aware methods seamlessly reduces the energy consumption by 14% on average over their original algorithms.

  7. An In-Home Digital Network Architecture for Real-Time and Non-Real-Time Communication

    NARCIS (Netherlands)

    Scholten, Johan; Jansen, P.G.; Hanssen, F.T.Y.; Hattink, Tjalling

    2002-01-01

    This paper describes an in-home digital network architecture that supports both real-time and non-real-time communication. The architecture deploys a distributed token mechanism to schedule communication streams and to offer guaranteed quality-ofservice. Essentially, the token mechanism prevents

  8. A Mirage or a Rural Life Line? Analysing the impact of Mahatma Gandhi Rural Employment Guarantee Act on Women Beneficiaries of Assam

    Directory of Open Access Journals (Sweden)

    Rituparna Bhattacharyya

    2013-05-01

    Full Text Available The National Rural Employment Guarantee Act (NREGA, launched in February 2006 was renamed in October 02, 2009 as the Mahatma Gandhi National Rural Employment Guarantee Act (henceforth, MGNREGA. It is an anti-poverty flagship programme of the Government of India. The key purpose of MGNREGA is to enhance wage employment in the rural areas by providing at least 100 days of guaranteed employment to every household in a financial year.  The MGNREGA implementation status report for the financial year 2012-2013 unfolds that the programme has already provided employment to 44.9 million households across 28 districts and five union territories. Hence, it is becoming increasingly difficult to ignore the impact of MGNREGA on women beneficiaries. A plethora of research argues that MGNREGA, which promotes inclusive growth, is a vehicle of change, a lifeline for rural women. So far, however, there has been very little discussion about the impact of MGNREGA on women beneficiaries of Assam. This research is an attempt to examine the participation of women in MGNREGA, Assam. It critically looks at the issues, problems and challenges confronted by the women while working at MGNREGA. Written from a feminist perspective on gender, poverty and women’s empowerment, the research seeks to address the problems of the women beneficiaries through their lived experiences. For this, we conducted in-depth interviews with the women beneficiaries in the months of August and September, 2009 in four remote areas namely, Burka, Chandrapur, Barbhang and Muguriya, the first two situated in Kamrup, while the third and the fourth in Barpeta districts of Assam, where the programme of MGNREGA is on-going. The findings of the research suggest measures so that the programme can be made more effective in the long run.

  9. Fair Valuation of Guaranteed Contracts : The Interaction Between Assets and Liabilities

    NARCIS (Netherlands)

    Charlier, E.; Kleynen, R.H.M.A.

    2005-01-01

    In this paper we study the investment behavior of an insurance company consisting of policy and equity holders and issuing fair valued guaranteed contracts.Building up on the work of Briys and De Varenne (1997) and De Munnik and Schotman (1994) an intertemporal stochastic asset model and an interest

  10. The Impact of Financial Support System on Technology Innovation: A Case of Technology Guarantee System in Korea

    Directory of Open Access Journals (Sweden)

    Woo-Seok Jang

    2008-04-01

    Full Text Available We analyzed the impact of financial support system on technological innovation of small and medium manufacturing firms in Korea, with a special interest in technology guarantee system. This was done using a sample of 1,014 Korean manufacturing firms of which 43% were venture companies. Our study provides two important conclusions. First, the result of empirical analysis indicates that financial support systems have a significant influence on both product innovation and process innovation of SMEs in Korea. Second, a more important conclusion of this research is that technology guarantee system impacts on product innovation; however not on process innovation. This result implies that technology guarantee system attaches more importance to technological innovations related with product development than to those related with process enhancement.

  11. Roles of Social Movement Organizations for Securing Workers' Safety in Korea: A Case Study of Abolition of the 30-Minute Delivery Guarantee Program in Pizza Delivery Service.

    Science.gov (United States)

    Park, Ji-Eun; Kim, Myoung-Hee

    2016-07-01

    Many restaurants in Korea maintain quick-delivery service programs to satisfy customers. This service allows delivery workers limited time to deliver, which frequently put them in danger. Most of the workers are young, work part-time, and are rarely organized into trade unions. In this article, through a case study of the social movement to abolish the 30-minute delivery guarantee program of pizza companies in Korea, we argue that social movements involving social movement organizations (SMOs) and individual citizens could serve as a means to rectify this problem. We show how the SMOs developed and expanded the movement using a framing perspective and how the general public became involved through social media. Data was collected via online searching. Interview scripts from key players of SMOs and unofficial documents they provided were also reviewed. Three SMOs primarily led the movement, successfully forming a frame that emphasized social responsibility. SMOs also utilized social media to link their standing frame with unmobilized citizens and to expand the movement. We identified contributing factors and limitations of the movement and drew lessons that could be applied to other sectors where workers are in vulnerable positions. © The Author(s) 2016.

  12. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    Science.gov (United States)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  13. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  14. 76 FR 30904 - Rural Utilities Service Telecommunications Loan and Loan Guarantee Program

    Science.gov (United States)

    2011-05-27

    ..., this new approach will give our customers increased flexibility to find and deploy technology that... DEPARTMENT OF AGRICULTURE Rural Utilities Service Rural Utilities Service Telecommunications Loan and Loan Guarantee Program AGENCY: Rural Utilities Service, USDA. ACTION: Notice of elimination of the...

  15. Time and Space: The difference between following time headway and distance headway instructions

    NARCIS (Netherlands)

    Risto, Malte; Martens, Marieke Hendrikje

    2013-01-01

    In order to guarantee safety, drivers are advised to keep large enough headways. However, headway advice is often provided in terms of time headway, without knowing whether this is the right way of presenting the advice. According to a psychophysics theory, attaining a time headway would indeed

  16. Time and space: The difference between following time headway and distance headway instructions

    NARCIS (Netherlands)

    Risto, M.; Martens, M.H.

    2013-01-01

    In order to guarantee safety, drivers are advised to keep large enough headways. However, headway advice is often provided in terms of time headway, without knowing whether this is the right way of presenting the advice. According to a psychophysics theory, attaining a time headway would indeed

  17. Finite-time and fixed-time synchronization analysis of inertial memristive neural networks with time-varying delays.

    Science.gov (United States)

    Wei, Ruoyu; Cao, Jinde; Alsaedi, Ahmed

    2018-02-01

    This paper investigates the finite-time synchronization and fixed-time synchronization problems of inertial memristive neural networks with time-varying delays. By utilizing the Filippov discontinuous theory and Lyapunov stability theory, several sufficient conditions are derived to ensure finite-time synchronization of inertial memristive neural networks. Then, for the purpose of making the setting time independent of initial condition, we consider the fixed-time synchronization. A novel criterion guaranteeing the fixed-time synchronization of inertial memristive neural networks is derived. Finally, three examples are provided to demonstrate the effectiveness of our main results.

  18. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors

    Energy Technology Data Exchange (ETDEWEB)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Russian Federation Academy of Cryptography (Russian Federation)

    2012-05-15

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Three protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.

  19. Achieving Synchronization in Arrays of Coupled Differential Systems with Time-Varying Couplings

    Directory of Open Access Journals (Sweden)

    Xinlei Yi

    2013-01-01

    Full Text Available We study complete synchronization of the complex dynamical networks described by linearly coupled ordinary differential equation systems (LCODEs. Here, the coupling is timevarying in both network structure and reaction dynamics. Inspired by our previous paper (Lu et al. (2007-2008, the extended Hajnal diameter is introduced and used to measure the synchronization in a general differential system. Then we find that the Hajnal diameter of the linear system induced by the time-varying coupling matrix and the largest Lyapunov exponent of the synchronized system play the key roles in synchronization analysis of LCODEs with identity inner coupling matrix. As an application, we obtain a general sufficient condition guaranteeing directed time-varying graph to reach consensus. Example with numerical simulation is provided to show the effectiveness of the theoretical results.

  20. The Belgian deposit guarantee scheme in a European perspective

    OpenAIRE

    Ch. Van Nieuwenhuyze; M. D. Zachary

    2010-01-01

    During the recent financial crisis, the deposit guarantee scheme in Belgium – as in other European countries – played a role in preventing bank runs and restoring confidence : to that end, the intervention ceilings were raised substantially and the scope of the scheme was extended to include certain life insurance policies. Finally, the expansion of the system’s coverage had to be financed by a sharp increase in the contributions from financial institutions. First of all, that measure had a p...

  1. Decentralized guaranteed cost static output feedback vibration control for piezoelectric smart structures

    International Nuclear Information System (INIS)

    Jiang, Jian-ping; Li, Dong-xu

    2010-01-01

    This paper is devoted to the study of the decentralized guaranteed cost static output feedback vibration control for piezoelectric smart structures. A smart panel with collocated piezoelectric actuators and velocity sensors is modeled using a finite element method, and then the size of the model is reduced in the state space using the modal Hankel singular value. The necessary and sufficient conditions of decentralized guaranteed cost static output feedback control for the reduced system have been presented. The decentralized and centralized static output feedback matrices can be obtained from solving two linear matrix inequalities. A comparison between centralized control and decentralized control is performed in order to investigate their effectiveness in suppressing vibration of a smart panel. Numerical results show that when the system is subjected to initial displacement or white noise disturbance, the decentralized and centralized controls are both very effective and the control results are very close

  2. Service Level Agreement for the QoS Guaranteed Mobile IPTV Services over Mobile WiMAX Networks

    OpenAIRE

    Chowdhury, Mostafa Zaman; Trung, Bui Minh; Jang, Yeong Min; Kim, Young-Il; Ryu, Won

    2011-01-01

    While mobile IPTV services are supported through the mobile WiMAX networks, there must need some guaranteed bandwidth for the IPTV services especially if IPTV and non-IPTV services are simultaneously supported by the mobile WiMAX networks. The quality of an IPTV service definitely depends on the allocated bandwidth for that channel. However, due to the high quality IPTV services and to support of huge non-IPTV traffic over mobile WiMAX networks, it is not possible to guarantee the sufficient ...

  3. Design of stability-guaranteed fuzzy logic controller for nuclear steam generators

    International Nuclear Information System (INIS)

    Cho, Byung Hak

    1996-02-01

    rule tables according to given learning parameters. Although the FLC introduced above can guarantee the stability of the control system, the FLC have a structural handicap that the number of rules to be determined goes numerous by adding new input variables. Thus the number of input variables are normally limited by two, or separated rules are developed for the other major variables. This means that the FLC cannot use all of the available information necessary to make the control system robust. In order to overcome these difficulties, a robust fuzzy logic gain scheduler (robust FLGS) is designed based on the synthesis of fuzzy logic inference and H ∞ technique which is one of the most commonly used one in the field of robust control system design. The robust FLGS has a set of robust control gains in a gain pool. The fuzzy inference engine chooses one of the most desirable control gain considering the S/G operatin condition. The robust gains in the gain pool are determined by the time domain H ∞ control technique such that both of the weighted H ∞ norms of the two transfer functions are minimized. One of the transfer functions is from the steam flow disturbance to the mass capacity portion of S/G level, and the other is from the steam flow disturbance to the reverse dynamics of S/G. The robustness of FLGS in the face of S/G parameter variation is checked. The result shows that the robust FLGS with H ∞ control gain is stable as long as the sign of S/G parameter is not changed due to variation. The FLGS rules are automatically generated using a genetic algorithm (GA). The genetic algorithm (GA) gives a set the gain scheduling rules that reflect given performance design specification well. The computer simulation confirms that the proposed controller shows both of guaranteed stability and good performance in terms of small overshoot and fast settling time in spite of S/G parameter variations and steam flow disturbances

  4. Optimal physiological structure of small neurons to guarantee stable information processing

    Science.gov (United States)

    Zeng, S. Y.; Zhang, Z. Z.; Wei, D. Q.; Luo, X. S.; Tang, W. Y.; Zeng, S. W.; Wang, R. F.

    2013-02-01

    Spike is the basic element for neuronal information processing and the spontaneous spiking frequency should be less than 1 Hz for stable information processing. If the neuronal membrane area is small, the frequency of neuronal spontaneous spiking caused by ion channel noise may be high. Therefore, it is important to suppress the deleterious spontaneous spiking of the small neurons. We find by simulation of stochastic neurons with Hodgkin-Huxley-type channels that the leakage system is critical and extremely efficient to suppress the spontaneous spiking and guarantee stable information processing of the small neurons. However, within the physiological limit the potassium system cannot do so. The suppression effect of the leakage system is super-exponential, but that of the potassium system is quasi-linear. With the minor physiological cost and the minimal consumption of metabolic energy, a slightly lower reversal potential and a relatively larger conductance of the leakage system give the optimal physiological structure to suppress the deleterious spontaneous spiking and guarantee stable information processing of small neurons, dendrites and axons.

  5. Proposal for the diagnosis and monitoring of quality, based on key performance indicators, that may lead to generate improvements in the Servicio de Radiologia of Hospital Mexico

    International Nuclear Information System (INIS)

    Brenes Acosta, Carolina; Cortes Barquero, Jorge

    2014-01-01

    Key performance indicators are proposed for the diagnosis, monitoring of quality and to generate improvements in the Servicio de Radiologia of Hospital Mexico. Critical performance key indicators are identified for service improvement. A method for collection of information is proposed of the individual production of medical assistants from Servicio de Radiologia of Hospital Mexico. Waiting times for patients in the ultrasound are measured in the Radiology Service, as indicator of patient experience and level of service. The satisfaction of treating physicians and their perception about the level quality of the service provided are identified with respect to the reports generated by the Departamento de Radiologia of Hospital Mexico. A peer review system is established to measure the clinical performance of the studies. A structured radiological report template is proposed for radiological practice in the Hospital Mexico, to facilitate its reading and guarantee a minimum standard of quality in information [es

  6. Traffic Scheduling in WDM Passive Optical Network with Delay Guarantee

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    WDM passive optical network becomes more favorable as the required bandwidth increases, but currently few media access control algorithms adapted to WDM access network. This paper presented a new scheduling algorithm for bandwidth sharing in WDM passive optical networks, which provides per-flow delay guarantee and supports variable-length packets scheduling. Through theoretical analysis and simulation, the end-to-end delay bound and throughput fairness of the algorithm was demonstrated.

  7. Nuclear power: status, outlook, guarantees of sustainable development

    International Nuclear Information System (INIS)

    Cherkasov, A.S.

    2004-01-01

    Full text: The principal advantages of nuclear power - almost unlimited fuel resources, its high energy capacity, ecological compatibility with a possibility of high wastes concentration - determine the large-scale nuclear power development. The signs of large-scale power - a large rate (dozens of percent) in electricity production, diverse areas (electricity, heat supply, technologies, transport) and media of application (land, ocean, space), extension of number of user countries, diversified power systems (centralized, autonomous), obligatory reproduction and reuse of produced fuel - create various requirements to nuclear power installations of the future. Economic efficiency and competitiveness, safety (of reactors and fuel cycle with waste), proper characteristics of nuclear fuel reproduction, guarantees of nuclear arm's non-proliferation and, particularly, public acceptance are the conditions of such nuclear power development. The up-to-date situation is the following: the 441 nuclear power-generation units with total installed power of 377.36 GW el. (in 31 countries) supply by 1/6 part of the world electric-power consumptions. The 32 units are in stage of the construction. To the present mid-century the level of the nuclear power production, as supposed, must be increased 4-5 times at the following scenario of a regional distribution of nuclear electric powers, GW: USA, Europe and developed countries of Eastern Asia - 1000, FSU-countries - 100 and developing countries - 400

  8. Guaranteeing the implementation of guarantees of origin: Creating a fair mechanism for renewable electricity generation and trade in europe

    International Nuclear Information System (INIS)

    Houwing; Michiel; Vries, Laurens J. de

    2005-01-01

    With the Renewables Directive (2001/77/EC) the EU has obliged its Member States to implement the Guarantees of Origin (GO) policy instrument into their national renewable electricity support schemes. Compared to formerly existing policy instruments as tradable green certificates, GOs can in a Union broad quota obligation scheme, for example, prove to be of major value in arriving at a more transparent and efficient way of trading renewable electricity. This paper gives an overview of the most important hurdles still to be addressed, mainly being double counting issues and policy interactions. When more clarity is given from the Commission in the future and when more EU Member States implement GOs beyond the minimum requirements, international trading of renewable electricity can become truly feasible. (Author)

  9. 7 CFR 1980.443 - Collateral, personal and corporate guarantees and other requirements.

    Science.gov (United States)

    2010-01-01

    ... the concurrence of FmHA or its successor agency under Public Law 103-354. (b) Personal and corporate... 7 Agriculture 14 2010-01-01 2009-01-01 true Collateral, personal and corporate guarantees and... (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM...

  10. Real-Time Robust Adaptive Modeling and Scheduling for an Electronic Commerce Server

    Science.gov (United States)

    Du, Bing; Ruan, Chun

    With the increasing importance and pervasiveness of Internet services, it is becoming a challenge for the proliferation of electronic commerce services to provide performance guarantees under extreme overload. This paper describes a real-time optimization modeling and scheduling approach for performance guarantee of electronic commerce servers. We show that an electronic commerce server may be simulated as a multi-tank system. A robust adaptive server model is subject to unknown additive load disturbances and uncertain model matching. Overload control techniques are based on adaptive admission control to achieve timing guarantees. We evaluate the performance of the model using a complex simulation that is subjected to varying model parameters and massive overload.

  11. A semi-automatic 2D-to-3D video conversion with adaptive key-frame selection

    Science.gov (United States)

    Ju, Kuanyu; Xiong, Hongkai

    2014-11-01

    To compensate the deficit of 3D content, 2D to 3D video conversion (2D-to-3D) has recently attracted more attention from both industrial and academic communities. The semi-automatic 2D-to-3D conversion which estimates corresponding depth of non-key-frames through key-frames is more desirable owing to its advantage of balancing labor cost and 3D effects. The location of key-frames plays a role on quality of depth propagation. This paper proposes a semi-automatic 2D-to-3D scheme with adaptive key-frame selection to keep temporal continuity more reliable and reduce the depth propagation errors caused by occlusion. The potential key-frames would be localized in terms of clustered color variation and motion intensity. The distance of key-frame interval is also taken into account to keep the accumulated propagation errors under control and guarantee minimal user interaction. Once their depth maps are aligned with user interaction, the non-key-frames depth maps would be automatically propagated by shifted bilateral filtering. Considering that depth of objects may change due to the objects motion or camera zoom in/out effect, a bi-directional depth propagation scheme is adopted where a non-key frame is interpolated from two adjacent key frames. The experimental results show that the proposed scheme has better performance than existing 2D-to-3D scheme with fixed key-frame interval.

  12. An adaptation method to improve secret key rates of time-frequency QKD in atmospheric turbulence channels

    Science.gov (United States)

    Sun, Xiaole; Djordjevic, Ivan B.; Neifeld, Mark A.

    2016-03-01

    Free-space optical (FSO) channels can be characterized by random power fluctuations due to atmospheric turbulence, which is known as scintillation. Weak coherent source based FSO quantum key distribution (QKD) systems suffer from the scintillation effect because during the deep channel fading the expected detection rate drops, which then gives an eavesdropper opportunity to get additional information about protocol by performing photon number splitting (PNS) attack and blocking single-photon pulses without changing QBER. To overcome this problem, in this paper, we study a large-alphabet QKD protocol, which is achieved by using pulse-position modulation (PPM)-like approach that utilizes the time-frequency uncertainty relation of the weak coherent photon state, called here TF-PPM-QKD protocol. We first complete finite size analysis for TF-PPM-QKD protocol to give practical bounds against non-negligible statistical fluctuation due to finite resources in practical implementations. The impact of scintillation under strong atmospheric turbulence regime is studied then. To overcome the secure key rate performance degradation of TF-PPM-QKD caused by scintillation, we propose an adaptation method for compensating the scintillation impact. By changing source intensity according to the channel state information (CSI), obtained by classical channel, the adaptation method improves the performance of QKD system with respect to the secret key rate. The CSI of a time-varying channel can be predicted using stochastic models, such as autoregressive (AR) models. Based on the channel state predictions, we change the source intensity to the optimal value to achieve a higher secret key rate. We demonstrate that the improvement of the adaptation method is dependent on the prediction accuracy.

  13. Compositional Synthesis of Controllers from Scenario-Based Assume-Guarantee Specifications

    DEFF Research Database (Denmark)

    Greenyer, Joel; Kindler, Ekkart

    2013-01-01

    Modern software-intensive systems often consist of multiple components that interact to fulfill complex functions in sometimes safety-critical situations. During the design, it is crucial to specify the system's requirements formally and to detect inconsistencies as early as possible in order to ...... present, in this paper, a novel assume-guarantee-style compositional synthesis technique for MSD specifications. We provide evaluation results underlining the benefit of our approach and formally justify its correctness....

  14. A general framework for performance guaranteed green data center networking

    OpenAIRE

    Wang, Ting; Xia, Yu; Muppala, Jogesh; Hamdi, Mounir; Foufou, Sebti

    2014-01-01

    From the perspective of resource allocation and routing, this paper aims to save as much energy as possible in data center networks. We present a general framework, based on the blocking island paradigm, to try to maximize the network power conservation and minimize sacrifices of network performance and reliability. The bandwidth allocation mechanism together with power-aware routing algorithm achieve a bandwidth guaranteed tighter network. Besides, our fast efficient heuristics for allocatin...

  15. 13 CFR 107.1600 - SBA authority to issue and guarantee Trust Certificates.

    Science.gov (United States)

    2010-01-01

    ... ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees (Leverage) Funding... guarantee by SBA of such TC is limited to the principal and interest due on the Debentures or the Redemption... to arrange public or private fundings of Leverage. SBA in its discretion may arrange for public or...

  16. 24 CFR 573.5 - Underwriting standards and availability of loan guarantee assistance.

    Science.gov (United States)

    2010-04-01

    ... acceptable financial risk under HUD's generally applicable loan underwriting standards based on the following: (1) The Borrower's ability to pay debt service; and (2) The value of the collateral assigned or... insufficient to make the guarantee an acceptable financial risk, or if the proposed interest rates or fees are...

  17. FORMATION OF THE FINANCIAL BASIS FOR GOVERNMENT GUARANTEES OF HEALTH CARE IN RUSSIA

    Directory of Open Access Journals (Sweden)

    E. V. Sinicyna

    2014-01-01

    Full Text Available Organization of the health system of theRussian Federationin the conditions of limited fi nancial resources needed to develop and implement new methods and management mechanisms. Conducted a study in the article allowed to formulate the basic problems of development management of medical organizations and off er possible solutions through the formation of the fi nancial basis for government guarantees of health care inRussia. The article deals with the current reform in the Russian budget-insurance model of health care fi nancing, reveals the content and direction of the program of state guarantees of medical care in the new fi nancing mechanism of public services. Development and implementation of a new funding system in the management of medical organization will help to reduce costs, improve staff effi ciency, improve the quality of public health services.

  18. Fire fighting. Measures to guarantee the safety of the radioactive installations

    International Nuclear Information System (INIS)

    Orta Aguilera, R.

    1993-01-01

    The work relates the incidence of the aspects related to the fire prevention and fighting as well as the activities of rescue and saving in the radioactive facilities, with the objective of guaranteeing a strict safety regime of all installations along the country so as to reduce to the minimum the risk for the personnel, the population and the environment

  19. Plan 2008. Costs starting in 2010 for the radioactive residual products from nuclear power. Basis for fees and guarantees in 2010 and 2011

    International Nuclear Information System (INIS)

    2008-12-01

    calculations. The quantity of spent nuclear fuel and radioactive waste to be disposed of is l inked to the operating time of the reactors, and this fee-determining operating time is stipulated in the regulatory framework. The fee calculation is then based on the electricity production that is expected during the same time. The fee-determining operating time should be 40 years for the reactors that are currently in operation. A minimum limit is stipulated entailing that a remaining operating time of at least six years shall be applied unless there is reason to assume that operation may cease before then. Aside from the payment of fees, a reactor owner must pledge two kinds of guarantees. One guarantee must cover the fees that have not yet been paid and that relate to the remaining fee-determining operating time. This guarantee declines gradually as the reactor's operating time approaches 34 years but then levels out at a minimum time of six years as described above. The basis for this guarantee is called the financing amount. The calculation is done in principle as for the fee basis, but the costs are limited to management and disposal of the waste products that exist when the calculation starts (31 December 2009). The second guarantee pertains to the case where it can be assumed that the assets in the Nuclear Waste Fund will not suffice due to unplanned events, at the same time as the option of increasing the fee payments and adjusting the aforementioned guarantee is for some reason not available. The basis for this guarantee is called the supplementary amount.

  20. An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

    Energy Technology Data Exchange (ETDEWEB)

    Zaher, Ashraf A. [Physics Department, Science College, Kuwait University, P.O. Box 5969, Safat 13060 (Kuwait)], E-mail: ashraf.zaher@ku.edu.kw

    2009-12-15

    In this paper, a secure communication technique, using a chaotic system with a single adjustable parameter and a single observable time series, is proposed. The chosen chaotic system, which is a variant of the famous Rikitake model, has a special structure for which the adjustable parameter appears in the dynamic equation of the observable time series. This particular structure is used to build a synchronization-based state observer that is decoupled from the adaptive parameter identifier. A local Lyapunov function is used to design the parameter identifier, with an adjustable convergence rate that guarantees the stability of the overall system. A two-channel transmission method is used to exemplify the suggested technique where the secret message is encoded using a nonlinear function of both the chaotic states and the adjustable parameter of the chaotic system that acts as a secret key. Simulations show that, at the receiver, the signal can be efficiently retrieved only if the secret key is known, even when both the receiver and the transmitter are in perfect synchronization. The proposed technique is demonstrated to have improved security and privacy against intruders, when compared to other techniques reported in the literature, while being simple to implement using both analog and digital hardware. In addition, the chosen chaotic system is shown to be flexible in accommodating the transmission of signals with variable bandwidths, which promotes the superiority and versatility of the suggested secure communication technique.

  1. An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

    International Nuclear Information System (INIS)

    Zaher, Ashraf A.

    2009-01-01

    In this paper, a secure communication technique, using a chaotic system with a single adjustable parameter and a single observable time series, is proposed. The chosen chaotic system, which is a variant of the famous Rikitake model, has a special structure for which the adjustable parameter appears in the dynamic equation of the observable time series. This particular structure is used to build a synchronization-based state observer that is decoupled from the adaptive parameter identifier. A local Lyapunov function is used to design the parameter identifier, with an adjustable convergence rate that guarantees the stability of the overall system. A two-channel transmission method is used to exemplify the suggested technique where the secret message is encoded using a nonlinear function of both the chaotic states and the adjustable parameter of the chaotic system that acts as a secret key. Simulations show that, at the receiver, the signal can be efficiently retrieved only if the secret key is known, even when both the receiver and the transmitter are in perfect synchronization. The proposed technique is demonstrated to have improved security and privacy against intruders, when compared to other techniques reported in the literature, while being simple to implement using both analog and digital hardware. In addition, the chosen chaotic system is shown to be flexible in accommodating the transmission of signals with variable bandwidths, which promotes the superiority and versatility of the suggested secure communication technique.

  2. Neural Network Based Finite-Time Stabilization for Discrete-Time Markov Jump Nonlinear Systems with Time Delays

    Directory of Open Access Journals (Sweden)

    Fei Chen

    2013-01-01

    Full Text Available This paper deals with the finite-time stabilization problem for discrete-time Markov jump nonlinear systems with time delays and norm-bounded exogenous disturbance. The nonlinearities in different jump modes are parameterized by neural networks. Subsequently, a linear difference inclusion state space representation for a class of neural networks is established. Based on this, sufficient conditions are derived in terms of linear matrix inequalities to guarantee stochastic finite-time boundedness and stochastic finite-time stabilization of the closed-loop system. A numerical example is illustrated to verify the efficiency of the proposed technique.

  3. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  4. Guarantee-bond: main concepts and overview of its application within the bidding process involving inactive areas with marginal accumulations of petroleum and natural gas; Seguro-garantia: conceituacao e panorama de sua aplicacao no processo licitatorio envolvendo areas inativas com acumulacoes marginais

    Energy Technology Data Exchange (ETDEWEB)

    Eduardo, Antonio Sergio; Herrmann, Hildebrando [Universidade ERstadual de Campinas (UNICAMP), SP (Brazil); Ferreira, Doneivan Fernandes [Universidade Federal da Bahia (UFBA), Salvador, BA (Brazil)

    2008-07-01

    The Brazilian Petroleum Agency has been working on the adoption of an efficient financial guarantee system in order to ensure the fulfillment of contractual obligations in upstream-related activities. This process is aimed at: creating incentives for responsible behavior in the industry; attending current demands from society for efficiency and transparency; attending to industries demands for the maintenance of investment flows within the sector; safeguarding the government against financial liabilities caused by irresponsible or insolvent concessionaires; and keeping the sector attractive and competitive for small and medium companies. Within the bidding process for the concession of inactive areas with marginal accumulations, ANP requires two kinds of guarantees: a bidding guarantee, and a PTI guarantee (for obligations under the Initial Work Program-PTI). In both cases, the ANP allows two kinds of financial instruments: 'Seguros-Garantia' and 'Letters of Credit'. According to bidding rules, guarantees must be presented before the bidding process. This instrument ensures that the winner will sign the concession contract. The PTI guarantee ensures performance in a timely fashion. This paper describes and analyzes the instrument 'Seguro-Garantia', its evolution, existing categories, and applicability. (author)

  5. 13 CFR 120.210 - What percentage of a loan may SBA guarantee?

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What percentage of a loan may SBA guarantee? 120.210 Section 120.210 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS... percent, except as otherwise authorized by law. [61 FR 3235, Jan. 31, 1996, as amended at 68 FR 51680, Aug...

  6. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  7. Takagi-Sugeno fuzzy model identification for turbofan aero-engines with guaranteed stability

    Directory of Open Access Journals (Sweden)

    Ruichao LI

    2018-06-01

    Full Text Available This paper is concerned with identifying a Takagi-Sugeno (TS fuzzy model for turbofan aero-engines working under the maximum power status (non-afterburning. To establish the fuzzy system, theoretical contributions are made as follows. First, by fixing antecedent parameters, the estimation of consequent parameters in state-space representations is formulated as minimizing a quadratic cost function. Second, to avoid obtaining unstable identified models, a new theorem is proposed to transform the prior-knowledge of stability into constraints. Then based on the aforementioned work, the identification problem is synthesized as a constrained quadratic optimization. By solving the constrained optimization, a TS fuzzy system is identified with guaranteed stability. Finally, the proposed method is applied to the turbofan aero-engine using simulation data generated from an aerothermodynamics component-level model. Results show the identified fuzzy model achieves a high fitting accuracy while stabilities of the overall fuzzy system and all its local models are also guaranteed. Keywords: Constrained optimization, Fuzzy system, Stability, System identification, Turbofan engine

  8. ADMIT: a toolbox for guaranteed model invalidation, estimation and qualitative-quantitative modeling.

    Science.gov (United States)

    Streif, Stefan; Savchenko, Anton; Rumschinski, Philipp; Borchers, Steffen; Findeisen, Rolf

    2012-05-01

    Often competing hypotheses for biochemical networks exist in the form of different mathematical models with unknown parameters. Considering available experimental data, it is then desired to reject model hypotheses that are inconsistent with the data, or to estimate the unknown parameters. However, these tasks are complicated because experimental data are typically sparse, uncertain, and are frequently only available in form of qualitative if-then observations. ADMIT (Analysis, Design and Model Invalidation Toolbox) is a MatLab(TM)-based tool for guaranteed model invalidation, state and parameter estimation. The toolbox allows the integration of quantitative measurement data, a priori knowledge of parameters and states, and qualitative information on the dynamic or steady-state behavior. A constraint satisfaction problem is automatically generated and algorithms are implemented for solving the desired estimation, invalidation or analysis tasks. The implemented methods built on convex relaxation and optimization and therefore provide guaranteed estimation results and certificates for invalidity. ADMIT, tutorials and illustrative examples are available free of charge for non-commercial use at http://ifatwww.et.uni-magdeburg.de/syst/ADMIT/

  9. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  10. Analysis of Aluminum Resource Supply Structure and Guarantee Degree in China Based on Sustainable Perspective

    Directory of Open Access Journals (Sweden)

    Shaoli Liu

    2016-12-01

    Full Text Available Aluminum is a strategic mineral resource, and China’s aluminum production and consumption is fairly large. However, its supply guarantee is uncertain because of a high dependency on external raw materials. This uncertainty may expand, so finding a way to reduce the uncertainty of aluminum resource supply is especially important. This paper applies the SFA method to analyze the aluminum flows in mainland China from 1996 to 2014, and establishes a supply structure model to measure its supply guarantee degree. The results claim that: (1 China’s aluminum production can satisfy demand and even create a surplus; (2 Domestic self-productive primary and secondary aluminum increased at an annual rate of 12% and 24%; (3 The proportion of self-productive secondary aluminum in the supply structure increased from 7.7% in 1996 to 12.8% in 2014, while that of primary aluminum decreased from 79.6% to 42.8%; (4 The total supply guarantee degree decreased from 87.3% to 55.6% in this period. These results provide a feasible way to solve this plight: the proportion of secondary aluminum in the supply structure should be enhanced, and an efficient aluminum resource recycling system needs to be established as soon as possible to ensure its sustainable supply.

  11. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  12. Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks

    Science.gov (United States)

    Lederer, Christian; Mader, Roland; Koschuch, Manuel; Großschädl, Johann; Szekely, Alexander; Tillich, Stefan

    Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of applications ranging from environmental surveillance over medical monitoring to home automation. Since WSNs are often deployed in unattended or even hostile environments, they can be subject to various malicious attacks, including the manipulation and capture of nodes. The establishment of a shared secret key between two or more individual nodes is one of the most important security services needed to guarantee the proper functioning of a sensor network. Despite some recent advances in this field, the efficient implementation of cryptographic key establishment for WSNs remains a challenge due to the resource constraints of small sensor nodes such as the MICAz mote. In this paper we present a lightweight implementation of the elliptic curve Diffie-Hellman (ECDH) key exchange for ZigBee-compliant sensor nodes equipped with an ATmega128 processor running the TinyOS operating system. Our implementation uses a 192-bit prime field specified by the NIST as underlying algebraic structure and requires only 5.20 ·106 clock cycles to compute a scalar multiplication if the base point is fixed and known a priori. A scalar multiplication using a random base point takes about 12.33 ·106 cycles. Our results show that a full ECDH key exchange between two MICAz motes consumes an energy of 57.33 mJ (including radio communication), which is significantly better than most previously reported ECDH implementations on comparable platforms.

  13. PESTEL Model Analysis and Legal Guarantee of Tourism Environmental Protection in China

    Science.gov (United States)

    Zhiyong, Xian

    2017-08-01

    On the basis of summarizing the general situation of tourism environmental protection in China, this paper analyses the macro factors of tourism environmental protection by using PESTEL model. On this basis, this paper explores the improvement paths of tourism environmental protection based on PESTEL model. Finally, it puts forward the legal guarantee suggestion of tourism environment protection.

  14. Universal algorithm of time sharing

    International Nuclear Information System (INIS)

    Silin, I.N.; Fedyun'kin, E.D.

    1979-01-01

    Timesharing system algorithm is proposed for the wide class of one- and multiprocessor computer configurations. Dynamical priority is the piece constant function of the channel characteristic and system time quantum. The interactive job quantum has variable length. Characteristic recurrent formula is received. The concept of the background job is introduced. Background job loads processor if high priority jobs are inactive. Background quality function is given on the base of the statistical data received in the timesharing process. Algorithm includes optimal trashing off procedure for the jobs replacements in the memory. Sharing of the system time in proportion to the external priorities is guaranteed for the all active enough computing channels (back-ground too). The fast answer is guaranteed for the interactive jobs, which use small time and memory. The external priority control is saved for the high level scheduler. The experience of the algorithm realization on the BESM-6 computer in JINR is discussed

  15. The study of NMR relaxation time spectra multi-exponential inversion based on Lloyd–Max optimal quantization

    International Nuclear Information System (INIS)

    Li, Xuewei; Kong, Li; Cheng, Jingjing; Wu, Lei

    2015-01-01

    The multi-exponential inversion of a NMR relaxation signal plays a key role in core analysis and logging interpretation in the formation of porous media. To find an efficient metod of inverting high-resolution relaxation time spectra rapidly, this paper studies the effect of inversion which is based on the discretization of the original echo in a time domain by using a simulation model. This paper analyzes the ill-condition of discrete equations on the basis of the NMR inversion model and method, determines the appropriate number of discrete echoes and acquires the optimal distribution of discrete echo points by the Lloyd–Max optimal quantization method, in considering the inverse precision and computational complexity comprehensively. The result shows that this method can effectively improve the efficiency of the relaxation time spectra inversion while guaranteeing inversed accuracy. (paper)

  16. [Living wills in a nursing home, guaranteeing freedom of expression].

    Science.gov (United States)

    Marigard Guyader, Céline; Richard, Christian

    The drawing up of a living will in a nursing home for elderly people is a complex process. Not only must the resident think about the end of life, which is not easy, but the institution must be fully aware of the law. Guaranteeing the resident's expression is essential. A study enabled this subject to be reviewed in a nursing home where different players are present around the resident. It enabled professionals to reflect on their practices. Copyright © 2018 Elsevier Masson SAS. All rights reserved.

  17. Design of stability-guaranteed fuzzy logic controller for nuclear steam generators

    International Nuclear Information System (INIS)

    Cho, B.H.; No, H.C.

    1996-01-01

    A fuzzy logic controller (FLC) and a fuzzy logic filter (FLF), which have a special type of fuzzifier, inference engine, and defuzzifier, are applied to the water level control of a nuclear steam generator (S/G). It is shown that arbitrary two-input, single-output linear controllers can be adequately expressed by this FLC. A procedure to construct stability-guaranteed FLC rules is proposed. It contains the following steps: (1) the stable sector of linear feedback gains is obtained from the suboptimal concept based on LQR theory and the Lyapunov's stability criteria; (2) the stable sector of linear gains is mapped into two linear rule tables that are used as limits for the FLC rules; and (3) the construction of an FLC rule table is done by choosing certain rules that lie between these limits. This type of FLC guarantees asymptotic stability of the control system. The FLF generates a feedforward signal of S/G feedwater from the steam flow measurement using a fuzzy concept. Through computer simulation, it is found that the FLC with the FLF works better than a well-tuned PID controller with variable gains to reduce swell/shrink phenomena, especially for the water level deviation and abrupt steam flow disturbances that are typical in the existing power plants

  18. ROMANIAN DEPOSIT GUARANTEE SCHEME AND THE REQUIREMENTS OF THE ACQUIS COMMUNAUTAIRE

    Directory of Open Access Journals (Sweden)

    Cristian Bichi

    2002-12-01

    Full Text Available This paper compares the Romanian and EU deposit insurance legislation in order to identify the changes, which are needed in order to obtain a full compatibility of the national regulations in the field of deposit protection with the corresponding European rules. The first part outlines the main features of the EU Directive 94/19/EEC on deposit guarantee schemes in order to find out to what extent Romania is bound to incorporate the relevant acquis communautaire into its national legislation. It results that the directive contains explicit harmonization provisions as regards the minimum level of protection (EUR 20,000, depositor co-insurance, types of depositors, instruments and currencies to be covered, nature of coverage, status of branches from EU and non-EU countries, the compensation period and information to depositors. The directive does not provide for the harmonization of the financial and administrative structure of the deposit guarantee schemes, Romania being free to choose from a wider range of options. The second part examines the legal environment of deposit protection in Romania. The third part identifies the measures to be taken by the Romanian authorities in order to fill in the remaining regulatory gaps in the area of deposit insurance. Finally, the fourth part contains the conclusions.

  19. Embedded protostars in the dust, ice, and gas in time (DIGIT) Herschel key program

    DEFF Research Database (Denmark)

    Green, Joel D.; Evans II, Neal J.; Jørgensen, Jes Kristian

    2013-01-01

    We present 50-210 um spectral scans of 30 Class 0/I protostellar sources, obtained with Herschel-PACS, and 0.5-1000 um SEDs, as part of the Dust, Ice, and Gas in Time (DIGIT) Key Program. Some sources exhibit up to 75 H2O lines ranging in excitation energy from 100-2000 K, 12 transitions of OH, a...

  20. Corporate Staff Social Rights and Protection as Key Points of Business Entities Social Policy

    Directory of Open Access Journals (Sweden)

    Svetlana V. Titova

    2013-01-01

    Full Text Available The article describes key notions and principles of corporate staff social rights and protection. These notions were considered in terms of business entities social policy. The author thoroughly studied such personnel rights as the right to organize and bargain collectively, freedom of association, payment for personnel labor, child labor, forced labor, duty hours, discrimination, worker safety and health. The author attaches special attention to the types of privileges and guarantees, which business entities should provide to their employees, such as compensation for moral damages caused by labor injury, material assistance to employees and their families in different cases, concerned with labor functions

  1. Model-based Integration of Past & Future in TimeTravel

    DEFF Research Database (Denmark)

    Khalefa, Mohamed E.; Fischer, Ulrike; Pedersen, Torben Bach

    2012-01-01

    We demonstrate TimeTravel, an efficient DBMS system for seamless integrated querying of past and (forecasted) future values of time series, allowing the user to view past and future values as one joint time series. This functionality is important for advanced application domain like energy....... The main idea is to compactly represent time series as models. By using models, the TimeTravel system answers queries approximately on past and future data with error guarantees (absolute error and confidence) one order of magnitude faster than when accessing the time series directly. In addition...... it to answer approximate and exact queries. TimeTravel is implemented into PostgreSQL, thus achieving complete user transparency at the query level. In the demo, we show the easy building of a hierarchical model index for a real-world time series and the effect of varying the error guarantees on the speed up...

  2. Studies on the performance guarantee for the engineered barrier system on geological disposal of high-level radioactive waste. V. 2

    International Nuclear Information System (INIS)

    Sugita, Yutaka; Kurihara, Yuji; Kawakami, Susumu; Jintoku, Takashi; Yui, Mikazu

    2003-05-01

    In order to contribute to the safety standards and guidelines upon which a governmental administration decide, examination for clarifying how to reflect the result obtained by future R and D was performed. From a view point of long-term safety on geological disposal, the items which should guarantee the performance of each element which constitutes disposal institutions (by this report, they are the backfill, the plug, the tunnel, and the pit) were extracted, and it was shown what a performance guarantee is concretely offered about these items. Furthermore, based on H12 report as a situation of present R and D for a method of a performance guarantee, the subjects considered that a future R and D is required were extracted. (author)

  3. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  4. Guarantee of Criminal Policy as Limited to Criminal Decisionism

    Directory of Open Access Journals (Sweden)

    María Belén Bonilla Albán

    2016-06-01

    Full Text Available The essay explains how the inclusion of the security of public policy in the 2008 Constitution of Ecuador as part of the constitutional state of law and justice or “guarantor state” can become a substantial limit for criminal decisionism, which is usually behind the penal policy in Latin America. Thus, the function of this collateral is to eliminate the huge space of discretion in the management of the most sensitive policy of modern state penal policy. However, the guarantee of public policy is not clear in determining the limits of punitive power; therefore, this paper seeks to explore some of the international human rights.

  5. Adaptation of failure scenario based resilience schemes toward availability guarantees

    Science.gov (United States)

    Scheffel, Matthias

    2006-07-01

    Various resilience schemes have been proposed to allow for fault-tolerant transport networks. Their common aim is to survive certain failure patterns such as node or span failures by providing alternative transmission paths. However, network operators guarantee the resulting network reliability in terms of service availability to their business customers. A maximum duration of service disruption per year must not be exceeded. We investigate an optimal design of resilient network configurations that adapts to end-to-end availability requirements. We formulate an integer linear program that minimizes the resource utilization and investigate a case study.

  6. The Minimum Price Guarantee Policy before and after Real Plan

    Directory of Open Access Journals (Sweden)

    Jackelline Favro

    2014-12-01

    Full Text Available This study aims to analyze the performance of the Minimum Price Guarantee Policy - MPGPin Brazil for the main agricultural products, during the 1980s and 1990s, and especially the post-Real Plan period. The research has a bibliographic and descriptive nature. The main results showed that the MPGP remains an important tool for ensuring income to farmers and the supply of selected crops in the analyzed period, but there was a reduction of public action for the new MPGP and new private instruments has revealed efficiency

  7. ADMIT: a toolbox for guaranteed model invalidation, estimation and qualitative–quantitative modeling

    Science.gov (United States)

    Streif, Stefan; Savchenko, Anton; Rumschinski, Philipp; Borchers, Steffen; Findeisen, Rolf

    2012-01-01

    Summary: Often competing hypotheses for biochemical networks exist in the form of different mathematical models with unknown parameters. Considering available experimental data, it is then desired to reject model hypotheses that are inconsistent with the data, or to estimate the unknown parameters. However, these tasks are complicated because experimental data are typically sparse, uncertain, and are frequently only available in form of qualitative if–then observations. ADMIT (Analysis, Design and Model Invalidation Toolbox) is a MatLabTM-based tool for guaranteed model invalidation, state and parameter estimation. The toolbox allows the integration of quantitative measurement data, a priori knowledge of parameters and states, and qualitative information on the dynamic or steady-state behavior. A constraint satisfaction problem is automatically generated and algorithms are implemented for solving the desired estimation, invalidation or analysis tasks. The implemented methods built on convex relaxation and optimization and therefore provide guaranteed estimation results and certificates for invalidity. Availability: ADMIT, tutorials and illustrative examples are available free of charge for non-commercial use at http://ifatwww.et.uni-magdeburg.de/syst/ADMIT/ Contact: stefan.streif@ovgu.de PMID:22451270

  8. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...

  9. Performance Guaranteed Inertia Emulation forDiesel-Wind System Feed Microgrid via ModelReference Control

    Energy Technology Data Exchange (ETDEWEB)

    Melin, Alexander M. [ORNL; Zhang, Yichen [University of Tennessee, Knoxville (UTK), Department of Electrical Engineering and Computer Science; Djouadi, Seddik [University of Tennessee, Knoxville (UTK), Department of Electrical Engineering and Computer Science; Olama, Mohammed M. [ORNL

    2017-04-01

    In this paper, a model reference control based inertia emulation strategy is proposed. Desired inertia can be precisely emulated through this control strategy so that guaranteed performance is ensured. A typical frequency response model with parametrical inertia is set to be the reference model. A measurement at a specific location delivers the information of disturbance acting on the diesel-wind system to the referencemodel. The objective is for the speed of the diesel-wind system to track the reference model. Since active power variation is dominantly governed by mechanical dynamics and modes, only mechanical dynamics and states, i.e., a swing-engine-governor system plus a reduced-order wind turbine generator, are involved in the feedback control design. The controller is implemented in a three-phase diesel-wind system feed microgrid. The results show exact synthetic inertia is emulated, leading to guaranteed performance and safety bounds.

  10. MAC-Level Communication Time Modeling and Analysis for Real-Time WSNs

    Directory of Open Access Journals (Sweden)

    STANGACIU, V.

    2016-02-01

    Full Text Available Low-level communication protocols and their timing behavior are essential to developing wireless sensor networks (WSNs able to provide the support and operating guarantees required by many current real-time applications. Nevertheless, this aspect still remains an issue in the state-of-the-art. In this paper we provide a detailed analysis of a recently proposed MAC-level communication timing model and demonstrate its usability in designing real-time protocols. The results of a large set of measurements are also presented and discussed here, in direct relation to the main time parameters of the analyzed model.

  11. Icelandic Public Pensions: Why time is running out

    Directory of Open Access Journals (Sweden)

    Ólafur Ísleifsson

    2011-12-01

    Full Text Available The aim of this paper is to analyse the Icelandic public sector pension system enjoying a third party guarantee. Defined benefit funds fundamentally differ from defined contribution pension funds without a third party guarantee as is the case with the Icelandic general labour market pension funds. We probe the special nature of the public sector pension funds and make a comparison to the defined contribution pension funds of the general labour market. We explore the financial and economic effects of the third party guarantee of the funds, their investment performance and other relevant factors. We seek an answer to the question why time is running out for the country’s largest pension fund that currently faces the prospect of becoming empty by the year 2022.

  12. Blanket guarantee, deposit insurance, and risk-shifting incentive: evidence from Indonesia

    OpenAIRE

    Kariastanto, Bayu

    2011-01-01

    Indonesia established a deposit insurance system to maintain stability in its banking sector after the abolishment of blanket guarantees in 2005. Since the insurance premiums are fixed and flat, deposit insurance may create an incentive for banks to take more risks and transfer the risks to the deposit insurer. Using an option pricing based model of deposit insurance, we compute the fair deposit insurance premiums for all banks listed on the Indonesian stock exchange. We find evidence that ba...

  13. GRS - Guarantee of results for grid-connected solar photovoltaic systems; GRS - Garantierte Resultate von Solarstromanlagen

    Energy Technology Data Exchange (ETDEWEB)

    Meier, Ch.; Frei, R.

    2001-07-01

    This final report for the Swiss Federal Office of Energy describes the development of a performance guarantee for the power delivered by grid-connected photovoltaic (PV) power plant. This is important for investors, who need to be able to calculate the price of the energy produced by the PV plant. The report examines the results of various case studies and experience gained with GRS contracts developed in different countries including Switzerland, the Netherlands, France and Germany. The problems encountered, which provided feedback for the further development of the contract presented in the report, are discussed. The model contract, which proposes a framework which provides many possible variations and adaptations, is presented in detail. Various problem areas such as guaranteed energy yield, meteorological references, correction methods, failure detection, dispute settlement and many other points are covered.

  14. Real promise or false hope: DOE's title XVII loan Guarantee

    Energy Technology Data Exchange (ETDEWEB)

    Massouh, Jennifer F.; Cannon, George D. Jr.; Logan, Suzanne M.; Schwartz, David L.

    2009-05-15

    While the American Recovery and Reinvestment Act of 2009 expanded the DOE loan guarantee program to include certain ''shovel-ready'' projects, and appropriated $6 billion to cover the credit subsidy cost associated with these projects, it failed to resolve some of the most pressing problems facing the program. Here are some recommendations that may finally get some shovels in the ground. (author)

  15. 7 CFR 1955.12 - Acquisition of property which served as security for a loan guarantee by FmHA or its successor...

    Science.gov (United States)

    2010-01-01

    ... Chattel Property § 1955.12 Acquisition of property which served as security for a loan guarantee by FmHA... 7 Agriculture 14 2010-01-01 2009-01-01 true Acquisition of property which served as security for a loan guarantee by FmHA or its successor agency under Public Law 103-354 or at sale by another...

  16. Supply guarantee initiatives for nuclear fuel materials and services and their compatibility with the market

    International Nuclear Information System (INIS)

    Nagano, Koji

    2009-01-01

    This paper first discusses where and why those ideas for nuclear fuel supply assurance and guarantee mechanisms came out, and attempts to draw a comparison among the proposed schemes and thereby examine possible steps forward. (author)

  17. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  18. Identification of key outcome measures when using the instrumented timed up and go and/or posturography for fall screening.

    Science.gov (United States)

    Sample, Renee Beach; Kinney, Allison L; Jackson, Kurt; Diestelkamp, Wiebke; Bigelow, Kimberly Edginton

    2017-09-01

    The Timed Up and Go (TUG) has been commonly used for fall risk assessment. The instrumented Timed Up and Go (iTUG) adds wearable sensors to capture sub-movements and may be more sensitive. Posturography assessments have also been used for determining fall risk. This study used stepwise logistic regression models to identify key outcome measures for the iTUG and posturography protocols. The effectiveness of the models containing these measures in differentiating fallers from non-fallers were then compared for each: iTUG total time duration only, iTUG, posturography, and combined iTUG and posturography assessments. One hundred and fifty older adults participated in this study. The iTUG measures were calculated utilizing APDM Inc.'s Mobility Lab software. Traditional and non-linear posturography measures were calculated from center of pressure during quiet-standing. The key outcome measures incorporated in the iTUG assessment model (sit-to-stand lean angle and height) resulted in a model sensitivity of 48.1% and max re-scaled R 2 value of 0.19. This was a higher sensitivity, indicating better differentiation, compared to the model only including total time duration (outcome of the traditional TUG), which had a sensitivity of 18.2%. When the key outcome measures of the iTUG and the posturography assessments were combined into a single model, the sensitivity was approximately the same as the iTUG model alone. Overall the findings of this study support that the iTUG demonstrates greater sensitivity than the total time duration, but that carrying out both iTUG and posturography does not greatly improve sensitivity when used as a fall risk screening tool. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Reduced computational cost in the calculation of worst case response time for real time systems

    OpenAIRE

    Urriza, José M.; Schorb, Lucas; Orozco, Javier D.; Cayssials, Ricardo

    2009-01-01

    Modern Real Time Operating Systems require reducing computational costs even though the microprocessors become more powerful each day. It is usual that Real Time Operating Systems for embedded systems have advance features to administrate the resources of the applications that they support. In order to guarantee either the schedulability of the system or the schedulability of a new task in a dynamic Real Time System, it is necessary to know the Worst Case Response Time of the Real Time tasks ...

  20. Field-measured drag area is a key correlate of level cycling time trial performance

    Directory of Open Access Journals (Sweden)

    James E. Peterman

    2015-08-01

    Full Text Available Drag area (Ad is a primary factor determining aerodynamic resistance during level cycling and is therefore a key determinant of level time trial performance. However, Ad has traditionally been difficult to measure. Our purpose was to determine the value of adding field-measured Ad as a correlate of level cycling time trial performance. In the field, 19 male cyclists performed a level (22.1 km time trial. Separately, field-determined Ad and rolling resistance were calculated for subjects along with projected frontal area assessed directly (AP and indirectly (Est AP. Also, a graded exercise test was performed to determine $\\dot {V}{O}_{2}$V̇O2 peak, lactate threshold (LT, and economy. $\\dot {V}{O}_{2}$V̇O2 peak ($\\mathrm{l}~\\min ^{-1}$lmin−1 and power at LT were significantly correlated to power measured during the time trial (r = 0.83 and 0.69, respectively but were not significantly correlated to performance time (r = − 0.42 and −0.45. The correlation with performance time improved significantly (p < 0.05 when these variables were normalized to Ad. Of note, Ad alone was better correlated to performance time (r = 0.85, p < 0.001 than any combination of non-normalized physiological measure. The best correlate with performance time was field-measured power output during the time trial normalized to Ad (r = − 0.92. AP only accounted for 54% of the variability in Ad. Accordingly, the correlation to performance time was significantly lower using power normalized to AP (r = − 0.75 or Est AP (r = − 0.71. In conclusion, unless normalized to Ad, level time trial performance in the field was not highly correlated to common laboratory measures. Furthermore, our field-measured Ad is easy to determine and was the single best predictor of level time trial performance.

  1. The Removal of the Judge as a Guarantee of Fair Criminal Justice

    Directory of Open Access Journals (Sweden)

    Yury V. Derishev

    2016-11-01

    Full Text Available The article is devoted to the institution of the removal of a judge in criminal trial proceedings, which is regarded as the most important guarantees of fair criminal justice. Based on the definition of the nature and content of the mechanism for the removal of a judge, the Authors offer an analysis of the problems of the application of law that accompany its implementation in modern criminal proceedings

  2. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  3. ALIENAÇÃO FIDUCIÁRIA DE IMÓVEL: APORIAS NA CONTRATAÇÃO / FIDUCIARY ASSIGNMENT FOR THE GUARANTEE OF REAL ESTATES: CONTRACTING APORIA

    Directory of Open Access Journals (Sweden)

    Erik Frederico Gramstrup

    2016-04-01

    Full Text Available This article refers to practical problems involving the compliance of the fiduciary assignment for the guarantee of real estate, according to the principles of the social function, good faith and the contractual balance, using the inductive methodology. In addition to the presentation and analysis of recent problems faced by the Brazilian Superior Court of Justice, in particular we have been identified and analyzed problems involving the contracting of the fiduciary assignment for the guarantee of real estate that are still pending Praetorian analysis, aiming for a solution in the Brazilian Law. The study demonstrates that the contract in reference is under constant unbalances, distorting its use and away from the purpose intended by the legislature. To make the technical analysis of this complex contract possible, it was necessary to retake definitions; concept; historical interpretation; legal nature and effects; and the guarantee foreclosure, not only of the fiduciary assignment for the guarantee of real estate, but also about the legal transaction and the trust property.

  4. Oral and public confrontation as guarantee of a democratic constitutional criminal procedure

    Directory of Open Access Journals (Sweden)

    Thiago Miranda Minagé

    2017-10-01

    Full Text Available Understanding the criminal process under the aegis of a Democratic State of Law requires, in addition to a critical re-reading of institutes already consolidated in a specific system model, it is still necessary to abandon them when they have legitimacy. It should be understood that the role to be played by the parties through the contradictory is fundamental and will never be possible without the support of orality and publicity of the acts. In order to control the observance of procedural safeguards, it is necessary to establish the contradictory as true guarantor of procedural guarantees. In order to do so, only the respective guarantees will be effective, when, all and any probative production is developed publicly and orally, through a procedural rite previously established in the law. To this end, the present work begins with an analysis of the inquisitive system and its permanent interference in our current criminal process, proposing an overcoming of the current system, which is the accusatory, in view of its inability to contain inquisitive interference, proposing a new Vision of system as a way of perfecting what was then valid, based on the premise of a change of the unifying principle in order to enhance the oral and publicity of the acts.

  5. An Initial Econometric Consideration of Supply and Demand in the Guaranteed Student Loan Program.

    Science.gov (United States)

    Bayus, Barry; Kendis, Kurt

    1982-01-01

    In this econometric model of the Guaranteed Student Loan Program (GSLP), supply is related to banks' liquidity and yield curves, all lenders' economic costs and returns, and Student Loan Marketing Association activity. GSLP demand is based on loan costs, family debt position, and net student need for financial aid. (RW)

  6. An Analytical Solution for Probabilistic Guarantees of Reservation Based Soft Real--Time Systems

    OpenAIRE

    Palopoli, Luigi; Fontanelli, Daniele; Abeni, Luca; Villalba Frias, Bernardo

    2015-01-01

    We show a methodology for the computation of the probability of deadline miss for a periodic real-time task scheduled by a resource reservation algorithm. We propose a modelling technique for the system that reduces the computation of such a probability to that of the steady state probability of an infinite state Discrete Time Markov Chain with a periodic structure. This structure is exploited to develop an efficient numeric solution where different accuracy/computation time trade-offs can be...

  7. Periodic capacity management under a lead-time performance constraint

    NARCIS (Netherlands)

    Büyükkaramikli, N.C.; Bertrand, J.W.M.; Ooijen, van H.P.G.

    2013-01-01

    In this paper, we study a production system that operates under a lead-time performance constraint which guarantees the completion of an order before a pre-determined lead-time with a certain probability. The demand arrival times and the service requirements for the orders are random. To reduce the

  8. Key Technologies and Applications of Satellite and Sensor Web-coupled Real-time Dynamic Web Geographic Information System

    Directory of Open Access Journals (Sweden)

    CHEN Nengcheng

    2017-10-01

    Full Text Available The geo-spatial information service has failed to reflect the live status of spot and meet the needs of integrated monitoring and real-time information for a long time. To tackle the problems in observation sharing and integrated management of space-borne, air-borne, and ground-based platforms and efficient service of spatio-temporal information, an observation sharing model was proposed. The key technologies in real-time dynamic geographical information system (GIS including maximum spatio-temporal coverage-based optimal layout of earth-observation sensor Web, task-driven and feedback-based control, real-time access of streaming observations, dynamic simulation, warning and decision support were detailed. An real-time dynamic Web geographical information system (WebGIS named GeoSensor and its applications in sensing and management of spatio-temporal information of Yangtze River basin including navigation, flood prevention, and power generation were also introduced.

  9. A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth

    Directory of Open Access Journals (Sweden)

    Yuwen Chen

    2017-01-01

    Full Text Available In a wearable sensor-based deployment, sensors are placed over the patient to monitor their body health parameters. Continuous physiological information monitored by wearable sensors helps doctors have a better diagnostic and a suitable treatment. When doctors want to access the patient’s sensor data remotely via network, the patient will authenticate the identity of the doctor first, and then they will negotiate a key for further communication. Many lightweight schemes have been proposed to enable a mutual authentication and key establishment between the two parties with the help of a gateway node, but most of these schemes cannot enable identity confidentiality. Besides, the shared key is also known by the gateway, which means the patient’s sensor data could be leaked to the gateway. In PriAuth, identities are encrypted to guarantee confidentiality. Additionally, Elliptic Curve Diffie–Hellman (ECDH key exchange protocol has been adopted to ensure the secrecy of the key, avoiding the gateway access to it. Besides, only hash and XOR computations are adopted because of the computability and power constraints of the wearable sensors. The proposed scheme has been validated by BAN logic and AVISPA, and the results show the scheme has been proven as secure.

  10. An Optimal Turkish Private Pension Plan with a Guarantee Feature

    Directory of Open Access Journals (Sweden)

    Ayşegül İşcanog̃lu-Çekiç

    2016-06-01

    Full Text Available The Turkish Private Pension System is an investment system which aims to generate income for future consumption. This is a volunteer system, and the contributions are held in individual portfolios. Therefore, management of the funds is an important issue for both the participants and the insurance company. In this study, we propose an optimal private pension plan with a guarantee feature that is based on Constant Proportion Portfolio Insurance (CPPI. We derive a closed form formula for the optimal strategy with the help of dynamic programming. Moreover, our model is evaluated with numerical examples, and we compare its performance by implementing a sensitivity analysis.

  11. Communication Framework for Tele-rehabilitation Systems with QoS Guarantee

    Directory of Open Access Journals (Sweden)

    Dandanov Nikolay

    2017-01-01

    Full Text Available Nowadays, there is great interest in developing telemedicine technologies. These technologies will provide health care from distance swiftly and lightly, as well as reduce the expenses for activities, such as rehabilitation. Telemedicine applications are possible due to the advances in information technologies and the ever-expanding communication network infrastructure. The network characteristics bandwidth, packet loss, latency, jitter and policies are crucial for the performance of tele-rehabilitation systems. Because in tele-rehabilitation human lives are at stake, guaranteeing the Quality of Service (QoS is important. In this paper, an approach for assuring the QoS for information transmission in tele-rehabilitation systems is proposed.

  12. Design of Networks-on-Chip for Real-Time Multi-Processor Systems-on-Chip

    DEFF Research Database (Denmark)

    Sparsø, Jens

    2012-01-01

    This paper addresses the design of networks-on-chips for use in multi-processor systems-on-chips - the hardware platforms used in embedded systems. These platforms typically have to guarantee real-time properties, and as the network is a shared resource, it has to provide service guarantees...... (bandwidth and/or latency) to different communication flows. The paper reviews some past work in this field and the lessons learned, and the paper discusses ongoing research conducted as part of the project "Time-predictable Multi-Core Architecture for Embedded Systems" (T-CREST), supported by the European...

  13. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Science.gov (United States)

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  14. Erratum to ''Johnson's algorithm : A key to solve optimally or approximately flowshop scheduling problems with unavailability periods'' [International Journal of Production Economics 121 (2009) 81-87

    OpenAIRE

    Rapine , Christophe

    2013-01-01

    International audience; In Allaoui H., Artiba A, ''Johnson's algorithm : A key to solve optimally or approximately flowshop scheduling problems with unavailability periods'' [International Journal of Production Economics 121 (2009)] the authors propose optimality conditions for the Johnson sequence in presence of one unavailability period on the first machine and pretend for a performance guarantee of 2 when several unavailability periods may occur. We establish in this note that these condit...

  15. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  16. First results from the INTEGRAL galactic plane scans

    DEFF Research Database (Denmark)

    Winkler, C.; Gehrels, N.; Schonfelder, V.

    2003-01-01

    Scans of the Galactic plane performed at regular intervals constitute a key element of the guaranteed time observations of the INTEGRAL observing programme. These scans are done for two reasons: frequent monitoring of the Galactic plane in order to detect transient sources, and time resolved mapp...... mapping of the Galactic plane in continuum and diffuse line emission. This paper describes first results obtained from the Galactic plane scans executed so far during the early phase (Dec. 2002-May 2003) of the nominal mission.......Scans of the Galactic plane performed at regular intervals constitute a key element of the guaranteed time observations of the INTEGRAL observing programme. These scans are done for two reasons: frequent monitoring of the Galactic plane in order to detect transient sources, and time resolved...

  17. 75 FR 17303 - Section 108 Community Development Loan Guarantee Program: Participation of States as Borrowers...

    Science.gov (United States)

    2010-04-06

    ... with access to long-term (up to 20-year) fixed-rate loans at relatively low interest rates to finance certain categories of eligible CDBG projects. Historically, section 108 guarantee authority has been... local governments in nonentitlement areas. The July 22, 2009, interim rule implemented the expansion of...

  18. Statistical quality analysis of schedulers under soft-real-time constraints

    NARCIS (Netherlands)

    Baarsma, H.E.; Hurink, Johann L.; Jansen, P.G.

    2007-01-01

    This paper describes an algorithm to determine the performance of real-time systems with tasks using stochastic processing times. Such an algorithm can be used for guaranteeing Quality of Service of periodic tasks with soft real-time constraints. We use a discrete distribution model of processing

  19. Hacking the Bell test using classical light in energy-time entanglement-based quantum key distribution.

    Science.gov (United States)

    Jogenfors, Jonathan; Elhassan, Ashraf Mohamed; Ahrens, Johan; Bourennane, Mohamed; Larsson, Jan-Åke

    2015-12-01

    Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.

  20. Limited Preemptive Scheduling in Real-time Systems

    OpenAIRE

    Thekkilakattil, Abhilash

    2016-01-01

    Preemptive and non-preemptive scheduling paradigms typically introduce undesirable side effects when scheduling real-time tasks, mainly in the form of preemption overheads and blocking, that potentially compromise timeliness guarantees. The high preemption overheads in preemptive real-time scheduling may imply high resource utilization, often requiring significant over-provisioning, e.g., pessimistic Worst Case Execution Time (WCET) approximations. Non-preemptive scheduling, on the other hand...

  1. Experimental multiplexing of quantum key distribution with classical optical communication

    International Nuclear Information System (INIS)

    Wang, Liu-Jun; Chen, Luo-Kan; Ju, Lei; Xu, Mu-Lan; Zhao, Yong; Chen, Kai; Chen, Zeng-Bing; Chen, Teng-Yun; Pan, Jian-Wei

    2015-01-01

    We demonstrate the realization of quantum key distribution (QKD) when combined with classical optical communication, and synchronous signals within a single optical fiber. In the experiment, the classical communication sources use Fabry-Pérot (FP) lasers, which are implemented extensively in optical access networks. To perform QKD, multistage band-stop filtering techniques are developed, and a wavelength-division multiplexing scheme is designed for the multi-longitudinal-mode FP lasers. We have managed to maintain sufficient isolation among the quantum channel, the synchronous channel and the classical channels to guarantee good QKD performance. Finally, the quantum bit error rate remains below a level of 2% across the entire practical application range. The proposed multiplexing scheme can ensure low classical light loss, and enables QKD over fiber lengths of up to 45 km simultaneously when the fibers are populated with bidirectional FP laser communications. Our demonstration paves the way for application of QKD to current optical access networks, where FP lasers are widely used by the end users

  2. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Luis Parrilla

    2018-01-01

    Full Text Available Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  3. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks

    Science.gov (United States)

    Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.

    2018-01-01

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921

  4. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.

    Science.gov (United States)

    Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P

    2018-01-16

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  5. 75 FR 5902 - Guarantees for Bonds and Notes Issued for Electrification or Telephone Purposes

    Science.gov (United States)

    2010-02-05

    ... Submission Form,'' must be completed. (If you click on the hyperlink of the docket when the search returns it.... 3. Amend Sec. 1720.3 by adding the definition of ``Eligible Loan'' to read as follows: Sec. 1720.3 Definitions. * * * * * Eligible Loan means a loan that a guaranteed lender extends to a borrower for up to 100...

  6. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    Science.gov (United States)

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  7. Planning virtual infrastructures for time critical applications with multiple deadline constraints

    NARCIS (Netherlands)

    Wang, J.; Taal, A.; Martin, P.; Hu, Y.; Zhou, H.; Pang, J.; de Laat, C.; Zhao, Z.

    2017-01-01

    Executing time critical applications within cloud environments while satisfying execution deadlines and response time requirements is challenging due to the difficulty of securing guaranteed performance from the underlying virtual infrastructure. Cost-effective solutions for hosting such

  8. 7 CFR 1810.1 - Information concerning interest rates, amortization, guarantee fee, annual charge, and fixed period.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Information concerning interest rates, amortization... UTILITIES SERVICE, AND FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE GENERAL REGULATIONS INTEREST RATES, TERMS, CONDITIONS, AND APPROVAL AUTHORITY Interest Rates, Amortization, Guarantee Fee, Annual Charge...

  9. Flexible Scheduling by Deadline Inheritance in Soft Real Time Kernels

    NARCIS (Netherlands)

    Jansen, P.G.; Wygerink, Emiel

    1996-01-01

    Current Hard Real Time (HRT) kernels have their timely behaviour guaranteed on the cost of a rather restrictive use of the available resources. This makes HRT scheduling techniques inadequate for use in Soft Real Time (SRT) environment where we can make a considerable profit by a better and more

  10. Managing high-bandwidth real-time data storage

    Energy Technology Data Exchange (ETDEWEB)

    Bigelow, David D. [Los Alamos National Laboratory; Brandt, Scott A [Los Alamos National Laboratory; Bent, John M [Los Alamos National Laboratory; Chen, Hsing-Bung [Los Alamos National Laboratory

    2009-09-23

    There exist certain systems which generate real-time data at high bandwidth, but do not necessarily require the long-term retention of that data in normal conditions. In some cases, the data may not actually be useful, and in others, there may be too much data to permanently retain in long-term storage whether it is useful or not. However, certain portions of the data may be identified as being vitally important from time to time, and must therefore be retained for further analysis or permanent storage without interrupting the ongoing collection of new data. We have developed a system, Mahanaxar, intended to address this problem. It provides quality of service guarantees for incoming real-time data streams and simultaneous access to already-recorded data on a best-effort basis utilizing any spare bandwidth. It has built in mechanisms for reliability and indexing, can scale upwards to meet increasing bandwidth requirements, and handles both small and large data elements equally well. We will show that a prototype version of this system provides better performance than a flat file (traditional filesystem) based version, particularly with regard to quality of service guarantees and hard real-time requirements.

  11. 75 FR 65615 - Conditional Commitment for a Federal Loan Guarantee for Project Financing for Southwest Intertie...

    Science.gov (United States)

    2010-10-26

    ... DEPARTMENT OF ENERGY Conditional Commitment for a Federal Loan Guarantee for Project Financing for... based on the analysis in the Final Environmental Impact Statement for Project Financing for Southwest... support of debt financing for transmission infrastructure investment projects located in the United States...

  12. Privacy for Key-Trees with Adaptive Adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2011-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen

  13. Anonymity for key-trees with adaptive adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2012-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen

  14. Rate effects on timing, key velocity, and finger kinematics in piano performance.

    Science.gov (United States)

    Bella, Simone Dalla; Palmer, Caroline

    2011-01-01

    We examined the effect of rate on finger kinematics in goal-directed actions of pianists. In addition, we evaluated whether movement kinematics can be treated as an indicator of personal identity. Pianists' finger movements were recorded with a motion capture system while they performed melodies from memory at different rates. Pianists' peak finger heights above the keys preceding keystrokes increased as tempo increased, and were attained about one tone before keypress. These rate effects were not simply due to a strategy to increase key velocity (associated with tone intensity) of the corresponding keystroke. Greater finger heights may compensate via greater tactile feedback for a speed-accuracy tradeoff that underlies the tendency toward larger temporal variability at faster tempi. This would allow pianists to maintain high temporal accuracy when playing at fast rates. In addition, finger velocity and accelerations as pianists' fingers approached keys were sufficiently unique to allow pianists' identification with a neural-network classifier. Classification success was higher in pianists with more extensive musical training. Pianists' movement "signatures" may reflect unique goal-directed movement kinematic patterns, leading to individualistic sound.

  15. Time Shared Optical Network (TSON): a novel metro architecture for flexible multi-granular services.

    Science.gov (United States)

    Zervas, Georgios S; Triay, Joan; Amaya, Norberto; Qin, Yixuan; Cervelló-Pastor, Cristina; Simeonidou, Dimitra

    2011-12-12

    This paper presents the Time Shared Optical Network (TSON) as metro mesh network architecture for guaranteed, statistically-multiplexed services. TSON proposes a flexible and tunable time-wavelength assignment along with one-way tree-based reservation and node architecture. It delivers guaranteed sub-wavelength and multi-granular network services without wavelength conversion, time-slice interchange and optical buffering. Simulation results demonstrate high network utilization, fast service delivery, and low end-to-end delay on a contention-free sub-wavelength optical transport network. In addition, implementation complexity in terms of Layer 2 aggregation, grooming and optical switching has been evaluated. © 2011 Optical Society of America

  16. 48 CFR 1812.7000 - Prohibition on guaranteed customer bases for new commercial space hardware or services.

    Science.gov (United States)

    2010-10-01

    ... customer bases for new commercial space hardware or services. 1812.7000 Section 1812.7000 Federal... PLANNING ACQUISITION OF COMMERCIAL ITEMS Commercial Space Hardware or Services 1812.7000 Prohibition on guaranteed customer bases for new commercial space hardware or services. Public Law 102-139, title III...

  17. Study of relationship between time overrun and productivity on construction sites

    Directory of Open Access Journals (Sweden)

    Ameh, Oko John

    2011-12-01

    Full Text Available The history of the construction industry worldwide is full of projects that were completed with significant time and cost overruns. In an attempt to reverse this trend, this study aims at establishing the relationship between time overrun and labour productivity on construction sites in Lagos, Nigeria. 43 technical and management staff of some medium and large construction firms based in Lagos, Nigeria were sampled and administered a questionnaire survey. The questionnaire contained 18 causes of project time overrun and 14 causes of low labour productivity which had been identified from the literature reviewed. With these a relationship between project time overrun and low labour productivity was established. Both descriptive and inferential statistics were used in analyzing the data. Results indicate that inadequate funds for the project, inadequate planning before project takeoff, inadequate tools and equipment and delay in delivery of material top the list of major causes of time overrun while the use of wrong construction methods, inadequate construction materials and inaccurate drawing/specification are the key factors causing low labour productivity on construction sites. Significant negative relationship was found between time overrun and labour productivity in construction sites in Nigeria. The study concludes by recommending that early appointment of project managers could ensure proper management of both the human and material resources that could guarantee improved productivity and ultimately save projects from time overrun.

  18. Design principles of a resource sharing real-time-system

    International Nuclear Information System (INIS)

    Gliss, B.

    1978-01-01

    Criteria for developing a resource sharing real time system are given. Resource sharing necessitates extra precautions for guaranteeing stable operating conditions. Some relevant measures to insure reliability and maintainability of the system are discussed. (Auth.)

  19. Global Environmental Governance as a Regulatory and Guarantee Criterion for Environmental Justice

    Directory of Open Access Journals (Sweden)

    Denise Schmitt Siqueira Garcia

    2016-12-01

    Full Text Available This article deals with the theme of Global Environmental Governance to the achievement of Environmental Justice, presenting as general objective to analyze the importance of the first in its public, business and civil society spheres for the regulation and guarantee of the second. Noting up at the end that the Environmental Justice, as a common humanitarian problem, presents itself as the main objective of Global Environmental Governance. In the methodology was adopted the inductive method, having been applied the techniques of the referent, category, operational concepts, bibliographical research and file.

  20. 77 FR 21793 - Notice of Proposed Information Collection for Public Comment; Loan Guarantee for Indian Housing

    Science.gov (United States)

    2012-04-11

    ... Number: 2577-0200. Description of the need for the information and proposed use: The information is... service areas. Mortgage lenders approved by HUD provide borrower and lender information to HUD for... Information Collection for Public Comment; Loan Guarantee for Indian Housing AGENCY: Office of the Assistant...

  1. Rate effects on timing, key velocity, and finger kinematics in piano performance.

    Directory of Open Access Journals (Sweden)

    Simone Dalla Bella

    Full Text Available We examined the effect of rate on finger kinematics in goal-directed actions of pianists. In addition, we evaluated whether movement kinematics can be treated as an indicator of personal identity. Pianists' finger movements were recorded with a motion capture system while they performed melodies from memory at different rates. Pianists' peak finger heights above the keys preceding keystrokes increased as tempo increased, and were attained about one tone before keypress. These rate effects were not simply due to a strategy to increase key velocity (associated with tone intensity of the corresponding keystroke. Greater finger heights may compensate via greater tactile feedback for a speed-accuracy tradeoff that underlies the tendency toward larger temporal variability at faster tempi. This would allow pianists to maintain high temporal accuracy when playing at fast rates. In addition, finger velocity and accelerations as pianists' fingers approached keys were sufficiently unique to allow pianists' identification with a neural-network classifier. Classification success was higher in pianists with more extensive musical training. Pianists' movement "signatures" may reflect unique goal-directed movement kinematic patterns, leading to individualistic sound.

  2. National Rural Employment Guarantee Scheme, poverty and prices in rural India.

    Science.gov (United States)

    Gaiha, Raghav; Kulkarni, Vani S; Pandey, Manoj K; Imai, Katsushi S

    2010-01-01

    The objective of this analysis is mainly to construct an intuitive measure of the performance of the National Rural Employment Guarantee Scheme (NREGS) in India. The focus is on divergence between demand and supply at the district level. Some related issues addressed are: (i) whether the gap between demand and supply responds to poverty; and (ii) whether recent hikes in NREGS wages are inflationary. Our analysis confirms responsiveness of the positive gap between demand and supply to poverty. Also, apprehensions expressed about the inflationary potential of recent hikes in NREGS wages have been confirmed. More importantly, higher NREGS wages are likely to undermine self-selection of the poor in it.

  3. Quality Guarantee in the services that the LSCD of Guatemala lends

    International Nuclear Information System (INIS)

    Dieguez Davila, L.

    1998-01-01

    It is of supreme importance that the instruments used in the radiological protection, as well as those used in clinical dosimetry, maintain trazability to primary patterns; this way it is guaranteed that the used magnitudes are reproducible in the secondary laboratories. This premise is important, however, it is indispensable that the laboratories can establish the necessary procedures in writing to make the mensurations that are involved in the calibrations and the other services characteristic of a secondary laboratory. The present work demonstrates as all the lent services in the secondary laboratory of dosimetric calibration of Guatemala are carried out by means of the procedures of quality demanded at international level

  4. Pre-conceptual-schema-based patterns for deriving key performance indicators from strategic objectives

    Directory of Open Access Journals (Sweden)

    Carlos Mario Zapata Jaramillo

    2017-05-01

    Full Text Available Performance measurement is crucial for achieving business success. Moreover, such success is also related to the fulfillment of the organizational strategic objectives. Hence, an adequate determination of relevant performance indicators—or key performance indicators (KPIs—and their relationships to organizational objectives is needed. Even though several approaches for treating KPIs and objective-KPI relationships have been proposed, they exhibit some drawbacks associated with the lack of reusability and traceability. We attempt to fill this gap by proposing a set of patterns based on pre-conceptual schemas for supporting the systematic derivation of KPIs and their relationships to organizational objectives. In this way, the proposed patterns guarantee a reusable and traceable derivation process of a set of candidate KPIs from organizational strategic objectives. Lastly, we provide a lab study in order to illustrate the usefulness of this proposal.

  5. Guaranteed Student Loan Amendments of 1976. Ninety-fourth Congress, Second Session. Report No. 94-1232.

    Science.gov (United States)

    Congress of the U.S., Washington, DC. House.

    A report on the Guaranteed Student Loan Amendments (H.R. 14070) to Title IV of the Higher Education Act of 1965 considers the problems behind and implications of the loan program. Chief among the problems are the default rate, access to loans, the schools as lenders, and the role of the states in administering the program. Changes recommended…

  6. Finite-time stability of neutral-type neural networks with random time-varying delays

    Science.gov (United States)

    Ali, M. Syed; Saravanan, S.; Zhu, Quanxin

    2017-11-01

    This paper is devoted to the finite-time stability analysis of neutral-type neural networks with random time-varying delays. The randomly time-varying delays are characterised by Bernoulli stochastic variable. This result can be extended to analysis and design for neutral-type neural networks with random time-varying delays. On the basis of this paper, we constructed suitable Lyapunov-Krasovskii functional together and established a set of sufficient linear matrix inequalities approach to guarantee the finite-time stability of the system concerned. By employing the Jensen's inequality, free-weighting matrix method and Wirtinger's double integral inequality, the proposed conditions are derived and two numerical examples are addressed for the effectiveness of the developed techniques.

  7. Strategy for introduction of quality guarantee in the supporting infrastructure to nucleoenergetics for a mixed association

    International Nuclear Information System (INIS)

    Jimenez, P.; Fernandez, R.

    1993-01-01

    The work consists in raising and proposing and integral strategy for the assimilation of the quality guarantee by all national enterprises, companies and institutions that participate in the nucleoenergetics program and specially for a mixed association to conclude the construction, starting-up and operation of Juragua nuclear power plants

  8. Discontinuation of approval of modifications in notes, guaranteed under Title VI or VII of the Public Health Service Act, proposed to permit use of the notes as collateral for tax-exempt financings--PHS. Final rule.

    Science.gov (United States)

    1983-09-21

    The Department of Health and Human Services (HHS) adds a new section to regulations for making and guaranteeing loans for construction and modernization of hospitals and medical facilities and to regulations for guaranteeing loans for the construction of teaching facilities for health professions personnel. Under these regulations HHS will not approve the modification of the terms of an existing loan guaranteed under Title VI or Title VII of the Public Health Service (PHS) Act if the modification would permit use of the guarantee (or guaranteed loan) as collateral for tax-exempt financing.

  9. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach

    Directory of Open Access Journals (Sweden)

    Ramon Sanchez-Iborra

    2018-06-01

    Full Text Available Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN, which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa and its layer-two supporter LoRa Wide Area Network (LoRaWAN, which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie–Hellman Over COSE (EDHOC is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  10. European social citizenship and gender: the part-time work directive

    NARCIS (Netherlands)

    Bleijenbergh, I.L.; de Bruijn, J.G.M.; Bussemaker, M.

    2004-01-01

    This article considers whether the development of European rights for workers implies a European social citizenship. It analyses the debate during the preparation and adoption of the EU Directive on part-time work in 1997, which guarantees part-time workers (who are primarily women) the same pay and

  11. Getting more than contractually guaranteed. Five years energy conservation contracting in the clinic Bremerhaven; Mehr bekommen als vertraglich garantiert. Fuenf Jahre Energiespar-Contracting im Klinikum Bremerhaven

    Energy Technology Data Exchange (ETDEWEB)

    Breuer, Juergen [Klinikum Bremerhaven-Reinkenheide (Germany); Habel, Birger; Harneit, Maurice; Kahmann, Lars [Siemens AG, Region Nord (Germany). Building Technologies Div.

    2012-04-15

    Most hospitals in Germany virtually throw their money out the window - for heat that could be produced more efficiently, for air that would not be worked up or for coldness which is produced at the wrong place at the wrong time and with low efficiency. Quite different in the Hospital Bremerhaven-Reinkenheide (Bremerhaven, Federal Republic of Germany): In 2004, the hospital administration decided for energetic modernization of building systems based on energy performance contracting with 25% of guaranteed conservation.

  12. Robust stability analysis of Takagi—Sugeno uncertain stochastic fuzzy recurrent neural networks with mixed time-varying delays

    International Nuclear Information System (INIS)

    Ali, M. Syed

    2011-01-01

    In this paper, the global stability of Takagi—Sugeno (TS) uncertain stochastic fuzzy recurrent neural networks with discrete and distributed time-varying delays (TSUSFRNNs) is considered. A novel LMI-based stability criterion is obtained by using Lyapunov functional theory to guarantee the asymptotic stability of TSUSFRNNs. The proposed stability conditions are demonstrated through numerical examples. Furthermore, the supplementary requirement that the time derivative of time-varying delays must be smaller than one is removed. Comparison results are demonstrated to show that the proposed method is more able to guarantee the widest stability region than the other methods available in the existing literature. (general)

  13. 76 FR 54454 - Issuance of Loan Guarantee to Genesis Solar, LLC, for the Genesis Solar Energy Project

    Science.gov (United States)

    2011-09-01

    ... DEPARTMENT OF ENERGY Issuance of Loan Guarantee to Genesis Solar, LLC, for the Genesis Solar... Energy Project (GSEP), a 250-megawatt (MW) nominal capacity solar power generating facility on.../Final Environmental Impact Statement for the Genesis Solar Energy Project, Riverside County, California...

  14. Stabilisation of discrete-time polynomial fuzzy systems via a polynomial lyapunov approach

    Science.gov (United States)

    Nasiri, Alireza; Nguang, Sing Kiong; Swain, Akshya; Almakhles, Dhafer

    2018-02-01

    This paper deals with the problem of designing a controller for a class of discrete-time nonlinear systems which is represented by discrete-time polynomial fuzzy model. Most of the existing control design methods for discrete-time fuzzy polynomial systems cannot guarantee their Lyapunov function to be a radially unbounded polynomial function, hence the global stability cannot be assured. The proposed control design in this paper guarantees a radially unbounded polynomial Lyapunov functions which ensures global stability. In the proposed design, state feedback structure is considered and non-convexity problem is solved by incorporating an integrator into the controller. Sufficient conditions of stability are derived in terms of polynomial matrix inequalities which are solved via SOSTOOLS in MATLAB. A numerical example is presented to illustrate the effectiveness of the proposed controller.

  15. Basic income guarantee: a review of implications for oral health.

    Science.gov (United States)

    Chen, Yi-An; Quiñonez, Carlos

    2018-12-01

    To: a) Familiarize readers with the concept of a basic income guarantee (BIG) and its different forms; b) Consider how BIG could improve oral health and decrease oral health disparities; c) Motivate readers to advocate for the evaluation of oral health outcomes in BIG experiments. Published articles and book chapters that have analyzed and reviewed data from past BIG pilot projects were examined for their findings on health and socioeconomic outcomes. Our findings suggest various areas and mechanisms whereby BIG can influence oral health-related outcomes, whether through impacts on work, illness and injury, education, a social multiplier effect, expenditure behavior, and/or mental illness and other health outcomes. Our findings illustrate the importance of assessing oral health-related outcomes in future BIG pilot projects. © 2017 American Association of Public Health Dentistry.

  16. Dynamic-Threshold-Limited Timed-Token (DTLTT) Protocol | Kalu ...

    African Journals Online (AJOL)

    An improved version of the Static-Threshold-Limited On-Demand Guaranteed Service Timed-Token (STOGSTT) Media Access Control (MAC) protocol for channel capacity allocation to the asynchronous trac in Multiservice Local Area Network (MLANs) was developed and analyzed. TLODGSTT protocol uses static value of ...

  17. An Asynchronous Time-Division-Multiplexed Network-on-Chip for Real-Time Systems

    DEFF Research Database (Denmark)

    Kasapaki, Evangelia

    is an important part of the T-CREST paltform and used in a number of configurations. The flexible timing organization of Argo combines asynchronous routers with mesochronous NIs, which are connected to individually clocked cores, supporting a GALS system organization. The mesochronous NIs operate at the same......Multi-processor architectures using networks-on-chip (NOCs) for communication are becoming the standard approach in the development of embedded systems and general purpose platforms. Typically, multi-processor platforms follow a globally asynchronous locally synchronous (GALS) timing organization....... This thesis focuses on the design of Argo, a NOC targeted at hard real-time multi-processor platforms with a GALS timing organization. To support real-time communication, NOCs establish end-to-end connections and provide latency and throughput guarantees for these connections. Argo uses time division...

  18. The Guarantee Contract as a Typical Warranty Business in Brazilian Civil Law

    Directory of Open Access Journals (Sweden)

    Fábio Siebeneichler de Andrade

    2016-12-01

    Full Text Available This paper deals with the guarantee contract, which is one of the most important forms of legal assurance business. It is one of the most widely used businesses in Brazilian negotiating practice. In this sense, considering the fact that Brazilian Private Law has gone through a renovation, by virtue of legislation such as the Civil Code of 2002 and the Consumer Protection Code, which welcomed the principle of good faith and social function of the contract, it is necessary to examine this important contract and check if it’s discipline is appropriate to the new contractual principles.

  19. 75 FR 25829 - Notice of Acceptance of Proposals for the Section 538 Multi-Family Housing Guaranteed Rural...

    Science.gov (United States)

    2010-05-10

    ... through the construction and permanent loan financing phases of a project. Those applications that meet... and will be in effect throughout both of the project's construction and permanent financing phases... loans. The Agency can guarantee the ``construction and permanent'' financing phases of a project. The...

  20. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

    2016-11-15

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  1. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2016-01-01

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  2. Major risks and financial guarantees provided by the State in France

    International Nuclear Information System (INIS)

    Brassard, Guy

    2012-01-01

    France's system for indemnifying damage from natural catastrophe is exemplary, whether for floods, storms, or subsidence. However, France is not equipped with the financial capacity to deal with the damage resulting from an exceptional disaster, such as an earthquake on the Mediterranean coast, or a nuclear meltdown. Major catastrophes could be a significant risk to the financial stability of the State today, because the State is in fact the ultimate insurer of its citizens and its institutions. It would be wise to built up reserves in order to enhance the financial resources of the State and to provide a uniform guarantee covering major risks, whatever the cause of the damage may be. (author)

  3. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  4. Using RBF to Enable Circuit Emulation Service over Internet%采用RBF来支撑互联网络上的电路模拟服务

    Institute of Scientific and Technical Information of China (English)

    金涬; 张斌; 赵阳; 王庆波; 陈滢

    2009-01-01

    Circuit Emulation Service(CES)aims to enable packet switched networks to provide guaranteed services with comparable qualities of circuit switched networks.Our paper addresses the key issue of QoS of CES flows over Internet.Enlightened by the time division idea popularly used in circuit switched networks,we propose a time division based control mechanism to provide guaranteed QoS for the constant-rate CES flows.The control mechanism is able to estimate the arrival times of the coming packets in CES flows,and reserve the time slots for them.ACCOrdingly.it enables the packets to consume the reserved time slots of their own,so the CES flows are guaranteed to be processed.Refreshing Bloom Filter(RBF),an efficient data representation structure,is proposed to support the time division control mechanism.It consists of multiple bloom filters,and can efficiently record the arrival time slots of millions of packets.The proposed control system model could be a practical tool to support Circuit Emulation Services over Intemet.

  5. A coherent and effective system to guarantee the quality of a radiotherapy service from the point of view of the unit of hospital radio physics

    International Nuclear Information System (INIS)

    Esposito, R. D.; Planes Meseguer, D.; Dorado Rodriguez, M. P.

    2013-01-01

    The technological advances that have been introduced in modern radiotherapy services involve, on the one hand, an improvement in accuracy of treatments and, on the other hand, the necessity of implementation of an extensive set of controls that guarantee quality in all phases]. A system of consistent quality, detailed and, at the same time, practical is necessary due to the interdisciplinary nature of these services. In this paper we describe the implementation of a system on our service, focusing on the aspects of Radio physics. (Author)

  6. The study of key issues about integration of GNSS and strong-motion records for real-time earthquake monitoring

    Science.gov (United States)

    Tu, Rui; Zhang, Pengfei; Zhang, Rui; Liu, Jinhai

    2016-08-01

    This paper has studied the key issues about integration of GNSS and strong-motion records for real-time earthquake monitoring. The validations show that the consistence of the coordinate system must be considered firstly to exclude the system bias between GNSS and strong-motion. The GNSS sampling rate is suggested about 1-5 Hz, and we should give the strong-motion's baseline shift with a larger dynamic noise as its variation is very swift. The initialization time of solving the baseline shift is less than one minute, and ambiguity resolution strategy is not greatly improved the solution. The data quality is very important for the solution, we advised to use multi-frequency and multi-system observations. These ideas give an important guide for real-time earthquake monitoring and early warning by the tight integration of GNSS and strong-motion records.

  7. LBTool: A stochastic toolkit for leave-based key updates

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Quantitative techniques have been successfully employed in verification of information and communication systems. However, the use of such techniques are still rare in the area of security. In this paper, we present a toolkit that implements transient analysis on a key update method for wireless...... sensor networks. The analysis aims to find out the probability of a network key being compromised at a specific time point, which result in fluctuations over time for a specific key update method called Leave-based key update. For such a problem, the use of current tools is limited in many ways...

  8. Practical quantum key distribution with polarization-entangled photons

    International Nuclear Information System (INIS)

    Poppe, A.; Fedrizzi, A.; Boehm, H.; Ursin, R.; Loruenser, T.; Peev, M.; Maurhardt, O.; Suda, M.; Kurtsiefer, C.; Weinfurter, H.; Jennewein, T.; Zeilinger, A.

    2005-01-01

    Full text: We present an entangled-state quantum cryptography system that operated for the first time in a real-world application scenario. The full key generation protocol was performed in real-time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. A source for polarization-entangled photons delivered about 8200 entangled photon pairs per second. After transmission to the distant receivers, a mean value of 468 pairs per second remained for the generation of a raw key, which showed an average qubit error rate of 6.4 %. The raw key was sifted and subsequently processed by a classical protocol which included error correction and privacy amplification. The final secure key bit rate was about 76 bits per second. The generated quantum key was then handed over and used by a secure communication application. (author)

  9. Basic study on the rectangular numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1997-06-01

    The present study was conducted to examine the optimum inter-key spacing of numeric rectangular keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) participated in the experiment. Each subject performed the data entry task using rectangular keys of touch devices. These keys were arranged in both horizontal and vertical layouts. The sizes of the rectangular keys in both layouts were 12 x 21 mm and 15 x 39 mm, and each of the inter-key spacing of each key was 0, 3, 6, 12 and 21 mm. The response time with inter-key spacing of 3 mm was significantly faster than with the inter-key spacing of 0, 12 and 21 mm (p < 0.05). Keys of vertical position produced faster response time than that of horizontal position. The subjective ratings showed that the inter-key spacing of 6 mm was significantly better than the inter-key spacing of 0, 3, 12 and 21 mm (p < 0.05).

  10. Discrete-Time Sliding-Mode Control of Uncertain Systems with Time-Varying Delays via Descriptor Approach

    Directory of Open Access Journals (Sweden)

    Maode Yan

    2008-01-01

    Full Text Available This paper considers the problem of robust discrete-time sliding-mode control (DT-SMC design for a class of uncertain linear systems with time-varying delays. By applying a descriptor model transformation and Moon's inequality for bounding cross terms, a delay-dependent sufficient condition for the existence of stable sliding surface is given in terms of linear matrix inequalities (LMIs. Based on this existence condition, the synthesized sliding mode controller can guarantee the sliding-mode reaching condition of the specified discrete-time sliding surface for all admissible uncertainties and time-varying delays. An illustrative example verifies the effectiveness of the proposed method.

  11. A QoS-Guaranteed Coverage Precedence Routing Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jiun-Chuan Lin

    2011-03-01

    Full Text Available For mission-critical applications of wireless sensor networks (WSNs involving extensive battlefield surveillance, medical healthcare, etc., it is crucial to have low-power, new protocols, methodologies and structures for transferring data and information in a network with full sensing coverage capability for an extended working period. The upmost mission is to ensure that the network is fully functional providing reliable transmission of the sensed data without the risk of data loss. WSNs have been applied to various types of mission-critical applications. Coverage preservation is one of the most essential functions to guarantee quality of service (QoS in WSNs. However, a tradeoff exists between sensing coverage and network lifetime due to the limited energy supplies of sensor nodes. In this study, we propose a routing protocol to accommodate both energy-balance and coverage-preservation for sensor nodes in WSNs. The energy consumption for radio transmissions and the residual energy over the network are taken into account when the proposed protocol determines an energy-efficient route for a packet. The simulation results demonstrate that the proposed protocol is able to increase the duration of the on-duty network and provide up to 98.3% and 85.7% of extra service time with 100% sensing coverage ratio comparing with LEACH and the LEACH-Coverage-U protocols, respectively.

  12. Lag synchronization of chaotic systems with time-delayed linear

    Indian Academy of Sciences (India)

    In this paper, the lag synchronization of chaotic systems with time-delayed linear terms via impulsive control is investigated. Based on the stability theory of impulsive delayed differential equations, some sufficient conditions are obtained guaranteeing the synchronized behaviours between two delayed chaotic systems.

  13. Dignity, Honor, and Civility: "New York Times v. Sullivan."

    Science.gov (United States)

    Hall, Kermit L.

    1995-01-01

    Maintains that "New York Times v. Sullivan" (1964) was the greatest political libel case ever decided by the Supreme Court. Asserts that it is a monument to the idea that open political discourse is the best guarantee of democratic self-governance. (CFR)

  14. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  15. 75 FR 3197 - Notice of a Public Meeting on Administration of the Business and Industry Guaranteed Loan Program

    Science.gov (United States)

    2010-01-20

    ... DEPARTMENT OF AGRICULTURE Rural Business-Cooperative Service Notice of a Public Meeting on Administration of the Business and Industry Guaranteed Loan Program AGENCY: Rural Business-Cooperative Service, USDA. ACTION: Notice of public meeting. SUMMARY: The Rural Business-Cooperative Service (RBS), an...

  16. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  17. The effect of time synchronization of wireless sensors on the modal analysis of structures

    International Nuclear Information System (INIS)

    Krishnamurthy, V; Sazonov, E; Fowler, K

    2008-01-01

    Driven by the need to reduce the installation cost and maintenance cost of structural health monitoring (SHM) systems, wireless sensor networks (WSNs) are becoming increasingly popular. Perfect time synchronization amongst the wireless sensors is a key factor enabling the use of low-cost, low-power WSNs for structural health monitoring applications based on output-only modal analysis of structures. In this paper we present a theoretical framework for analysis of the impact created by time delays in the measured system response on the reconstruction of mode shapes using the popular frequency domain decomposition (FDD) technique. This methodology directly estimates the change in mode shape values based on sensor synchronicity. We confirm the proposed theoretical model by experimental validation in modal identification experiments performed on an aluminum beam. The experimental validation was performed using a wireless intelligent sensor and actuator network (WISAN) which allows for close time synchronization between sensors (0.6–10 µs in the tested configuration) and guarantees lossless data delivery under normal conditions. The experimental results closely match theoretical predictions and show that even very small delays in output response impact the mode shapes

  18. Differentiated protection services with failure probability guarantee for workflow-based applications

    Science.gov (United States)

    Zhong, Yaoquan; Guo, Wei; Jin, Yaohui; Sun, Weiqiang; Hu, Weisheng

    2010-12-01

    A cost-effective and service-differentiated provisioning strategy is very desirable to service providers so that they can offer users satisfactory services, while optimizing network resource allocation. Providing differentiated protection services to connections for surviving link failure has been extensively studied in recent years. However, the differentiated protection services for workflow-based applications, which consist of many interdependent tasks, have scarcely been studied. This paper investigates the problem of providing differentiated services for workflow-based applications in optical grid. In this paper, we develop three differentiated protection services provisioning strategies which can provide security level guarantee and network-resource optimization for workflow-based applications. The simulation demonstrates that these heuristic algorithms provide protection cost-effectively while satisfying the applications' failure probability requirements.

  19. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  20. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  1. Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay.

    Science.gov (United States)

    Chen, Chuan; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2017-12-01

    This paper is devoted to studying the fixed-time synchronization of memristor-based BAM neural networks (MBAMNNs) with discrete delay. Fixed-time synchronization means that synchronization can be achieved in a fixed time for any initial values of the considered systems. In the light of the double-layer structure of MBAMNNs, we design two similar feedback controllers. Based on Lyapunov stability theories, several criteria are established to guarantee that the drive and response MBAMNNs can realize synchronization in a fixed time. In particular, by changing the parameters of controllers, this fixed time can be adjusted to some desired value in advance, irrespective of the initial values of MBAMNNs. Numerical simulations are included to validate the derived results. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Optimal routing of hazardous substances in time-varying, stochastic transportation networks

    International Nuclear Information System (INIS)

    Woods, A.L.; Miller-Hooks, E.; Mahmassani, H.S.

    1998-07-01

    This report is concerned with the selection of routes in a network along which to transport hazardous substances, taking into consideration several key factors pertaining to the cost of transport and the risk of population exposure in the event of an accident. Furthermore, the fact that travel time and the risk measures are not constant over time is explicitly recognized in the routing decisions. Existing approaches typically assume static conditions, possibly resulting in inefficient route selection and unnecessary risk exposure. The report described the application of recent advances in network analysis methodologies to the problem of routing hazardous substances. Several specific problem formulations are presented, reflecting different degrees of risk aversion on the part of the decision-maker, as well as different possible operational scenarios. All procedures explicitly consider travel times and travel costs (including risk measures) to be stochastic time-varying quantities. The procedures include both exact algorithms, which may require extensive computational effort in some situations, as well as more efficient heuristics that may not guarantee a Pareto-optimal solution. All procedures are systematically illustrated for an example application using the Texas highway network, for both normal and incident condition scenarios. The application illustrates the trade-offs between the information obtained in the solution and computational efficiency, and highlights the benefits of incorporating these procedures in a decision-support system for hazardous substance shipment routing decisions

  3. Real-time distributed scheduling algorithm for supporting QoS over WDM networks

    Science.gov (United States)

    Kam, Anthony C.; Siu, Kai-Yeung

    1998-10-01

    Most existing or proposed WDM networks employ circuit switching, typically with one session having exclusive use of one entire wavelength. Consequently they are not suitable for data applications involving bursty traffic patterns. The MIT AON Consortium has developed an all-optical LAN/MAN testbed which provides time-slotted WDM service and employs fast-tunable transceivers in each optical terminal. In this paper, we explore extensions of this service to achieve fine-grained statistical multiplexing with different virtual circuits time-sharing the wavelengths in a fair manner. In particular, we develop a real-time distributed protocol for best-effort traffic over this time-slotted WDM service with near-optical fairness and throughput characteristics. As an additional design feature, our protocol supports the allocation of guaranteed bandwidths to selected connections. This feature acts as a first step towards supporting integrated services and quality-of-service guarantees over WDM networks. To achieve high throughput, our approach is based on scheduling transmissions, as opposed to collision- based schemes. Our distributed protocol involves one MAN scheduler and several LAN schedulers (one per LAN) in a master-slave arrangement. Because of propagation delays and limits on control channel capacities, all schedulers are designed to work with partial, delayed traffic information. Our distributed protocol is of the `greedy' type to ensure fast execution in real-time in response to dynamic traffic changes. It employs a hybrid form of rate and credit control for resource allocation. We have performed extensive simulations, which show that our protocol allocates resources (transmitters, receivers, wavelengths) fairly with high throughput, and supports bandwidth guarantees.

  4. Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN Key Exchange

    Directory of Open Access Journals (Sweden)

    Kish Laszlo B.

    2016-03-01

    Full Text Available We introduce two new Kirchhoff-law-Johnson-noise (KLJN secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR- KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random Resistor Random Temperature (RRRT- KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at a non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.

  5. Combining loop unrolling strategies and code predication to reduce the worst-case execution time of real-time software

    Directory of Open Access Journals (Sweden)

    Andreu Carminati

    2017-07-01

    Full Text Available Worst-case execution time (WCET is a parameter necessary to guarantee timing constraints on real-time systems. The higher the worst-case execution time of tasks, the higher will be the resource demand for the associated system. The goal of this paper is to propose a different way to perform loop unrolling on data-dependent loops using code predication targeting WCET reduction, because existing techniques only consider loops with fixed execution counts. We also combine our technique with existing unrolling approaches. Results showed that this combination can produce aggressive WCET reductions when compared with the original code.

  6. Study of the Insurance Premium Charged to Borrowers under the Guaranteed Student Loan Program. Report No. 3.

    Science.gov (United States)

    Touche Ross and Co., Washington, DC.

    Insurance premiums being charged to borrowers under the Guaranteed Student Loan (GSL) program were studied to determine if the rate exceeded the rate necessary to protect the reserves of the insurer. Attention was directed to whether historical changes in the GSL program have affected insurance premiums. Guaranty agency's sources and uses of funds…

  7. Study on the Correlation between Gene Expression and Enzyme Activity of Seven Key Enzymes and Ginsenoside Content in Ginseng in Over Time in Ji'an, China.

    Science.gov (United States)

    Yin, Juxin; Zhang, Daihui; Zhuang, Jianjian; Huang, Yi; Mu, Ying; Lv, Shaowu

    2017-12-11

    Panax ginseng is a traditional medicine. Fresh ginseng is one of the most important industries related to ginseng development, and fresh ginseng of varying ages has different medicinal properties. Previous research has not systematically reported the correlation between changes in key enzyme activity with changes in ginsenoside content in fresh ginseng over time. In this study, for the first time, we use ginseng samples of varying ages in Ji'an and systematically reported the changes in the activity of seven key enzymes (HMGR, FPS, SS, SE, DS, CYP450, and GT). We investigated the content of ginsenoside and gene expression of these key enzymes. Ginsenoside content was measured using HPLC. HPLC, GC-MS, and LC-MS were combined to measure the enzyme activity of the key enzymes. Quantitative PCR was used in the investigation of gene expression. By analyzing the correlation between the enzyme activity and the transcription level of the key enzymes with ginsenoside content, we found that DS and GT enzyme activities are significantly correlated with the ginsenoside content in different ages of ginseng. Our findings might provide a new strategy to discriminate between ginseng of different years. Meanwhile, this research provides important information for the in-depth study of ginsenoside biosynthesis.

  8. [The current situation regarding guarantees of legal rights to social welfare and nursing care in Japan: based on an analysis of adjudications spanning the period 1960 to 2005].

    Science.gov (United States)

    Matsuzawa, Akemi; Tamiya, Nanako; Wakino, Koutaro

    2009-06-01

    To clarify whether people who need social care are legally guaranteed a "right to receive nursing-care services" as a living right in Japan. Using the database "Judicial Information System on CD-ROM" and journals which cover judicial precedents, such as "Supreme Court Reports" and "Judicial Reports", we searched for adjudications from 1960 to 2005 with 'living rights' as key words. The complete content of these adjudications was ascertained by reference to the journals. We then assessed whether a "right to receive nursing-care services" was specifically discussed in each of the adjudications by determining how the courts interpreted Article 25 of the Constitution in the verdicts and whether or not there was specific discussion of legal rights in each case. Of 210 adjudications extracted from the database, 23 (11.0%) specifically discussed the right to some sort of social security. No specific reference was made in the remaining 187 decisions (89.0%), and plaintiffs' claims were rejected. Whereas the "right to nursing care" was specifically discussed in no decisions before 1992, it was discussed in 4 decisions (40.0%) from 1993 onwards, resulting in plaintiffs' demands being partly granted. The content of the decisions covered issues that included anxiety about future nursing care, the practice of nursing homes of placing several elderly people in one room, ill-defined standards and low pay for home nursing-care workers, provision of nursing-care services based on the assumption that nursing care would be provided by family members, and self-determination and independence of the severely handicapped. A "right to receive nursing-care services" has not been fully guaranteed in the legal sense. However, such a right, included as a living right, is a primary right with a constitutional basis. Although this right has been specifically discussed in only a minority of adjudications, there has been a recent tendency for more emphasis. Both elderly and handicapped persons

  9. Guidelines for the design of the working rules of the guarantee and quality control in radiotherapy commission

    International Nuclear Information System (INIS)

    Pardo, J.; Galmes, M.A.; Font, J.; Caro, J.; Serra, J.; Mata, F.; Bertan, S.; Biete, A.; Carceller, J.A.; Esco, R.; Palacios, A.; Veiras, C.; Vazquez, M.G.

    2001-01-01

    The 1566/1988 Royal Decree stated on July 17 th , focused on Quality Criteria in Radiation Therapy, was published in the Official Spanish Gazette on August 28 th . Its publication began a self-analysis process in all the Spanish Radiation Oncology Departments due to the fact that it implies the guidelines elaboration of each step of the radiation therapy process, including the patient post-treatment follow up and the equipment quality control. The Royal Decree orders the managers of the hospitals and facilities that have a radiation oncology department to create the Guarantee and Quality Control in Radiotherapy Commission. According to the Spanish law regulations, every single commission must have its own working rules based on the Chapter II, focused in 'Organos Colegiados', of the 30/1992 Law stated on November 27 th about Public Administration Legal Rules. The Guidelines for the design of the Guarantee and Quality Control in Radiotherapy Commission Working Rules here presented, have been done by consensus in Son Dureta University Hospital and afterwards sent to all Radiation Oncology Departments by the Spanish Society for Radiotherapy and Oncology. (author)

  10. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Kizhvatov, Ilya; Manzoor, Kamran

    2016-01-01

    , this algorithm outputs the full combined keys in the optimal order – from more likely to less likely ones. OKEA uses plenty of memory by its nature though, which limits its practical efficiency. Especially in the cases where the side-channel traces are noisy, the memory and running time requirements to find...... the right key can be prohibitively high. To tackle this problem, we propose a score-based key enumeration algorithm (SKEA). Though it is suboptimal in terms of the output order of candidate combined keys, SKEA’s memory and running time requirements are more practical than those of OKEA. We verify...... the advantage at the example of a DPA attack on an 8-bit embedded software implementation of AES-128. We vary the number of traces available to the adversary and report a significant increase in the success rate of the key recovery due to SKEA when compared to OKEA, within practical limitations on time...

  11. Centralized and decentralized global outer-synchronization of asymmetric recurrent time-varying neural network by data-sampling.

    Science.gov (United States)

    Lu, Wenlian; Zheng, Ren; Chen, Tianping

    2016-03-01

    In this paper, we discuss outer-synchronization of the asymmetrically connected recurrent time-varying neural networks. By using both centralized and decentralized discretization data sampling principles, we derive several sufficient conditions based on three vector norms to guarantee that the difference of any two trajectories starting from different initial values of the neural network converges to zero. The lower bounds of the common time intervals between data samples in centralized and decentralized principles are proved to be positive, which guarantees exclusion of Zeno behavior. A numerical example is provided to illustrate the efficiency of the theoretical results. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Time: A Critical Parameter in Satellite Navigation and Positioning ...

    African Journals Online (AJOL)

    The applications of space-borne satellites are increasing in many aspects of human endeavours; the most among them being the provision of guaranteed access to users of precise time and location services. An investigation was therefore carried out through a review process mechanism to determine the orbit parameter ...

  13. Securing quantum key distribution systems using fewer states

    Science.gov (United States)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  14. Diversity and representativeness: two key factors

    CERN Multimedia

    Staff Association

    2013-01-01

    In the past few weeks many of you have filled out the questionnaire for preparing the upcoming Five-yearly review. Similarly, Staff Association members have elected their delegates to the Staff Council for the coming two years. Once again we would like to thank all those who have taken the time and effort to make their voice heard on these two occasions. Elections to the Staff Council Below we publish the new Staff Council with its forty delegates who will represent in 2014 and 2015 all CERN staff in the discussions with Management and Member States in the various bodies and committees. Therefore it is important that the Staff Council represents as far as possible the diversity of the CERN population. By construction, the election process with its electoral colleges and two-step voting procedure guarantees that all Departments, even the small ones, and the various staff categories are correctly represented. Figure 1 shows the participation rate in the elections. The average rate is just above 52 %, with ...

  15. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  16. Project Guarantee 1985. Final repository for high-level radioactive wastes: The system of safety barriers

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    Final disposal of radioactive waste involves preventing the waste from returning from the repository location into the biosphere by means of successively arranged containment measures known as safety barriers. In the present volume NGB 85-04 of the series of reports for Project 'Guarantee' 1985, the safety barrier system for the type C repository for high-level waste is described. The barrier parameters which are relevant for safety analysis are quantified and associated error limits and data scatter are given. The aim of the report is to give a summary documentation of the safety analysis input data and their scientific background. For secure containment of radioactive waste safety barriers are used which effectively limit the release of radioactive material from the repository (release barriers) and effectively retard the entry of the original radioactive material into the biosphere (time barriers). Safety barriers take the form of both technically constructed containment measures and the siting of the repository in suitable geological formations. The technical safety barrier system in the case of high-level waste comprises: the waste solidification matrix (borosilicate glass), massive steel canisters, encasement of the waste canisters, encasement of the waste canisters in highly compacted bentonite, sealing of vacant storage space and access routes on repository closure. The natural geological safety barriers - the host rock and overlying formations provide sufficiently long deep groundwater flow times from the repository location to the earth's surface and for additional lengthening of radionuclide migration times by means of various chemical and physical retardation mechanisms. The stability of the geological formations is so great that hydrogeological system is protected for a sufficient length of time from deterioration caused, in particular, by erosion. Observations in the final section of the report indicate that input data for the type C repository safety

  17. Guaranteed Unresolved Point Source Emission and the Gamma-ray Background

    International Nuclear Information System (INIS)

    Pavlidou, Vasiliki; Siegal-Gaskins, Jennifer M.; Brown, Carolyn; Fields, Brian D.; Olinto, Angela V.

    2007-01-01

    The large majority of EGRET point sources remain without an identified low-energy counterpart, and a large fraction of these sources are most likely extragalactic. Whatever the nature of the extragalactic EGRET unidentified sources, faint unresolved objects of the same class must have a contribution to the diffuse extragalactic gamma-ray background (EGRB). Understanding this component of the EGRB, along with other guaranteed contributions from known sources (blazars and normal galaxies), is essential if we are to use this emission to constrain exotic high-energy physics. Here, we follow an empirical approach to estimate whether the contribution of unresolved unidentified sources to the EGRB is likely to be important. Additionally, we discuss how upcoming GLAST observations of EGRET unidentified sources, their fainter counterparts, and the Galactic and extragalactic diffuse backgrounds, will shed light on the nature of the EGRET unidentified sources even without any positional association of such sources with low-energy counterparts

  18. Automated Assume-Guarantee Reasoning for Omega-Regular Systems and Specifications

    Science.gov (United States)

    Chaki, Sagar; Gurfinkel, Arie

    2010-01-01

    We develop a learning-based automated Assume-Guarantee (AG) reasoning framework for verifying omega-regular properties of concurrent systems. We study the applicability of non-circular (AGNC) and circular (AG-C) AG proof rules in the context of systems with infinite behaviors. In particular, we show that AG-NC is incomplete when assumptions are restricted to strictly infinite behaviors, while AG-C remains complete. We present a general formalization, called LAG, of the learning based automated AG paradigm. We show how existing approaches for automated AG reasoning are special instances of LAG.We develop two learning algorithms for a class of systems, called infinite regular systems, that combine finite and infinite behaviors. We show that for infinity-regular systems, both AG-NC and AG-C are sound and complete. Finally, we show how to instantiate LAG to do automated AG reasoning for infinite regular, and omega-regular, systems using both AG-NC and AG-C as proof rules

  19. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  20. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  1. A reliable and real-time aggregation aware data dissemination in a chain-based wireless sensor network

    NARCIS (Netherlands)

    Taghikhaki, Zahra; Meratnia, Nirvana; Havinga, Paul J.M.

    2012-01-01

    Time-critical applications of Wireless Sensor Networks (WSNs) demand timely data delivery for fast identification of out-of-ordinary situations and fast and reliable delivery of notification and warning messages. Due to the low reliable links in WSNs, achieving real-time guarantees and providing

  2. Stability analysis of linear switching systems with time delays

    International Nuclear Information System (INIS)

    Li Ping; Zhong Shouming; Cui Jinzhong

    2009-01-01

    The issue of stability analysis of linear switching system with discrete and distributed time delays is studied in this paper. An appropriate switching rule is applied to guarantee the stability of the whole switching system. Our results use a Riccati-type Lyapunov functional under a condition on the time delay. So, switching systems with mixed delays are developed. A numerical example is given to illustrate the effectiveness of our results.

  3. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  4. 76 FR 21716 - Record of Decision for Issuance of Loan Guarantees to Solar Partners I, LLC; Solar Partners II...

    Science.gov (United States)

    2011-04-18

    ....37 billion in loan guarantees to support the financing of the ISEGS project. The conditional... operation of this project were analyzed in the Proposed California Desert Conservation Area Plan Amendment... comments, which BLM incorporated. DOE determined that the project analyzed in the Final EIS was...

  5. Using Kalman Filter to Guarantee QoS Robustness of Web Server

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    The exponential growth of the Internet coupled with the increasing popularity of dynamically generated content on the World Wide Web, has created the need for more and faster Web servers capable of serving the over 100 million Internet users. To converge the control method has emerged as a promising technique to solve the Web QoS problem. In this paper, a model of adaptive session is presented and a session flow self-regulating algorism based on Kalman Filter are proposed towards Web Server. And a Web QoS self-regulating scheme is advanced. To attain the goal of on-line system identification, the optimized estimation of QoS parameters is fulfilled by utilizing Kalman Filter in full domain. The simulation results shows that the proposed scheme can guarantee the QoS with both robustness and stability .

  6. [Thermolabile drugs: pharmacist intervention as a guarantee of cold chain maintenance].

    Science.gov (United States)

    Ricote-Lobera, I; Santos-Mena, B; Fraile-Gil, S; Ortiz-Martín, B; Hidalgo-Correas, F J; García-Díaz, B

    2014-05-01

    To determine whether pharmacist is able to guarantee cold chain maintenance of thermolabile drugs during transport using the available information in the reception process and to compare these results with those obtained in a subsequent intervention phase, in which the manufacturing laboratories were contacted. Intervention study, prospective and comparative"before-after". It was analyzed the storage conditions during transport of all thermolabile drugs received in a 400-bed hospital for 3 months, excluding those from clinical trials. The intervention allowed to ensure cold chain maintenance in 76,5% (n = 488) of received drugs, representing an increase of 41,8% (IC 95% 36,7-46,6%; p cold chain maintenance of received thermolabile drugs without temperature monitoring device (64,6%). Reports requested from laboratories allowed to increase significantly that percentage. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  7. The role of health informatics in clinical audit: part of the problem or key to the solution?

    Science.gov (United States)

    Georgiou, Andrew; Pearson, Michael

    2002-05-01

    The concepts of quality assurance (for which clinical audit is an essential part), evaluation and clinical governance each depend on the ability to derive and record measurements that describe clinical performance. Rapid IT developments have raised many new possibilities for managing health care. They have allowed for easier collection and processing of data in greater quantities. These developments have encouraged the growth of quality assurance as a key feature of health care delivery. In the past most of the emphasis has been on hospital information systems designed predominantly for the administration of patients and the management of financial performance. Large, hi-tech information system capacity does not guarantee quality information. The task of producing information that can be confidently used to monitor the quality of clinical care requires attention to key aspects of the design and operation of the audit. The Myocardial Infarction National Audit Project (MINAP) utilizes an IT-based system to collect and process data on large numbers of patients and make them readily available to contributing hospitals. The project shows that IT systems that employ rigorous health informatics methodologies can do much to improve the monitoring and provision of health care.

  8. Compilation time analysis to minimize run-time overhead in preemptive scheduling on multiprocessors

    Science.gov (United States)

    Wauters, Piet; Lauwereins, Rudy; Peperstraete, J.

    1994-10-01

    This paper describes a scheduling method for hard real-time Digital Signal Processing (DSP) applications, implemented on a multi-processor. Due to the very high operating frequencies of DSP applications (typically hundreds of kHz) runtime overhead should be kept as small as possible. Because static scheduling introduces very little run-time overhead it is used as much as possible. Dynamic pre-emption of tasks is allowed if and only if it leads to better performance in spite of the extra run-time overhead. We essentially combine static scheduling with dynamic pre-emption using static priorities. Since we are dealing with hard real-time applications we must be able to guarantee at compile-time that all timing requirements will be satisfied at run-time. We will show that our method performs at least as good as any static scheduling method. It also reduces the total amount of dynamic pre-emptions compared with run time methods like deadline monotonic scheduling.

  9. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  10. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  11. Secure information release in timed automata

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2018-01-01

    . In this paper, we develop a formal approach of information flow for timed automata that allows intentional information leaks. The security of a timed automaton is then defined using a bisimulation relation that takes account of the non-determinism and the clocks of timed automata. Finally, we define...... of security goals for confidentiality and integrity. Notions of security based on Information flow control, such as non-interference, provide strong guarantees that no information is leaked; however, many cyberphysical systems leak intentionally some information in order to achieve their purposes...... an algorithm that traverses a timed automaton and imposes information flow constraints on it and we prove that our algorithm is sound with respect to our security notion....

  12. The inverse method parametric verification of real-time embedded systems

    CERN Document Server

    André , Etienne

    2013-01-01

    This book introduces state-of-the-art verification techniques for real-time embedded systems, based on the inverse method for parametric timed automata. It reviews popular formalisms for the specification and verification of timed concurrent systems and, in particular, timed automata as well as several extensions such as timed automata equipped with stopwatches, linear hybrid automata and affine hybrid automata.The inverse method is introduced, and its benefits for guaranteeing robustness in real-time systems are shown. Then, it is shown how an iteration of the inverse method can solv

  13. Applying WHO's 'workforce indicators of staffing need' (WISN) method to calculate the health worker requirements for India's maternal and child health service guarantees in Orissa State.

    Science.gov (United States)

    Hagopian, Amy; Mohanty, Manmath K; Das, Abhijit; House, Peter J

    2012-01-01

    In one district of Orissa state, we used the World Health Organization's Workforce Indicators of Staffing Need (WISN) method to calculate the number of health workers required to achieve the maternal and child health 'service guarantees' of India's National Rural Health Mission (NRHM). We measured the difference between this ideal number and current staffing levels. We collected census data, routine health information data and government reports to calculate demand for maternal and child health services. By conducting 54 interviews with physicians and midwives, and six focus groups, we were able to calculate the time required to perform necessary health care tasks. We also interviewed 10 new mothers to cross-check these estimates at a global level and get assessments of quality of care. For 18 service centres of Ganjam District, we found 357 health workers in our six cadre categories, to serve a population of 1.02 million. Total demand for the MCH services guaranteed under India's NRHM outpaced supply for every category of health worker but one. To properly serve the study population, the health workforce supply should be enhanced by 43 additional physicians, 15 nurses and 80 nurse midwives. Those numbers probably under-estimate the need, as they assume away geographic barriers. Our study established time standards in minutes for each MCH activity promised by the NRHM, which could be applied elsewhere in India by government planners and civil society advocates. Our calculations indicate significant numbers of new health workers are required to deliver the services promised by the NRHM.

  14. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    Science.gov (United States)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  15. 76 FR 62052 - Issuance of a Loan Guarantee to First Solar, Inc., for the Desert Sunlight Solar Farm Project

    Science.gov (United States)

    2011-10-06

    ... DEPARTMENT OF ENERGY Issuance of a Loan Guarantee to First Solar, Inc., for the Desert Sunlight Solar Farm Project AGENCY: U.S. Department of Energy. ACTION: Record of decision. SUMMARY: The U.S... The proposed DSSFP is a photovoltaic solar electrical generating facility using commercial, thin-film...

  16. Temporal logics and real time expert systems.

    Science.gov (United States)

    Blom, J A

    1996-10-01

    This paper introduces temporal logics. Due to the eternal compromise between expressive adequacy and reasoning efficiency that must decided upon in any application, full (first order logic or modal logic based) temporal logics are frequently not suitable. This is especially true in real time expert systems, where a fixed (and usually small) response time must be guaranteed. One such expert system, Fagan's VM, is reviewed, and a delineation is given of how to formally describe and reason with time in medical protocols. It is shown that Petri net theory is a useful tool to check the correctness of formalised protocols.

  17. Use of an identification system based on biometric data for patients requiring transfusions guarantees transfusion safety and traceability.

    Science.gov (United States)

    Bennardello, Francesco; Fidone, Carmelo; Cabibbo, Sergio; Calabrese, Salvatore; Garozzo, Giovanni; Cassarino, Grazia; Antolino, Agostino; Tavolino, Giuseppe; Zisa, Nuccio; Falla, Cadigia; Drago, Giuseppe; Di Stefano, Giovanna; Bonomo, Pietro

    2009-07-01

    One of the most serious risks of blood transfusions is an error in ABO blood group compatibility, which can cause a haemolytic transfusion reaction and, in the most severe cases, the death of the patient. The frequency and type of errors observed suggest that these are inevitable, in that mistakes are inherent to human nature, unless significant changes, including the use of computerised instruments, are made to procedures. In order to identify patients who are candidates for the transfusion of blood components and to guarantee the traceability of the transfusion, the Securblood system (BBS srl) was introduced. This system records the various stages of the transfusion process, the health care workers involved and any immediate transfusion reactions. The patients and staff are identified by fingerprinting or a bar code. The system was implemented within Ragusa hospital in 16 operative units (ordinary wards, day hospital, operating theatres). In the period from August 2007 to July 2008, 7282 blood components were transfused within the hospital, of which 5606 (77%) using the Securblood system. Overall, 1777 patients were transfused. In this year of experience, no transfusion errors were recorded and each blood component was transfused to the right patient. We recorded 33 blocks of the terminals (involving 0.6% of the transfused blood components) which required the intervention of staff from the Service of Immunohaematology and Transfusion Medicine (SIMT). Most of the blocks were due to procedural errors. The Securblood system guarantees complete traceability of the transfusion process outside the SIMT and eliminates the possibility of mistaken identification of patients or blood components. The use of fingerprinting to identify health care staff (nurses and doctors) and patients obliges the staff to carry out the identification procedures directly in the presence of the patient and guarantees the presence of the doctor at the start of the transfusion.

  18. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  19. A Flattened Hierarchical Scheduler for Real-Time Virtual Machines

    OpenAIRE

    Drescher, Michael Stuart

    2015-01-01

    The recent trend of migrating legacy computer systems to a virtualized, cloud-based environment has expanded to real-time systems. Unfortunately, modern hypervisors have no mechanism in place to guarantee the real-time performance of applications running on virtual machines. Past solutions to this problem rely on either spatial or temporal resource partitioning, both of which under-utilize the processing capacity of the host system. Paravirtualized solutions in which the guest communicates it...

  20. Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems

    DEFF Research Database (Denmark)

    Jørgensen, Bo Nørregaard; Joosen, Wouter

    1998-01-01

    This paper describes some of the issues that we investigate in order to develop distributed object computing middleware for application domains where timely cooperation and coordination between objects are crucial for guaranteeing correct system behavior. In particular, issues on admission contro...

  1. 76 FR 60475 - Issuance of a Loan Guarantee to Tonopah Solar Energy, LLC, for the Crescent Dunes Solar Energy...

    Science.gov (United States)

    2011-09-29

    ... DEPARTMENT OF ENERGY Issuance of a Loan Guarantee to Tonopah Solar Energy, LLC, for the Crescent Dunes Solar Energy Project AGENCY: U.S. Department of Energy. ACTION: Record of decision. SUMMARY: The U... and Reinvestment Act of 2009 (Recovery Act), to Tonopah Solar Energy, LLC (TSE), for construction and...

  2. Interior point algorithms: guaranteed optimality for fluence map optimization in IMRT

    Energy Technology Data Exchange (ETDEWEB)

    Aleman, Dionne M [Department of Mechanical and Industrial Engineering, University of Toronto, 5 King' s College Road, Toronto, ON M5S 3G8 (Canada); Glaser, Daniel [Division of Optimization and Systems Theory, Department of Mathematics, Royal Institute of Technology, Stockholm (Sweden); Romeijn, H Edwin [Department of Industrial and Operations Engineering, University of Michigan, Ann Arbor, MI 48109-2117 (United States); Dempsey, James F, E-mail: aleman@mie.utoronto.c, E-mail: romeijn@umich.ed, E-mail: jfdempsey@viewray.co [ViewRay, Inc. 2 Thermo Fisher Way, Village of Oakwood, OH 44146 (United States)

    2010-09-21

    One of the most widely studied problems of the intensity-modulated radiation therapy (IMRT) treatment planning problem is the fluence map optimization (FMO) problem, the problem of determining the amount of radiation intensity, or fluence, of each beamlet in each beam. For a given set of beams, the fluences of the beamlets can drastically affect the quality of the treatment plan, and thus it is critical to obtain good fluence maps for radiation delivery. Although several approaches have been shown to yield good solutions to the FMO problem, these solutions are not guaranteed to be optimal. This shortcoming can be attributed to either optimization model complexity or properties of the algorithms used to solve the optimization model. We present a convex FMO formulation and an interior point algorithm that yields an optimal treatment plan in seconds, making it a viable option for clinical applications.

  3. Interior point algorithms: guaranteed optimality for fluence map optimization in IMRT

    International Nuclear Information System (INIS)

    Aleman, Dionne M; Glaser, Daniel; Romeijn, H Edwin; Dempsey, James F

    2010-01-01

    One of the most widely studied problems of the intensity-modulated radiation therapy (IMRT) treatment planning problem is the fluence map optimization (FMO) problem, the problem of determining the amount of radiation intensity, or fluence, of each beamlet in each beam. For a given set of beams, the fluences of the beamlets can drastically affect the quality of the treatment plan, and thus it is critical to obtain good fluence maps for radiation delivery. Although several approaches have been shown to yield good solutions to the FMO problem, these solutions are not guaranteed to be optimal. This shortcoming can be attributed to either optimization model complexity or properties of the algorithms used to solve the optimization model. We present a convex FMO formulation and an interior point algorithm that yields an optimal treatment plan in seconds, making it a viable option for clinical applications.

  4. A Practical Approach to Mode Change in Real-Time Systems

    DEFF Research Database (Denmark)

    Søndergaard, Hans; Ravn, Anders P.; Thomsen, Bent

    We present a contract for consistent mode change in a real-time system for control applications. The contract between the control engineer and the software developer guarantees that when a mode change is signalled, it will occur at a specific instant thereafter, and that the task sets for the modes...

  5. A Practical Approach to Mode Change in Real-Time Systems

    DEFF Research Database (Denmark)

    Søndergaard, Hans; Ravn, Anders Peter; Thomsen, Bent

    We present a contract for consistent mode change in a real-time system for control applications. The contract between the control engineer and the software developer guarantees that when a mode change is signalled, it will occur at a specific instant thereafter, and that the task sets for the mod...

  6. 78 FR 20317 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-04-04

    ... supplying information that competitors could use to compete with companies in the United States. DATES... or Financial Guarantee in Excess of $100 Million: AP087223XX and AP087223XA AGENCY: Export-Import...''), that Ex-Im Bank has received an application for final commitment for a long-term loan or financial...

  7. 78 FR 20913 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-04-08

    ... the transaction: To support the export of U.S. manufactured commercial aircraft to China. Brief non... EXPORT-IMPORT BANK [Public Notice 2013-0024] Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100 million: AP087801XX AGENCY: Export-Import Bank of the United...

  8. 78 FR 33090 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-06-03

    ...-haul passenger service from Australia to other countries. To the extent that Ex-Im Bank is reasonably... EXPORT-IMPORT BANK [Public Notice 2013-0030] Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100 Million: AP087980XX AGENCY: Export-Import Bank of the United...

  9. Orthognathic model surgery with LEGO key-spacer.

    Science.gov (United States)

    Tsang, Alfred Chee-Ching; Lee, Alfred Siu Hong; Li, Wai Keung

    2013-12-01

    A new technique of model surgery using LEGO plates as key-spacers is described. This technique requires less time to set up compared with the conventional plaster model method. It also retains the preoperative setup with the same set of models. Movement of the segments can be measured and examined in detail with LEGO key-spacers. Copyright © 2013 American Association of Oral and Maxillofacial Surgeons. Published by Elsevier Inc. All rights reserved.

  10. DNA based random key generation and management for OTP encryption.

    Science.gov (United States)

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  11. THE METHODOLOGICAL APPROACHES TO THE BANK DEPOSITS GUARANTEE PROBLEM SOLVING

    Directory of Open Access Journals (Sweden)

    O.I. Pechonik

    2006-12-01

    Full Text Available In world banking practice it is considered that it is better to solve the problem of one bank, rather than arouse the mass impressment of deposits, generating the effect of spreading the disease onto the other credit institutions. In our conditions the process of spreading was specifically reflected in flowing the financial resources of people out of the commercial banks into Sberbank, that shortened drawn resources of other banks, lowed their financial steadiness. The decision of this problem demands conducting aim-oriented policy on the safe-keeping of funds of individuals and organizations in all commercial banks. In other words, the system of deposits insurance is needed, which is based on the necessary participation of all banks and credit organizations, drawing money resources into deposits. But the legislation we have nowadays does not allow to provide in full measure the demanded guarantees to depositors, to form real mechanism of bank liquidity crisis and mass impressments of financial resources by the depositors prevention in case of negative economic market or bankruptcy.

  12. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  13. [Anatomical key points and operative principle of "two planes and four landmarks" in extralevator abdominoperineal excision].

    Science.gov (United States)

    Ye, Yingjiang; Shen, Zhanlong; Wang, Shan

    2014-11-01

    Abominoperineal resection (APR) is the main approach of lower rectal cancer treatment. Recently, it was found that conventional APR had higher incidence rate of positive circumferential resection margin(CRM) and intraoperative perforation (IOP), which was the crucial reason of local recurrence and worse prognosis. Extralevator abdominoperineal excision(ELAPE) procedure was proposed by European panels including surgeons, radiologist and pathologists, and considered to lower the positive rates of CRM and IOP. Definitive surgical planes and anatomic landmarks are the cores of this procedure, which are the prerequisite for the guarantee of safety and smoothness of surgery. To realize the anatomy of muscles, fascias, blood vessels and nervous of perineal region is the base of carrying out ELAPE procedure. In this paper, we introduce the key anatomy related to ELAPE procedure and summarize the principle of ELAPE procedure as "two planes and four landmarks", which will be beneficial to the popularization and application.

  14. THE LEGAL PROBLEMS OF ESTABLISHING THE ADDITIONAL GUARANTEES OF REALIZATION OF CONSTITUTIONAL HUMAN AND CIVIL RIGHTS AND FREEDOMS BY THE CONSTITUENT ENTITIES OF THE RUSSIAN FEDERATION

    Directory of Open Access Journals (Sweden)

    Alexander Chuklin

    2017-01-01

    Full Text Available The subject. The article focuses on the need to improve legislative and law enforcement activities related to the consolidation of constituent entities of the Russian Federation additional guarantees of realization of constitutional human and civil rights and freedoms.The purpose of the article is to identify main ways of improvement the legal regulation additional guarantees of realization of constitutional human and civil rights and freedoms by the constituent entities of the Russian Federation.The methodology. The author uses a dialectical method, a method of analysis and synthesis, a formal legal method.The results and scope of application. The lack of unity in understanding the essence of additional guarantees of realization of rights and freedoms requires not only theoretical analysis of this legal category, but a consistent system of the legislation, and corresponding to the system of law enforcement practice. The legal establishment of the additional guarantees of realization of constitutional human and civil rights and freedoms, due solely to the will of the legislator of a constituent entitiy of the Russian Federation aimed at the concretization of constitutional rights and freedoms as well as of the security mechanisms (legal conditions, means of the implementation of these rights. Features of development of the corresponding constituent entitiy of the Russian Federation should be taken into account.One of the main directions of improvement of legal regulation in this field is legislative recognition of additional guarantees of realization of constitutional human and civil rights and freedoms established by the constituent entities of the Russian Federation. This concept should be reflected in the Federal law of October 6, 1999 No. 184-FZ "On General principles of organization of legislative (representative and executive bodies of state power of constituent entities of the Russian Federation", as well as in the constitutions (charters

  15. A Router Architecture for Connection-Oriented Service Guarantees in the MANGO Clockless Network-on-Chip

    DEFF Research Database (Denmark)

    Bjerregaard, Tobias; Sparsø, Jens

    2005-01-01

    On-chip networks for future system-on-chip designs need simple, high performance implementations. In order to promote system-level integrity, guaranteed services (GS) need to be provided. We propose a network-on-chip (NoC) router architecture to support this, and demonstrate with a CMOS standard...... cell design. Our implementation is based on clockless circuit techniques, and thus inherently supports a modular, GALS-oriented design flow. Our router exploits virtual channels to provide connection-oriented GS, as well as connection-less best-effort (BE) routing. The architecture is highly flexible...

  16. Agroecology: the key role of arbuscular mycorrhizas in ecosystem services.

    Science.gov (United States)

    Gianinazzi, Silvio; Gollotte, Armelle; Binet, Marie-Noëlle; van Tuinen, Diederik; Redecker, Dirk; Wipf, Daniel

    2010-11-01

    The beneficial effects of arbuscular mycorrhizal (AM) fungi on plant performance and soil health are essential for the sustainable management of agricultural ecosystems. Nevertheless, since the 'first green revolution', less attention has been given to beneficial soil microorganisms in general and to AM fungi in particular. Human society benefits from a multitude of resources and processes from natural and managed ecosystems, to which AM make a crucial contribution. These resources and processes, which are called ecosystem services, include products like food and processes like nutrient transfer. Many people have been under the illusion that these ecosystem services are free, invulnerable and infinitely available; taken for granted as public benefits, they lack a formal market and are traditionally absent from society's balance sheet. In 1997, a team of researchers from the USA, Argentina and the Netherlands put an average price tag of US $33 trillion a year on these fundamental ecosystem services. The present review highlights the key role that the AM symbiosis can play as an ecosystem service provider to guarantee plant productivity and quality in emerging systems of sustainable agriculture. The appropriate management of ecosystem services rendered by AM will impact on natural resource conservation and utilisation with an obvious net gain for human society.

  17. 78 FR 69850 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-11-21

    ..., rail and port facilities in Australia. To the extent that Ex-Im Bank is reasonably aware, the item(s... EXPORT-IMPORT BANK [Public Notice: 2013-0054] Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100 Million: AP086750XX AGENCY: Export-Import Bank of the...

  18. Real-time Testing of Operating Systems on Raspberry Pi

    OpenAIRE

    Murstad, Amund

    2016-01-01

    A subset of operating systems are called ``real time'' operating systems. While a general operating system like Windows or OSX can make no guarantee when a process gets to run, a real time one has the ability to do so. They are used for systems where the quality of the results from the operating system is not only defined by their correctness, but also by when they arrive. These kinds of systems are called Real-time Systems and can be divided into soft, hard and firm. If a deadline is missed ...

  19. Analysis of potential self-guarantee tests for demonstrating financial assurance by non-profit colleges, universities, and hospitals and by business firms that do not issue bonds

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, P.; Dean, C.; Collier, J.; Dasappa, V.; Goldberg, W. [ICF, Inc., Fairfax, VA (United States)

    1997-06-01

    The Nuclear Regulatory Commission (NRC) on December 29, 1993, promulgated self-guarantee requirements that materials licensees may use to demonstrate financial assurance for decommissioning costs. However, nonprofit colleges and universities, nonprofit hospitals, and for-profit firms that do not issue bonds are currently precluded, by their unique accounting and financial reporting systems, or by other features of their business practices, from using the financial tests for self-guarantors adopted by the NRC. This Report evaluates several alternative financial tests that might serve as the basis for self-guarantee by these three categories of licensees.

  20. Analysis of potential self-guarantee tests for demonstrating financial assurance by non-profit colleges, universities, and hospitals and by business firms that do not issue bonds

    International Nuclear Information System (INIS)

    Bailey, P.; Dean, C.; Collier, J.; Dasappa, V.; Goldberg, W.

    1997-06-01

    The Nuclear Regulatory Commission (NRC) on December 29, 1993, promulgated self-guarantee requirements that materials licensees may use to demonstrate financial assurance for decommissioning costs. However, nonprofit colleges and universities, nonprofit hospitals, and for-profit firms that do not issue bonds are currently precluded, by their unique accounting and financial reporting systems, or by other features of their business practices, from using the financial tests for self-guarantors adopted by the NRC. This Report evaluates several alternative financial tests that might serve as the basis for self-guarantee by these three categories of licensees

  1. Social Guarantee Programme: Principles for Classroom Procedure with Students Who Have Suffered Failure at School--The Spanish Educational System Case

    Science.gov (United States)

    Recio, R. Vazquez; Diaz, J. Ojeda

    2010-01-01

    The article explores the Social Guarantee Programmes, one measure at attending to diversity within the Spanish educational system. It is an alternative measure that aims to break away from the organisational structure of Obligatory Secondary Education, seeking an organisational model and educational strategies that pursue satisfactory results…

  2. Final disposal of radioactive wastes in Switzerland: concept and overview of Project Guarantee 1985

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    The validity of the operational licences of the existing Swiss nuclear power plants (NPP) Beznau I and II, Muehleberg, Goesgen and Leibstadt after 31st. December 1985 is, because of official requirements, dependent on the demonstration of permanent, safe management and final disposal of radioactive waste. For this purpose, the NPP companies have to prepare a so-called guarantee project and present this to the Bundesrat for review. The appropriate investigations and research have been carried out by Nagra (National Cooperative for the Storage of Radioactive Waste). The 1985 Project Gewaehr (Guarantee) is described in an eight volume report NGB 85-01 to 85-08 and individual research projects are reported on in separate NTB-series reference reports. The present volume NGB 85-01 takes the form of a self-contained project overview in which the concepts for nuclear waste management are described, the contents of the remaining volumes NGB 85-02 to 85-08 are summarized and Project conclusions are drawn from Project Gewaehr 1985. Project Gewaehr 1985 covers two repository types: Type C repository for high-level and certain alpha-containing intermediate-level waste, and Type B repository for all remaining intermediate- and low-level waste. The Project shows in detail that technical feasibility of final disposal can be assumed given presently available methods, that the technical safety barriers show a high level of efficiency and that suitable geological options are available to ensure long-term safety in Switzerland as the concept is defined by official requirements. The Project safety analyses show that the chosen disposal concepts assure the protection of mankind and the environment under all realistically anticipated conditions

  3. Real-Time Software for the Compass Tokamak Plasma Control

    Energy Technology Data Exchange (ETDEWEB)

    Valcarcel, D.F.; Duarte, A.S.; Neto, A.; Carvalho, I.S.; Carvalho, B.B.; Fernandes, H.; Sousa, J. [Instituto de Plasmas e Fusao Nuclear, Instituto Superior Tecnico, Lisboa (Portugal); Sartori, F. [Euratom-UKAEA, Culham Science Centre, Abingdon, OX14 3DB Oxon (United Kingdom); Janky, F.; Cahyna, P.; Hron, M.; Panek, R. [Institute of Plasma Physics AS CR, v.v.i., Association EURATOM / IPP.CR, Prague (Costa Rica)

    2009-07-01

    This poster presents the flexible and high-performance real time system that guarantees the desired time cycles for plasma control on the COMPASS tokamak: 500 {mu}s for toroidal field, current, equilibrium and shaping; 50 {mu}s for fast control of the equilibrium and vertical instability. This system was developed on top of a high-performance processor and a software framework (MARTe) tailored for real-time. The preliminary measurements indicate that the time constraints will be met on the final solution. The system allows the making of modifications in the future to improve software components. (A.C.)

  4. A Real-Time Recording Model of Key Indicators for Energy Consumption and Carbon Emissions of Sustainable Buildings

    Directory of Open Access Journals (Sweden)

    Weiwei Wu

    2014-05-01

    Full Text Available Buildings’ sustainability is one of the crucial parts for achieving urban sustainability. Applied to buildings, life-cycle assessment encompasses the analysis and assessment of the environmental effects of building materials, components and assemblies throughout the entire life of the building construction, use and demolition. Estimate of carbon emissions is essential and crucial for an accurate and reasonable life-cycle assessment. Addressing the need for more research into integrating analysis of real-time and automatic recording of key indicators for a more accurate calculation and comparison, this paper aims to design a real-time recording model of these crucial indicators concerning the calculation and estimation of energy use and carbon emissions of buildings based on a Radio Frequency Identification (RFID-based system. The architecture of the RFID-based carbon emission recording/tracking system, which contains four functional layers including data record layer, data collection/update layer, data aggregation layer and data sharing/backup layer, is presented. Each of these layers is formed by RFID or network devices and sub-systems that operate at a specific level. In the end, a proof-of-concept system is developed to illustrate the implementation of the proposed architecture and demonstrate the feasibility of the design. This study would provide the technical solution for real-time recording system of building carbon emissions and thus is of great significance and importance to improve urban sustainability.

  5. A Real-Time Recording Model of Key Indicators for Energy Consumption and Carbon Emissions of Sustainable Buildings

    Science.gov (United States)

    Wu, Weiwei; Yang, Huanjia; Chew, David; Hou, Yanhong; Li, Qiming

    2014-01-01

    Buildings' sustainability is one of the crucial parts for achieving urban sustainability. Applied to buildings, life-cycle assessment encompasses the analysis and assessment of the environmental effects of building materials, components and assemblies throughout the entire life of the building construction, use and demolition. Estimate of carbon emissions is essential and crucial for an accurate and reasonable life-cycle assessment. Addressing the need for more research into integrating analysis of real-time and automatic recording of key indicators for a more accurate calculation and comparison, this paper aims to design a real-time recording model of these crucial indicators concerning the calculation and estimation of energy use and carbon emissions of buildings based on a Radio Frequency Identification (RFID)-based system. The architecture of the RFID-based carbon emission recording/tracking system, which contains four functional layers including data record layer, data collection/update layer, data aggregation layer and data sharing/backup layer, is presented. Each of these layers is formed by RFID or network devices and sub-systems that operate at a specific level. In the end, a proof-of-concept system is developed to illustrate the implementation of the proposed architecture and demonstrate the feasibility of the design. This study would provide the technical solution for real-time recording system of building carbon emissions and thus is of great significance and importance to improve urban sustainability. PMID:24831109

  6. Use of work-life balance benefits guaranteed by law in Poland - Do size of the enterprise and gender matter?

    Science.gov (United States)

    Merecz-Kot, Dorota; Drabek, Marcin; Stańczak, Aleksander; Andysz, Aleksandra; Jacukowicz, Aleksandra

    2017-07-26

    The paper is aimed at indicating the similarities and differences in use of benefits supporting work-life balance (WLB) between women and men working in Polish small/medium and large enterprises. The sample included 556 workers (311 women, 245 men), aged 20-68 years old employed on the basis of employment contracts for at least a year in Polish enterprises. The respondents completed a questionnaire on the use of benefits guaranteed by the Polish Labour Code, referring to their current workplaces. Women took maternity leaves and returned to the same work position after using childcare leaves more often than men. Men took leaves on demand more often than women. Our results also showed that in comparison to women working in smaller enterprises, those working in large enterprises were more likely to use almost all the analyzed WLB benefits - paid days off to take care of others, educational leaves, leaves on demand, maternity leaves and return to the same work position after childcare leave, reduction of business trips when pregnant or having young children and breastfeeding breaks. The size of enterprise, however, did not differentiate the take-up of benefits among the studied men. Our analysis brought unexpected results on the lack of common availability of the WLB benefits guaranteed by the law in the case of employees who worked on the basis of employment contracts. We also found that women used most of child rearing benefits guaranteed by the law more often than men, which might reflect still a traditional division of child care responsibilities in Poland. Med Pr 2017;68(5):575-581. This work is available in Open Access model and licensed under a CC BY-NC 3.0 PL license.

  7. Guaranteed cost control of mobile sensor networks with Markov switching topologies.

    Science.gov (United States)

    Zhao, Yuan; Guo, Ge; Ding, Lei

    2015-09-01

    This paper investigates the consensus seeking problem of mobile sensor networks (MSNs) with random switching topologies. The network communication topologies are composed of a set of directed graphs (or digraph) with a spanning tree. The switching of topologies is governed by a Markov chain. The consensus seeking problem is addressed by introducing a global topology-aware linear quadratic (LQ) cost as the performance measure. By state transformation, the consensus problem is transformed to the stabilization of a Markovian jump system with guaranteed cost. A sufficient condition for global mean-square consensus is derived in the context of stochastic stability analysis of Markovian jump systems. A computational algorithm is given to synchronously calculate both the sub-optimal consensus controller gains and the sub-minimum upper bound of the cost. The effectiveness of the proposed design method is illustrated by three numerical examples. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  8. 78 FR 67144 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-11-08

    ... EXPORT-IMPORT BANK [Public Notice 2013-0050] Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100 Million: AP086418XX AGENCY: Export-Import Bank of the United...) of the Charter of the Export-Import Bank of the United States (``Ex-Im Bank''), that Ex-Im Bank has...

  9. 变额年金保险中最低提取利益保证的定价模型研究%Pricing Model Study on the Guaranteed Minimum Withdrawal Benefit in Variable Annuities

    Institute of Scientific and Technical Information of China (English)

    邓庆彪; 李方方

    2012-01-01

    本文对提供最低提取利益保证的变额年金保险进行了深入分析,总结了最低提取利益保证的主要特征(重置条款、奖励条款、惩罚条款),并将这些特征进行了定量的分析。本文在DanielBauer等(2006)提出的定价模型的基础上进行了创新和改进,在定价过程中加入了国外年金市场上通行的最低提取利益保证的三大主要特征,研究出一套可操作性较强的定价方法,旨在为将来国内保险公司设计开发此类产品时,提供一些建议和理论指导参考。%China has launched a pilot project on Variable Annuities since May 2010, trying to enrich the product mix and establish a multi-level product structure to cater to the need of different levels of consumers. A variable annuities policy is a financial contract between a policyholder and an insurance company which promises a stream of annuities cash flows. At the initiation of the contract, the policyholder pays a single lump sum premium to the issu er. The trusted fund is then invested in a well diversified reference portfolio of a specific class of assets. Under the policy, the insurer promises to make variable periodic payments to the policyholder on preset future dates. The variable payments would depend on the performance of the reference portfolio, thus the policyholders are provided with the equity participation. Variable Annuity products are the mainstream pension products abroad, among all the guarantees the most popular one is guaranteed minimum withdrawal benefit (GMWB) ,which is also at the greatest risk. A GMWB provides the policyholder with the right to withdraw the initial investment over a certain period of time, irrespective of investment performance, as long as annual withdrawals do not exceed a pre-specified amount. To finance these guarantees, most commonly insurers continuously deduct an option fee at a constant rate from the policyholder's ac- count value. China

  10. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  11. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  12. Use of work–life balance benefits guaranteed by law in Poland – Do size of the enterprise and gender matter?

    Directory of Open Access Journals (Sweden)

    Dorota Merecz-Kot

    2017-10-01

    Full Text Available Background: The paper is aimed at indicating the similarities and differences in use of benefits supporting work–life balance (WLB between women and men working in Polish small/medium and large enterprises. Material and Methods: The sample included 556 workers (311 women, 245 men, aged 20–68 years old employed on the basis of employment contracts for at least a year in Polish enterprises. The respondents completed a questionnaire on the use of benefits guaranteed by the Polish Labour Code, referring to their current workplaces. Results: Women took maternity leaves and returned to the same work position after using childcare leaves more often than men. Men took leaves on demand more often than women. Our results also showed that in comparison to women working in smaller enterprises, those working in large enterprises were more likely to use almost all the analyzed WLB benefits – paid days off to take care of others, educational leaves, leaves on demand, maternity leaves and return to the same work position after childcare leave, reduction of business trips when pregnant or having young children and breastfeeding breaks. The size of enterprise, however, did not differentiate the take-up of benefits among the studied men. Conclusions: Our analysis brought unexpected results on the lack of common availability of the WLB benefits guaranteed by the law in the case of employees who worked on the basis of employment contracts. We also found that women used most of child rearing benefits guaranteed by the law more often than men, which might reflect still a traditional division of child care responsibilities in Poland. Med Pr 2017;68(5:575–581

  13. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  14. Analysis of Third Party Loan Guarantee and Performance of Non-Prime Household Loans in Microfinance Banks in Kenya

    Directory of Open Access Journals (Sweden)

    Bernard Ndirangu Wachira

    2017-08-01

    Full Text Available Household loans remain the engine to productivity and economic growth globally. Non-prime household loan is essential, because it enables the borrowers with no collateral to access credit from Microfinance Banks. The survival and sustainability of non-prime household loans globally is therefore significant. Credit risk however remains the main deterrent of the soundness of Microfinance Banks. This leads to the poor performance of microfinance institutions in many economies in the world. Several countries globally are making inroad in reducing the credit risks, which lead to the poor performance of Microfinance Banks. It is still unknown why the credit risk affects the performance of non-prime household loans in the Microfinance Banks domiciled in Kenya. The reason for conducting this study is to determine the level at which the third party loan guarantee and the performance of non-prime household loans relate to the Microfinance Banks in Kenya. Particularly, this study is to determine how the amount secured by guarantee, recoveries from guarantors, percentage of loan secured, and percentage recoveries from guarantors relate to the performance of nonprime household loans in the Microfinance Banks in Kenya. The population was 516 senior management employees of the banks. The researcher conducted a multiple regression analysis for determining the relationship between the amount secured by guarantee—recoveries from guarantors, percentage granted, and percentage recoveries—and the performance of non-prime household loans. The R and R2 were used for determining the strength of the relationship and the coefficient of determination at 0.05 level of significance of variables. The result of this study reveals that there exists a strong relationship between the dependent and independent variables, thereby contradicting the null hypothesis, which states that the relationship does not exist. The percentage of the recoveries from the guarantors over the

  15. REAL TIME ANALYSIS OF WIRELESS CONTROLLER AREA NETWORK

    Directory of Open Access Journals (Sweden)

    Gerardine Immaculate Mary

    2014-09-01

    Full Text Available It is widely known that Control Area Networks (CAN are used in real-time, distributed and parallel processing which cover manufacture plants, humanoid robots, networking fields, etc., In applications where wireless conditions are encountered it is convenient to continue the exchange of CAN frames within the Wireless CAN (WCAN. The WCAN considered in this research is based on wireless token ring protocol (WTRP; a MAC protocol for wireless networks to reduce the number of retransmissions due to collision and the wired counterpart CAN attribute on message based communication. WCAN uses token frame method to provide channel access to the nodes in the system. This method allow all the nodes to share common broadcast channel by taken turns in transmitting upon receiving the token frame which is circulating within the network for specified amount of time. This method provides high throughput in bounded latency environment, consistent and predictable delays and good packet delivery ratio. The most important factor to consider when evaluating a control network is the end-to-end time delay between sensors, controllers, and actuators. The correct operation of a control system depends on the timeliness of the data coming over the network, and thus, a control network should be able to guarantee message delivery within a bounded transmission time. The proposed WCAN is modeled and simulated using QualNet, and its average end to end delay and packet delivery ratio (PDR are calculated. The parameters boundaries of WCAN are evaluated to guarantee a maximum throughput and a minimum latency time, in the case of wireless communications, precisely WCAN.

  16. The bases and keys for the future of the social work and services / Fundamentos y claves para el futuro de de los servicios sociales y el trabajo social

    Directory of Open Access Journals (Sweden)

    Antonio Gutiérrez Resa

    2009-10-01

    Full Text Available The actual values emerging from the Social Services and the Social Work treat to make compatible the Public Services Field with those which the Market offers. However, without the State Guarantee which to look after universality and local proximity, so after the quality of the Social Services and Social Work, it is the Market which treat to resolve the management of the human being. In the future the bases and keys of the Social Services and Social Work have to require, at least, from the Beneficiaries listening and participation, the same way as relation contents.

  17. Security analysis of an untrusted source for quantum key distribution: passive approach

    International Nuclear Information System (INIS)

    Zhao Yi; Qi Bing; Lo, H-K; Qian Li

    2010-01-01

    We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input pulse. We show that we can characterize the source using a cross-estimate technique without active routing of each pulse. We have derived analytical expressions for the passive estimation scheme. Moreover, using simulations, we have considered four real-life imperfections: additional loss introduced by the 'plug and play' structure, inefficiency of the intensity monitor noise of the intensity monitor, and statistical fluctuation introduced by finite data size. Our simulation results show that the passive estimate of an untrusted source remains useful in practice, despite these four imperfections. Also, we have performed preliminary experiments, confirming the utility of our proposal in real-life applications. Our proposal makes it possible to implement the 'plug and play' QKD with the security guaranteed, while keeping the implementation practical.

  18. Calculation of critical fault recovery time for nonlinear systems based on region of attraction analysis

    DEFF Research Database (Denmark)

    Tabatabaeipour, Mojtaba; Blanke, Mogens

    2014-01-01

    of a system. It must be guaranteed that the trajectory of a system subject to fault remains in the region of attraction (ROA) of the post-fault system during this time. This paper proposes a new algorithm to compute the critical fault recovery time for nonlinear systems with polynomial vector elds using sum...

  19. Secured Session-key Distribution using control Vector Encryption / Decryption Process

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim; Khaleqdad Khan, ANM; Lutfar Rahman, M.

    2006-01-01

    Frequent key changes are very much desirable for the secret communications and are thus in high demand. A session-key distribution technique has been designed and implemented using the programming language C on which the communication between the end-users is encrypted is used for the duration of a logical connection. Each session-key is obtained from the key distribution center (KDC) over the same networking facilities used for end-user communication. The control vector is cryptographically coupled with the session-key at the time of key generation in the KDC. For this, the generated hash function, master key and the session-key are used for producing the encrypted session-key, which has to be transferred. All the operations have been performed using the C programming language. This process can be widely applicable to all sorts of electronic transactions online or offline; commercially and academically.(authors)

  20. The INTEGRAL Core Observing Programme

    DEFF Research Database (Denmark)

    Winkler, C.; Gehrels, N.; Lund, Niels

    1999-01-01

    The Core Programme of the INTEGRAL mission is defined as the portion of the scientific programme covering the guaranteed time observations for the INTEGRAL Science Working Team. This paper describes the current status of the Core Programme preparations and summarizes the key elements...... of the observing programme....