WorldWideScience

Sample records for hierarchical key management

  1. Secure Session Mobility using Hierarchical Authentication Key Management in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Zubair

    2014-05-01

    Full Text Available In this paper we propose a novel authentication mechanism for session mobility in Next Generation Networks named as Hierarchical Authentication Key Management (HAKM. The design objectives of HAKM are twofold: i to minimize the authentication latency in NGNs; ii to provide protection against an assortment of attacks such as denial-of-service attacks, man-in-the-middle attacks, guessing attacks, and capturing node attacks. In order to achieve these objectives, we combine Session Initiation Protocol (SIP with Hierarchical Mobile IPv6 (HMIPv6 to perform local authentication for session mobility. The concept of group keys and pairwise keys with one way hash function is employed to make HAKM vigorous against the aforesaid attacks. The performance analysis and numerical results demonstrate that HAKM outperforms the existing approaches in terms of latency and protection against the abovementioned attacks

  2. A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ayman EL-SAYED

    2014-05-01

    Full Text Available The migration from wired network to wireless network has been a global trend in the past few decades because they provide anytime-anywhere networking services. The wireless networks are rapidly deployed in the future, secure wireless environment will be mandatory. As well, The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks,Mobile Ad hoc Networks (MANET is one of the most important and unique applications. MANET is a collection of autonomous nodes or terminals which communicate with each other by forming a multihop radio network and maintaining connectivity in a decentralized manner. Due to the nature of unreliable wireless medium data transfer is a major problem in MANET and it lacks security and reliability of data. The most suitable solution to provide the expected level of security to these services is the provision of a key management protocol. A Key management is vital part of security. This issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in MANET. When a member leaves or joins the group, it needs to generate a new key to maintain forward and backward secrecy. In this paper, we propose a new group key management schemes namely a Hierarchical, Simple, Efficient and Scalable Group Key (HSESGK based on clustering management scheme for MANETs and different other schemes are classified. Group members deduce the group key in a distributed manner.

  3. A Dynamic Key Management Scheme Based on Secret Sharing for Hierarchical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Enjian Bai

    2013-01-01

    Full Text Available Since wireless sensor networks (WSN for short are often deployed in hostile environments in many applications, security becomes one of the critical issues in WSN. Moreover, due to the limitation of the sensor nodes, traditional key management schemes are not suitable for it. Thereby,a feasible and efficient key management scheme is an important guarantee for WSN to communicate securely. For the moment, many protocols have been proposed and each has its own advantages. However, these protocols cannot provide sufficient security in many cases, such as node capture attack, which makes WSN more vulnerable than traditional wireless networks. Key protection and revocation issues must be considered with special attention in WSN. To address these two issues, we propose a dynamically clustering key management scheme based on secret sharing for WSN. The scheme combined the hierarchical structure of wireless sensor networks with dynamic key management scheme. The analysis results show that the scheme has strong security and resistance of captured attack, as well as low communicational overhead, and it well meets the requirement of scalability.

  4. A Model of Hierarchical Key Assignment Scheme

    Institute of Scientific and Technical Information of China (English)

    ZHANG Zhigang; ZHAO Jing; XU Maozhi

    2006-01-01

    A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property.

  5. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    Science.gov (United States)

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  6. 一种分层分簇的组密钥管理方案%A HIERARCHICAL CLUSTERING-BASED GROUP KEY MANAGEMENT SCHEME

    Institute of Scientific and Technical Information of China (English)

    李珍格; 游林

    2014-01-01

    为了满足无线传感器网络组通信的安全,提出一种分层分簇的组密钥管理方案。该方案采用分层的体系结构,将组中节点分为管理层和普通层。BS通过构造特殊的组密钥多项式更新普通层组密钥,而管理层则采用二元单向函数进行组密钥的协商。分析表明,该方案很好满足了无线传感器网络中组密钥管理的前向安全性,后向安全性,并且减小了存储开销、计算开销和通信开销。%In this paper,a hierarchical clustering-based group key management scheme is proposed in order to satisfy the secure group communication in wireless sensor network.The proposed scheme adopts the hierarchical architecture and divides the nodes in the group into master-node layer and terminal layer.The group key of terminal layer is updated by constructing a special group key polynomial in BS,and the binary one-way function is used by the master-node layer for group key negotiation.Analysis demonstrates that the scheme well satisfies the forward security and backward security of the group key management in WSN,and reduces the storage overhead,computation overhead and communication overhead as well.

  7. Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks

    CERN Document Server

    Chen, Hao

    2010-01-01

    Key establishment is the basic necessary tool in the network security, by which pairs in the network can establish shared keys for protecting their pairwise communications. There have been some key agreement or predistribution schemes with the property that the key can be established without the interaction (\\cite{Blom84,BSHKY92,S97}). Recently the hierarchical cryptography and the key management for hierarchical networks have been active topics(see \\cite{BBG05,GHKRRW08,GS02,HNZI02,HL02,Matt04}. ). Key agreement schemes for hierarchical networks were presented in \\cite{Matt04,GHKRRW08} which is based on the Blom key predistribution scheme(Blom KPS, [1]) and pairing. In this paper we introduce generalized Blom-Blundo et al key predistribution schemes. These generalized Blom-Blundo et al key predistribution schemes have the same security functionality as the Blom-Blundo et al KPS. However different and random these KPSs can be used for various parts of the networks for enhancing the resilience. We also presentk...

  8. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...represents that important data are compromised. The second condition represents that the mobile group is unable to function correctly and is compromised as a...include mobile computing, wireless systems, dependable and secure computing, multimedia, sensor networks, data and service management, trust management

  9. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  10. Cost of Multicast Logical Key Tree Based on Hierarchical Data Processing

    Institute of Scientific and Technical Information of China (English)

    ZHOU Fucai; XU Jian; LI Ting

    2006-01-01

    How to design a multicast key management system with high performance is a hot issue now. This paper will apply the idea of hierarchical data processing to construct a common analytic model based on directed logical key tree and supply two important metrics to this problem: re-keying cost and key storage cost. The paper gives the basic theory to the hierarchical data processing and the analyzing model to multicast key management based on logical key tree. It has been proved that the 4-ray tree has the best performance in using these metrics. The key management problem is also investigated based on user probability model, and gives two evaluating parameters to re-keying and key storage cost.

  11. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  12. Quantum key management

    Science.gov (United States)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  13. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  14. Key Account Management

    OpenAIRE

    Dvořák, Dalibor

    2007-01-01

    This note tries to explain concept of key account management (KAM), factors leading to importance of this emerging concept, criteria to determine key accounts from customer base, benefits to both buyers and sellers agreeing to practice it, stages of KAM relationship, conditions under which power lies with buyer or seller, outlines risks faced by both the parties, key success factors, challenges faced in implementing this concept and relevance to infrastructure sector.

  15. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  16. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  17. Effective Hierarchical Information Management in Mobile Environment

    Directory of Open Access Journals (Sweden)

    Hanmin Jung

    2012-01-01

    Full Text Available Problem statement: As the performance of mobile devices is developed highly, several kinds of data is stored on mobile devices. For effective data management and information retrieval, some researches applying ontology concept to mobile devices are progressed. However, in conventional researches, they apply conventional ontology storage structure used in PC environment to mobile platform. Conclusion/Recommendations: Therefore, performance of search about data is low and not effective. Therefore, we suggested new ontology storage schema with ontology path for effective hierarchical information in mobile environment.

  18. Creativity Management Key Elements

    Directory of Open Access Journals (Sweden)

    Rosa María Fuchs Ángeles

    2015-09-01

    Full Text Available Organizations are constantly looking towards innovation. In order to reach it they must foment creativity. This paper analyzes a series of elements considered in the organizational creativity management and proposes a model with the indispensable factors that organizations should consider to reach it. These elements are: culture and organizational environment, strategy, structure, communication, relation with customers, human resources (recruiting, training, job design, compensation, promotion, and performance evaluation, long term orientation and the organizational life cycle. Having the analysis of those elements as a basis, the indispensable pillars on management creativity are identified. The proposed model is based on 5 pillars: the alignment between strategic, culture and organizational structure, called by the authors 'Holy Trinity'; intern publicity; customer’s voice; recognition and a look towards future. Finally, the case of an innovative Peruvian enterprise is presented from the model’s perspective and the study conclusions.

  19. Using Hierarchical Folders and Tags for File Management

    Science.gov (United States)

    Ma, Shanshan

    2010-01-01

    Hierarchical folders have been widely used for managing digital files. A well constructed hierarchical structure can keep files organized. A parent folder can have several subfolders and one subfolder can only reside in one parent folder. Files are stored in folders or subfolders. Files can be found by traversing a given path, going through…

  20. Adaptive mobility management scheme in hierarchical mobile IPv6

    Science.gov (United States)

    Fang, Bo; Song, Junde

    2004-04-01

    Hierarchical mobile IPv6 makes the mobility management localized. Registration with HA is only needed while MN moving between MAP domains. This paper proposed an adaptive mobility management scheme based on the hierarchical mobile IPv6. The scheme focuses on the MN operation as well as MAP operation during the handoff. Adaptive MAP selection algorithm can be used to select a suitable MAP to register with once MN moves into a new subnet while MAP can thus adaptively changing his management domain. Furthermore, MAP can also adaptively changes its level in the hierarchical referring on the service load or other related information. Detailed handoff algorithm is also discussed in this paper.

  1. Integrated optimization of management cost of hierarchical mobile IPv6 and its performance simulation

    Science.gov (United States)

    Peng, Xue-hai; Zhang, Hong-ke; Zhang, Si-dong

    2004-04-01

    Mobile IPv6 was designed to enable an IPv6 terminal to continue communications seamlessly while changing its access to network. Decreasing communication and management cost is a key issue of the research of the Internet mobility management. Hierarchical Mobile IPv6 was proposed to reduce the number of management messages in backbone network. However, the resources consumptions inside a hierarchical domain are increased as expense according to our cost models. Based on the idea of integrated optimization, adaptive mobility management scheme (AMMS) is proposed in this paper, which decreases the total cost of delivering management messages and data payload on the viewpoint of entire network resources by selecting a suitable mobility management scheme adaptively for a mobile node. The results of simulation show that AMMS has better performance than unmixed Mobile IPv6 and Hierarchical Mobile IPv6.

  2. Key Updating Methods for Combinatorial Design Based Key Management Schemes

    Directory of Open Access Journals (Sweden)

    Chonghuan Xu

    2014-01-01

    Full Text Available Wireless sensor network (WSN has become one of the most promising network technologies for many useful applications. However, for the lack of resources, it is different but important to ensure the security of the WSNs. Key management is a corner stone on which to build secure WSNs for it has a fundamental role in confidentiality, authentication, and so on. Combinatorial design theory has been used to generate good-designed key rings for each sensor node in WSNs. A large number of combinatorial design based key management schemes have been proposed but none of them have taken key updating into consideration. In this paper, we point out the essence of key updating for the unital design based key management scheme and propose two key updating methods; then, we conduct performance analysis on the two methods from three aspects; at last, we generalize the two methods to other combinatorial design based key management schemes and enhance the second method.

  3. Managing Clustered Data Using Hierarchical Linear Modeling

    Science.gov (United States)

    Warne, Russell T.; Li, Yan; McKyer, E. Lisako J.; Condie, Rachel; Diep, Cassandra S.; Murano, Peter S.

    2012-01-01

    Researchers in nutrition research often use cluster or multistage sampling to gather participants for their studies. These sampling methods often produce violations of the assumption of data independence that most traditional statistics share. Hierarchical linear modeling is a statistical method that can overcome violations of the independence…

  4. Managing Clustered Data Using Hierarchical Linear Modeling

    Science.gov (United States)

    Warne, Russell T.; Li, Yan; McKyer, E. Lisako J.; Condie, Rachel; Diep, Cassandra S.; Murano, Peter S.

    2012-01-01

    Researchers in nutrition research often use cluster or multistage sampling to gather participants for their studies. These sampling methods often produce violations of the assumption of data independence that most traditional statistics share. Hierarchical linear modeling is a statistical method that can overcome violations of the independence…

  5. Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    Yang, Yanjiang; Zhou, Jianying; Deng, Robert H.; Bao, Feng

    Self-healing group key distribution aims to achieve robust key distribution over lossy channels in wireless sensor networks (WSNs). However, all existing self-healing group key distribution schemes in the literature consider homogenous WSNs which are known to be unscalable. Heterogeneous WSNs have better scalability and performance than homogenous ones. We are thus motivated to study hierarchial self-healing group key distribution, tailored to the heterogeneous WSN architecture. In particular, we revisit and adapt Dutta et al.’s model to the setting of hierarchical self-healing group key distribution, and propose a concrete scheme that achieves computational security and high efficiency.

  6. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  7. Hierarchical Policy Model for Managing Heterogeneous Security Systems

    Science.gov (United States)

    Lee, Dong-Young; Kim, Minsoo

    2007-12-01

    The integrated security management becomes increasingly complex as security manager must take heterogeneous security systems, different networking technologies, and distributed applications into consideration. The task of managing these security systems and applications depends on various systems and vender specific issues. In this paper, we present a hierarchical policy model which are derived from the conceptual policy, and specify means to enforce this behavior. The hierarchical policy model consist of five levels which are conceptual policy level, goal-oriented policy level, target policy level, process policy level and low-level policy.

  8. SUPPLY CHAIN MANAGEMENTKEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  9. A novel key management scheme using biometrics

    Science.gov (United States)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  10. Architecture Aware Key Management Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mohammed FEHAM

    2012-11-01

    Full Text Available The emergence of wireless networking as well as the development in embedded systems and technologies have given birth to application specific networks called wireless sensor networks WSNs, their flexibility, facility of use and deployment as well as their low cost give them an increasing field of applications. Usually sensors are limited in capacities deployed in a hostile and unpredictable environment, making the security of these networks a challenging task. In this paper we are going to present a key management scheme in which the base station play the role of the secure third party responsible of distributing key and managing security in the network, two versions of this scheme are presented the first one for flat networks and the second one for hierarchical networks in which the cluster head play the key role in all key agreement with the base station.

  11. A hierarchical architecture for an energy management system

    NARCIS (Netherlands)

    Piotrowski, Krzysztof; Casaca, Augusto; Gerards, Marco E.T.; Jongerden, Marijn; Melo, Francisco; Garrido, Daniel; Geers, Marcel; Peralta, Jacoba

    2016-01-01

    This paper introduces an innovative energy management system architecture for Smart Grids, designed in the European 7th framework program project e-balance. The architecture is hierarchical and fractal-like, which results in better scalability and reuse of algorithms and programming code for energy

  12. Information Sharing During Crisis Management in Hierarchical vs. Network Teams

    NARCIS (Netherlands)

    Schraagen, J.M.C.; Veld, M.H.I.T.; Koning, L. de

    2010-01-01

    This study examines the differences between hierarchical and network teams in emergency management. A controlled experimental environment was created in which we could study teams that differed in decision rights, availability of information, information sharing, and task division. Thirty-two teams

  13. Hierarchical Portfolio Management: Theory and Applications

    NARCIS (Netherlands)

    H. Ning (Haikun)

    2007-01-01

    textabstractUnder his own preference, how should an investor coordinate the asset managers such that his aggregated portfolio is optimized? The efficiency of each managed sub portfolio and the aggregation of all the sub portfolios are the 2 main underlying problems considered in this dissertation.

  14. Hierarchical Portfolio Management: Theory and Applications

    NARCIS (Netherlands)

    H. Ning (Haikun)

    2007-01-01

    textabstractUnder his own preference, how should an investor coordinate the asset managers such that his aggregated portfolio is optimized? The efficiency of each managed sub portfolio and the aggregation of all the sub portfolios are the 2 main underlying problems considered in this dissertation.

  15. P2MP MPLS-Based Hierarchical Service Management System

    Science.gov (United States)

    Kumaki, Kenji; Nakagawa, Ikuo; Nagami, Kenichi; Ogishi, Tomohiko; Ano, Shigehiro

    This paper proposes a point-to-multipoint (P2MP) Multi-Protocol Label Switching (MPLS) based hierarchical service management system. Traditionally, general management systems deployed in some service providers control MPLS Label Switched Paths (LSPs) (e.g., RSVP-TE and LDP) and services (e.g., L2VPN, L3VPN and IP) separately. In order for dedicated management systems for MPLS LSPs and services to cooperate with each other automatically, a hierarchical service management system has been proposed with the main focus on point-to-point (P2P) TE LSPs in MPLS path management. In the case where P2MP TE LSPs and services are deployed in MPLS networks, the dedicated management systems for P2MP TE LSPs and services must work together automatically. Therefore, this paper proposes a new algorithm that uses a correlation between P2MP TE LSPs and multicast VPN services based on a P2MP MPLS-based hierarchical service management architecture. Also, the capacity and performance of the proposed algorithm are evaluated by simulations, which are actually based on certain real MPLS production networks, and are compared to that of the algorithm for P2P TE LSPs. Results show this system is very scalable within real MPLS production networks. This system, with the automatic correlation, appears to be deployable in real MPLS production networks.

  16. Translating Management Ideas in Hierarchical Organization

    DEFF Research Database (Denmark)

    Wæraas, Arild; Nielsen, Jeppe

    of Leadership Pipeline in a Danish fire department and how the translators’ approach changed over time from a modifying to a reproducing mode. The study finds that translation does not necessarily imply transformation of the management idea at every phase of the process, pointing instead to efforts of exact...

  17. Coordinated Resource Management Models in Hierarchical Systems

    Directory of Open Access Journals (Sweden)

    Gabsi Mounir

    2013-03-01

    Full Text Available In response to the trend of efficient global economy, constructing a global logistic model has garnered much attention from the industry .Location selection is an important issue for those international companies that are interested in building a global logistics management system. Infrastructure in Developing Countries are based on the use of both classical and modern control technology, for which the most important components are professional levels of structure knowledge, dynamics and management processes, threats and interference and external and internal attacks. The problem of control flows of energy and materials resources in local and regional structures in normal and marginal, emergency operation provoked information attacks or threats on failure flows are further relevant especially when considering the low level of professional ,psychological and cognitive training of operational personnel manager. Logistics Strategies include the business goals requirements, allowable decisions tactics, and vision for designing and operating a logistics system .In this paper described the selection module coordinating flow management strategies based on the use of resources and logistics systems concepts.

  18. SUPPLY CHAIN MANAGEMENTKEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  19. KEY CHARACTERISTICS OF DIFFERENT MANAGEMENT STYLES

    OpenAIRE

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  20. 6 Keys to Identity Management

    Science.gov (United States)

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  1. A Distributed and Adaptive Location Management Scheme for Hierarchical Mobility Management

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Hierarchical mobility management is sensitive to the failure of gateway mobility agents and prone to degrade performance on heavy loads. This paper proposes a distributed and adaptive location management scheme based on Hierarchical Mobile IPv6. This scheme can balance the loads of mobility anchor points and increase the robustness of the hierarchical structure to certain extents. In this scheme, the optimized IP paging scheme is adopted to reduce the paging signaling cost and improve the scalability of the hierarchical mobility management. We implement the distributed and adaptive location management scheme in a simulation platform and compare its performance with that of two other location management schemes. Our simulation results show that our scheme is capable of balancing the signaling and traffic loads of mobility ancher points, decreasing the average handover latency, and increasing the throughout of the visited networks.

  2. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    Directory of Open Access Journals (Sweden)

    Hyunsung Kim

    2014-12-01

    Full Text Available The digitization of patient health information (PHI for wireless health monitoring systems (WHMSs has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient’s PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient’s privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks.

  3. Disease management contracting: key elements.

    Science.gov (United States)

    Knutson, D J

    1996-01-01

    Although the data at the outset of a contractual agreement can often be incomplete or inaccurate, and the analytical tools necessary to interpret these data are still being developed, partners about to enter a disease management (DM) arrangement can nonetheless take steps to ensure that the relationship will be sound and successful. Pharmaceutical firms (and other service providers) wishing to enter into DM relationships with managed-care organizations must consider several important factors of the contracting process to protect their financial interests and benefit from the partnership, particularly in the first 1 to 2 years of the arrangement. This paper provides recommendations for both general strategies and financial elements of DM contracting, and defines several contractual elements that can help to secure a harmonious and profitable partnership. These suggestions address concerns for various types of partnerships, including risk-sharing and fee-for-service plans. Early and careful consideration of the legal aspects of the DM business can protect companies from incurring significant, unanticipated losses.

  4. Hierarchical, model-based risk management of critical infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Baiardi, F. [Polo G.Marconi La Spezia, Universita di Pisa, Pisa (Italy); Dipartimento di Informatica, Universita di Pisa, L.go B.Pontecorvo 3 56127, Pisa (Italy)], E-mail: f.baiardi@unipi.it; Telmon, C.; Sgandurra, D. [Dipartimento di Informatica, Universita di Pisa, L.go B.Pontecorvo 3 56127, Pisa (Italy)

    2009-09-15

    Risk management is a process that includes several steps, from vulnerability analysis to the formulation of a risk mitigation plan that selects countermeasures to be adopted. With reference to an information infrastructure, we present a risk management strategy that considers a sequence of hierarchical models, each describing dependencies among infrastructure components. A dependency exists anytime a security-related attribute of a component depends upon the attributes of other components. We discuss how this notion supports the formal definition of risk mitigation plan and the evaluation of the infrastructure robustness. A hierarchical relation exists among models that are analyzed because each model increases the level of details of some components in a previous one. Since components and dependencies are modeled through a hypergraph, to increase the model detail level, some hypergraph nodes are replaced by more and more detailed hypergraphs. We show how critical information for the assessment can be automatically deduced from the hypergraph and define conditions that determine cases where a hierarchical decomposition simplifies the assessment. In these cases, the assessment has to analyze the hypergraph that replaces the component rather than applying again all the analyses to a more detailed, and hence larger, hypergraph. We also show how the proposed framework supports the definition of a risk mitigation plan and discuss some indicators of the overall infrastructure robustness. Lastly, the development of tools to support the assessment is discussed.

  5. Development of balanced key performance indicators for emergency departments strategic dashboards following analytic hierarchical process.

    Science.gov (United States)

    Safdari, Reza; Ghazisaeedi, Marjan; Mirzaee, Mahboobeh; Farzi, Jebrail; Goodini, Azadeh

    2014-01-01

    Dynamic reporting tools, such as dashboards, should be developed to measure emergency department (ED) performance. However, choosing an effective balanced set of performance measures and key performance indicators (KPIs) is a main challenge to accomplish this. The aim of this study was to develop a balanced set of KPIs for use in ED strategic dashboards following an analytic hierarchical process. The study was carried out in 2 phases: constructing ED performance measures based on balanced scorecard perspectives and incorporating them into analytic hierarchical process framework to select the final KPIs. The respondents placed most importance on ED internal processes perspective especially on measures related to timeliness and accessibility of care in ED. Some measures from financial, customer, and learning and growth perspectives were also selected as other top KPIs. Measures of care effectiveness and care safety were placed as the next priorities too. The respondents placed least importance on disease-/condition-specific "time to" measures. The methodology can be presented as a reference model for development of KPIs in various performance related areas based on a consistent and fair approach. Dashboards that are designed based on such a balanced set of KPIs will help to establish comprehensive performance measurements and fair benchmarks and comparisons.

  6. UNCERTAINTY HANDLING IN DISASTER MANAGEMENT USING HIERARCHICAL ROUGH SET GRANULATION

    Directory of Open Access Journals (Sweden)

    H. Sheikhian

    2015-08-01

    Full Text Available Uncertainty is one of the main concerns in geospatial data analysis. It affects different parts of decision making based on such data. In this paper, a new methodology to handle uncertainty for multi-criteria decision making problems is proposed. It integrates hierarchical rough granulation and rule extraction to build an accurate classifier. Rough granulation provides information granules with a detailed quality assessment. The granules are the basis for the rule extraction in granular computing, which applies quality measures on the rules to obtain the best set of classification rules. The proposed methodology is applied to assess seismic physical vulnerability in Tehran. Six effective criteria reflecting building age, height and material, topographic slope and earthquake intensity of the North Tehran fault have been tested. The criteria were discretized and the data set was granulated using a hierarchical rough method, where the best describing granules are determined according to the quality measures. The granules are fed into the granular computing algorithm resulting in classification rules that provide the highest prediction quality. This detailed uncertainty management resulted in 84% accuracy in prediction in a training data set. It was applied next to the whole study area to obtain the seismic vulnerability map of Tehran. A sensitivity analysis proved that earthquake intensity is the most effective criterion in the seismic vulnerability assessment of Tehran.

  7. Talent Management: Working lines and key processes

    Directory of Open Access Journals (Sweden)

    Alvaro Alonso

    2014-12-01

    Full Text Available Purpose: Talent management represents today a challenge for companies, since the contribution of value comes increasingly from the area of intangible capital. The current paradigm of expanding technology and competitive dynamics, makes talent management that companies realize a critical success factor in today's markets. However, there is no generally accepted theoretical framework and empirical studies sufficient to demonstrate the role of talent management in creating competitive advantage. Therefore, the first objective of this paper is to analyze the evolution of talent management, to understand more deeply their fundamental dimensions: people and key positions in the organization. From these dimensions, as a second objective of the research is proposed to classify and characterize the literature about four alternative ways of study, according to the treatment they receive such dimensions and thus improve understanding of the role of talent management in business strategyDesign/methodology: To develop this paper we have selected the major contributions to the field of talent management, with particular emphasis on certain meta-analysis very quoted by the scientific community (Lewis and Heckman, 2006; Mellahi and Collings, 2009; Tarique and Schuler, 2010. In addition we have select additional papers published in high impact journals seen in ABI/Inform, Science Direct, SCOPUS, and EBSCO (Business Source Complete, through the keywords "Gestion del talento", "Plan de Gestion del Talento" and "Modelo de Gestion de Talento" and its English equivalent "Talent Management ", "Talent Management Plans/Systems" and "Talent Management Framework/Model ".Findings: From this review, we extracted the existence of different ways of understanding and talent management apply in organizations and even different understandings of what is talent itself. For this, we describe the basic dimensions of talent management (people and key positions and four alternative

  8. Hierarchical energy management mechanisms for an electricity market with microgrids

    Directory of Open Access Journals (Sweden)

    Hong-Tzer Yang

    2014-08-01

    Full Text Available This study addresses a micro-grid electricity market (MGEM with day-ahead (DA and real-time market mechanisms integrated. The bidding mechanisms for the market are described in this study, considering the generation cost of different distributed energy resources (DERs, like distributed generator, energy storage system and demand response. Including load and renewable generation forecasting systems and a fuzzy decision supporting system, a hierarchical micro-grid energy management system (MG-EMS is then proposed to ensure the benefits of involved micro-grid central controller, DER owners and customers. To verify the feasibility of the proposed system, the whole-year historical pricing and load data for New England independent system operator are employed. The numerical results show that the proposed MG-EMS is promising and effective for the operations of MGEM.

  9. Key personality traits of sales managers.

    Science.gov (United States)

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  10. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  11. INFOGRAPHIC MODELING OF THE HIERARCHICAL STRUCTURE OF THE MANAGEMENT SYSTEM EXPOSED TO AN INNOVATIVE CONFLICT

    OpenAIRE

    Chulkov Vitaliy Olegovich; Rakhmonov Emomali Karimovich; Kas'yanov Vitaliy Fedorovich; Gusakova Elena Aleksandrovna

    2012-01-01

    This article deals with the infographic modeling of hierarchical management systems exposed to innovative conflicts. The authors analyze the facts that serve as conflict drivers in the construction management environment. The reasons for innovative conflicts include changes in hierarchical structures of management systems, adjustment of workers to new management conditions, changes in the ideology, etc. Conflicts under consideration may involve contradictions between requests placed by custom...

  12. SARS: Key factors in crisis management.

    Science.gov (United States)

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  13. Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme

    Institute of Scientific and Technical Information of China (English)

    Yueh-Min Huang; Hua-Yi Lin; Tzone-I Wang

    2006-01-01

    Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobility or link failures. These indicate that an ad hoc network is difficult to provide on-line access to a trusted authority server. Therefore,applying traditional Public Key Infrastructure (PKI) security framework to mobile ad hoc networks will cause insecurities.This study proposes a scalable and elastic key management scheme integrated into Cluster Based Secure Routing Protocol (CBSRP) to enhance security and non-repudiation of routing authentication, and introduces an ID-Based internal routing authentication scheme to enhance the routing performance in an internal cluster. Additionally, a method of performing routing authentication between internal and external clusters, as well as inter-cluster routing authentication, is developed.The proposed cluster-based key management scheme distributes trust to an aggregation of cluster heads using a threshold scheme faculty, provides Certificate Authority (CA) with a fault tolerance mechanism to prevent a single point of compromise or failure, and saves CA large repositories from maintaining member certificates, making ad hoc networks robust to malicious behaviors and suitable for numerous mobile devices.

  14. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  15. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  16. Hierarchical Planning Methodology for a Supply Chain Management

    National Research Council Canada - National Science Library

    Virna Ortiz-Araya; Víctor M Albornoz

    2012-01-01

      Hierarchical production planning is a widely utilized methodology for real world capacitated production planning systems with the aim of establishing different decision-making levels of the planning...

  17. Hierarchical Management to be Implemented on Ratification Risk of Certification Institution

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ Recently, the China National Accreditation Service for Conformity Assessment (CNAS) has promulgated Measures for Hierarchical Management of Ratification Risk of Certification Institution (hereinafter referred to as Measures), which was put into execution.

  18. CHANGE MANAGEMENT IS A KEY FEATURE OF INNOVATIONAL PERSONNEL MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Buntovskiy S. Y.

    2016-04-01

    Full Text Available The article examines organizational and economic preconditions of the increasing of innovative activity of the personnel of a company in the modern conditions of managing. We have substantiated conclusions about the necessity and the importance of the development and the implementation of the corporate system of innovative-personnel management at the production level. We present specific proposals on the formation of the key system-oriented blocks, the basic elements of which in their totality and interconnection will contribute to efficient implementation of management decisions on innovative capacity of production through the change in labor behavior

  19. Hierarchical Planning Methodology for a Supply Chain Management

    Directory of Open Access Journals (Sweden)

    Virna ORTIZ-ARAYA

    2012-01-01

    Full Text Available Hierarchical production planning is a widely utilized methodology for real world capacitated production planning systems with the aim of establishing different decision–making levels of the planning issues on the time horizon considered. This paper presents a hierarchical approach proposed to a company that produces reusable shopping bags in Chile and Perú, to determine the optimal allocation of resources at the tactical level as well as over the most immediate planning horizon to meet customer demands for the next weeks. Starting from an aggregated production planning model, the aggregated decisions are disaggregated into refined decisions in two levels, using a couple of optimization models that impose appropriate constraints to keep coherence of the plan on the production system. The main features of the hierarchical solution approach are presented.

  20. A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks

    Science.gov (United States)

    Kawano, Keita; Kinoshita, Kazuhiko; Yamai, Nariyoshi

    Route optimization for network mobility is a key technique for providing a node in a mobile network (Mobile Network Node or MNN) with high quality broadband communications. Many schemes adding route optimization function to Network Mobility (NEMO) Basic Support protocol, the standardized network mobility management protocol from the IETF nemo working group, have already been proposed in recent years. One such scheme, a scheme using Hierarchical Mobile IPv6 (HMIPv6) aims to overcome micromobility management issues as well by applying a mechanism based on HMIPv6. The traditional scheme, however, suffers from a significant number of signaling messages as the number of MNNs and/or the number of their Correspondent Nodes (CNs) increase, because many messages notifying the MNNs' Home Agents (HAMNNs) and the CNs of the mobile network's movement are generated simultaneously each time the mobile network moves to the domain of another micromobility management router (Mobility Anchor Point or MAP). This paper proposes a scheme to overcome this problem. Our scheme reduces the number of signaling messages generated at the same time by managing the mobility of MNNs using multiple MAPs distributed within a network for load sharing. The results of simulation experiments show that our scheme works efficiently compared to the traditional scheme when a mobile network has many MNNs and/or these MNNs communicate with many CNs.

  1. SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor

    Science.gov (United States)

    2016-11-01

    cryptography; key management ; synthesizable. I. INTRODUCTION Modern cryptographic algorithms are designed with Kerckhoffs’ Principle in mind – that...LOCKMA supports good cryptography and key management practices . However, in general a software only solution is insufficient to guarantee the...1 SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor David Whelihan, Michael Vai, Dan Utin, Roger Khazan, Karen

  2. Perceptions of food risk management among key stakeholders

    DEFF Research Database (Denmark)

    van Kleef, Ellen; Frewer, Lynn J.; Chryssochoidis, George M.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management.......In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management....

  3. Water management as a key component of integrated weed management

    Directory of Open Access Journals (Sweden)

    Giuseppe Zanin

    2011-02-01

    Full Text Available Water management within the cropping system is a key factor for an integrated weed management. Soil moisture affects seed persistence and seed dormancy, thus influencing their germination, the establishment of seedlings as well as the competition at adult stage and the number, vitality and dormancy of the new seeds produced by the weeds. The interactions among water availability and competition are very complex and still not fully understood. A research effort in this sector should the be very relevant for the development of new approaches of weed management, such as “Ecological weed management”, aiming to reduce weed density and competitiveness and, in the medium term, to prevent undesired modifications of the weed flora.

  4. Secure SCADA communication by using a modified key management scheme.

    Science.gov (United States)

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks.

  5. An Efficient Group Key Management Using Code for Key Calculation for Simultaneous Join/Leave: CKCS

    OpenAIRE

    Melisa Hajyvahabzadeh; Elina Eidkhani; S. Anahita Mortazavi; Alireza Nemaney Pour

    2012-01-01

    This paper presents an efficient group key management protocol, CKCS (Code for Key Calculation in Simultaneous join/leave) for simultaneous join/leave in secure multicast. This protocol is based on logical key hierarchy. In this protocol, when new members join the group simultaneously, server sends only thegroup key for those new members. Then, current members and new members calculate the necessary keys by node codes and one-way hash function. A node code is a random number which is assigned...

  6. INFOGRAPHIC MODELING OF THE HIERARCHICAL STRUCTURE OF THE MANAGEMENT SYSTEM EXPOSED TO AN INNOVATIVE CONFLICT

    Directory of Open Access Journals (Sweden)

    Chulkov Vitaliy Olegovich

    2012-12-01

    Full Text Available This article deals with the infographic modeling of hierarchical management systems exposed to innovative conflicts. The authors analyze the facts that serve as conflict drivers in the construction management environment. The reasons for innovative conflicts include changes in hierarchical structures of management systems, adjustment of workers to new management conditions, changes in the ideology, etc. Conflicts under consideration may involve contradictions between requests placed by customers and the legislation, any risks that may originate from the above contradiction, conflicts arising from any failure to comply with any accepted standards of conduct, etc. One of the main objectives of the theory of hierarchical structures is to develop a model capable of projecting potential innovative conflicts. Models described in the paper reflect dynamic changes in patterns of external impacts within the conflict area. The simplest model element is a monad, or an indivisible set of characteristics of participants at the pre-set level. Interaction between two monads forms a diad. Modeling of situations that involve a different number of monads, diads, resources and impacts can improve methods used to control and manage hierarchical structures in the construction industry. However, in the absence of any mathematical models employed to simulate conflict-related events, processes and situations, any research into, projection and management of interpersonal and group-to-group conflicts are to be performed in the legal environment

  7. A Low Computation Cost Key Management Solution to MANET

    Institute of Scientific and Technical Information of China (English)

    WANG Shun-man; TAO Ran; WANG Yue; XU Kai; WANG Zhan-lu

    2006-01-01

    After concisely analyzing the typical group key agreement protocols of centralized key distribution (CKD),Diffie-Hellman (DH) and group Diffie-Hellman (GDH), tree-based group Diffie-Hellman (TGDH), the paper gives out a new key management method by threshold cryptography and tree-based structure, which is proved to gain advantages in computation cost greatly and improves the MANET key management performance accordingly.

  8. Military Officer Personnel Management: Key Concepts and Statutory Provisions

    Science.gov (United States)

    2016-05-10

    Military Officer Personnel Management : Key Concepts and Statutory Provisions Lawrence Kapp Specialist in Military Manpower Policy May 10......Congressional Research Service Summary Congress and the executive branch are currently considering changes to the officer personnel management system

  9. Preventing Distribution Grid Congestion by Integrating Indirect Control in a Hierarchical Electric Vehicles Management System

    DEFF Research Database (Denmark)

    Hu, Junjie; Si, Chengyong; Lind, Morten

    2016-01-01

    In this paper, a hierarchical management system is proposed to integrate electric vehicles (EVs) into a distribution grid. Three types of actors are included in the system: Distribution system operators (DSOs), Fleet operators (FOs) and EV owners. In contrast to a typical hierarchical control...... system where the upper level controller directly controls the lower level subordinated nodes, this study aims to integrate two common indirect control methods:market-based control and price-based control into the hierarchical electric vehicles management system. Specifically, on the lower level...... of the hierarchy, the FOs coordinate the charging behaviors of their EV users using a price-based control method. A parametric utility model is used on the lower level to characterize price elasticity of electric vehicles and thus used by the FO to coordinate the individual EV charging. On the upper level...

  10. Socialization as key process in knowledge management

    Directory of Open Access Journals (Sweden)

    Francisco José GARCÍA-PEÑALVO

    2016-07-01

    Full Text Available The editorial of this second issue of volume 17,corresponding to 2016, is devoted to socialization process in the knowledge management in order to complement the special section about Social Networks and Education.

  11. A novel protocol for multiparty quantum key management

    Science.gov (United States)

    Xu, Gang; Chen, Xiu-Bo; Dou, Zhao; Yang, Yi-Xian; Li, Zongpeng

    2015-08-01

    Key management plays a fundamental role in the field of cryptography. In this paper, we propose a novel multiparty quantum key management (QKM) protocol. Departing from single-function quantum cryptography protocols, our protocol has a salient feature in that it accomplishes a complete QKM process. In this process, we can simultaneously realize the functions of key generation, key distribution and key backup by executing the protocol once. Meanwhile, for the first time, we propose the idea of multi-function QKM. Firstly, the secret key is randomly generated by managers via the quantum measurements in -level Bell basis. Then, through entanglement swapping, the secret key is successfully distributed to users. Under circumstances of urgent requirement, all managers can cooperate to recover the users' secret key, but neither of them can recover it unilaterally. Furthermore, this protocol is further generalized into the multi-manager and multi-user QKM scenario. It has clear advantages in the burgeoning area of quantum security group communication. In this system, all group members share the same group key, and group key management is the foundation of secure group communication and hence an important subject of study.

  12. An Efficient Communication Key Management Solution for MANET

    Institute of Scientific and Technical Information of China (English)

    WANG Shun-man; TAO Ran; WANG Yue

    2006-01-01

    An efficient communication key management scheme to mobile ad-hoc networks (MANET) based on the ideas of threshold cryptography is proposed, local-TTP and location-based virtual network infrastructure. The protocol is built upon a combinatorial formulation of the group key management issue. Primary features of the scheme include independent-ly computation group keys by using a hash function and the mapping of nodes for group keys. Also, the proposed scheme scales well and supports dynamic setup and management of arbitrary structures of secure group communication in MANET.

  13. MANAGING STRESS - THE KEY TO ORGANIZATIONAL WELLNESS

    Directory of Open Access Journals (Sweden)

    Bucurean Mirela

    2009-05-01

    Full Text Available In the 21 cetury, the century of fast changes, business operates faster and with more complexity and uncertainty than ever before. The impact of stress on profitability, whether creative or negative, must be understood, measured and managed in a realistic

  14. Identity management key to successful mergers

    NARCIS (Netherlands)

    S.R. Giessner (Steffen)

    2011-01-01

    textabstractAlienated employees who feel a loss of identity could place financial and strategic objectives of a merger at risk through lack of drive, reduced performance, and even sabotage. Identifying and managing these issues from the start could therefore be critical to the success of such undert

  15. Key issues for sustainable urban stormwater management.

    Science.gov (United States)

    Barbosa, A E; Fernandes, J N; David, L M

    2012-12-15

    Since ancient times, it is understood that stormwater from constructed areas should be managed somehow. Waste and pollution transported by stormwater poses quantity and quality problems, affecting public health and the quality of the environment. Sanitation infrastructures in urbanized regions have different development levels and the perception of stormwater changed considerably during the centuries and especially in recent years. Still, there is an evident worldwide heterogeneity when analyzing the lack of studies on urban stormwater conducted in some Asian or African countries. Strategies for sustainable stormwater management are needed at different decision levels (political, regional or local scale, for instance) but all of them need information and a clear understanding of the possibilities that are at stake as well as the main consequences of each decision. A sound approach to stormwater management should be flexible, based on local characteristics, and should take into consideration temporal, spatial and administrative factors and law, among other issues. Economic or technical constraints define different decision scenarios. Best Management Practices should be seen as an opportunity for development and improvement of social, educational and environmental conditions in urbanized and surrounding areas. Therefore they require an ample perspective and the participation of different stakeholders. High-quality decision needs time and a fair overview of the problem: the purpose of this document is to contribute to sustainable stormwater management, informing on the most relevant factors that should be assessed and their interaction. A flowchart has been produced and is presented, indicating the most relevant steps, processes and information that should be taken into account in urban development. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. Risk management of key issues of FPSO

    Science.gov (United States)

    Sun, Liping; Sun, Hai

    2012-12-01

    Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offloading system and fire accidents were analyzed based on the floating production, storage and offloading (FPSO) features. Fault tree analysis (FTA), and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS). Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases, statistical data, and risk control measures examined. Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process, using risk priority number (RPN) methods to evaluate their severity rank. The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offloading, and the fire FMEA gave the priorities and suggested processes. The research has practical importance for the security analysis problems of FPSO.

  17. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    Science.gov (United States)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  18. Data standardization. The key to effective management

    Science.gov (United States)

    Wagner, C. Russell

    1991-01-01

    Effective management of the nation's water resources is dependent upon accurate and consistent hydrologic information. Before the emergence of environmental concerns in the 1960's, most hydrologic information was collected by the U.S. Geological Survey and other Federal agencies that used fairly consistent methods and equipment. In the past quarter century, however, increased environmental awareness has resulted in an expansion of hydrologic data collection not only by Federal agencies, but also by state and municipal governments, university investigators, and private consulting firms. The acceptance and use of standard methods of collecting and processing hydrologic data would contribute to cost savings and to greater credibility of flow information vital to responsible assessment and management of the nation's water resources. This paper traces the evolution of the requirements and uses of open-channel flow information in the U.S., and the sequence of efforts to standardize the methods used to obtain this information in the future. The variable nature of naturally flowing rivers results in continually changing hydraulic properties of their channels. Those persons responsible for measurement of water flowing in open channels (streamflow) must use a large amount of judgement in the selection of appropriate equipment and technique to obtain accurate flow information. Standardization of the methods used in the measurement of streamflow is essential to assure consistency of data, but must also allow considerable latitude for individual judgement to meet constantly changing field conditions.

  19. A Comparative Study of Group Key Management in MANET

    Directory of Open Access Journals (Sweden)

    M. El-Bashary,

    2015-08-01

    Full Text Available A Mobile Ad-Hoc Network (MANET is a self organized network, with no fixed infrastructure, limited resources and limited physical security. Security in such an environment is an essential requirement. Key management is a salient element in MANET security. It is responsible for key generation, storage, distribution, updating, revocation, deleting, and archiving. Key management protocols are classified into symmetric, asymmetric, group, and hybrid. Group key management is a point of interest for researchers with the growing usage of mobile devices and the rising of multicast communication. This paper surveys different approaches in group key management schemes. A comparative study is demonstrated in terms of reliability, computational complexity, storage cost, communication overheads, pre-requirements, security levels, robustness, vulnerabilities, scalability, energy and mobility. Finally, the study concludes the pros and cons of each protocol.

  20. Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks

    Directory of Open Access Journals (Sweden)

    Probidita Roychoudhury

    2017-01-01

    Full Text Available In view of the exponential growth in the volume of wireless data communication among heterogeneous devices ranging from smart phones to tiny sensors across a wide range of applications, 3GPP LTE-A has standardized Machine Type Communication (MTC which allows communication between entities without any human intervention. The future 5G cellular networks also envisage massive deployment of MTC Devices (MTCDs which will increase the total number of connected devices hundredfold. This poses a huge challenge to the traditional cellular system processes, especially the traditional Mutual Authentication and Key Agreement (AKA mechanism currently used in LTE systems, as the signaling load caused by the increasingly large number of devices may have an adverse effect on the regular Human to Human (H2H traffic. A solution in the literature has been the use of group based architecture which, while addressing the authentication traffic, has their share of issues. This paper introduces Hierarchical Group based Mutual Authentication and Key Agreement (HGMAKA protocol to address those issues and also enables the small cell heterogeneous architecture in line with 5G networks to support MTC services. The aggregate Message Authentication Code based approach has been shown to be lightweight and significantly efficient in terms of resource usage compared to the existing protocols, while being robust to authentication message failures, and scalable to heterogeneous network architectures.

  1. Secure Key Management in the Cloud

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive informat......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  2. Risk Management of Key Issues of FPSO

    Institute of Scientific and Technical Information of China (English)

    Liping Sun; Hai Sun

    2012-01-01

    Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offioading system and fire accidents were analyzed based on the floating production,storage and offioading (FPSO) features.Fault tree analysis (FTA),and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS).Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases,statistical data,and risk control measures examined.Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process,using risk priority number (RPN) methods to evaluate their severity rank.The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offioading,and the fire FMEA gave the priorities and suggested processes.The research has practical importance for the security analysis problems of FPSO.

  3. Hierarchical level oF managers’ abilities: A Moderator between Quality Management Practices and Company Financial Performance

    Directory of Open Access Journals (Sweden)

    Wakhid Slamet Ciptono

    2007-09-01

    . Compared to the hierarchical level of managers’ abilities, the degree of autonomy may be a more comprehensive contribution in reference to managers’ abilities to influence an organizational system. Autonomy may not only act as a person enhancer to increase internal work motivation, but it may also serve to moderate the extent to which individuals are able to significantly influence a system. In addition, involvement and empowerment of all organizational members (including managers in cooperative and collaborative (interactive efforts to achieve quality improvements appear to be a key element to TQM. Results further reveal that world-class performance in operations (world-class company practices, operational excellence practices, and company non-financial performance positively mediates the impact of critical factors of quality management practices on company financial performance. Results also point out that three out of six critical factors of quality management practices are positively associated with world-class company practices and operational excellence practices under the moderating of hierarchical level of managers’ abilities. World-class company practices and operational excellence practices have direct and significant effects on company non-financial performance. Furthermore, empirical results suggest that there is a positive and significant relationship between company non-financial performance and company financial performance.

  4. Priority-Based Hierarchical Operational Management for Multiagent-Based Microgrids

    Directory of Open Access Journals (Sweden)

    Takumi Kato

    2014-03-01

    Full Text Available Electricity consumption in the world is constantly increasing, making our lives become more and more dependent on electricity. There are several new paradigms proposed in the field of power grids. In Japan, especially after the Great East Japan Earthquake in March 2011, the new power grid paradigms are expected to be more resilient to survive several difficulties during disasters. In this paper, we focus on microgrids and propose priority-based hierarchical operational management for multiagent-based microgrids. The proposed management is a new multiagent-based load shedding scheme and multiagent-based hierarchical architecture to realize such resilient microgrids. We developed a prototype system and performed an evaluation of the proposed management using the developed system. The result of the evaluation shows the effectiveness of our proposal in power shortage situations, such as disasters.

  5. Complex Threshold Key Management for Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    GUO Wei; XIONG Zhong-wei; LI Zhi-tang

    2005-01-01

    A complex threshold key management framework has been proposed, which can address the challenges posed by the unique nature of Ad hoc network. Depending on the cooperation of the controller and participation nodes, this scheme should be efficient in the operation environmental alteration and tolerant faults of node, which take the advantages of the benefits of both key management approaches and alleviate their limitations. For the cooperation of the controller and participation nodes, a (t,n) threshold Elliptic curve sign-encryption scheme with the specified receiver also has been proposed. Using this threshold signencryption scheme, the key management distributes the trust between a controller and a set of participation nodes.

  6. A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor networks have been used in a variety of environments; a wireless network infrastructure, established to communicate and exchange information in a monitoring area, has also been applied in different environments. However, for sensitive applications, security is the paramount issue. In this paper, we propose using bilinear pairing to design dynamic key management and authentication scheme of the hierarchical sensor network. We use the dynamic key management and the pairing-based cryptography (PBC to establish the session key and the hash message authentication code (HMAC to support the mutual authentication between the sensors and the base station. In addition, we also embed the capability of the Global Positioning System (GPS to cluster nodes to find the best path of the sensor network. The proposed scheme can also provide the requisite security of the dynamic key management, mutual authentication, and session key protection. Our scheme can defend against impersonation attack, replay attack, wormhole attack, and message manipulation attack.

  7. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  8. Key Management Building Blocks for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Palaniswami, M.

    2007-01-01

    Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly. First of all, the necessary keys need to be distributed to the nodes before the node

  9. Key Management Building Blocks for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Palaniswami, M

    2007-01-01

    Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly. First of all, the necessary keys need to be distributed to the nodes before the

  10. Institutional Research: The Key to Successful Enrollment Management.

    Science.gov (United States)

    Clagett, Craig A.

    Enrollment management includes the processes and activities that influence the size, shape, and characteristics of a student body by directing institutional efforts in marketing, recruitment, admissions, pricing, and financial aid. Institutional research plays an essential, if not the key, role in enrollment management. This report discusses the…

  11. An Efficient Key Management Protocol for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    ZENG Qingguang; CUI Yanling; LUO Juan

    2006-01-01

    Key management is a fundamental security service in wireless sensor networks. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the design and implementation of an efficient key management scheme based on low energy adaptive clustering hierarchy(LEACH) for wireless sensor networks. The design of the protocol is motivated by the observation that many sensor nodes in the network play different roles. The paper presents different keys are set to the sensors for meeting different transmitting messages and variable security requirements. Simulation results show that our key management protocol based-on LEACH can achieve better performance. The energy consumption overhead introduced is remarkably low compared with the original Kerberos schemes.

  12. Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    Sanjeev Kumar Rana

    2011-03-01

    Full Text Available Securing mobile ad hoc networks (MANETs is a crucial task for their good deployments. One fundamental aspect of providing confidentiality and authentication is key management. While Public Key Infrastructure (PKI based solutions has provided these properties historically, MANETs are resource constrained and benefit from symmetric key encryption. In this paper, we proposed a certificateless efficient group key management scheme (CE-GKMS in MANETs for group confidentiality which uses identity based cryptography for secure multicast group communication. The scheme does not need PKI in which mobile nodes needs large storage to carry certificates and to perform public key cryptography based large computation. The scheme introduced a new idea of hiding the public keys and making them visible only to the trusted nodes which not only make it difficult for cryptanalyst to crack the private information but also permit to keep small value of encryption and decryption component causes asymmetric cryptography operation faster. For scalability and dynamic reconfigurability, we divide the network into groups. Leaders in these groups securely communicate with each other to agree on group key in response to membership change and member mobility-induced events. The performance results prove the effectiveness of our proposed key management scheme CE-GKMS.

  13. Triangle-based key management scheme for wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    Hangyang DAI; Hongbing XU

    2009-01-01

    For security services in wireless sensor net-works, key management is a fundamental building block.In this article, we propose a triangle-based key predis-tribution approach and show that it can improve the effectiveness of key management in wireless sensor networks. This is achieved by using the bivariate polynomial in a triangle deployment system based on deployment information about expected locations of the sensor nodes. The analysis indicates that this scheme can achieve higher probability of both direct key establishment and indirect key establishment. On the other hand, the security analysis shows that its security against node capture would increase with a decrease of the sensor node deployment density and size of the deployment model and an increase of the polynomial degree.

  14. Information Systems Management: an Australian view of the key issues

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  15. A Multi-layer, Hierarchical Information Management System for the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Ning; Du, Pengwei; Paulson, Patrick R.; Greitzer, Frank L.; Guo, Xinxin; Hadley, Mark D.

    2011-10-10

    This paper presents the modeling approach, methodologies, and initial results of setting up a multi-layer, hierarchical information management system (IMS) for the smart grid. The IMS allows its users to analyze the data collected by multiple control and communication networks to characterize the states of the smart grid. Abnormal, corrupted, or erroneous measurement data and outliers are detected and analyzed to identify whether they are caused by random equipment failures, unintentional human errors, or deliberate tempering attempts. Data collected from different information networks are crosschecked for data integrity based on redundancy, dependency, correlation, or cross-correlations, which reveal the interdependency between data sets. A hierarchically structured reasoning mechanism is used to rank possible causes of an event to aid the system operators to proactively respond or provide mitigation recommendations to remove or neutralize the threats. The model provides satisfactory performance on identifying the cause of an event and significantly reduces the need of processing myriads of data collected.

  16. KEY FACTORS IN WORKING CAPITAL MANAGEMENT IN THE BRAZILIAN MARKET

    Directory of Open Access Journals (Sweden)

    Wilson Toshiro Nakamura

    2012-01-01

    Full Text Available Many studies have been conducted in corporate finance regarding long-term investment and financing decisions. However, short-term asset investments play a significant role in the balance sheet of companies. Moreover, financial managers dedicate significantamounts of time and effort to the subject of working capital management, balancing current assets and liabilities. This paper provides insights regarding the key factors of working capital management by exploring the internal variables of a number of companies. This study used data from 2,976 Brazilian public companies from 2001 to 2008, and found that debt level, size and growth rate can affect the working capital management of companies.

  17. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  18. A Council-based Distributed Key Management Scheme for MANETs

    Directory of Open Access Journals (Sweden)

    Mohammed ELKOUTBI

    2010-09-01

    Full Text Available Abstract—Mobile ad hoc networks (MAETs have beenproposed as an extremely flexible technology for establishingwireless communications. In comparison with fixed networks,some new security issues have arisen with the introduction ofMAETs. Secure routing, in particular, is an important andcomplicated issue. Clustering is commonly used in order to limitthe amount of secure routing information. In this work, wepropose an enhanced solution for ad hoc key management basedon a cauterized architecture. This solution uses clusters as aframework to manage cryptographic keys in a distributed way.This paper sheds light on the key management algorithm for theOLSR protocol standard. Our algorithm takes into account thenode mobility and engenders major improvements regarding thenumber of elected cluster heads to create a PKI council. Ourobjective is to distribute the certification authority functions for areduced and less mobile cluster heads that will serve for keysexchange.

  19. Optimisation of key performance measures in air cargo demand management

    Directory of Open Access Journals (Sweden)

    Alexander May

    2014-03-01

    Full Text Available This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that for Air Cargo Revenue Management, ‘Network Optimisation’ represents a critical outcome-based performance indicator. This collaborative study contributes to existing logistics management literature, especially in the area of Revenue Management, and it seeks to enhance Revenue Management practice. It also provides a platform for Air Cargo operators seeking to improve reliability values for their key performance indicators as a means of enhancing operational monitoring power.

  20. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  1. Knowledge Management – the Key Resource in the Knowledge Economy

    Directory of Open Access Journals (Sweden)

    Domingo NEVADO PEÑA

    2010-06-01

    Full Text Available The influence of global information and communication technology changes and globalization have transformed our society by favoring the economy and innovation as key driver of global competition. Creation and exploitation of knowledge has become key resource in the new economy. All advanced economies are technologically knowledgebased economy. Many of today's managers and their employees, still guided by the definition given by Francis Bacon (1597 “Knowledge is power” instead of “sharing and managing knowledge is power”. Knowing taken alone may not bring value if not shared before and then managed in an efficient manner. This article seeks to demonstrate what knowledge, what the knowledge management is and what are its main implications in the new economy, a knowledge-based economy.

  2. DNA based random key generation and management for OTP encryption.

    Science.gov (United States)

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  3. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  4. Key determinants of managing the marketing asset of global companies

    Directory of Open Access Journals (Sweden)

    Tatyana Tsygankova

    2016-12-01

    Full Text Available As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development. The article identified the optimal set of key elements of the system of marketing assets, which are the brand, customer loyalty, reputation, network cooperation, marketing strategy, internal marketing, marketing information system and marketing innovation. Due to correlation and regression analysis of the impact of each system elements on performance of global companies, the model of the "marketing asset octagon" was built as an integrative management tool. Also, as a result of construction of the said model, the authors identified the most profitable marketing assets, return on investment and development of competencies in the field of efficient management will bring the highest profit to the company. On the basis of summarizing the regional and branch features of managing the disparate elements of the marketing assets of global companies, the key regional and sectoral priorities of formation, development and improvement of existing concepts of the international marketing management were identified, particularly in terms of building an author’s integrative octagon model.

  5. Managing changes in distributed biomedical ontologies using hierarchical distributed graph transformation.

    Science.gov (United States)

    Shaban-Nejad, Arash; Haarslev, Volker

    2015-01-01

    The issue of ontology evolution and change management is inadequately addressed by available tools and algorithms, mostly due to the lack of suitable knowledge representation formalisms to deal with temporal abstract notations and the overreliance on human factors. Also most of the current approaches have been focused on changes within the internal structure of ontologies and interactions with other existing ontologies have been widely neglected. In our research, after revealing and classifying some of the common alterations in a number of popular biomedical ontologies, we present a novel agent-based framework, Represent, Legitimate and Reproduce (RLR), to semi-automatically manage the evolution of bio-ontologies, with emphasis on the FungalWeb Ontology, with minimal human intervention. RLR assists and guides ontology engineers through the change management process in general and aids in tracking and representing the changes, particularly through the use of category theory and hierarchical graph transformation.

  6. Replication and extension of a hierarchical model of social anxiety and depression: fear of positive evaluation as a key unique factor in social anxiety.

    Science.gov (United States)

    Weeks, Justin W

    2015-01-01

    Wang, Hsu, Chiu, and Liang (2012, Journal of Anxiety Disorders, 26, 215-224) recently proposed a hierarchical model of social interaction anxiety and depression to account for both the commonalities and distinctions between these conditions. In the present paper, this model was extended to more broadly encompass the symptoms of social anxiety disorder, and replicated in a large unselected, undergraduate sample (n = 585). Structural equation modeling (SEM) and hierarchical regression analyses were employed. Negative affect and positive affect were conceptualized as general factors shared by social anxiety and depression; fear of negative evaluation (FNE) and disqualification of positive social outcomes were operationalized as specific factors, and fear of positive evaluation (FPE) was operationalized as a factor unique to social anxiety. This extended hierarchical model explicates structural relationships among these factors, in which the higher-level, general factors (i.e., high negative affect and low positive affect) represent vulnerability markers of both social anxiety and depression, and the lower-level factors (i.e., FNE, disqualification of positive social outcomes, and FPE) are the dimensions of specific cognitive features. Results from SEM and hierarchical regression analyses converged in support of the extended model. FPE is further supported as a key symptom that differentiates social anxiety from depression.

  7. An efficient scalable key management scheme for secure group communication

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jun; GU Da-wu; MA Fan-yuan; BAI Ying-cai

    2006-01-01

    Several multicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliable multicast infrastructure, this approach results in a highly efficient key update mechanism in which the number of multicast messages transmitted upon a membership update is proportional to the depth of the tree,which is logarithmic to the size of the secure multicast group. But this is based on the hypothesis that the tree is maintained in a balanced manner. This paper proposes a scalable rekeying scheme-link-tree structure for implementing secure group communication. Theoretical calculation and experimentation show that this scheme has better performance than the tree structure and the star structure, and at the same time still keep the link-tree structure balanced.

  8. Hierarchical Linear Modeling (HLM): An Introduction to Key Concepts within Cross-Sectional and Growth Modeling Frameworks. Technical Report #1308

    Science.gov (United States)

    Anderson, Daniel

    2012-01-01

    This manuscript provides an overview of hierarchical linear modeling (HLM), as part of a series of papers covering topics relevant to consumers of educational research. HLM is tremendously flexible, allowing researchers to specify relations across multiple "levels" of the educational system (e.g., students, classrooms, schools, etc.).…

  9. Securing Mobile Ad hoc Networks:Key Management and Routing

    CERN Document Server

    Chauhan, Kamal Kumar; 10.5121/ijans.2012.2207

    2012-01-01

    Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network's topology causes weak trust relationship among the nodes in the network. In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs ...

  10. Results-based management - Developing one's key results areas (KRAs).

    Science.gov (United States)

    Kansal, Om Prakash; Goel, Sonu

    2015-01-01

    In spite of aspiring to be a good manager, we public health experts fail to evaluate ourselves against our personal and professional goals. The Key Result Areas (KRAs) or key performance indicators (KPIs) help us in setting our operational (day-to-day) and/or strategic (long-term) goals followed by grading ourselves at different times of our careers. These shall help in assessing our strengths and weaknesses. The weakest KRA should set the maximum extent to which one should use his/her skills and abilities to have the greatest impact on his/her career.

  11. The Assistant Manager - a Key Factor of the Managerial Team

    Directory of Open Access Journals (Sweden)

    Lecturer Ph. D. Niculina Vargolici

    2009-05-01

    Full Text Available The new economic context, marked by the crisis and by radical transformations of the labor market, generates the need for more and more sophisticated skills for the assistant manager. That is because the efficiency of the secretarial activity implies both strategic skills and complex abilities, starting from knowledge about the specific activity of the company/institution where the person works as assistant manager, to connected areas such as: management, marketing, human resources, brand communication, company’s culture etc. Whether the manager changes his job together with the “boss”, or the boss is changed and he is bond to adapt to new conditions, a strong team spirit between the manager and his assistant is one of the most important elements that contribute to the productivity and efficiency of the both. The loyalty to the boss and to the company where he works, his adaptation capacity, his competence and his professionalism make the today’s assistant manager a key factor of the managerial team. The essence of the assistant manager job consists in making more efficient the managerial activities, namely, to make it respond to the expectations expressed or not of the manager, or even to anticipate them.

  12. Hierarchically Coordinated Power Management for Target Tracking in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Feng Juan

    2013-10-01

    Full Text Available Energy efficiency is very important for wireless sensor networks (WSNs since sensor nodes have a limited energy supply from a battery. So far, a lot research has focused on this issue, while less emphasis has been placed on the adaptive sleep time for each node with a consideration for the application constraints. In this paper, we propose a hierarchically coordinated power management (HCPM approach, which both addresses the energy conservation problem and reduces the packet forwarding delay for target tracking WSNs based on a virtual‐grid‐based network structure. We extend the network lifetime by adopting an adaptive sleep scheduling scheme that combines the local power management (PM and the adaptive coordinate PM strategies to schedule the activities of the sensor nodes at the surveillance stage. Furthermore, we propose a hierarchical structure for the tracking stage. Experimental results show that the proposed approach has a greater capability of extending the network lifetime while maintaining a short transmission delay when compared with the protocol which does not consider the application constraints in target tracking sensor networks.

  13. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  14. EXPLORING THE KEY ASPECTS OF MANAGEMENT ORGANIZATIONS IN SHIPPING BUSINESS

    Directory of Open Access Journals (Sweden)

    Metin Celik

    2008-01-01

    Full Text Available Ship management, recognized as one of the complex business disciplines, consists of various managerial aspects in different levels of organization hierarchy such as administrative, technical, and operational. On the other hand, the requirements of international maritime rules & regulations, market competitiveness, safety and environmental related concerns are the primarily constraints in maritime transportation industry. This paper mainly concentrates on identification of key issues within the concept of ship management in shore-based organizational level. Consequently, the relative importance of the each item is determined quantitatively by utilizing Analytic Network Process (ANP that led to ensure dependencies and feedbacks between relevant aspects.

  15. Multicast Address Management and Connection Control Based on Hierarchical Autonomous Structure

    Institute of Scientific and Technical Information of China (English)

    WANG Jian; ZHANG Fuyan

    1999-01-01

    Multicast capability, including multicast address and multicast routing mechanisms, at the network layeris necessary in order to reduce the bandwidth requirements of multiparty, multicast applications. Based on hierarchical autonomous structure in accordance with the self-organization topologies of Internet, the paper puts forward a multicast address management scheme that is shown to be robust and scalable. Connection control hierarchy (CCH) based on master/slave relationship and a simple efficient building algorithm of multi-point connection is also built. The paper also describes the normal operations of multicast address management andmulti-point connection controller. Through simulation experiment, HAM, CM and DDM of Multicast Address Allocation are compared. HAM integrates the merits of CM and DDM, which is efficient as a whole, robust andscalable. CCH raises the efficiency of connection control, and is highly robust, flexible and scalable.

  16. THE MANAGEMENT OF KNOWLEDGE WORKERS – KEY FACTOR OF SUCCES

    Directory of Open Access Journals (Sweden)

    Claudia-Elena ŢUCLEA

    2007-01-01

    Full Text Available The traditional companies are built on familiar bedrock of buildings, plants, and inventories. Competitive advantage is viewed in terms of scale and volume stemming from high-capacity use of machine-based factories. Such an approach fails to recognize how the leverage of knowledge is becoming a key to long-term success. Nowadays, organizations must recognize that power resides in the minds of their best people, who are diffused throughout the business and the organizations are becoming more dependent on people than ever before. The recruitment and the employment of knowledge workers are becoming very important issues from Romanian managers. The competitiveness is the only chance to deal with a very challenging market, especially after European integration. In this paper we present the results of a survey of the opinions of Romanian managers about the most effective strategies for recruitment, motivation and retention the knowledge workers. The study investigated two groups of managers: the first group included the managers who never were involved in activities related to human resources, and the second, the managers who have been involved. The managers from the first group chose theoretical the strategies they considered most effective; the managers for the second group indicated the strategies they applied.

  17. A Cluster based Key Management Scheme for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Seema Verma

    2015-08-01

    Full Text Available Underwater Wireless Sensor Networks (UWSNs explore aquatic environment to facilitate various underwater surveillance applications. However, UWSN unique features also impose new challenges such as limited bandwidth, huge propagation delay, mobile nature of nodes and high error rates. UWSNs deployment in unattended environment further exacerbates their vulnerabilities to the attacks. These challenges make security solutions proposed for Wireless Sensor Network (WSN impractical to be applicable for UWSN. This paper analyzes the problem of security and mobility in UWSN and proposes Cluster based Key management Protocol (CKP, a new key management protocol for hierarchical networks where sensor nodes form cluster around more capable nodes. CKP also proposes a new communication architecture that handles mobility efficiently and minimizes the impact of a node compromisation to itself. CKP provides confidentiality, authentication, integrity and freshness. The performance evaluation demonstrates that the CKP is energy and storage-efficient. Further, we investigate the survivability and the security of the CKP against various security threats in order to evaluate its effectiveness.

  18. Information Systems Management: an Australasian view of key issues - 1996

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1997-11-01

    Full Text Available As part of a longitudinal study of key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by the IS executives as being important, problematic and critical over the next three to five years. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, communications, disaster recovery, strategic management issues (competitive advantage, IS planning, aligning the IS organisation, people management issues (organisational learning, educating senior management in IT, systems development and data management issues (effective use of the data resource, and end-user computing. This reflects the need for a balance of business, technical, and people skills in an IS executive. Non-critical issues were mostly related to systems development and the individual technologies which must be integrated and managed to ensure a responsive IT infrastructure. The study also reveals that some issues are much more important than problematic (disaster recovery, competitive advantage, information architecture, and IS alignment while others are much more problematic than important (end-user computing, IS role and contribution, and BPR. The former reflects a growing level of knowledge in handling these issues, while the latter reflects a continuing problem with them. The differences between this study and similar studies conducted in 1988 and 1992 show that there is a growing confidence in the IS executive's ability to manage the strategic issues, a continuing concern about providing a responsive IT infrastructure (especially communications, and a continuing concern with educating all 'customers' in the organisation in the effective use of IT, including senior management.

  19. Analysis of key competencies in museums. Proposal for a tool to assess key competencies in museum managers

    Directory of Open Access Journals (Sweden)

    Zara Marcela Arguello Arciniegas

    2015-11-01

    Full Text Available Within the field of Cultural Management, such a wide world and sometimes so difficult to outline in terms of all-encompassing, key competencies play a very important role. Therefore, we have tried to propose a tool to assess key competencies in cultural managers who perform their professional work in museums. We present a set of key competencies and then, a list of ten key competencies which are considered important for the staff of cultural management of a museum. For this it is assumed, first, the key competencies proposed by the universities offering master's degrees in official Cultural Management in Spain and, second, the key competencies proposed for the ICOM museum workers. Finally, we present a tool for the evaluation of the chosen key competencies.

  20. Hierarchical adaptation scheme for multiagent data fusion and resource management in situation analysis

    Science.gov (United States)

    Benaskeur, Abder R.; Roy, Jean

    2001-08-01

    Sensor Management (SM) has to do with how to best manage, coordinate and organize the use of sensing resources in a manner that synergistically improves the process of data fusion. Based on the contextual information, SM develops options for collecting further information, allocates and directs the sensors towards the achievement of the mission goals and/or tunes the parameters for the realtime improvement of the effectiveness of the sensing process. Conscious of the important role that SM has to play in modern data fusion systems, we are currently studying advanced SM Concepts that would help increase the survivability of the current Halifax and Iroquois Class ships, as well as their possible future upgrades. For this purpose, a hierarchical scheme has been proposed for data fusion and resource management adaptation, based on the control theory and within the process refinement paradigm of the JDL data fusion model, and taking into account the multi-agent model put forward by the SASS Group for the situation analysis process. The novelty of this work lies in the unified framework that has been defined for tackling the adaptation of both the fusion process and the sensor/weapon management.

  1. [Key performance indicators of OR efficiency. Myths and evidence of key performance indicators in OR management].

    Science.gov (United States)

    Schuster, M; Wicha, L L; Fiege, M

    2007-03-01

    A variety of different key performance indicators, both for process and financial performance, are used to evaluate OR efficiency. Certain indicators like OR utilization and turnover times seem to become common standard in many hospitals to evaluate OR process performance. Despite the general use and availability of these indicators in OR management, the scientific evidence behind these data is relatively low. These process indicators are strongly influenced by artefacts and depend on planning process, resource allocation and documentation. Direct financial indicators become more important with increasing autonomy of OR management. Besides budgetary compliance the focus is set on the net results of internal transfer pricing systems. By taking part in an internal transfer pricing system, OR management develops from a mere passive cost center to an active shaper of perioperative processes. However, detailed knowledge of the origin of costs and pitfalls of internal transfer pricing systems is crucial. The increased transparency due to the free accessibility of diagnosis-related-groups (DRG) cost breakdown data can help to develop tools for economic analysis of OR efficiency.

  2. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  3. Energy Management Systems and tertiary regulation in hierarchical control architectures for islanded micro-grids

    DEFF Research Database (Denmark)

    Sanseverino, Eleonora Riva; Di Silvestre, Maria Luisa; Quang, Ninh Nguyen;

    2015-01-01

    In this paper, the structure of the highest level of a hierarchical control architecture for micro-grids is proposed. Such structure includes two sub-levels: the Energy Management System, EMS, and the tertiary regulation. The first devoted to energy resources allocation in each time slot based...... on marginal production costs, the latter aiming at finding the match between production and consumption satisfying the constraints set by the EMS level about the energy production in each time slot. Neglecting the efficiency of the different energy generation systems as well as that of the infrastructure...... for electrical energy distribution, the problem dealt with by the EMS sub-level is linear and can be solved by well known Linear Programming optimization procedures. The tertiary sub-level, below the EMS, optimizes mainly technical objectives and requires the solution of the Optimal Power Flow problem. After...

  4. A Comparative Study of Key Management Protocols for WSN

    Directory of Open Access Journals (Sweden)

    Seema Verma

    2014-03-01

    Full Text Available Increased employment of WSN (Wireless Sensor Network in real life applications and their hostile and remote locations accelerate demand of security in WSN. Publicly accessible wireless communication channel also makes WSN vulnerable to numerous security attacks. Scarcity of resources acquaints new sort of challenges and difficulties during implementation of effective security mechanisms. In this paper, we evaluate and compare performance of three different security mechanisms (ECRKS, CKP and AP scheme. ECRKS (Energy-efficient, Connected, Resilient Key pre-distribution Scheme is based upon multi hop communication architecture specifically designed for homogeneous WSN. Clustering based protocols, AP (Asymmetric pre-distribution scheme and CKP (Clustering based Key management Protocol are proposed for heterogeneous WSN. All the above mentioned schemes are simulated in MATLAB to evaluate their effectiveness and suitability for WSN. Simulation result shows that CKP outperforms other two schemes in terms of transmission distance, memory burden, energy dissipation and resilience.

  5. Probabilistic Key Management Practical Concerns in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rui Miguel Soares Silva

    2008-02-01

    Full Text Available The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made concerning the peculiarities of resource constrains inherent to sensor devices. One of the most accepted proposals is based on random distribution of keys among the sensor nodes, which was followed by some variants in order to increase its security. In this paper we introduce the mathematical concepts behind this class of proposals through a step-by-step mathematical analysis. This leads to some practical concerns about its applicability to real world applications where the technological constrains strictly compromise the mathematical theoretical models. We demonstrate that the number of communication links needed to assure near 100% network connectivity, is in fact, impractical in nowadays applications.

  6. Leading processes of patient care and treatment in hierarchical healthcare organizations in Sweden--process managers' experiences.

    Science.gov (United States)

    Nilsson, Kerstin; Sandoff, Mette

    2015-01-01

    The purpose of this study is to gain better understanding of the roles and functions of process managers by describing Swedish process managers' experiences of leading processes involving patient care and treatment when working in a hierarchical health-care organization. This study is based on an explorative design. The data were gathered from interviews with 12 process managers at three Swedish hospitals. These data underwent qualitative and interpretative analysis with a modified editing style. The process managers' experiences of leading processes in a hierarchical health-care organization are described under three themes: having or not having a mandate, exposure to conflict situations and leading process development. The results indicate a need for clarity regarding process manager's responsibility and work content, which need to be communicated to all managers and staff involved in the patient care and treatment process, irrespective of department. There also needs to be an emphasis on realistic expectations and orientation of the goals that are an intrinsic part of the task of being a process manager. Generalizations from the results of the qualitative interview studies are limited, but a deeper understanding of the phenomenon was reached, which, in turn, can be transferred to similar settings. This study contributes qualitative descriptions of leading care and treatment processes in a functional, hierarchical health-care organization from process managers' experiences, a subject that has not been investigated earlier.

  7. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Yee Wei; Corin, Ricardo; Etalle, Sandro; Hartel, Pieter H.; Conti, Marco; Giordano, Silvia; Gregori, Enrico; Olariu, Stephan

    2003-01-01

    We present a decentralized key management architecture for wireless sensor networks (WSNs), covering the aspects of key deployment, key refreshment and key establishment. Our architecture is based on a clear set of assumptions and guidelines. Key deployment uses minimal key storage while key refresh

  8. Distributed mixed-integer fuzzy hierarchical programming for municipal solid waste management. Part II: scheme analysis and mechanism revelation.

    Science.gov (United States)

    Cheng, Guanhui; Huang, Guohe; Dong, Cong; Xu, Ye; Chen, Jiapei; Chen, Xiujuan; Li, Kailong

    2017-02-16

    As presented in the first companion paper, distributed mixed-integer fuzzy hierarchical programming (DMIFHP) was developed for municipal solid waste management (MSWM) under complexities of heterogeneities, hierarchy, discreteness, and interactions. Beijing was selected as a representative case. This paper focuses on presenting the obtained schemes and the revealed mechanisms of the Beijing MSWM system. The optimal MSWM schemes for Beijing under various solid waste treatment policies and their differences are deliberated. The impacts of facility expansion, hierarchy, and spatial heterogeneities and potential extensions of DMIFHP are also discussed. A few of findings are revealed from the results and a series of comparisons and analyses. For instance, DMIFHP is capable of robustly reflecting these complexities in MSWM systems, especially for Beijing. The optimal MSWM schemes are of fragmented patterns due to the dominant role of the proximity principle in allocating solid waste treatment resources, and they are closely related to regulated ratios of landfilling, incineration, and composting. Communities without significant differences among distances to different types of treatment facilities are more sensitive to these ratios than others. The complexities of hierarchy and heterogeneities pose significant impacts on MSWM practices. Spatial dislocation of MSW generation rates and facility capacities caused by unreasonable planning in the past may result in insufficient utilization of treatment capacities under substantial influences of transportation costs. The problems of unreasonable MSWM planning, e.g., severe imbalance among different technologies and complete vacancy of ten facilities, should be gained deliberation of the public and the municipal or local governments in Beijing. These findings are helpful for gaining insights into MSWM systems under these complexities, mitigating key challenges in the planning of these systems, improving the related management

  9. Key management and encryption under the bounded storage model.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Neumann, William Douglas; Lanzone, Andrew J.; Anderson, William Erik

    2005-11-01

    There are several engineering obstacles that need to be solved before key management and encryption under the bounded storage model can be realized. One of the critical obstacles hindering its adoption is the construction of a scheme that achieves reliable communication in the event that timing synchronization errors occur. One of the main accomplishments of this project was the development of a new scheme that solves this problem. We show in general that there exist message encoding techniques under the bounded storage model that provide an arbitrarily small probability of transmission error. We compute the maximum capacity of this channel using the unsynchronized key-expansion as side-channel information at the decoder and provide tight lower bounds for a particular class of key-expansion functions that are pseudo-invariant to timing errors. Using our results in combination with Dziembowski et al. [11] encryption scheme we can construct a scheme that solves the timing synchronization error problem. In addition to this work we conducted a detailed case study of current and future storage technologies. We analyzed the cost, capacity, and storage data rate of various technologies, so that precise security parameters can be developed for bounded storage encryption schemes. This will provide an invaluable tool for developing these schemes in practice.

  10. Key Account Management ve vybrané obchodní firmě

    OpenAIRE

    Nováková, Michaela

    2016-01-01

    This bachelor thesis is aimed at Key account management especially evaluation of the process of implementation and realization of the Key account management in a selected business company. The theoretical part is dedicated to the study of theoretical knowledge. There is described a trade, wholesale and retail, management, relationship management, key account management and marketing research. The practical part of this thesis describes process of implementation and realization of the Key Acco...

  11. 护士分层管理的实践及体会%Practice of hierarchical nurse management

    Institute of Scientific and Technical Information of China (English)

    杨秀菊

    2014-01-01

    The author implemented hierarchical nurse management in her hospital. The nurses were divided into four levels according to their education level, professional skills and working years. The nurses in different level had different clearly deifned responsibilities, and they got regularly evaluation from nurse managers. After implementing hierarchical management, nursing care quality, doctor satisfaction, patient satisfaction, and staff satisfaction all improved.%根据护士的学历、专业技能、年资等将护士分为4个层级,界定各层级护士职责,进行培训、使用、考核等。通过实施护士分层管理,护理质量及患者、医生、护士对护理工作满意度均得以提高。

  12. A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei

    2016-04-09

    With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes.

  13. Soil management: The key to soil quality and sustainable agriculture

    Science.gov (United States)

    Basch, Gottlieb; Barão, Lúcia; Soares, Miguel

    2017-04-01

    Today, after the International Year of Soils in 2015 and the proclamation by the International Union of Soil Sciences of the International Decade of Soils 2015-2020, much attention is paid to soil quality. Often used interchangeably, both terms, soil quality and soil health, refer to dynamic soil properties such as soil organic matter or pH, while soil quality also includes inherent soil properties such as texture or mineral composition. However, it is the dynamic or manageable properties that adequate soil management can influence and thus contribute to a well-functioning soil environment capable to deliver the soil-mediated provisioning, regulating and supporting ecosystem services and soil functions. This contribution intends to highlight the key principles of sustainable soil management and provide evidence that they are compliant with a productive, resource efficient and ecologically friendly agriculture. Paradoxically, and despite benefitting from good soil quality, agriculture itself when based on conventional, especially intensive tillage-based soil management practices contributes decisively to soil degradation and to several of the soil threats as identified by the Soil Thematic Strategy, being soil erosion and soil organic matter decline the most notorious ones. To mitigate soil degradation, the European Union's Common Agricultural Policy has introduced conservation measures, mainly through cross-compliance measures supposed to guarantee minimum soil cover, to limit soil erosion and to maintain the levels of soil organic matter. However, it remains unclear to what extent EU member states apply these 'Good Agricultural and Environmental Condition' (GAEC) measures to their utilized agricultural areas. Effective and cost-efficient soil management systems able to conserve or to restore favourable soil conditions, to minimize soil erosion and to invert soil organic matter and soil biodiversity decline and improve soil structure are those capable to mimic as

  14. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  15. Risk assessment and hierarchical risk management of enterprises in chemical industrial parks based on catastrophe theory.

    Science.gov (United States)

    Chen, Yu; Song, Guobao; Yang, Fenglin; Zhang, Shushen; Zhang, Yun; Liu, Zhenyu

    2012-12-03

    According to risk systems theory and the characteristics of the chemical industry, an index system was established for risk assessment of enterprises in chemical industrial parks (CIPs) based on the inherent risk of the source, effectiveness of the prevention and control mechanism, and vulnerability of the receptor. A comprehensive risk assessment method based on catastrophe theory was then proposed and used to analyze the risk levels of ten major chemical enterprises in the Songmu Island CIP, China. According to the principle of equal distribution function, the chemical enterprise risk level was divided into the following five levels: 1.0 (very safe), 0.8 (safe), 0.6 (generally recognized as safe, GRAS), 0.4 (unsafe), 0.2 (very unsafe). The results revealed five enterprises (50%) with an unsafe risk level, and another five enterprises (50%) at the generally recognized as safe risk level. This method solves the multi-objective evaluation and decision-making problem. Additionally, this method involves simple calculations and provides an effective technique for risk assessment and hierarchical risk management of enterprises in CIPs.

  16. 探讨护理组长在护理层级管理中的作用%Role of group leader in the nursing hierarchical management

    Institute of Scientific and Technical Information of China (English)

    卢美萍

    2015-01-01

    目的:探究护理组长在护理层级当中起到的作用。方法护士排班顺序按在护士长-护理组长-责任护士-助理护士来进行,全面发挥护理组长在护理层级当中的作用,领导该组护士完成患者的各种治疗与护理工作。最后比较实施层级管理后护理人员的各项成绩,即:病区质量、护理效果、病患满意度。结果实施层级管理过后对护理人员的知识技能、护理病区质量、病患满意度进行比较,所得结果,差异具有统计学意义(P<0.05)。另外,在实施层级管理过后,护理人员的知识技能、护理病区质量、病患满意度都有所提升。结论护理组长在层级管理当中起到了关键性的作用,可以合理安排人力资源,从而提高护理人员的工作质量,维护医院的社会形象。%Objective To explore the role of group leader in the nursing hierarchical management.MethodsThe nursing work was arranged according to the order of the head nurse - group leader- responsible nurse-assistant nurse, so as that the group leader could fully play the role in the nursing hierarchical management, who could lead the group to take a variety of treatment and nursing for patients. Finally, the performances of nursing staff such as the quality of nursing, nursing effect, patients' satisfaction were compared after the implementation of the hierarchical management. Results After the implementation of the hierarchical management of nursing, the nurses' knowledge and skills, nursing quality and patients' satisfaction were compared with before. Results shows that nurses' knowledge and skills, nursing quality and patients' satisfaction were all improved after the implementation of the hierarchical management, what's more,P is less than 0.05, therefore, the difference was statistically significant.Conclusion Nursing group leaders play a key role in the hierarchical management, who can arrange human resources reasonably

  17. Clusters Regarding Key Factors Affecting Changes in Accounting, Finance, Administration and Management Control

    OpenAIRE

    Rodica Gabriela Blidisel; Adina Simona Popa; Raimondo Lo Russo; Maria Moraru

    2010-01-01

    During the last decade, important changes have occurred in public governance, which has evolved in this time from hierarchical bureaucracy to participatory governance, where the role of citizens in public decision-making process is more direct. There were performed reforms in finance, management administration and finances of public sector. Starting from the factors that influenced during the history the accounting, finances, administration and management control, we want to test the factors ...

  18. Numerical expression of general relationships in hierarchical data base management systems

    Energy Technology Data Exchange (ETDEWEB)

    Hall, R. C.

    1980-01-01

    The need for a means to express general relationships among entity occurrences in hierarchical data bases is addressed. Integer expression of general path segments is described as a means to meet this need. Operations on the expressions are also described. Two possible implementations are discussed. Both implementations are compatible with the hierarchical data model, and provide a logical extension that permits representation of many-to-many relationships. 4 figures.

  19. Web Application for Hierarchical Organizational Structure Optimization – Human Resource Management Case Study

    Directory of Open Access Journals (Sweden)

    Kofjač Davorin

    2015-08-01

    Full Text Available Background and Purpose: In a complex strictly hierarchical organizational structure, undesired oscillations may occur, which have not yet been adequately addressed. Therefore, parameter values, which define fluctuations and transitions from one state to another, need to be optimized to prevent oscillations and to keep parameter values between lower and upper bounds. The objective was to develop a simulation model of hierarchical organizational structure as a web application to help in solving the aforementioned problem.

  20. A data management proposal to connect in a hierarchical way nodes of the Spanish Long Term Ecological Research (LTER) network

    Science.gov (United States)

    Fuentes, Daniel; Pérez-Luque, Antonio J.; Bonet García, Francisco J.; Moreno-LLorca, Ricardo A.; Sánchez-Cano, Francisco M.; Suárez-Muñoz, María

    2017-04-01

    The Long Term Ecological Research (LTER) network aims to provide the scientific community, policy makers, and society with the knowledge and predictive understanding necessary to conserve, protect, and manage the ecosystems. LTER is organized into networks ranging from the global to national scale. In the top of network, the International Long Term Ecological Research (ILTER) Network coordinates among ecological researchers and LTER research networks at local, regional and global scales. In Spain, the Spanish Long Term Ecological Research (LTER-Spain) network was built to foster the collaboration and coordination between longest-lived ecological researchers and networks on a local scale. Currently composed by nine nodes, this network facilitates the data exchange, documentation and preservation encouraging the development of cross-disciplinary works. However, most nodes have no specific information systems, tools or qualified personnel to manage their data for continued conservation and there are no harmonized methodologies for long-term monitoring protocols. Hence, the main challenge is to place the nodes in its correct position in the network, providing the best tools that allow them to manage their data autonomously and make it easier for them to access information and knowledge in the network. This work proposes a connected structure composed by four LTER nodes located in southern Spain. The structure is built considering hierarchical approach: nodes that create information which is documented using metadata standards (such as Ecological Metadata Language, EML); and others nodes that gather metadata and information. We also take into account the capacity of each node to manage their own data and the premise that the data and metadata must be maintained where it is generated. The current state of the nodes is a follows: two of them have their own information management system (Sierra Nevada-Granada and Doñana Long-Term Socio-ecological Research Platform) and

  1. Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Fa-gen; GAO Jun-tao; LIU Shuang-gen; HU Yu-pu

    2006-01-01

    This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).

  2. Key characteristics relevant for selecting knowledge management software tools

    CSIR Research Space (South Africa)

    Smuts, H

    2011-07-01

    Full Text Available phenomenon that makes the use of technology not an option, but a necessity. Software tools in knowledge management are a collection of technologies and are not necessarily acquired as a single software solution. Furthermore, these knowledge management...

  3. Key actions towards the sustainable management of European geese

    DEFF Research Database (Denmark)

    Stroud, David A.; Madsen, Jesper; Fox, Anthony D.

    2017-01-01

    by differences in species' ecology, behaviour, abundance and population status, and in contrasting political and socio-economic environments across the flyways. Effective goose management requires coordinated application of a suite of tools from the local level to strategic flyway management actions....... The European Goose Management Platform, established under the Agreement on the Conservation of African-Eurasian Migratory Waterbirds, aims to harmonise and prioritise management, monitoring and conservation efforts, sharing best practice internationally by facilitating agreed policies, coordinating flyway...

  4. The Application of Hierarchical Management in the Management of Obstetrical Nursing%层级管理在产科护理管理中的应用

    Institute of Scientific and Technical Information of China (English)

    汪颖; 邵品超; 金明石

    2014-01-01

    Objective To explore the application of hierarchical management in the management of obstetrical nursing. Methods Hierarchical nursing management was implemented in the obstetrics and compared the difference of nursing satisfaction and nursing quality assessment results before and after implementing the management. Results 1) Patients' satisfaction on nurses in the department of obstetrics before and after practicing the hierarchical management in terms of service attitude, the working ability, communication, ward management and overall evaluation was improved with significantly statistical difference (P<0.05). 2) Patients' satisfaction on senior and junior nurses before and after practicing the hierarchical management was improved with significantly statistical difference (P<0.05), so was on nurses with technical school education or bachelor degree (P<0.05). 3) Theoretical knowledge, basic nursing, professional nursing, nursing records, nursing care of critically ill patients and ward management of nurses in obstetrics were significantly improved (P < 0.05). Conclusion Hierarchical management could improve the nursing quality in the department of obstetrics and worth being popularized.%目的探讨层级管理在产科护理管理中的应用。方法在我院妇产科实施层级护理管理,比较实施层级护理管理前后住院患者对护理工作满意度及护理部对护理质量考核得分的变化。结果实施层级护理管理后取得了以下效果:(1)患者对护士的服务、工作能力、沟通及病区管理及总体评价都有显著提高。(2)患者对初级护士和高级护士的评价显著提高,对中专学历及本科学历护士的满意度显著提高。(3)产科护士在理论知识、基础护理、专科护理、护理文书、危重患者护理、病房管理等方面显著提高。结论层级护理管理能够提高产科护理质量,值得在临床工作中广泛推广。

  5. A Key Management Scheme for ZigBee in AMI of Smart Grid

    Institute of Scientific and Technical Information of China (English)

    Jianquan Liang; Xianji Jin; Shuidong Dai; Weiming Tong; Zhongwei Li

    2016-01-01

    Advanced metering infrastructure ( AMI) is a critical part of the smart grid, and ZigBee is playing an increasingly important role in AMI. The cyber security is the prerequisite to ensure the reliable operation of AMI. To guarantee the ZigBee communication security in AMI, a key management scheme based on the elliptic curve cryptosystem ( ECC) is proposed. According to the ways of information transformation in AMI, the scheme is categorized as unicast communication key management process and multicast communication key management process. And in the scheme, the selection of elliptic curve, the calculation of ZigBee node’ s ECC public key and private key, the establishment and distribution of the link key in unicast communication, and the establishment and distribution of the network key in multicast communication are elaborated. The analysis results show that the proposed key management scheme is secure, and consumes less memory and energy, thus, can meet the demands of communication security of AMI.

  6. Sanitary Landfilling – A Key Component of Waste Management

    OpenAIRE

    Johann Fellner

    2013-01-01

    In many affluent countries waste management is experiencing a fast transition from landfilling to sophisticated recycling and waste to energy plants. Thus, landfilling of waste becomes less important in these countries. The present paper discusses whether a similar development will take place in transition economies, or waste management systems will mainly rely on landfilling in the near future. For this purpose, the current waste management practices and associated environmental impacts as w...

  7. Leadership – The Key Element in Improving Quality Management

    Directory of Open Access Journals (Sweden)

    Iveta Paulová

    2011-10-01

    Full Text Available The present contribution is processed partial results of the survey application of leadership as one of the fundamental principles of quality management in organizations in the Slovak Republic. This survey was conducted in the research project VEGA No. 1/0229/08 Perspectives of quality management development in coherence with requirements of Slovak republic market. Results from the survey were the basis for proposals to improve the quality management in Slovak industrial organizations

  8. IPTV traffic management using topology-based hierarchical scheduling in Carrier Ethernet transport networks

    DEFF Research Database (Denmark)

    Yu, Hao; Yan, Ying; Berger, Michael Stubert

    2009-01-01

    of Service (QoS) provisioning abilities, which guarantee end-to-end performances of voice, video and data traffic delivered over networks. This paper introduces a topology-based hierarchical scheduler scheme, which controls the incoming traffic at the edge of the network based on the network topology...

  9. Successful customer value management : Key lessons and emerging trends

    NARCIS (Netherlands)

    Verhoef, P.C.; Lemon, Katherine

    In the past decade, firms have paid increasing attention to customer value management (CVM). Through customer-centric management systems, firms aim to maximize customer value. In this article, we put forth six important lessons that firms can employ for successful CVM, integrating available research

  10. Successful customer value management : Key lessons and emerging trends

    NARCIS (Netherlands)

    Verhoef, P.C.; Lemon, Katherine

    2013-01-01

    In the past decade, firms have paid increasing attention to customer value management (CVM). Through customer-centric management systems, firms aim to maximize customer value. In this article, we put forth six important lessons that firms can employ for successful CVM, integrating available research

  11. Successful customer value management : Key lessons and emerging trends

    NARCIS (Netherlands)

    Verhoef, P.C.; Lemon, Katherine

    2013-01-01

    In the past decade, firms have paid increasing attention to customer value management (CVM). Through customer-centric management systems, firms aim to maximize customer value. In this article, we put forth six important lessons that firms can employ for successful CVM, integrating available research

  12. Disseminated Public-Key Management and Certificate Generation Scheme for MANET

    Directory of Open Access Journals (Sweden)

    Sanjay Kumar Chowlam

    2011-07-01

    Full Text Available In this paper, we first discuss the predominant assail abilities in the mobile ad hoc networks, which have made it much easier to prone to attacks than the traditional wired network. Then we discuss the basic operations of our public-key management scheme: creation of public (and private keys, issuing public-key certificates, storage of certificates, and key authentication by the nodes themselves without the control of any principal authority. More over the public key management scheme serves as an underlying mechanism for both key distribution and establishing security relationships between nodes.

  13. Key Practice for Green Building Management In Malaysia

    Directory of Open Access Journals (Sweden)

    Aghili Nasim

    2016-01-01

    Full Text Available This paper identifies the management practices for green building management in Malaysia. A set of practices was ascertained from the reviewed of various established Green Building Standard in the world. Green building practices are significant role in attaining sustainability particularly in the construction industry. Green building is constructed for minimizing impacts to environment as well as decreasing building effects on occupants. To achieve the goals of green buildings, set of management practices is required. A comprehensive review on the world green building standards that include the criteria of “management” has been carried out. The results of the content analysis have identified a total of five clusters of practices that found important for effective management of green building in Malaysia. These including Sustainable Procurement, Sustainable Operation, Resource Management, Repair and Maintenance Management, and Environmental Health. Each cluster of management practice composed of few activities. The identification of the set of practices contributes to the effective and efficient operation of green building in advancing the sustainability agenda, hence decreasing building’s operating costs and realising increase in return of investment.

  14. Interdisciplinary and participatory approaches: the key to effective groundwater management

    Science.gov (United States)

    Barthel, Roland; Foster, Stephen; Villholth, Karen G.

    2017-06-01

    The challenges of a changing world, which are progressively threatening sustainable use of groundwater resources, can only be rationally and effectively addressed through close collaboration between experts and practitioners from different disciplines. Furthermore, science and management need to build on stakeholder opinions and processes in order to generate useful knowledge and positive outcomes in terms of sustainable and equitable groundwater management. This essay provides a discussion of the status of and vision for participatory and inter-disciplinary approaches to groundwater evaluation and management as well as a conceptual framework and relevant research questions that will facilitate such approaches.

  15. Quality Management and Key Performance Indicators in Oncologic Esophageal Surgery.

    Science.gov (United States)

    Gockel, Ines; Ahlbrand, Constantin Johannes; Arras, Michael; Schreiber, Elke Maria; Lang, Hauke

    2015-12-01

    Ranking systems and comparisons of quality and performance indicators will be of increasing relevance for complex "high-risk" procedures such as esophageal cancer surgery. The identification of evidence-based standards relevant for key performance indicators in esophageal surgery is essential for establishing monitoring systems and furthermore a requirement to enhance treatment quality. In the course of this review, we analyze the key performance indicators case volume, radicality of resection, and postoperative morbidity and mortality, leading to continuous quality improvement. Ranking systems established on this basis will gain increased relevance in highly complex procedures within the national and international comparison and furthermore improve the treatment of patients with esophageal carcinoma.

  16. Key challenges facing water resource management in South Africa

    CSIR Research Space (South Africa)

    Ashton, P

    2008-11-01

    Full Text Available Resource Managers The Dichotomy of Water Source of destruction, dispute and poverty • Drought and desertification • Flooding and erosion • Salinization • Malnutrition and starvation • Contamination • Epidemics and diseases • Dispute...

  17. Keys for successful implementation of total quality management in hospitals.

    Science.gov (United States)

    Carman, James M; Shortell, Stephen M; Foster, Richard W; Hughes, Edward F X; Boerstler, Heidi; O' Brien, James L; O'Connor, Edward J

    2010-01-01

    Editor's Note: This article reports the findings of an analysis of the implementation of continuous quality improvement (CQI) or total quality management (TQM) programs in 10 hospitals. This analysis is the result of a 2-year study designed to identify and assess the ingredients that lead to the successful implementation of CQI programs in acute care hospitals. This article first appeared in Health Care Management Review 21(1), 48-60. Copyright © 1996 Aspen Publishers, Inc. (Lippincott Williams & Wilkins).

  18. Teaching Tip: Utilizing Classroom Simulation to Convey Key Concepts in IT Portfolio Management

    Science.gov (United States)

    Larson, Eric C.

    2013-01-01

    Managing a portfolio of IT projects is an important capability for firms and their managers. The classroom simulation described here provides students in an MBA information systems management/strategy course with the opportunity to deepen their understanding of the key concepts that should be considered in managing an IT portfolio and helps…

  19. Teaching Tip: Utilizing Classroom Simulation to Convey Key Concepts in IT Portfolio Management

    Science.gov (United States)

    Larson, Eric C.

    2013-01-01

    Managing a portfolio of IT projects is an important capability for firms and their managers. The classroom simulation described here provides students in an MBA information systems management/strategy course with the opportunity to deepen their understanding of the key concepts that should be considered in managing an IT portfolio and helps…

  20. Key success factors for clinical knowledge management systems: Comparing physician and hospital manager viewpoints.

    Science.gov (United States)

    Chang, Sho-Fang; Hsieh, Ping-Jung; Chen, Hui-Fang

    2015-01-01

    The study explores the perceptions of physicians and hospital managers regarding the key success factors (KSFs) of a clinical knowledge management system (CKMS). It aims to eliminate the perception gap and gain more insights for a successful CKMS.A survey was conducted in four medical centers in Taiwan. A total of 340 questionnaires, including 15 for hospital managers and 70 for physicians in each hospital, were administered. The effective response rates are 78.3% and 56.1% respectively. Partial least square (PLS) were used to analyze the data.The results identified six KSFs of CKMS including system software and hardware, knowledge quality, system quality, organizational factors, user satisfaction, and policy factors. User satisfaction and policy factors have direct effects on perceived CKMS performance. Knowledge quality is regarded as an antecedent to user satisfaction, while system quality is the antecedent to both user satisfaction and policy factors. System software and hardware was supported only by managers, and organizational factors were supported only by physicians.Among the factors, this study highlighted the policy factor. Besides, the study provides hospital managers additional insights into physician requirements for organizational support. Third, more physician participation and involvement are recommended when introducing and developing a CKMS.

  1. Clusters Regarding Key Factors Affecting Changes in Accounting, Finance, Administration and Management Control

    Directory of Open Access Journals (Sweden)

    Rodica Gabriela Blidisel

    2010-01-01

    Full Text Available During the last decade, important changes have occurred in public governance, which has evolved in this time from hierarchical bureaucracy to participatory governance, where the role of citizens in public decision-making process is more direct. There were performed reforms in finance, management administration and finances of public sector. Starting from the factors that influenced during the history the accounting, finances, administration and management control, we want to test the factors that affect the changes of these elements in Romanian environment.

  2. Key actions towards the sustainable management of European geese.

    Science.gov (United States)

    Stroud, David A; Madsen, Jesper; Fox, Anthony D

    2017-03-01

    Increasing abundance of geese in North America and Europe constitutes a major conservation success, but has caused increasing conflicts with economic, health and safety interests, as well as ecosystem impacts. Potential conflict resolution through a single, 'one size fits all' policy is hindered by differences in species' ecology, behaviour, abundance and population status, and in contrasting political and socio-economic environments across the flyways. Effective goose management requires coordinated application of a suite of tools from the local level to strategic flyway management actions. The European Goose Management Platform, established under the Agreement on the Conservation of African-Eurasian Migratory Waterbirds, aims to harmonise and prioritise management, monitoring and conservation efforts, sharing best practice internationally by facilitating agreed policies, coordinating flyway efforts, and sharing and exchanging experiences and information. This depends crucially upon adequate government financing, the collection of necessary monitoring data (e.g., on distribution, abundance, hunting bags, demography, ecosystem and agricultural damage), the collation and effective use of such data and information, as well as the evaluation of outcomes of existing management measures.

  3. THE KEY POSITIONS OF STRATEGIC MANAGEMENT AT THE ENTERPRISE

    Directory of Open Access Journals (Sweden)

    Elena BARANOV

    2012-01-01

    Full Text Available The external environment in which there are now a variety of forms of economic organization, it is qualitatively different: it is constantly increasing degree of uncertainty, there are unaccounted for risk factors. Management must now be better able to market self-regulation. More and more talk about the new role of management, new approaches to strategic planning and management. The strategy is not only as a tool to study, develop and implement long-term goals and objectives of the industrial, scientific, technical, economic, organizational and social nature, not only as a factor that regulates the activities of the organization until such time as the planned goals and objectives are achieved, but also as a means of communication enterprise with foreign market environment.

  4. ACHIEVING VALUE FROM ICT IN SMES: KEY MANAGEMENT STRATEGIES

    Directory of Open Access Journals (Sweden)

    K. Johnston

    2009-01-01

    Full Text Available ICT covers a broad range of fields in business and therefore makes ICT value difficult to simply define. The main factors that influence the use of ICT are therefore important to look at, as they give a good understanding of the how much influence the organisation has, on achieving value in its given context. The transformational model of ICT use was analysed to establish how SMEs in South Africa achieve business value from ICT and what management practices are most effective. Implications of the research are that management practices are an important factor that influences the value from ICT, and that the more management practices organisations implement, the greater the business value from ICT. Further findings of this study deduced that organisations that are more ICT aware, gain greater business value from ICT, with value achievement from ICT largely within the organisation’s control. This paper concludes with recommendations for future research.

  5. THE MANAGEMENT OF KNOWLEDGE WORKERS – KEY FACTOR OF SUCCES

    OpenAIRE

    Claudia-Elena ŢUCLEA; Gabriela ŢIGU

    2007-01-01

    The traditional companies are built on familiar bedrock of buildings, plants, and inventories. Competitive advantage is viewed in terms of scale and volume stemming from high-capacity use of machine-based factories. Such an approach fails to recognize how the leverage of knowledge is becoming a key to long-term success. Nowadays, organizations must recognize that power resides in the minds of their best people, who are diffused throughout the business and the organizations are becoming more d...

  6. Key safety parameters in the optimization of fuel management

    Energy Technology Data Exchange (ETDEWEB)

    Kollmar, W.; Boehm, R.; Dernedde, I.; Haase, H.; Kiehlmann, H.D.; Neufert, A.

    1988-08-01

    Nuclear design related key safety parameters and admissible parameter ranges are defined for reload cycles which are so similar in safety terms as to allow these to be covered by generic reload safety analyses in advance. The conceptual frame of such safety analyses together with the resulting economic benefits are illustrated by four concrete applications demonstrating reduction of excessive safety margins, increase in discharge burnup, streamlining of steam break analysis, and increase in operational flexibility of first cores.

  7. KALwEN: a new practical and interoperable key management scheme for body sensor networks

    NARCIS (Netherlands)

    Law, Yee Wei; Moniava, Giorgi; Gong, Zheng; Hartel, Pieter; Palaniswami, Marimuthu

    2010-01-01

    Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made. The challenge is taken on, and the result is KALwEN,

  8. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Science.gov (United States)

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain. PMID:22319333

  9. Innovation & Collaboration Are Keys to Campus Water Management

    Science.gov (United States)

    Thaler-Carter, Ruth E.

    2013-01-01

    Water, water everywhere--managing and conserving water resources is a major factor at campuses worldwide. Doing so is a challenge, since water is one of the most-used and ubiquitous resources in any environment. Water is often taken for granted and not measured by the people who use it the most, yet it might have the greatest potential for helping…

  10. Resource management as a key factor for sustainable urban planning

    NARCIS (Netherlands)

    Agudelo Vera, C.M.; Mels, A.R.; Keesman, K.J.; Rijnaarts, H.H.M.

    2011-01-01

    Due to fast urbanization and increasing living standards, the environmental sustainability of our global society becomes more and more questionable. In this historical review we investigate the role of resources management (RM) and urban planning (UP) and propose ways for integration in sustainable

  11. Media Management Education: Key Themes, Pedagogies, and Challenges

    Science.gov (United States)

    Förster, Kati; Rohn, Ulrike

    2015-01-01

    The media sphere has changed significantly as a result of globalization, technology, and new habits of media use. Scholars in journalism and mass communication thus call on a transformation and reinvention of higher education in the field. The purpose of this article is to investigate how media management is taught across different institutions,…

  12. Innovation & Collaboration Are Keys to Campus Water Management

    Science.gov (United States)

    Thaler-Carter, Ruth E.

    2013-01-01

    Water, water everywhere--managing and conserving water resources is a major factor at campuses worldwide. Doing so is a challenge, since water is one of the most-used and ubiquitous resources in any environment. Water is often taken for granted and not measured by the people who use it the most, yet it might have the greatest potential for helping…

  13. Personnel Management - The Key for Making Force Modernization Payoff.

    Science.gov (United States)

    2014-09-26

    moving away. The trauma of a Permanent Change of Station move for families and soldiers ordered to join the division has been delayed in some cases...officials, in conjunction with commanders and personnel managers. This predicted personnel nightmare was partially a result of TOE changes and the

  14. Key Institutions in Business and Management Education Research

    Science.gov (United States)

    Fornaciari, Charles J.; Arbaugh, J. B.; Asarta, Carlos J.; Bento, Regina F.; Hwang, Alvin; Lund Dean, Kathy

    2017-01-01

    The authors investigate institutional productivity in business and management education (BME) research based on the analysis of 4,464 articles published by 7,210 authors across 17 BME journals over a 10-year period, involving approximately 1,900 schools worldwide. Departing from traditional disciplinary silos, they examine the BME research field…

  15. Land literacy improvement: Key to sustainable natural resources management

    OpenAIRE

    Catacutan, Delia C.; Tabbada, A.; Duque, Caroline

    2003-01-01

    In this issue we cover the topic on education and advocacy on natural resources management. This was identified by the Working Group No. 2 led by Ms. Dulce Elazegui of ISPPS-UPLB during the Policy Workshop on the First Bukidnon NRM Policy Forum, 8-9 November 2001, Valencia City.

  16. Total Cost of Ownership: Key Infrastructure Management Tool.

    Science.gov (United States)

    Bolton, Denny G.

    2001-01-01

    Many school districts have planned only for upfront software and hardware costs (one-quarter of "real" costs). This article examines major cost components of client-server computing, discusses TCO (total cost of ownership) as a tool for managing investment in technology, and considers how to leverage cost-reduction strategies. (MLH)

  17. Networking: A Key to Career Communication and Management Consulting Success

    Science.gov (United States)

    Clark, Thomas

    2009-01-01

    Now that job security with one organization is a relic of the past and companies are outsourcing training and other "nonessential" functions, the author suggests in his career communication classes that students develop the same inventive strategies to plan their employment futures that management consultants use to market themselves in the 21st…

  18. Case management: key to access, quality, and financial success.

    Science.gov (United States)

    Smith, Alison P

    2003-01-01

    Several strategic, organizational, and operational variables drive successful case management programs. Organizational goals and accountability for support by administrative and medical staff leaders set the stage for a comprehensive program. The integration of utilization review, discharge planning, and other functions into the role of the case manager improves productivity and continuity. Choosing a model for assigning patients, a variable unique to the institution, should be carefully considered. Regardless of the power of strategic goals or the creative selection of a model, daily practices that promote daily review and communication will reveal all of the opportunities for improved performance. Complications are avoided one patient at a time and patients deserve vigilance. Length of stay is shortened 1 day at a time and we can no longer afford to miss these opportunities. In the period of high census, an unnecessary day for one patient at the end of his/her stay may mean another patient being diverted to another hospital away from his/her physician and past medical records. Creating constructive physician partnerships and cooperative relationships with postacute care providers can bring a case management program to higher level of performance. While many organizations have employees called "case managers," fewer have a comprehensive approach that has the potential to drive so many important indicators of performance.

  19. Waste to energy – key element for sustainable waste management

    Energy Technology Data Exchange (ETDEWEB)

    Brunner, Paul H., E-mail: paul.h.brunner@tuwien.ac.at; Rechberger, Helmut

    2015-03-15

    Highlights: • First paper on the importance of incineration from a urban metabolism point of view. • Proves that incineration is necessary for sustainable waste management. • Historical and technical overview of 100 years development of MSW incineration. - Abstract: Human activities inevitably result in wastes. The higher the material turnover, and the more complex and divers the materials produced, the more challenging it is for waste management to reach the goals of “protection of men and environment” and “resource conservation”. Waste incineration, introduced originally for volume reduction and hygienic reasons, went through a long and intense development. Together with prevention and recycling measures, waste to energy (WTE) facilities contribute significantly to reaching the goals of waste management. Sophisticated air pollution control (APC) devices ensure that emissions are environmentally safe. Incinerators are crucial and unique for the complete destruction of hazardous organic materials, to reduce risks due to pathogenic microorganisms and viruses, and for concentrating valuable as well as toxic metals in certain fractions. Bottom ash and APC residues have become new sources of secondary metals, hence incineration has become a materials recycling facility, too. WTE plants are supporting decisions about waste and environmental management: They can routinely and cost effectively supply information about chemical waste composition as well as about the ratio of biogenic to fossil carbon in MSW and off-gas.

  20. MANAGEMENT IN LAND USE PLANNING: PROBLEMS AND KEY PERFORMANCE INDICATORS

    Directory of Open Access Journals (Sweden)

    Gorbunov V. S.

    2016-09-01

    Full Text Available The Russian and the world economy can be characterized as crisis ones. The economic crisis in modern society is perceived as ordinary, it is a part of its daily occurrence. The management and the organization of functioning in different spheres of economy traditionally treats management activity, at the same time the manager's profession in Russia is discredited completely. In the economy of Russia the institute of the professional managers who are ready to perform high-quality services in the land market, and at the same to meet time requirements imposed both from users of land services was not created. Recovery of trust to the leading class of the society undermined in decades of the carried-out socioeconomic transformations affecting all spheres of life of society is the basis of successful development of the country. The first step in ladder of development of national economy always was land issues and there still is. It is possible to carry out the economic transformations affecting the taxation and property without knowing how much the land costs currently. However, without the strong base it is impossible to construct high economic potential of welfare of society. Consideration of topical issues of preparation of the new and already performing the professional activity managerial personnel in the market of land resources in Russia became the purpose of this article

  1. Cultural Intelligence as a Key Construct for Global Talent Management

    NARCIS (Netherlands)

    Bücker, J.J.L.E.

    2014-01-01

    This chapter focuses on the competencies needed to undertake global talent management (GTM), according to the concept of cultural intelligence (CQ) and its four main dimensions. Using real-world examples and excerpts from interviews with relevant actors in this field, this chapter outlines the CQ co

  2. Professional Development and Networking: The Keys to Managing My Career

    Science.gov (United States)

    Reilly, Cindy

    2013-01-01

    In this article, the author describes her journey serving in five school districts and finally becoming a business manager in her hometown in Wisconsin. Having become involved in professional organizations and working to share what she knows, she became recognized as a skilled business official and thus never had a problem finding a job or…

  3. Key Elements of the Tutorial Support Management Model

    Science.gov (United States)

    Lynch, Grace; Paasuke, Philip

    2011-01-01

    In response to an exponential growth in enrolments the "Tutorial Support Management" (TSM) model has been adopted by Open Universities Australia (OUA) after a two-year project on the provision of online tutor support in first year, online undergraduate units. The essential focus of the TSM model was the development of a systemic approach…

  4. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Aldridge, Hal [ORNL; Duren, Mike [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC; Bertino, Elisa [ORNL; Kulatunga, Athula [Purdue University; Navaratne, Uditha Sudheera [Purdue University

    2011-01-01

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  5. Classroom Management: Key to Teacher SuccessPenn

    OpenAIRE

    Meister, Denise G.

    2013-01-01

    to affect student behavior through instructional management. His best-known work was completed in the 1970s, where he conducted two major case studies. From educational psychologist to a well-known theorist today, Kounin brought a novel idea that incorporated both the instructional and disciplinary aspects of the classroom together. Before this happened, most educators viewed their role as simply passing on skills and knowledge to passive listeners. After publishing his book, Discipline...

  6. Audit as Key Element of System Management Improvement in Company

    Directory of Open Access Journals (Sweden)

    L. Wojtynek

    2007-07-01

    Full Text Available This article presents what is an audit for a company, tries to regularize the quality audits, presents main differences between separate types of audits and between audit and control. There are also some exemplary types of nonconformance in a company. Each system has a risk of deficiencies. They can result from material defects or human imperfection. A good quality system should allow the company to detect them in an organized and systematical manner. It guarantees that the irregularities will be removed before they cause a defective production. Quality management consists of planning the quality via quality plans, control and research plans, and supervision and verification by audits and controls. The objective of this paper is to present a special message of audit for organizations which is the improvement of management system in company. Quality audit is used with reference to quality system and its elements, to process, products and services. It compares the real values with expected ones with reference to the activities connected with quality and their results, and planned data. Thanks to quality audits, it is possible to state if the quality management instruments achieve the desired effect. Quality audit can be conducted for the internal and external purposes. One of the quality audit purposes is to estimate if the improvement is necessary or to take corrective actions. The universality of audit, which is completed by periodic system review preformed by head management, allows the use of its application effects both on the strategic and operational effects. Audit is often misled with quality monitoring or control, i.e. activities which aim to control the process or accept the product. Therefore this paper shows the differences between the notions. The information used to conduct an audit is only based on facts (evidence objective, which really exist, independent on emotions or prejudice. They can be documented, declared, based on observed

  7. Intelligent Financial Forecasting, The key for a Successful Management

    OpenAIRE

    Logica Banica; Daniela Pirvu; Alina Hagiu

    2012-01-01

    Given the prolonged economic crisis felt by entire business world, companies have turned to knowledge, processing and analyzing information as powerful tools of top management. IT market has provided business intelligence software, useful for companies in their effort to obtain current situation viewed from different angles, and projections that underpin decision-making strategy. In this article we focused on two goals: the presentation of the concept and the environment to realize a financia...

  8. Polarity management: the key challenge for integrated health systems.

    Science.gov (United States)

    Burns, L R

    1999-01-01

    Integrated health systems are confronted with numerous dilemmas that must be managed. Many of these dilemmas are an inherent part of the system's structure, given that multiple competing hospitals, medical groups, and (sometimes) health plans are often under one organizational roof. This article presents an analysis of these dilemmas--referred to in the management literature as polarities--as they are found in six integrated health systems in Illinois. The nine polarities that must be managed include (1) hospital systems that want to be organizations of physicians; (2) system expansion by growing the physician component; (3) system centralization and physician decentralization; (4) centripetal and centrifugal forces involving physicians; (5) system objectives and physician interests; (6) system centralization and hospital decentralization; (7) primary care physicians and specialists; (8) physician autonomy via collectivization; and (9) vertical and virtual integration. The article identifies some of the solutions to the polarities that have been enacted by systems. In general, executives and physicians in integrated health systems must attend to the processes of integration as much as or more than the structures of integration.

  9. Waste to energy--key element for sustainable waste management.

    Science.gov (United States)

    Brunner, Paul H; Rechberger, Helmut

    2015-03-01

    Human activities inevitably result in wastes. The higher the material turnover, and the more complex and divers the materials produced, the more challenging it is for waste management to reach the goals of "protection of men and environment" and "resource conservation". Waste incineration, introduced originally for volume reduction and hygienic reasons, went through a long and intense development. Together with prevention and recycling measures, waste to energy (WTE) facilities contribute significantly to reaching the goals of waste management. Sophisticated air pollution control (APC) devices ensure that emissions are environmentally safe. Incinerators are crucial and unique for the complete destruction of hazardous organic materials, to reduce risks due to pathogenic microorganisms and viruses, and for concentrating valuable as well as toxic metals in certain fractions. Bottom ash and APC residues have become new sources of secondary metals, hence incineration has become a materials recycling facility, too. WTE plants are supporting decisions about waste and environmental management: They can routinely and cost effectively supply information about chemical waste composition as well as about the ratio of biogenic to fossil carbon in MSW and off-gas. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  11. Perceived triggers of asthma: key to symptom perception and management.

    Science.gov (United States)

    Janssens, T; Ritz, T

    2013-09-01

    Adequate asthma management depends on an accurate identification of asthma triggers. A review of the literature on trigger perception in asthma shows that individuals vary in their perception of asthma triggers and that the correlation between self-reported asthma triggers and allergy tests is only modest. In this article, we provide an overview of psychological mechanisms involved in the process of asthma triggers identification. We identify sources of errors in trigger identification and targets for behavioural interventions that aim to improve the accuracy of asthma trigger identification and thereby enhance asthma control.

  12. Key Features in the Management of Pulmonary Carcinosarcoma

    Directory of Open Access Journals (Sweden)

    Nikolaos Panagiotopoulos

    2016-01-01

    Full Text Available Pulmonary carcinosarcoma represents a category of extremely rare tumours accounting for 0.1% of all lung malignancies. It is defined as a poorly differentiated non-small-cell carcinoma that contains a component of sarcoma or sarcoma-like elements. These biphasic tumours typically have a poor prognosis due to late diagnosis and early metastases. Preoperative tissue diagnosis is usually difficult due to the heterogeneity of the tumour, with biopsies often just reflecting one element of the tumour. By means of a case illustration and review of the literature, we discuss the optimal management of patients with pulmonary carcinosarcoma.

  13. Microgrids: Hierarchical Control and an Overview of the Control and Reserve Management Strategies

    DEFF Research Database (Denmark)

    Vandoorn, T.L.; Vasquez, Juan Carlos; de Kooning, D.M.

    2013-01-01

    in the network, allowing the DG units to actively contribute in the frequency and voltage regulation. Microgrids can provide such coordination by aggregating DG, (controllable) loads and storage in small-scale networks, that can operate both in grid-connected and islanded mode. Here, the islanded operating...... as either local or centralized. In this article, the hierarchical control for application in microgrids is discussed and an overview of the control strategies is given with respect to the reserve provision by the DG units, loads and storage equipment....

  14. Knowledge communication: a key to successful crisis management.

    Science.gov (United States)

    Johansson, Anders; Härenstam, Malin

    2013-09-01

    A winning concept of crisis management can be summarized in 2 words: knowledge communication. If decision makers, communicators, experts, and the public understand what the crisis is about and share their knowledge, the process of handling it will be optimized. Effective crisis communication implies the necessity of an unhindered but purposeful exchange of information within and between authorities, organizations, media, involved individuals, and groups before, during, and after a crisis. This article focuses on the importance of the before, or prevention, part of a crisis since it holds a rich possibility to enhance the chances for successful crisis management of a bioterrorism incident. An extended perspective on crisis communication efficiently links to a more thorough understanding of risk perception with various stakeholders and the public, which also will be helpful for situational awareness. Furthermore, the grounded baseline for the dialogue type of crisis communication suitable in modern society and to modern social media is achieved by linking to those risk communication efforts that are made. The link between risk and crisis should be afforded more attention since, especially in biosecurity, there would be no crisis without risk negligence and poor or malfunctioning preventive efforts.

  15. Geriatric hip fracture management: keys to providing a successful program.

    Science.gov (United States)

    Basu, N; Natour, M; Mounasamy, V; Kates, S L

    2016-10-01

    Hip fractures are a common event in older adults and are associated with significant morbidity, mortality and costs. This review examines the necessary elements required to implement a successful geriatric fracture program and identifies some of the barriers faced when implementing a successful program. The Geriatric Fracture Center (GFC) is a treatment model that standardizes the approach to the geriatric fracture patient. It is based on five principles: surgical fracture management; early operative intervention; medical co-management with geriatricians; patient-centered, standard order sets to employ best practices; and early discharge planning with a focus on early functional rehabilitation. Implementing a geriatric fracture program begins with an assessment of the hospital's data on hip fractures and standard care metrics such as length of stay, complications, time to surgery, readmission rates and costs. Business planning is essential along with the medical planning process. To successfully develop and implement such a program, strong physician leadership is necessary to articulate both a short- and long-term plan for implementation. Good communication is essential-those organizing a geriatric fracture program must be able to implement standardized plans of care working with all members of the healthcare team and must also be able to foster relationships both within the hospital and with other institutions in the community. Finally, a program of continual quality improvement must be undertaken to ensure that performance outcomes are improving patient care.

  16. Key concepts in the management of difficult hemorrhagic cases.

    Science.gov (United States)

    MacLaren, Robert

    2007-09-01

    Goals of hemorrhage management involve promoting coagulation and reducing fibrinolysis to enhance clot formation and stability, and minimizing hemorrhagic expansion to reduce the likelihood of adverse outcomes. The optimal hemostatic regimen to obtain these goals will differ according to the clinical scenario. Two hypothetical cases of patients with hemorrhage are presented that are typical of those encountered by clinical pharmacists who practice in centers that treat trauma or surgical patients or patients in need of emergency or critical care because of serious bleeding. To maximize therapy, the clinician must be aware of how best to clinically apply hemostatic agents, their comparative benefits and disadvantages, and the optimal methods for monitoring their effectiveness and toxicities.

  17. Resource management as a key factor for sustainable urban planning.

    Science.gov (United States)

    Agudelo-Vera, Claudia M; Mels, Adriaan R; Keesman, Karel J; Rijnaarts, Huub H M

    2011-10-01

    Due to fast urbanization and increasing living standards, the environmental sustainability of our global society becomes more and more questionable. In this historical review we investigate the role of resources management (RM) and urban planning (UP) and propose ways for integration in sustainable development (SD). RM follows the principle of circular causation, and we reflect on to what extent RM has been an element for urban planning. Since the existence of the first settlements, a close relationship between RM, urbanization and technological development has been present. RM followed the demand for urban resources like water, energy, and food. In history, RM has been fostered by innovation and technology developments and has driven population growth and urbanization. Recent massive resource demand, especially in relation to energy and material flows, has altered natural ecosystems and has resulted in environmental degradation. UP has developed separately in response to different questions. UP followed the demand for improved living conditions, often associated to safety, good manufacturing and trading conditions and appropriate sanitation and waste management. In history UP has been a developing research area, especially since the industrial era and the related strong urbanization at the end of the 18th century. UP responded to new emerging problems in urban areas and became increasingly complex. Nowadays, UP has to address many objectives that are often conflicting, including, the urban sustainability. Our current urban un-sustainability is rooted in massive resource consumption and waste production beyond natural limits, and the absence of flows from waste to resources. Therefore, sustainable urban development requires integration of RM into UP. We propose new ways to this integration.

  18. Personal health records: key adoption issues and implications for management.

    Science.gov (United States)

    Raisinghani, Mahesh S; Young, Erika

    2008-01-01

    Electronic Personal Health Records (PHRs) has been perceived as the tool to empower consumers to become active decision-makers of their healthcare instead of leaving the decision to providers. However, there has been the lack of enthusiasm and adoption of PHRs. This paper examines the current healthcare climate and attempts to understand the major challenges associated with PHRs adoption. The paper-based and fragmented healthcare system is no longer appropriate for the digital economy of the 21st century. The integrated health information technology system is the solution to transform clinical practice to consumer centric and information driven. Tools such as PHRs are means to an end that provide better, safer and more affordable healthcare for consumers. However, there has been little research conducted to demonstrate PHR's tangible value, despite the widespread perceived value of these technologies. Although survey data reveals that there is a lack of awareness among the public, consumers are receptive to this concept, especially when a physician recommends it. Key issues in adopting PHRs and strategies for successful implementation of PHRs are discussed.

  19. A hierarchical approach to forest landscape pattern characterization.

    Science.gov (United States)

    Wang, Jialing; Yang, Xiaojun

    2012-01-01

    Landscape spatial patterns have increasingly been considered to be essential for environmental planning and resources management. In this study, we proposed a hierarchical approach for landscape classification and evaluation by characterizing landscape spatial patterns across different hierarchical levels. The case study site is the Red Hills region of northern Florida and southwestern Georgia, well known for its biodiversity, historic resources, and scenic beauty. We used one Landsat Enhanced Thematic Mapper image to extract land-use/-cover information. Then, we employed principal-component analysis to help identify key class-level landscape metrics for forests at different hierarchical levels, namely, open pine, upland pine, and forest as a whole. We found that the key class-level landscape metrics varied across different hierarchical levels. Compared with forest as a whole, open pine forest is much more fragmented. The landscape metric, such as CONTIG_MN, which measures whether pine patches are contiguous or not, is more important to characterize the spatial pattern of pine forest than to forest as a whole. This suggests that different metric sets should be used to characterize landscape patterns at different hierarchical levels. We further used these key metrics, along with the total class area, to classify and evaluate subwatersheds through cluster analysis. This study demonstrates a promising approach that can be used to integrate spatial patterns and processes for hierarchical forest landscape planning and management.

  20. Key Account Management - nøglen til vækst?

    DEFF Research Database (Denmark)

    Skogberg, Simon

    2011-01-01

    Artiklen tager afsæt i en beskrivelse af begrebet Key Account Management samt den udvikling begrebet har gennemgået de senere år. Artiklen diskuterer problemstillingen om hvorvidt virksomheder skal implementere Key Account Management som et styringsredskab, men sætter samtidig spørgsmålstegn ved om...... Key Account Management nu også er den frelser som faglitteraturen ofte betegner det som. Artiklen inddrager eksempler fra en nordjysk energivirksomhed, hvis aktuelle situation illustrerer de udfordringer mange virksomheder i praksis står overfor....

  1. GPs have key role in managing motor neurone disease.

    Science.gov (United States)

    Orrell, Richard W

    2011-09-01

    Motor neurone disease (MND) is a rapidly progressive neurodegenerative condition. It affects people of all ages, but is more common with increasing age (especially over 50 years) and men are affected twice as often as women. The causes remain unknown, although around 5% of cases have a genetic basis. Survival is usually only three to five years from diagnosis. MND affects both upper and lower motor neurones, with variable contributions. The nerve involvement in MND usually has a focal onset, is asymmetrical, but tends to spread to adjacent regions of the body. If the affected region is in the legs, a common presenting feature is tripping, falls or foot drop. If it is in the arms there may be difficulty with fine tasks such as fastening buttons, or raising an arm, and if the cranial nerves are affected there may be slurring of speech, or difficulty swallowing. Key to the diagnosis is evidence of progression, and this may lead to some delay in considering and also confirming the diagnosis. When examining the patient, evidence of more widespread neuromuscular involvement should be looked for. In a patient with foot drop, and fasciculation of the tongue, MND would be a likely diagnosis. Upper motor neurone involvement may be readily determined by examining the reflexes. Brisk reflexes, in the arms, legs or jaw, in the context of features of lower motor neurone denervation are highly suggestive of MND. Suspicion of MND should lead to referral for a neurology opinion. The most useful investigation is likely to be EMG with nerve conduction studies, and probably MRI scan of relevant areas. Blood tests are arranged to screen for any other causative condition. Riluzole is a disease modifying drug licensed to extend the life of patients with MND. There is no treatment that will reverse, or halt, progression of the disease.

  2. A Framework for Group Key Management Protocol Assessment Independent of View Synchrony

    Directory of Open Access Journals (Sweden)

    David Manz

    2010-01-01

    Full Text Available Problem statement: As group key management extended into the area of large dynamic networks, complex issues emerged involving the many operations that run over several network topologies. The issues that occurred due to multiple topologies were also compounded by differing views of the network, taken at different time slices or positions within the network. This was especially complex when figuring in mobile, ad-hoc networks. View synchrony is the current operational technique, or assumption, applied to group key exchange protocols. However, before this analysis view synchrony was just that, an assumption and the literature for group key exchange lacked an inquiry into what could happen when view synchrony was removed. Current group key management protocols rely on view synchrony and yet all protocols vary in requisite operational descriptions and performance measures. In this study, a framework for group key management protocol operations and performance measures was defined and examined how that framework could be used to compare and contrast existing protocols with and, more importantly, without view synchrony. Approach: Current literature lacked categories by which to quantify the performance metric of the protocols. This study first defined the dynamic key operations that all protocols share. By these definitions, group key management protocols were directly compared. Once definitions existed, this study assembled a list of costs that every protocol requires to establish and share keys across the dynamic group. These results provided an understanding of view synchrony's role and whether or not it should be solely relied on in these current protocols. Results: The prior conclusion that view synchrony was an integral part of all group key management protocols was shattered, when seen through the lens of communication costs and assumptions in wireless ad-hoc networks. View synchrony, as an assumed part of all group key management was

  3. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-03-05

    used trust mechanism. Many studies used certificate-based public key manage- ent. However, they have brought out practical limitations cluding high...certificate-based public key management hemes cited above expose practical limitations, including eeding a centralized trusted CA [25] , high...ent sociability derived from the trust profile availabl a priori as well as dynamic social behavior measure by the number of nodes that a node

  4. Designing new institutions for implementing integrated disaster risk management: key elements and future directions.

    Science.gov (United States)

    Gopalakrishnan, Chennat; Okada, Norio

    2007-12-01

    The goal of integrated disaster risk management is to promote an overall improvement in the quality of safety and security in a region, city or community at disaster risk. This paper presents the case for a thorough overhaul of the institutional component of integrated disaster risk management. A review of disaster management institutions in the United States indicates significant weaknesses in their ability to contribute effectively to the implementation of integrated disaster risk management. Our analysis and findings identify eight key elements for the design of dynamic new disaster management institutions. Six specific approaches are suggested for incorporating the identified key elements in building new institutions that would have significant potential for enhancing the effective implementation of integrated disaster risk management. We have developed a possible blueprint for effective design and construction of efficient, sustainable and functional disaster management institutions.

  5. EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    He Jingsha

    2011-01-01

    Full Text Available Energy efficiency is an essential requirement for wireless sensor networks while security must also be ensured for mission-critical applications. In this paper, we present an energy-efficient distributed deterministic key management scheme (EDDK for resource-constrained wireless sensor networks. EDDK mainly focuses on the establishment and maintenance of the pairwise keys as well as the local cluster keys and can fix some flaws in some existing key management schemes. Not only can the neighbor table constructed during key establishment provide the security for key maintenance and data transfer, but it can also be used to effectively manage the storage and update of the keys. By using the elliptic curve digital signature algorithm in EDDK, both new and mobile sensor nodes can join or rejoin a sensor network securely. Unlike some centralized and location-based key management schemes, EDDK does not depend on such infrastructure as base stations and robots and thus has a high level of flexibility. Experiments and analyses show that EDDK has a very low overhead in terms of computation, communication, and storage.

  6. ERP as an organization innovation : Key users and cross-boundary knowledge management

    NARCIS (Netherlands)

    Maas, J.-B.; van Fenema, P.C.; Soeters, J.M.M.L.

    2016-01-01

    Purpose The purpose of this study is to provide more insight in the ways key users act as knowledge managers and boundary spanners during the enterprise resource planning (ERP) system usage phase. Despite the recognized importance of key users during the implementation phase of an ERP system, little

  7. Provably Secure Authenticated Key Agreement Protocol Based on Hierarchical Identity%基于层级化身份的可证明安全的认证密钥协商协议

    Institute of Scientific and Technical Information of China (English)

    曹晨磊; 刘明奇; 张茹; 杨义先

    2014-01-01

    目前基于身份的认证密钥协商协议均以单个私钥生成器(PKG)为可信第三方,但这种系统结构难以满足身份分层注册与认证需求。该文以基于层级化身份的加密(HIBE)系统为基础重构了私钥的组成元素,并利用椭圆曲线乘法循环群上的双线性映射提出一个基于层级化身份的认证密钥协商协议,为隶属于不同层级的云实体提供了安全的会话密钥协商机制。基于CDH(Computational Diffie-Hellman)与GDH(Gap Diffie-Hellman)假设,该文证明了新协议在eCK模型下具有已知密钥安全性、前向安全性和PKG前向安全性,并且能够抵抗基于密钥泄露的伪装攻击。%At present most Identity-based authenticated key agreement protocols are built on the security infrastructure in which a single Private Key Generator (PKG) is contained as the only trusted third party of the whole system, however such kind of infrastructure can not satisfy the requirements of hierarchical identity register and authentication. On the basis of Hierarchical Identity Based Encryption (HIBE) system, this paper reconstructs the private key and proposes a new hierarchical identity based authenticated key agreement protocol using the bilinear map in multiplicative cyclic group and it provides secure session key exchange mechanism for cloud entities on different hierarchical levels. Based on the Computational Diffie-Hellman (CDH) and Gap Diffie-Hellman (GDH) assumptions, this paper proves that the new protocol not only achieves known-key security, forward secrecy and PKG forward secrecy, but also resists key-compromise impersonation attacks in the eCK model.

  8. Key Account Management v mezinárodní organizaci AIESEC

    OpenAIRE

    Sochor, Ondřej

    2008-01-01

    The thesis compounds three views on the Key Account Management (KAM). Firstly, KAM is defined from a theoretical perspective. Secondly, a practical example of KAM is described within the international organization AIESEC; including feedback from a client. Finally, there are suggestions in order to improve KAM in terms of soft skills of Account Managers.

  9. Perceptions of food risk management among key stakeholders: Results from a cross-European study

    NARCIS (Netherlands)

    Kleef, van E.; Frewer, L.J.; Chryssochoidis, G.M.; Houghton, J.R.; Korzen-Bohr, S.; Krystallis, T.; Lassen, J.; Pfenning, U.; Rowe, G.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management. The objective of this study is to identify similarities and differences in perceptions of, and attitudes

  10. A NOVEL APPROACH FOR INFORMATION SECURITY IN AD HOC NETWORKS THROUGH SECURE KEY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    S. Suma Christal Mary

    2013-01-01

    Full Text Available Ad hoc networks provide flexible and adaptive networks with no fixed infrastructure and dynamic topology. Owe to the vulnerability nature of ad hoc network, there are lots of security threats that diminish the development of ad hoc networks. Therefore, to provide security for information of users and to preserve their privacy, it becomes mandatory to use cryptographic techniques to set up secure mobile ad hoc network. Earlier cryptographic method based on computational complexity ruins with the advent of fast computing computers. In this proposal, we proposed Secure Key Management (SKM framework. We make use of McEliece algorithm embedded with Dispense Key designed for key generation and for the key distribution and it is highly scalable with respect to memory. The experimental result shows that our framework provides a high-performance platform to execute key generation, key distribution scenarios. SKM framework reduces execution time of encryption and decryption by minimizing the number of keys.

  11. A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems

    Institute of Scientific and Technical Information of China (English)

    SUN Zhili

    2016-01-01

    Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular commu⁃nication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key manage⁃ment schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The security managers (SMs) play a key role in the framework by retrieving the vehicle departure information, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more efficient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effective⁃ness and efficiency of the proposed framework: Our GKM results demonstrate that probability⁃based BR reduces rekeying cost compared to the benchmark scheme, while the blockchain decreases the time cost of key transmission over heterogeneous net⁃works.

  12. Effects of management intervention on post-disturbance community composition: an experimental analysis using bayesian hierarchical models.

    Science.gov (United States)

    Giovanini, Jack; Kroll, Andrew J; Jones, Jay E; Altman, Bob; Arnett, Edward B

    2013-01-01

    As human demand for ecosystem products increases, management intervention may become more frequent after environmental disturbances. Evaluations of ecological responses to cumulative effects of management interventions and natural disturbances provide critical decision-support tools for managers who strive to balance environmental conservation and economic development. We conducted an experiment to evaluate the effects of salvage logging on avian community composition in lodgepole pine (Pinus contorta) forests affected by beetle outbreaks in Oregon, USA, 1996-1998. Treatments consisted of the removal of lodgepole pine snags only, and live trees were not harvested. We used a bayesian hierarchical model to quantify occupancy dynamics for 27 breeding species, while accounting for variation in the detection process. We examined how magnitude and precision of treatment effects varied when incorporating prior information from a separate intervention study that occurred in a similar ecological system. Regardless of which prior we evaluated, we found no evidence that the harvest treatment had a negative impact on species richness, with an estimated average of 0.2-2.2 more species in harvested stands than unharvested stands. Estimated average similarity between control and treatment stands ranged from 0.82-0.87 (1 indicating complete similarity between a pair of stands) and suggested that treatment stands did not contain novel assemblies of species responding to the harvesting prescription. Estimated treatment effects were positive for twenty-four (90%) of the species, although the credible intervals contained 0 in all cases. These results suggest that, unlike most post-fire salvage logging prescriptions, selective harvesting after beetle outbreaks may meet multiple management objectives, including the maintenance of avian community richness comparable to what is found in unharvested stands. Our results provide managers with prescription alternatives to respond to severe

  13. Effects of management intervention on post-disturbance community composition: an experimental analysis using bayesian hierarchical models.

    Directory of Open Access Journals (Sweden)

    Jack Giovanini

    Full Text Available As human demand for ecosystem products increases, management intervention may become more frequent after environmental disturbances. Evaluations of ecological responses to cumulative effects of management interventions and natural disturbances provide critical decision-support tools for managers who strive to balance environmental conservation and economic development. We conducted an experiment to evaluate the effects of salvage logging on avian community composition in lodgepole pine (Pinus contorta forests affected by beetle outbreaks in Oregon, USA, 1996-1998. Treatments consisted of the removal of lodgepole pine snags only, and live trees were not harvested. We used a bayesian hierarchical model to quantify occupancy dynamics for 27 breeding species, while accounting for variation in the detection process. We examined how magnitude and precision of treatment effects varied when incorporating prior information from a separate intervention study that occurred in a similar ecological system. Regardless of which prior we evaluated, we found no evidence that the harvest treatment had a negative impact on species richness, with an estimated average of 0.2-2.2 more species in harvested stands than unharvested stands. Estimated average similarity between control and treatment stands ranged from 0.82-0.87 (1 indicating complete similarity between a pair of stands and suggested that treatment stands did not contain novel assemblies of species responding to the harvesting prescription. Estimated treatment effects were positive for twenty-four (90% of the species, although the credible intervals contained 0 in all cases. These results suggest that, unlike most post-fire salvage logging prescriptions, selective harvesting after beetle outbreaks may meet multiple management objectives, including the maintenance of avian community richness comparable to what is found in unharvested stands. Our results provide managers with prescription alternatives to

  14. Scalable Hierarchical Network Management System for Displaying Network Information in Three Dimensions

    Science.gov (United States)

    George, Jude (Inventor); Schlecht, Leslie (Inventor); McCabe, James D. (Inventor); LeKashman, John Jr. (Inventor)

    1998-01-01

    A network management system has SNMP agents distributed at one or more sites, an input output module at each site, and a server module located at a selected site for communicating with input output modules, each of which is configured for both SNMP and HNMP communications. The server module is configured exclusively for HNMP communications, and it communicates with each input output module according to the HNMP. Non-iconified, informationally complete views are provided of network elements to aid in network management.

  15. Dynamics of Hierarchical Urban Green Space Patches and Implications for Management Policy.

    Science.gov (United States)

    Yu, Zhoulu; Wang, Yaohui; Deng, Jinsong; Shen, Zhangquan; Wang, Ke; Zhu, Jinxia; Gan, Muye

    2017-06-06

    Accurately quantifying the variation of urban green space is the prerequisite for fully understanding its ecosystem services. However, knowledge about the spatiotemporal dynamics of urban green space is still insufficient due to multiple challenges that remain in mapping green spaces within heterogeneous urban environments. This paper uses the city of Hangzhou to demonstrate an analysis methodology that integrates sub-pixel mapping technology and landscape analysis to fully investigate the spatiotemporal pattern and variation of hierarchical urban green space patches. Firstly, multiple endmember spectral mixture analysis was applied to time series Landsat data to derive green space coverage at the sub-pixel level. Landscape metric analysis was then employed to characterize the variation pattern of urban green space patches. Results indicate that Hangzhou has experienced a significant loss of urban greenness, producing a more fragmented and isolated vegetation landscape. Additionally, a remarkable amelioration of urban greenness occurred in the city core from 2002 to 2013, characterized by the significant increase of small-sized green space patches. The green space network has been formed as a consequence of new urban greening strategies in Hangzhou. These strategies have greatly fragmented the built-up areas and enriched the diversity of the urban landscape. Gradient analysis further revealed a distinct pattern of urban green space landscape variation in the process of urbanization. By integrating both sub-pixel mapping technology and landscape analysis, our approach revealed the subtle variation of urban green space patches which are otherwise easy to overlook. Findings from this study will help us to refine our understanding of the evolution of heterogeneous urban environments.

  16. Healthcare restructuring and hierarchical alignment: why do staff and managers perceive change outcomes differently?

    Science.gov (United States)

    Walston, Stephen L; Chou, Ann F

    2006-09-01

    Healthcare organizations have undergone major change efforts in the past decade. Sustained change is related to continued alignment among organizational participants and may fail with incongruent perceptions of change. This study identifies factors contributing to the alignment in perceptions of organizational change outcomes between executives and all other employees. The sample included 10 hospitals with survey responses from 421 executives and other employees. Using hierarchical linear modeling (HLM), perceptual alignment was modeled at the first level as a function of goal commitment, goal clarity, goal acceptance, goal specificity, staff participation, available skill set, and knowledge and at the second level as organizational size. Descriptive statistics showed employee perception of outcomes differed among personnel levels. HLM results showed that goal specificity, appropriate staff training, reward incentives, effective communication, information sharing, and organization's ability to sustain changes induced perceptual alignment in change outcomes. Staff involvement in designing change efforts increased perceptual misalignment, whereas involvement during implementation and maintenance phases increased alignment. This research uses cross-sectional data from 10 hospitals. Data were gathered from surveys that may have recall bias as hospitals were surveyed at different times after the implementation of their restructuring. Our findings enhance the understanding of processes and mechanisms that enable healthcare organizations to align organizational participants' efforts during change. Results suggest that decision-makers should create incentives to encourage innovative practices, institute effective communication mechanisms, selectively disseminate information, and involve participants in implementing and maintaining changes to achieve intended outcomes. ORIGINALITY/VALUE OF ARTICLE: This article provides unique insight into the importance and causes of

  17. Application of hierarchical management in clinical nursing management%分层次管理在临床护理管理中的应用

    Institute of Scientific and Technical Information of China (English)

    李雪松

    2014-01-01

    目的:探讨分层次管理在临床护理管理中的应用效果。方法2011年2月至2012年2月我院临床护理中应用的是传统管理方法,将此时期作为对照组;2012年3月至2013年2月我院引进分层次管理方法(采取分层管理与岗位责任制,考核并分析护理质量),并在临床护理中应用,将此时期作为研究组。比较两组护理人员的工作积极性及工作成就感、护理质量评分和护理满意评分。结果研究组工作成就感强于对照组(P<0.05);研究组护理质量评分高于对照组,差异有统计学意义(P<0.05);研究组护理满意评分高于对照组,差异有统计学意义(P<0.05);研究组工作积极性明显高于对照组(P<0.05)。结论临床护理管理中采取分层次管理,可以提高护理质量,同时也降低了护理缺陷发生率,亦提高了患者满意度,具有较高的医学应用价值,值得推广。%Objective To explore the actual effect of hierarchical management in clinical nursing management.Methods From 2011 February to 2012 February , the traditional management methods were applied in the clinical nursing in our hospital , this period was taken as control group;From 2012 March to 2013 February, the hierarchical management methods were introduced ( hierarchical management and work post responsibility , assessment and analysis of nursing quality ) , the methods were applied in the clinical nursing , this period was taken as research group .The two groups were compared with working enthusiasm , job achievement of nursing staff and the scores of nursing quality and nursing satisfaction .Results Working enthusiasm , job achievement of nursing staff and the scores of nursing quality and nurs-ing satisfaction in the research group were higher than those in the control group .Conclusions The hierarchical management in the clinical nursing management can improve nursing quality , patients

  18. Distributed mixed-integer fuzzy hierarchical programming for municipal solid waste management. Part I: System identification and methodology development.

    Science.gov (United States)

    Cheng, Guanhui; Huang, Guohe; Dong, Cong; Xu, Ye; Chen, Xiujuan; Chen, Jiapei

    2017-03-01

    Due to the existence of complexities of heterogeneities, hierarchy, discreteness, and interactions in municipal solid waste management (MSWM) systems such as Beijing, China, a series of socio-economic and eco-environmental problems may emerge or worsen and result in irredeemable damages in the following decades. Meanwhile, existing studies, especially ones focusing on MSWM in Beijing, could hardly reflect these complexities in system simulations and provide reliable decision support for management practices. Thus, a framework of distributed mixed-integer fuzzy hierarchical programming (DMIFHP) is developed in this study for MSWM under these complexities. Beijing is selected as a representative case. The Beijing MSWM system is comprehensively analyzed in many aspects such as socio-economic conditions, natural conditions, spatial heterogeneities, treatment facilities, and system complexities, building a solid foundation for system simulation and optimization. Correspondingly, the MSWM system in Beijing is discretized as 235 grids to reflect spatial heterogeneity. A DMIFHP model which is a nonlinear programming problem is constructed to parameterize the Beijing MSWM system. To enable scientific solving of it, a solution algorithm is proposed based on coupling of fuzzy programming and mixed-integer linear programming. Innovations and advantages of the DMIFHP framework are discussed. The optimal MSWM schemes and mechanism revelations will be discussed in another companion paper due to length limitation.

  19. A MULTICAST KEY MANAGEMENT SCHEME BASED ON CHARACTERISTIC VALUES OF MEMBERS

    Institute of Scientific and Technical Information of China (English)

    Du Xiaoqiang; Bao Wansu; Fu Xiangqun

    2012-01-01

    A new collusion attack on Pour-like schemes is proposed in this paper.Then,we present a collusion-free centralized multicast key management scheme based on characteristic values of members.The re-keying method that other group members calculate new keys when a member is joining or leaving is also designed.It achieves forward secrecy and backward secrecy.Compared with typical existing centralized schemes,the storage of Group Key Controller (GKC) in our scheme halves the storage overhead of others,and communication overhead of GKC is 2 in case of joining re-keying.Especially,the leaving re-keying overhead is log2 n,and the overall performance is excellent.

  20. A Study on the Key Management Strategy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon KO

    2015-05-01

    Full Text Available Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.

  1. Strategy Implementation through Hierarchical Couplings in a Management Control Package : An Explorative Case Study

    NARCIS (Netherlands)

    van der Kolk, Berend; Schokker, Tom

    2016-01-01

    We examine how couplings of management control (MC) elements help to implement an organization’s strategy. Despite prior research stating that couplings between MC elements form fruitful soil for further research, empirical studies in this area are still scarce. We draw on coupling theory to explore

  2. Hierarchical video summarization

    Science.gov (United States)

    Ratakonda, Krishna; Sezan, M. Ibrahim; Crinon, Regis J.

    1998-12-01

    We address the problem of key-frame summarization of vide in the absence of any a priori information about its content. This is a common problem that is encountered in home videos. We propose a hierarchical key-frame summarization algorithm where a coarse-to-fine key-frame summary is generated. A hierarchical key-frame summary facilitates multi-level browsing where the user can quickly discover the content of the video by accessing its coarsest but most compact summary and then view a desired segment of the video with increasingly more detail. At the finest level, the summary is generated on the basis of color features of video frames, using an extension of a recently proposed key-frame extraction algorithm. The finest level key-frames are recursively clustered using a novel pairwise K-means clustering approach with temporal consecutiveness constraint. We also address summarization of MPEG-2 compressed video without fully decoding the bitstream. We also propose efficient mechanisms that facilitate decoding the video when the hierarchical summary is utilized in browsing and playback of video segments starting at selected key-frames.

  3. Health Related Quality Management Values and Key Principles of Communicative Leadership - Are They the Same?

    Directory of Open Access Journals (Sweden)

    Ingela Backstrom

    2014-07-01

    Full Text Available The purpose of this paper is to compare health related values within Quality Management with Key Principles of Communicative Leadership in order to see if Communicative leaders also promote healthy co-workers.  A literature review was conducted within the area of Communicative Leadership and within the values of health related Quality Management. The principles within Communicative leadership were compared with the underlying dimensions within the health related values ‘Leadership Commitment’ and Participation of everybody’. The analysis shows that the underlying dimensions within both of the health related Quality Management values ‘Participation of everybody’ and ‘Leadership commitment’ were related to some of the Key Principles of Communicative Leadership. The results can help Communicative Leaders to emphasize the Key Principles that also promote healthy co-workers. The results can also help leaders that already have healthy co-workers to increase leaders’ communication competence within organizations.

  4. Signcryption-Based Key Management for MANETs Applications in Mobile Commerce

    Institute of Scientific and Technical Information of China (English)

    LI Jingfeng; ZHU Yuefei; ZHANG Yajuan; PAN Heng

    2006-01-01

    Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management.

  5. OTTO Revisited: Management Training and Management Performance. Some Perceptions of Headteachers and Key Subordinates.

    Science.gov (United States)

    Hellawell, David E.

    1988-01-01

    Presents a follow-up study to the 1984 One Term Training Opportunity (OTTO) for headteachers and senior teachers conducted by the City of Birmingham Polytechnic. Discusses the effects of the management training course and attempts to determine whether the performance of managers was significantly affected by management training. (GEA)

  6. Adding Hierarchical Objects to Relational Database General-Purpose XML-Based Information Managements

    Science.gov (United States)

    Lin, Shu-Chun; Knight, Chris; La, Tracy; Maluf, David; Bell, David; Tran, Khai Peter; Gawdiak, Yuri

    2006-01-01

    NETMARK is a flexible, high-throughput software system for managing, storing, and rapid searching of unstructured and semi-structured documents. NETMARK transforms such documents from their original highly complex, constantly changing, heterogeneous data formats into well-structured, common data formats in using Hypertext Markup Language (HTML) and/or Extensible Markup Language (XML). The software implements an object-relational database system that combines the best practices of the relational model utilizing Structured Query Language (SQL) with those of the object-oriented, semantic database model for creating complex data. In particular, NETMARK takes advantage of the Oracle 8i object-relational database model using physical-address data types for very efficient keyword searches of records across both context and content. NETMARK also supports multiple international standards such as WEBDAV for drag-and-drop file management and SOAP for integrated information management using Web services. The document-organization and -searching capabilities afforded by NETMARK are likely to make this software attractive for use in disciplines as diverse as science, auditing, and law enforcement.

  7. A Loss-Tolerant Group Key Management Scheme with Revocation Capability for Wireless Sensor Network

    Institute of Scientific and Technical Information of China (English)

    LI Lin-chun; LI Jian-hua; YI Ping; PAN Jun

    2009-01-01

    A new group key management scheme against the unreliable wireless communication channel and unsafe environment was proposed for wireless sensor network (WSN). In the proposed scheme, broadcast polynomial, generated over finite field Fq based on the secret sharing, was employed to revoke compromised sensor nodes. In order to tolerate key-update message loss, group session keys were generated as one-way hash chain sequence and distributed in advance. The analysis showes that the scheme has better performance in terms of the computation and communication overhead.

  8. Reducing Communication Overhead For Authentication Using Self Contained Public Key Management Scheme In MANET

    Directory of Open Access Journals (Sweden)

    Gundala Swathi

    2013-06-01

    Full Text Available In the past few years, we have seen a rapid increase in important application fields of Mobile ad-hoc networks (MANET. Hence, many industrial and academic researchers have been conducted. Because, these applications are closely related to human beings and their physical environment, the usage of MANET on a large scale depends on whether we can provide proper dependability. Particularly, security is the most important issue in MANET because of the limitation in resources. Management of keys is the most necessary activity for providing security for the network. MANETs have resource limitations. Thus using public-key based solutions is not feasible. Thus, we use symmetric key establishment. In this paper, a key management scheme which is self contained and public is represented.This scheme achieves near zero communication overhead while providing security services. Cryptographic keys in small numbers are inputted at all nodes prior to the deployment in network. Mathematical Combinations of pairs of keys, both public and private is used for better utilization of storage space. This means a combination of more than one key pair is utilized by nodes for the encryption and the decryption of messages. A secure communication algorithm for forwarding the packets in MANET is also proposed.

  9. Perceptions of food risk management among key stakeholders: results from a cross-European study.

    Science.gov (United States)

    van Kleef, Ellen; Frewer, Lynn J; Chryssochoidis, George M; Houghton, Julie R; Korzen-Bohr, Sara; Krystallis, Thanassis; Lassen, Jesper; Pfenning, Uwe; Rowe, Gene

    2006-07-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management. The objective of this study is to identify similarities and differences in perceptions of, and attitudes to, food risk management practices held by consumers and experts with an interest in food safety. Focus groups were conducted in five European countries chosen for their (hypothesised) cultural differences in attitudes towards risk: Denmark, Germany, Greece, Slovenia and the UK. Content analysis was carried out on the resulting texts and (sub) categories were identified within the analysis framework to facilitate the capture of emerging themes. Five key themes were identified as common to the perceptions of both consumers and experts, although these are not represented in the same way by both groups. These key themes are: (1) efforts made by the responsible authorities to manage food risks; (2) responsibility for prevention and management of food risks; (3) how priorities are established within regulatory systems; (4) scientific progress and its implications for food risk management; and (5) media attention and food safety incidents. Although some similarities emerged between the groups, differences were also identified. For example, experts appeared to be highly negative about media influences, whereas consumers appeared more indifferent about media influences and motives. These different perspectives need to be addressed in order to reduce the perceptual distance between key stakeholders, and in particular, to enhance consumer confidence in the food risk management system. Based on the study findings, recommendations for food risk management policies are outlined.

  10. StoRM-GPFS-TSM: A new approach to hierarchical storage management for the LHC experiments

    Energy Technology Data Exchange (ETDEWEB)

    Cavalli, A; Dell' Agnello, L; Ghiselli, A; Gregori, D; Magnoni, L; Martelli, B; Mazzucato, M; Prosperini, A; Ricci, P P; Ronchieri, E; Sapunenko, V; Vitlacil, D; Zappi, R [INFN-CNAF, viale Berti-Pichat 6/2, 40127 Bologna (Italy); Vagnoni, V [INFN-Bologna, via Irnerio 46, 40126 Bologna (Italy)

    2010-04-01

    The mass storage challenge for the experiments at the Large Hadron Collider (LHC) is still nowadays a critical issue for the various Tier-1 computing centres and the Tier-0 centre involved in the custodial and analysis of the data produced by the experiments. In particular, the requirements for the tape mass storage systems are quite strong, amounting to about 15 PB of data produced annually that should be available for near-line access at any time. Besides the solutions already widely employed by the High Energy Physics community so far, INFN-CNAF has approched, in the last year, a solution based on the collaboration between the General Parallel File System (GPFS) and the Tivoli Storage Manager (TSM) by IBM and StoRM as Storage Resource Management (SRM) interface, developed at INFN. The new features available in GPFS version 3.2 allow in general to interface GPFS with any tape storage manager. We implemented such an interface for TSM, and we performed various performance studies on a prototype testbed system. The first StoRM/GPFS/TSM based system is already in production at CNAF for T1D1 Storage Class; it is used by the LHCb experiment. Currently we are performing new tests to exploit features implemented in the new versione of TSM 6.1. These features are focused in high performance and optimized access to the tape backend. We will describe the implementation of the interface and details of the prototype testbed for T1D0 SC and we will discuss the results of the LHCb production system.

  11. Hierarchical Downlink Resource Management Framework for OFDMA based WiMAX Systems

    DEFF Research Database (Denmark)

    Wang, Hua; Iversen, Villy Bæk

    2008-01-01

    resource management framework for OFDMA based WiMAX systems. Our framework consists of a dynamic resource allocation (DRA) module and a connection admission control (CAC) module. DRA emphasizes on how to share the limited radio resources in term of subchannels and time slots among WiMAX subscribers...... belonging to different service classes with the objective of increasing the spectral efficiency while satisfying the diverse QoS requirements in each service class. CAC highlights how to limit the number of ongoing connections preventing the system capacity from being overused. Through system...

  12. Medication supply and management in rural Queensland: views of key informants in health service provision.

    Science.gov (United States)

    Tan, Amy Chen Wee; Emmerton, Lynne; Hattingh, Laetitia; Jarvis, Victoria

    2012-01-01

    Rural settings challenge health care providers to provide optimal medication services in a manner that is timely and of high quality. Extending the roles of rural health care providers is often necessary to improve access to medication services; however, there appears to be a lack of pharmacy-based involvement and support within the medication system. This article explores medication supply and management issues in rural settings, based on the governance perspectives of key informants on regulatory aspects, policy, and professional practice. The specific objectives were to (1) identify the key issues and existing facilitators and (2) explore the potential roles of pharmacy to improve medication supply and management services. Semi-structured interviews were conducted with representatives within regulatory or professional organizations. The participants were key informants who held leadership and/or managerial roles within their respective organizations and were recruited to provide insights from a governance perspective before data collection in the community. An interview guide, informed by the literature, assisted the flow of interviews, exploring topics, such as key issues, existing initiatives, and potential pharmacy-based facilitators, in relation to medication supply and management in rural settings. Issues identified that hindered the provision of optimal medication supply and management services in the rural areas centered on workforce, interprofessional communication, role structures, and funding opportunities. Legislative and electronic developments and support mechanisms aim to facilitate medication processes in rural areas. Potential initiatives to further enhance medication services and processes could explore extended roles for pharmacists and pharmacy support staff, as well as alternative service delivery models to enhance pharmacy workforce capacity. The study provided an overview of key issues with medication supply and management and highlighted

  13. THE KEY ACTIVITIES OF GREEN LOGISTICS MANAGEMENT IN THE THAI AUTOMOTIVE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Thanyaphat Muangpan

    2016-01-01

    Full Text Available Thai automotive industry needs to be developed for understanding activities management on inbound logistics that is an essential element of business operations for a manufacturing firm. The purpose of research is to study the main activities of green logistics management (inbound logistics in the Thai automotive industry. Survey research was used in this study to collect data by sampling from the people in the field of logistics and environmental management of Thai automotive industry to examine the key activities of Green logistics management. Inferential statistics analysis using Confirmatory Factor Analysis (CFA is applied to determine the key activities that influence to the logistics management in the sense of environmental friendly. There are two finding of research. Firstly, the conceptual framework presents three dimensions i.e. Green Transportation Activity (GTA, Green Purchasing Activity (GPA and Green Inventory Activity (GIA for key activities of green logistics management (inbound logistics. Secondly, the measurement model of the main three activities that GTA, GPA, and GIA are tested. The Goodness of fit statistic is 0.546. These suggest the fit of collected data to the hypothesized model.

  14. Application of the hierarchical management of nurses to clinical nursing care%护士分层次管理在临床护理中的应用

    Institute of Scientific and Technical Information of China (English)

    王华

    2013-01-01

    目的:探讨护士分层管理在临床护理中的应用效果。方法:将2011年5~8月331例患者作为分层管理实施前组;将2011年9~11月425例患者作为护士分层管理实施后组,实施护士分层管理模式,通过护士分层培训和建立护士能级与绩效考核指标,将病房护士按工作年资、学历、职称、业务能力进行分层使用和管理。结果:护士分层管理实施后患者、医生、护士满意度较实施前显著提高(P<0.05);护士分层管理后护理质量评分明显优于实施前组(P<0.05)。结论:护士分层管理提高了临床护理质量,增加了患者、医生、护士满意度,提升了管理效能,值得临床推广。%Objective:To investigate the application effect of hierarchical management of nurses in clinical nursing care .Methods:331 patients hospitalized from May to Aug .2011 were taken as group A ,in which the hierarchical management of nurses was not implemented;other 425 patients hospitalized from Sept .to Nov.2011 were taken as group B ,in which the hierarchical management of nurses was adopt-ed.The nurses for ward duty were arranged and managed stratifiedly according to their seniority ,educational background ,job title and pro-fessional ability through the establishment of performance evaluation index of the nurse after training .Results:The doctor,nurse and patient satisfaction was significantly improved after implementation of the hierarchical management compared with that before its implementation (P<0.05);the scores of nursing quality were significantly higher in the group B than those in the group A after implementation of the management (P<0.05).Conclusion:The hierarchical management of nurses has improved the quality of clinical nursing care ,increased the degree of doctor ,nurse and patient satisfaction and improved the management efficiency as well .

  15. Identifying Key Factors for Introducing GPS-Based Fleet Management Systems to the Logistics Industry

    Directory of Open Access Journals (Sweden)

    Yi-Chung Hu

    2015-01-01

    Full Text Available The rise of e-commerce and globalization has changed consumption patterns. Different industries have different logistical needs. In meeting needs with different schedules logistics play a key role. Delivering a seamless service becomes a source of competitive advantage for the logistics industry. Global positioning system-based fleet management system technology provides synergy to transport companies and achieves many management goals such as monitoring and tracking commodity distribution, energy saving, safety, and quality. A case company, which is a subsidiary of a very famous food and retail conglomerate and operates the largest shipping line in Taiwan, has suffered from the nonsmooth introduction of GPS-based fleet management systems in recent years. Therefore, this study aims to identify key factors for introducing related systems to the case company. By using DEMATEL and ANP, we can find not only key factors but also causes and effects among key factors. The results showed that support from executives was the most important criterion but it has the worst performance among key factors. It is found that adequate annual budget planning, enhancement of user intention, and collaboration with consultants with high specialty could be helpful to enhance the faith of top executives for successfully introducing the systems to the case company.

  16. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  17. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  18. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  19. Break-it thinking--the key to quality management for health care institutions.

    Science.gov (United States)

    Kasarda, A J

    1995-01-01

    Thinking outside the mold is the key to creating a truly high quality health care delivery system, states author Andrew J. Kasarda, Ph.D., of Quantum Technologies International. He takes a look at Deming's 14 points of total quality management and offers his own version of how to deal with change.

  20. Key Performance Indicators for Maintenance Management Effectiveness of Public Hospital Building

    Directory of Open Access Journals (Sweden)

    Farhana Omar Mardhiah

    2017-01-01

    Full Text Available Effectiveness of management in maintenance aspect holds the key element in influencing the performance of overall maintenance management. Similarly, public hospital building needs an effective maintenance management as this type of building in nature is one of the most complex issues in the field of maintenance. Improper building maintenance management adopted by the organization significantly will interrupt the overall operation of the building. Therefore, this paper is aim to identifying the key performance indicator (KPI of effectiveness of maintenance management for the public hospital building. A total of 32 set of questionnaires were distributed to the maintenance manager for each hospital in the northern region of peninsular Malaysia by using self-administration strategy. The survey answer was analyzed by performing descriptive analysis in SPSS. Overall, the result of descriptive analysis shows that all the ten factors of effectiveness of maintenance management are accepted as KPI since the mean value is at least 3.93 which classified as important and significant. The most significant factor of effectiveness of maintenance management is task planning and scheduling with the mean score of 4.35. While less significant factor is identify as maintenance approach with the value of mean score is 3.93. The both results indicates that the management need to have well-structured planning for the maintenance works and also need to embrace the exact strategy of maintenance approach in order to achieved better overall performance of maintenance management. This study may draw a standard practice for the government in assessing the performance of public facilities in terms of maintenance management.

  1. Securing Metering Infrastructure of Smart Grid: A Machine Learning and Localization Based Key Management Approach

    Directory of Open Access Journals (Sweden)

    Imtiaz Parvez

    2016-08-01

    Full Text Available In smart cities, advanced metering infrastructure (AMI of the smart grid facilitates automated metering, control and monitoring of power distribution by employing a wireless network. Due to this wireless nature of communication, there exist potential threats to the data privacy in AMI. Decoding the energy consumption reading, injecting false data/command signals and jamming the networks are some hazardous measures against this technology. Since a smart meter possesses limited memory and computational capability, AMI demands a light, but robust security scheme. In this paper, we propose a localization-based key management system for meter data encryption. Data are encrypted by the key associated with the coordinate of the meter and a random key index. The encryption keys are managed and distributed by a trusted third party (TTP. Localization of the meter is proposed by a method based on received signal strength (RSS using the maximum likelihood estimator (MLE. The received packets are decrypted at the control center with the key mapped with the key index and the meter’s coordinates. Additionally, we propose the k-nearest neighbors (kNN algorithm for node/meter authentication, capitalizing further on data transmission security. Finally, we evaluate the security strength of a data packet numerically for our method.

  2. A Security Protocol for the Identification and Data Encrypt- Key Management of Secure Mobile Devices

    Directory of Open Access Journals (Sweden)

    Song Han

    2013-07-01

    Full Text Available In this paper, we proposed an identification and data encrypt key manage protocol that can be used in some security system based on such secure devices as secure USB memories or RFIDs, which are widely used for identifying persons or other objects recently. In general, the default functions of the security system using a mobile device are the authentication for the owner of the device and secure storage of data stored on the device. We proposed a security model that consists of the server and mobile devices in order to realize these security features. In this model we defined the secure communication protocol for the authentication and management of data encryption keys using a private key encryption algorithm with the public key between the server and mobile devices. In addition, we was performed the analysis for the attack to the communication protocol between the mobile device and server. Using the communication protocol, the system will attempt to authenticate the mobile device. The data decrypt key is transmitted only if the authentication process is successful. The data in the mobile device can be decrypted using the key. Our analysis proved that this Protocol ensures anonymity, prevents replay attacks and realizes the interactive identification between the security devices and the authentication server.

  3. Implementing hierarchical management in Central Sterile Supply Department%消毒供应中心人员层级管理的实施

    Institute of Scientific and Technical Information of China (English)

    郝淑芹; 谢小华; 常香远

    2011-01-01

    目的:探讨消毒供应中心人员实施层级管理的实践效果。方法:建立层级质量控制网,落实层级管理,与临床建立有效沟通机制,结合弹性排班,提供优质高效服务。结果:实施层级管理后,临床满意度明显提高,重复使用诊疗器械、器具、物品返洗率及差错和不良事件发生率下降,与实施层级管理前比较差异有统计学意义(P<0.01)。结论:实施层级管理能有效提高工作质量和临床满意度,降低差错和不良问题发生率,减轻护士长管理压力,值得借鉴和推广。%Objective: To explore effects of implementing hierarchical management in CSSD. Methods: The author set up a hierarchical quality management system in CSSD. Effective communication with clinical department and flexible staff scheduling also were used to provide high quality service for clinical department.Results:After implementing hierarchical management,clients' satisfaction increased while adverse events incidence, sterile devise reuse rate and defective percentage decreased. All differences had statistical significance. Conclusion:The hierarchical management system was effective in CSSD quality improvement.

  4. Fish traders as key actors in fisheries: gender and adaptive management.

    Science.gov (United States)

    Fröcklin, Sara; de la Torre-Castro, Maricela; Lindström, Lars; Jiddawi, Narriman S

    2013-12-01

    This paper fills an important gap towards adaptive management of small-scale fisheries by analyzing the gender dimension of fish trade in Zanzibar, Tanzania. We hypothesize that gender-based differences are present in the fish value chain and to test the hypothesis interviews were performed to analyze: (i) markets, customers, and mobility, (ii) material and economic resources, (iii) traded fish species, (iv) contacts and organizations, and (v) perceptions and experiences. Additionally, management documents were analyzed to examine the degree to which gender is considered. Results show that women traders had less access to social and economic resources, profitable markets, and high-value fish, which resulted in lower income. These gender inequalities are linked, among others, to women's reproductive roles such as childcare and household responsibilities. Formal fisheries management was found to be gender insensitive, showing how a crucial feedback element of adaptive management is missing in Zanzibar's management system, i.e., knowledge about key actors, their needs and challenges.

  5. 云计算系统中Key-Value数据管理研究%Key-Value Data Management in Cloud Computing System

    Institute of Scientific and Technical Information of China (English)

    郭显娥

    2015-01-01

    Key-Value database is a typical cloud storage system applied within Cloud Computing environment. Based on re-searches on Key-Value data model, the new demands and challenges emerged for big data management, or Cloud Data Management be-came the new focal point of this area. This article started with a brief introduction on Key-Value data modeling and data input and out-put methods. Then with the combination of Key-Value index mechanism, the author emphasized on Key-Value indexing operation, pro-viding a general algorithm on Multidimensional Query.%Key-Value数据库是应用于云环境下的典型云存储系统,基于key-value数据模型的研究对大数据管理或称云数据管理系统提出了新的需求与挑战,成为人们关注的热点.本文对key-value数据模型与数据读写方式作了简单介绍,引入了key-value索引机制,重点讨论了key-value查询操作,给出了关于多维点查询的通用算法.

  6. Key Management and Authentication in Ad Hoc Network based on Mobile Agent

    Directory of Open Access Journals (Sweden)

    Yi Zhang

    2009-08-01

    Full Text Available Key management and authentication is important to security of Mobile Ad Hoc network (MANET. Based on the (t, n threshold cryptography, this paper introduced mobile agents to exchange private key and network topological information with nodes in the network. This method avoids a centralized certification authority to distribute the public keys and the certificates, thus enhances security. Carrying private key and some state variables, mobile agents navigate in the network according to visitsbalance policy, namely, node with the least visits would be first visited by mobile agent. Any t nodes in the network can cooperate to perform an authentication upon a new node wanting to join the network. Experimental results show that the mobile agent performs very well for improving the success ratio of authentication and enhance security while reducing the communication overhead and resource consumption.

  7. Collaborative distributed sensor management for multitarget tracking using hierarchical Markov decision processes

    Science.gov (United States)

    Akselrod, D.; Sinha, A.; Kirubarajan, T.

    2007-09-01

    In this paper, we consider the problem of collaborative sensor management with particular application to using unmanned aerial vehicles (UAVs) for multitarget tracking. The problem of decentralized cooperative control considered in this paper is an optimization of the information obtained by a number of unmanned aerial vehicles (UAVs) equipped with Ground Moving Target Indicator (GMTI) radars, carrying out surveillance over a region which includes a number of confirmed and suspected moving targets. The goal is to track confirmed targets and detect new targets in the area. Each UAV has to decide on the most optimal path with the objective to track as many targets as possible maximizing the information obtained during its operation with the maximum possible accuracy at the lowest possible cost. Limited communication between UAVs and uncertainty in the information obtained by each UAV regarding the location of the ground targets are addressed in the problem formulation. In order to handle these issues, the problem is presented as a decentralized operation of a group of decision-makers lacking full observability of the global state of the system. Markov Decision Processes (MDPs) are incorporated into the solution. Given the MDP model, a local policy of actions for a single agent (UAV) is given by a mapping from a current partial view of a global state observed by an agent to actions. The available probability model regarding possible and confirmed locations of the targets is considered in the computations of the UAVs' policies. The authors present multi-level hierarchy of MDPs controlling each of the UAVs. Each level in the hierarchy solves a problem at a different level of abstraction. Simulation results are presented on a representative multisensor-multitarget tracking problem.

  8. Parallel hierarchical radiosity rendering

    Energy Technology Data Exchange (ETDEWEB)

    Carter, M.

    1993-07-01

    In this dissertation, the step-by-step development of a scalable parallel hierarchical radiosity renderer is documented. First, a new look is taken at the traditional radiosity equation, and a new form is presented in which the matrix of linear system coefficients is transformed into a symmetric matrix, thereby simplifying the problem and enabling a new solution technique to be applied. Next, the state-of-the-art hierarchical radiosity methods are examined for their suitability to parallel implementation, and scalability. Significant enhancements are also discovered which both improve their theoretical foundations and improve the images they generate. The resultant hierarchical radiosity algorithm is then examined for sources of parallelism, and for an architectural mapping. Several architectural mappings are discussed. A few key algorithmic changes are suggested during the process of making the algorithm parallel. Next, the performance, efficiency, and scalability of the algorithm are analyzed. The dissertation closes with a discussion of several ideas which have the potential to further enhance the hierarchical radiosity method, or provide an entirely new forum for the application of hierarchical methods.

  9. Sustainable Materials Management (SMM) - Materials and Waste Management in the United States Key Facts and Figures

    Data.gov (United States)

    U.S. Environmental Protection Agency — Each year EPA produces a report called Advancing Sustainable Materials Management: Facts and Figures. It includes information on municipal solid waste (MSW)...

  10. An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN

    Directory of Open Access Journals (Sweden)

    Harjot Bawa

    2013-01-01

    Full Text Available The Wireless Sensor Networks are energy constrained and are normally low cost and low power devices. These nodes are deployed over a specific area for specific goals. Due to energy and memory constraints, secure communication among these sensors is challenging management issue. In order to ensure security, proper connectivity among nodes and resilience against node capture, we propose a scheme called as Random Pre-Key distribution scheme which takes advantage of the binomial key pattern while creating and distributing keys. The value of keys would develop the number of patterns, which is given by the binomial distribution, which would be helpful in maintaining a key pool which is all though random in nature and following a pattern leads to more probability of network connection links. This paper provides a secured communication in WSNs environment and pairing user authentication has been proposed. We employ the idea of dividing the sensor network field into scattered nodes. Inside the scenario, one of the sensor nodes is selected as a server sensor node which is responsible for delivering the key. The novelty of the proposed scenario lies behind the idea of incorporating the sensor nodes along with the proper user authentications. We calculate the throughput involving a periodic traffic and obtained results from the xgraph utility with the use of Network Simulator. The results of this key scheme are obtained and show that improvement in terms of connectivity.

  11. Hierarchical photocatalysts.

    Science.gov (United States)

    Li, Xin; Yu, Jiaguo; Jaroniec, Mietek

    2016-05-01

    As a green and sustainable technology, semiconductor-based heterogeneous photocatalysis has received much attention in the last few decades because it has potential to solve both energy and environmental problems. To achieve efficient photocatalysts, various hierarchical semiconductors have been designed and fabricated at the micro/nanometer scale in recent years. This review presents a critical appraisal of fabrication methods, growth mechanisms and applications of advanced hierarchical photocatalysts. Especially, the different synthesis strategies such as two-step templating, in situ template-sacrificial dissolution, self-templating method, in situ template-free assembly, chemically induced self-transformation and post-synthesis treatment are highlighted. Finally, some important applications including photocatalytic degradation of pollutants, photocatalytic H2 production and photocatalytic CO2 reduction are reviewed. A thorough assessment of the progress made in photocatalysis may open new opportunities in designing highly effective hierarchical photocatalysts for advanced applications ranging from thermal catalysis, separation and purification processes to solar cells.

  12. Efficient Key Management System for Large-scale Smart RFID Applications

    Directory of Open Access Journals (Sweden)

    Mohammad Fal Sadikin

    2015-08-01

    Full Text Available Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all RFID tags in order to update their security properties (e.g. update their private keys. On the other hand, using common key management solution like standard TLS/SSL is too heavy-weight that can drain and overload the limited resources. Furthermore, most of existing solutions are highly susceptible to various threats reaching from privacy threats, physical attacks to various technics of Man-in-the-Middle attacks. This paper introduces novel key management system, tailored to the limited resources of smart RFID system. It proposes light-weight mutual authentication and identity protection to mitigate the existing threats.

  13. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  14. Mobility based key management technique for multicast security in mobile ad hoc networks.

    Science.gov (United States)

    Madhusudhanan, B; Chitra, S; Rajan, C

    2015-01-01

    In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  15. Optimization of Key Parameters of Energy Management Strategy for Hybrid Electric Vehicle Using DIRECT Algorithm

    Directory of Open Access Journals (Sweden)

    Jingxian Hao

    2016-11-01

    Full Text Available The rule-based logic threshold control strategy has been frequently used in energy management strategies for hybrid electric vehicles (HEVs owing to its convenience in adjusting parameters, real-time performance, stability, and robustness. However, the logic threshold control parameters cannot usually ensure the best vehicle performance at different driving cycles and conditions. For this reason, the optimization of key parameters is important to improve the fuel economy, dynamic performance, and drivability. In principle, this is a multiparameter nonlinear optimization problem. The logic threshold energy management strategy for an all-wheel-drive HEV is comprehensively analyzed and developed in this study. Seven key parameters to be optimized are extracted. The optimization model of key parameters is proposed from the perspective of fuel economy. The global optimization method, DIRECT algorithm, which has good real-time performance, low computational burden, rapid convergence, is selected to optimize the extracted key parameters globally. The results show that with the optimized parameters, the engine operates more at the high efficiency range resulting into a fuel savings of 7% compared with non-optimized parameters. The proposed method can provide guidance for calibrating the parameters of the vehicle energy management strategy from the perspective of fuel economy.

  16. Results-based management - Developing one′s key results areas (KRAs

    Directory of Open Access Journals (Sweden)

    Om Prakash Kansal

    2015-01-01

    Full Text Available In spite of aspiring to be a good manager, we public health experts fail to evaluate ourselves against our personal and professional goals. The Key Result Areas (KRAs or key performance indicators (KPIs help us in setting our operational (day-to-day and/or strategic (long-term goals followed by grading ourselves at different times of our careers. These shall help in assessing our strengths and weaknesses. The weakest KRA should set the maximum extent to which one should use his/her skills and abilities to have the greatest impact on his/her career.

  17. Defining disaster resilience: comparisons from key stakeholders involved in emergency management in Victoria, Australia.

    Science.gov (United States)

    Goode, Natassia; Salmon, Paul M; Spencer, Caroline; McArdle, Dudley; Archer, Frank

    2017-01-01

    Three years after the introduction of the National Strategy for Disaster Resilience there remains no unanimously adopted definition of disaster resilience within Australia's emergency management sector. The aim of this study is to determine what the concept means to key stakeholders in the emergency management sector in the Australian State of Victoria, and how these conceptualisations overlap and diverge. Via an online survey, 113 people were asked how they define disaster resilience in their work in the emergency management sector. A data mining software tool, Leximancer, was employed to uncover the relationships between the definitions provided. The findings show that stakeholders see resilience as an 'ability' that encompasses emergency management activities and personal responsibility. However, the findings also highlight some possible points of conflict between stakeholders. In addition, the paper outlines and discusses a number of potential consequences for the implementation and the success of the resilience-based approach in Australia.

  18. An Hierarchical Approach to Big Data

    CERN Document Server

    Allen, M G; Boch, T; Durand, D; Oberto, A; Merin, B; Stoehr, F; Genova, F; Pineau, F-X; Salgado, J

    2016-01-01

    The increasing volumes of astronomical data require practical methods for data exploration, access and visualisation. The Hierarchical Progressive Survey (HiPS) is a HEALPix based scheme that enables a multi-resolution approach to astronomy data from the individual pixels up to the whole sky. We highlight the decisions and approaches that have been taken to make this scheme a practical solution for managing large volumes of heterogeneous data. Early implementors of this system have formed a network of HiPS nodes, with some 250 diverse data sets currently available, with multiple mirror implementations for important data sets. This hierarchical approach can be adapted to expose Big Data in different ways. We describe how the ease of implementation, and local customisation of the Aladin Lite embeddable HiPS visualiser have been keys for promoting collaboration on HiPS.

  19. Self-organized key management with trusted certificate exchange in MANET

    Directory of Open Access Journals (Sweden)

    Saju P John

    2015-03-01

    Full Text Available In MANET, security is more challenging due to problems related to key exchange. It is necessary to secure the exchanges in MANETs for assuring the development of services in the network. The self-organized MANET is visualized as a key communication technology enabler for application such as network centric warfare, disaster relief operations, emergency situations, and intelligent transportation systems. In this paper, we propose a self-organized key management technique coupled with trusted certificate exchange for mobile ad hoc networks. The proposed architecture consists of one coordinator node, servers and normal mobile nodes. The coordinator acts as a mediator for transmitting the message among the servers and mobile nodes. Each node generates its own public/private key pairs using server-signed public keying technique. Then multi-path certificate exchange technique is employed where public key of the nodes is certified by different nodes. Those nodes that issued the certificates are validated using the Eigen Vector Reputation Centrality. By simulation results, we show that the proposed approach improves security.

  20. Key Drivers of an Effective Facilities Management Practice for Malaysia State Mosque

    Directory of Open Access Journals (Sweden)

    Sapri Maimunah

    2016-01-01

    Full Text Available The paper discuss on the importance of facilities management (FM in supporting mosque function and propose the key drivers for an effective FM practice for mosque. Qualitative research design was adopted in this study. Data were collected using focus group consists of seven (7 participants who have been selected among mosque management committee, FM practitioner and academician. Transcript of focus group discussion was analysed using content analysis. Coding system was applied in order to describe the interpretation of data. The results show that there is an agreement among participants on the importance of FM in supporting mosque function. Although practice of FM in mosque is not widely recognised, but its potential in uplifting and prospering mosque function could not be denied. Therefore, an effective of FM practice in mosque is seen vital. This paper discovered that team working is the most significant drivers to an effective FM practice for mosque. Other key drivers are organisational structure design; appoint knowledgeable and skilled facilities manager; sharing FM knowledge and its benefits; and strong change management. The discovered FM drivers are important for all stakeholders that directly or indirectly involve in mosque management.

  1. Key IT management issues in hospitals: Results of a Delphi study in Canada.

    Science.gov (United States)

    Jaana, Mirou; Tamim, Haitham; Paré, Guy; Teitelbaum, Mari

    2011-12-01

    To develop an authoritative list of IT management issues faced by CIOs and IT directors in public hospitals. The ranking-type Delphi method, which elicits the opinion of a panel of experts through iterative controlled feedback, was used in this study. Data collection involved three main steps during which three panels of experts in Ontario (n=13 in rural hospitals; n=9 in community hospitals; n=8 in academic hospitals) provided their input about the key IT management issues in hospitals and their relative importance. Attrition rate was minimal; 28 out of the 30 experts who participated in the study completed all three phases of the survey. During the brainstorming phase, the responses from the three panels were consolidated resulting in a list of 36 IT management issues; eleven were overlapping between the three panels. In the narrowing down phase, 18 issues were retained in the rural panel; 20 issues in the community panel; and 17 issues in the academic panel. The top issues retained in this phase included: managing demand and expectations for IT services (76% of participants); having sufficient funds (69% of participants); recognizing IT as a key stakeholder in major hospital decisions (65% of participants); and implementation of an EMR (62% of participants). In the ranking phase, a moderate level of consensus was obtained for all three panels: W=0.41 (rural panel); W=0.54 (community panel); and W=0.43 (academic panel). Despite the differences in the preoccupations between the three groups, there were similarities on certain IT management issues. Besides having sufficient funds, three of the top IT management issues relate to the strategic positioning of IT within the hospital: managing demands and expectations for IT services; IT competing with other clinical priorities for scarce resources; and recognizing IT as a key stakeholder in major hospital decisions. This study is the first to systematically and rigorously identify and prioritize critical IT management

  2. Management of CAD/CAM information: Key to improved manufacturing productivity

    Science.gov (United States)

    Fulton, R. E.; Brainin, J.

    1984-01-01

    A key element to improved industry productivity is effective management of CAD/CAM information. To stimulate advancements in this area, a joint NASA/Navy/industry project designated Intergrated Programs for Aerospace-Vehicle Design (IPAD) is underway with the goal of raising aerospace industry productivity through advancement of technology to integrate and manage information involved in the design and manufacturing process. The project complements traditional NASA/DOD research to develop aerospace design technology and the Air Force's Integrated Computer-Aided Manufacturing (ICAM) program to advance CAM technology. IPAD research is guided by an Industry Technical Advisory Board (ITAB) composed of over 100 representatives from aerospace and computer companies.

  3. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    Institute of Scientific and Technical Information of China (English)

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  4. A Group Key Management Protocol Based on Weight-Balanced 2-3 Tree for Wireless Sensor Networks

    CERN Document Server

    Yao, Lin; Xia, Feng; Wu, Guowei; Lin, Qiang

    2012-01-01

    Multicast in Wireless Sensor Networks (WSNs) is an attractive mechanism for delivering data to multiple receivers as it saves bandwidth. To guarantee the security of multicast, the group key is used to encrypt and decrypt the packages. However, providing key management services in WSNs is complicated because sensor nodes possess limited resources of computing, storage and communication. To address the balance between security and limited resources, a multicast group key management protocol based on the weight-balanced 2-3 tree is proposed to generate, distribute, and update the group key securely and efficiently. The decentralized group key management method is employed. A weight-balanced 2-3 key tree is formed in every subgroup. Instead of using the conventional symmetric and non-symmetric encryption algorithms, the Maximum Distance Separable (MDS) code technique is used to distribute the multicast key dynamically. During the key updating, a series of adjustment rules are summarized to keep the tree weight-b...

  5. Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange

    Institute of Scientific and Technical Information of China (English)

    Fereshteh Amini; Moazzam Khan; Jelena Mi(s)i(c); Hossein Pourreza

    2008-01-01

    The IEEE 802.15.4 specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zig Bee specification and built on top of IEEE 802.15.4 link layer. This protocol includes a key exchange mechanism. We assume that all nodes are applying power management technique based on thecons tant event sensing reliability required by the coordinator. Power management generates random sleep times by every node which in average fairly distributes the sensing load among the nodes. Key exchange is initiated by a cluster coordinator after some given number of sensing packets have been received by the coordinator. We develop and integrate simulation model of the key exchange and power management technique into the cluster's reliable sensing function. We evaluate the impact of security function and its periodicity on cluster performance.

  6. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Science.gov (United States)

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  7. On the use of hierarchical probabilistic models for characterizing and managing uncertainty in risk/safety assessment.

    Science.gov (United States)

    Kodell, Ralph L; Chen, James J

    2007-04-01

    A general probabilistically-based approach is proposed for both cancer and noncancer risk/safety assessments. The familiar framework of the original ADI/RfD formulation is used, substituting in the numerator a benchmark dose derived from a hierarchical pharmacokinetic/pharmacodynamic model and in the denominator a unitary uncertainty factor derived from a hierarchical animal/average human/sensitive human model. The empirical probability distributions of the numerator and denominator can be combined to produce an empirical human-equivalent distribution for an animal-derived benchmark dose in external-exposure units.

  8. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    I-Hsien Lin

    2010-08-01

    Full Text Available Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  9. The Proposal of Key Performance Indicators in Facility Management and Determination the Weights of Significance

    Science.gov (United States)

    Rimbalová, Jarmila; Vilčeková, Silvia

    2013-11-01

    The practice of facilities management is rapidly evolving with the increasing interest in the discourse of sustainable development. The industry and its market are forecasted to develop to include non-core functions, activities traditionally not associated with this profession, but which are increasingly being addressed by facilities managers. The scale of growth in the built environment and the consequential growth of the facility management sector is anticipated to be enormous. Key Performance Indicators (KPI) are measure that provides essential information about performance of facility services delivery. In selecting KPI, it is critical to limit them to those factors that are essential to the organization reaching its goals. It is also important to keep the number of KPI small just to keep everyone's attention focused on achieving the same KPIs. This paper deals with the determination of weights of KPI of FM in terms of the design and use of sustainable buildings.

  10. COST ACCOUNTING AS THE KEY INFORMATION CORE OF THE COMPANY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Radmila Jablan STEFANOVIĆ

    2010-12-01

    Full Text Available The management is expected to lead the company towards the achievement of set objectives which, in the contemporary settings of marked external and internal complexity, inevitably requires sophisticated expert knowledge and skills, as well as quality information support. Cost accounting generates cost and performance information with the goal of qualitatively meeting information needs of, above all, internal users. It represents the essential part of the company’s accounting information system as a whole and it is often stressed as the key information core and a reliable information support for the company’s management in performing their managerial activities. The contemporary business environment inevitably requires the restructuring of cost accounting and new approaches to costing and cost management, in the attempt to improve the quality of cost information that has always been the object of particular interest. Moreover, only a flexibly designed cost accounting information system can qualitatively respond to the increasingly numerous and various information requirements. In this paper we discuss the role cost accounting has in offering adequate information support to managers at all managerial levels. We emphasize some of the new tools, techniques, concepts and approaches to costing and cost management

  11. Conceptual framework for holistic dialysis management based on key performance indicators.

    Science.gov (United States)

    Liu, Hu-Chen; Itoh, Kenji

    2013-10-01

    This paper develops a theoretical framework of holistic hospital management based on performance indicators that can be applied to dialysis hospitals, clinics or departments in Japan. Selection of a key indicator set and its validity tests were performed primarily by a questionnaire survey to dialysis experts as well as their statements obtained through interviews. The expert questionnaire asked respondents to rate the degree of "usefulness" for each of 66 indicators on a three-point scale (19 responses collected). Applying the theoretical framework, we selected a minimum set of key performance indicators for dialysis management that can be used in the Japanese context. The indicator set comprised 27 indicators and items that will be collected through three surveys: patient satisfaction, employee satisfaction, and safety culture. The indicators were confirmed by expert judgment from viewpoints of face, content and construct validity as well as their usefulness. This paper established a theoretical framework of performance measurement for holistic dialysis management from primary healthcare stakeholders' perspectives. In this framework, performance indicators were largely divided into healthcare outcomes and performance shaping factors. Indicators of the former type may be applied for the detection of operational problems or weaknesses in a dialysis hospital, clinic or department, while latent causes of each problem can be more effectively addressed by the latter type of indicators in terms of process, structure and culture/climate within the organization. © 2013 The Authors. Therapeutic Apheresis and Dialysis © 2013 International Society for Apheresis.

  12. Research on and design of key circuits in RFID tag chip for container management

    Directory of Open Access Journals (Sweden)

    Wang Wenjie

    2016-01-01

    Full Text Available This paper introduces the design of semi-passive RFID tag chip capable of monitoring container safety. A system framework complying with requirements by ISO/IEC 18000-6C is firstly presented, and then differences from the key units of common passive chip, such as switch-state monitoring circuit, power management unit and anti-shake design in baseband processor, are elaborated. The main function of such a chip is to record the container opening frequency during transportation. Finally, the realizations of each unit’s function are simulated.

  13. Diagnosis and Management of Heart Failure with Preserved Ejection Frac-tion: 10 Key Lessons

    OpenAIRE

    A, Afşin Oktay; Sanjiv J Shah

    2015-01-01

    Heart failure with preserved ejection fraction (HFpEF) is a common clinical syndrome associated with high rates of morbidi-ty and mortality. Due to the lack of evidence-based therapies and increasing prevalence of HFpEF, clinicians are often con-fronted with these patients and yet have little guidance on how to effectively diagnose and manage them. Here we offer 10 key lessons to assist with the care of patients with HFpEF: (1) Know the difference between diastolic dysfunction, diastolic hear...

  14. KEY ITEMS OF INNOVATION MANAGEMENT IN THE PRIMARY HEALTHCARE CENTRES CASE STUDY: FINLAND.

    Science.gov (United States)

    Aslani, Alireza; Zolfagharzadeh, Mohammad Mahdi; Naaranoja, Marja

    2015-09-01

    Trends such as aging populations, excess costs, rising public expectations, and progress in medical science and technologies point out the necessity of adaptation and development of innovation in the healthcare systems particularly in developed countries. The main objective of this article is to review diffusion of innovation in the healthcare sector. Different types of innovation, diffusion characteristics, and adoption mechanisms are the subjects that are discussed in the selected case study, Finland. Finally, the key items of innovation management in the Finnish health system are introduced. The results can be implemented in other countries as well.

  15. Management of CAD/CAM information: Key to improved manufacturing productivity

    Science.gov (United States)

    Fulton, R. E.; Brainin, J.

    1984-01-01

    A key element to improved industry productivity is effective management of CAD/CAM information. To stimulate advancements in this area, a joint NASA/Navy/Industry project designated Integrated Programs for Aerospace-Vehicle Design (IPAD) is underway with the goal of raising aerospace industry productivity through advancement of technology to integrate and manage information involved in the design and manufacturing process. The project complements traditional NASA/DOD research to develop aerospace design technology and the Air Force's Integrated Computer-Aided Manufacturing (ICAM) program to advance CAM technology. IPAD research is guided by an Industry Technical Advisory Board (ITAB) composed of over 100 repesentatives from aerospace and computer companies. The IPAD accomplishments to date in development of requirements and prototype software for various levels of company-wide CAD/CAM data management are summarized and plans for development of technology for management of distributed CAD/CAM data and information required to control future knowledge-based CAD/CAM systems are discussed.

  16. Modelling management process of key drivers for economic sustainability in the modern conditions of economic development

    Directory of Open Access Journals (Sweden)

    Pishchulina E.S.

    2017-01-01

    Full Text Available The text is about issues concerning the management of driver for manufacturing enterprise economic sustainability and manufacturing enterprise sustainability assessment as the key aspect of the management of enterprise economic sustainability. The given issues become topical as new requirements for the methods of manufacturing enterprise management in the modern conditions of market economy occur. An economic sustainability model that is considered in the article is an integration of enterprise economic growth, economic balance of external and internal environment and economic sustainability. The method of assessment of economic sustainability of a manufacturing enterprise proposed in the study allows to reveal some weaknesses in the enterprise performance, and untapped reserves, which can be further used to improve the economic sustainability and efficiency of the enterprise. The management of manufacturing enterprise economic sustainability is one of the most important factors of business functioning and development in modern market economy. The relevance of this trend is increasing in accordance with the objective requirements of the growing volumes of production and sale, the increasing complexity of economic relations, changing external environment of an enterprise.

  17. Key Technologies in the Context of Future Networks: Operational and Management Requirements

    Directory of Open Access Journals (Sweden)

    Lorena Isabel Barona López

    2016-12-01

    Full Text Available The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, three main fields must be improved: radio, network, and operation and management. In particular, operation and management capabilities are intended to enable business agility and operational sustainability, where the addition of new services does not imply an excessive increase in capital or operational expenditures. In this context, a set of key-enabled technologies have emerged in order to aid in this field. Concepts such as Software Defined Network (SDN, Network Function Virtualization (NFV and Self-Organized Networks (SON are pushing traditional systems towards the next 5G network generation.This paper presents an overview of the current status of these promising technologies and ongoing works to fulfill the operational and management requirements of mobile infrastructures. This work also details the use cases and the challenges, taking into account not only SDN, NFV, cloud computing and SON but also other paradigms.

  18. Identifying IDS Agent Nodes Based on 3-Layered Key Management Framework for MANET

    Directory of Open Access Journals (Sweden)

    Marjan KUCHAKI RAFSANJANI

    2014-02-01

    Full Text Available Nowadays, Mobile Ad Hoc Networks (MANETs have become one of the most important networks in advanced technologies. However, MANETs are more vulnerable than wired and wireless networks to active and passive attacks. So, security and intrusion detection are very important in these networks. In this paper, we have presented a method of identifying IDS agent nodes in MANET. Whereas, IDS agent nodes due to monitoring activities in Intrusion Detection Systems (IDSs need more battery energy than other nodes in the network. In the first step, our method uses a 3-layered key management framework in order to authenticate and then in the second step, nodes with higher battery power from among authorized nodes as IDS agent nodes are considered. Therefore, with this method, some authorized nodes contribute in monitoring activities and the network lifetime will be increased and also communication cost in the 3-layered key management framework is less than other frameworks, thus communication performance will be increased.doi:10.14456/WJST.2014.30

  19. A reliable p ower management scheme for consistent hashing based distributed key value storage systems#

    Institute of Scientific and Technical Information of China (English)

    Nan-nan ZHAO; Ji-guang WAN; Jun WANG; Chang-sheng XIE

    2016-01-01

    Distributed key value storage systems are among the most important types of distributed storage systems currently deployed in data centers. Nowadays, enterprise data centers are facing growing pressure in reducing their power consumption. In this paper, we propose GreenCHT, a reliable power management scheme for consistent hashing based distributed key value storage systems. It consists of a multi-tier replication scheme, a reliable distributed log store, and a predictive power mode scheduler (PMS). Instead of randomly placing replicas of each object on a number of nodes in the consistent hash ring, we arrange the replicas of objects on nonoverlapping tiers of nodes in the ring. This allows the system to fall in various power modes by powering down subsets of servers while not violating data availability. The predictive PMS predicts workloads and adapts to load fluctuation. It cooperates with the multi-tier replication strategy to provide power proportionality for the system. To ensure that the reliability of the system is maintained when replicas are powered down, we distribute the writes to standby replicas to active servers, which ensures failure tolerance of the system. GreenCHT is implemented based on Sheepdog, a distributed key value storage system that uses consistent hashing as an underlying distributed hash table. By replaying 12 typical real workload traces collected from Microsoft, the evaluation results show that GreenCHT can provide significant power savings while maintaining a desired performance. We observe that GreenCHT can reduce power consumption by up to 35%–61%.

  20. Group assessment of key indicators of sustainable waste management in developing countries.

    Science.gov (United States)

    Tot, Bojana; Vujić, Goran; Srđević, Zorica; Ubavin, Dejan; Russo, Mário Augusto Tavares

    2017-09-01

    Decision makers in developing countries are struggling to solve the present problems of solid waste management. Prioritisation and ranking of the most important indicators that influence the waste management system is very useful for any decision maker for the future planning and implementation of a sustainable waste management system. The aim of this study is to evaluate key indicators and their related sub-indicators in a group decision-making environment. In order to gain insight into the subject it was necessary to obtain the qualified opinions of decision makers from different countries who understand the situation in the sector of waste management in developing countries. An assessment is performed by 43 decision makers from both developed and developing countries, and the applied methodology is based on a combined use of the analytic hierarchy process, from the multi-criteria decision-making set of tools, and the preferential voting method known as Borda Count, which belongs to social choice theory. Pairwise comparison of indicators is performed with the analytic hierarchy process, and the ranking of indicators once obtained is assessed with Borda Count. Detailed analysis of the final results showed that the Institutional-Administrative indicator was the most important one, with the maximum weight as derived by both groups of decision makers. The results also showed that the combined use of the analytic hierarchy process and Borda Count contributes to the credibility and objectivity of the decision-making process, allowing its use in more complex waste management group decision-making problems to be recommended.

  1. Key performance indicators in plant asset management: hype, burden or real help?

    Energy Technology Data Exchange (ETDEWEB)

    Jovanovic, A. (Steinbeis Advanced Risk Technologies, Stuttgart (Germany)); Bareiss, J.M. (EnBW, Stuttgart (Germany))

    2010-05-15

    The paper tackles the increasing role and use of indicators (e.g. the key performance indicators, KPIs) in asset management in power and process plants, in particular for risk and safety management (safety performance indicators, SPIs), inspection, maintenance, emerging risks analysis and aging management. The two main aspects of the use of indicators are monitoring of performance (e.g. of a single unit) and benchmarking (e.g. among different units). The basis for the considerations presented in the paper are several international projects in the field, showing that the main issue in the field is not and cannot be just the introduction of new indicators as such. They deal with the principles of establishing indicators, establishing generally accepted indicators (goal 'globally accepted' indicators), creating of 'repositories' of indicators in industry and respective tools. The repository/tool developed in the EU project iNTeg-Risk is presented in more detail. The main proposed criteria for successful introduction are the acceptance, transparency and clear added value, e.g. when the indicators help in finding solutions for the issues where the conventional analysis, e.g. the one based on engineering models and analysis is too expensive, complex or simply unavailable. Three practical cases are briefly shown in the paper: one for the improved asset management in a refinery, one for the identification of indicators helping to deal with emerging risks (how to identify them and how to assess risks of a new technology) and one for the implementation of a complex aging management program for industrial plants. (orig.)

  2. The Application Effect Analysis of Nurse Hierarchically Management in Nursing Management%护士分层次管理在护理管理中应用效果分析

    Institute of Scientific and Technical Information of China (English)

    何小红

    2013-01-01

    Objective:To analyze the application effect of nurse hierarchically management in nursing management. Method:To select the nursing staff accept hierarchically management and divide into four levels,including the head nurse,expert nurses,senior responsibility nurses,and primary responsibility nurse,each levels respectively carried out the nursing work of different content,then analyze the nursing quality and the satisfaction of patients before and after classification management. Result:After classification management,the nursing quality obviously increased on the whole, and the satisfaction of patients was relatively higher,the difference was obvious(P<0.05). Conclusion:The application effect of nurse hierarchically management in nursing management is obvious,and medical clinical could apply in a wide range.%  目的:分析护士分层次管理在护理管理中应用效果。方法:选取接受分层次管理的护理人员,分为护士长、专科护士、高级责任护士和初级责任护士四个层次,并分别开展不同内容的护理工作,对实施分层次管理前后的护理质量和患者的满意度分别比较分析。结果:实施分层次管理后,整体护理质量明显提高,患者的满意度相对更高,比较差异有统计学意义(P<0.05)。结论:护士分层次管理在护理管理中应用效果明显,值得临床推广应用。

  3. 密钥管理系统研究与实现%Research and Implementation of Key Management System

    Institute of Scientific and Technical Information of China (English)

    陈亚东; 张涛; 曾荣; 费稼轩; 华晔; 叶云

    2014-01-01

    Cryptographic technology is one of the core technologies of information security,which is basis of key management. To provide efficient and economic key service,it is of crucial importance to ensure the safety of secret key throughout the process of the whole life cycle includes system initialization,key generation,key encasement,key distribution,key storage,key renovation,key destruction,and to assure the effective and safety management of symmetric key and asymmetric key. Describe the design of key management system from the infrastructure layer to the management layer,the system provides real-time safety monitoring of cryptographic devices,key manage-ment system can be used as an independent with a symmetric key and asymmetric key lifecycle safety management services,also can be extended to be the key provider of CA (Certificate Authority) system.%密码技术是信息安全问题的核心技术之一,密钥管理技术是密码技术的基础,在密钥的产生、存储、分配、更新、吊销、控制、销毁等密钥全生命周期过程中保证密钥的安全,保证对称密钥和非对称密钥的有效和安全管理,并提供高效、经济的密钥服务十分关键。文中从基础设施层到系统的管理层设计了将对称密钥和非对称密钥在整体上统一管理的密钥管理系统,实现了对密码设备的实时安全监控,可以作为一个独立提供对称密钥和非对称密钥全生命周期安全管理服务的密钥管理系统,也可以扩展作为数字证书发布系统的密钥管理系统后台。

  4. Hierarchical population monitoring of greater sage-grouse (Centrocercus urophasianus) in Nevada and California—Identifying populations for management at the appropriate spatial scale

    Science.gov (United States)

    Coates, Peter S.; Prochazka, Brian G.; Ricca, Mark A.; Wann, Gregory T.; Aldridge, Cameron; Hanser, Steven E.; Doherty, Kevin E; O'Donnell, Michael S.; Edmunds, David R.; Espinosa, Shawn P.

    2017-08-10

    Population ecologists have long recognized the importance of ecological scale in understanding processes that guide observed demographic patterns for wildlife species. However, directly incorporating spatial and temporal scale into monitoring strategies that detect whether trajectories are driven by local or regional factors is challenging and rarely implemented. Identifying the appropriate scale is critical to the development of management actions that can attenuate or reverse population declines. We describe a novel example of a monitoring framework for estimating annual rates of population change for greater sage-grouse (Centrocercus urophasianus) within a hierarchical and spatially nested structure. Specifically, we conducted Bayesian analyses on a 17-year dataset (2000–2016) of lek counts in Nevada and northeastern California to estimate annual rates of population change, and compared trends across nested spatial scales. We identified leks and larger scale populations in immediate need of management, based on the occurrence of two criteria: (1) crossing of a destabilizing threshold designed to identify significant rates of population decline at a particular nested scale; and (2) crossing of decoupling thresholds designed to identify rates of population decline at smaller scales that decouple from rates of population change at a larger spatial scale. This approach establishes how declines affected by local disturbances can be separated from those operating at larger scales (for example, broad-scale wildfire and region-wide drought). Given the threshold output from our analysis, this adaptive management framework can be implemented readily and annually to facilitate responsive and effective actions for sage-grouse populations in the Great Basin. The rules of the framework can also be modified to identify populations responding positively to management action or demonstrating strong resilience to disturbance. Similar hierarchical approaches might be beneficial

  5. HDS: Hierarchical Data System

    Science.gov (United States)

    Pearce, Dave; Walter, Anton; Lupton, W. F.; Warren-Smith, Rodney F.; Lawden, Mike; McIlwrath, Brian; Peden, J. C. M.; Jenness, Tim; Draper, Peter W.

    2015-02-01

    The Hierarchical Data System (HDS) is a file-based hierarchical data system designed for the storage of a wide variety of information. It is particularly suited to the storage of large multi-dimensional arrays (with their ancillary data) where efficient access is needed. It is a key component of the Starlink software collection (ascl:1110.012) and is used by the Starlink N-Dimensional Data Format (NDF) library (ascl:1411.023). HDS organizes data into hierarchies, broadly similar to the directory structure of a hierarchical filing system, but contained within a single HDS container file. The structures stored in these files are self-describing and flexible; HDS supports modification and extension of structures previously created, as well as functions such as deletion, copying, and renaming. All information stored in HDS files is portable between the machines on which HDS is implemented. Thus, there are no format conversion problems when moving between machines. HDS can write files in a private binary format (version 4), or be layered on top of HDF5 (version 5).

  6. A HIPAA-compliant key management scheme with revocation of authorization.

    Science.gov (United States)

    Lee, Wei-Bin; Lee, Chien-Ding; Ho, Kevin I-J

    2014-03-01

    Patient control over electronic protected health information (ePHI) is one of the major concerns in the Health Insurance and Accountability Act (HIPAA). In this paper, a new key management scheme is proposed to facilitate control by providing two functionalities. First, a patient can authorize more than one healthcare institute within a designated time period to access his or her ePHIs. Second, a patient can revoke authorization and add new authorized institutes at any time as necessary. In the design, it is not required to re-encrypt ePHIs for adding and revoking authorizations, and the implementation is time- and cost-efficient. Consent exception is also considered by the proposed scheme.

  7. The key incident monitoring and management system - history and role in quality improvement.

    Science.gov (United States)

    Badrick, Tony; Gay, Stephanie; Mackay, Mark; Sikaris, Ken

    2017-08-03

    The determination of reliable, practical Quality Indicators (QIs) from presentation of the patient with a pathology request form through to the clinician receiving the report (the Total Testing Process or TTP) is a key step in identifying areas where improvement is necessary in laboratories. The Australasian QIs programme Key Incident Monitoring and Management System (KIMMS) began in 2008. It records incidents (process defects) and episodes (occasions at which incidents may occur) to calculate incident rates. KIMMS also uses the Failure Mode Effects Analysis (FMEA) to assign quantified risk to each incident type. The system defines risk as incident frequency multiplied by both a harm rating (on a 1-10 scale) and detection difficulty score (also a 1-10 scale). Between 2008 and 2016, laboratories participating rose from 22 to 69. Episodes rose from 13.2 to 43.4 million; incidents rose from 114,082 to 756,432. We attribute the rise in incident rate from 0.86% to 1.75% to increased monitoring. Haemolysis shows the highest incidence (22.6% of total incidents) and the highest risk (26.68% of total risk). "Sample is suspected to be from the wrong patient" has the second lowest frequency, but receives the highest harm rating (10/10) and detection difficulty score (10/10), so it is calculated to be the 8th highest risk (2.92%). Similarly, retracted (incorrect) reports QI has the 10th highest frequency (3.9%) but the harm/difficulty calculation confers the second highest risk (11.17%). TTP incident rates are generally low (less than 2% of observed episodes), however, incident risks, their frequencies multiplied by both ratings of harm and discovery difficulty scores, concentrate improvement attention and resources on the monitored incident types most important to manage.

  8. Identifying and weighting of key performance indicators of knowledge management2.0 in organizations

    Directory of Open Access Journals (Sweden)

    Saeed Khalilazar

    2016-03-01

    Full Text Available Main purpose of this research is identifying and weighting of key performance indicators of knowledge management2.0 in organizations. According to widespread permeation of technology, especially social media in different organizational dimensions and functional view to this phenomenon in knowledge management, performance measurement of this kind of media in order to meet organizational goals seems necessary. KM2.0 key performance indicators in this article has been identified and weighted through Delphi methodology, via questionnaire in three rounds. KM2.0 KPIs which are identified and weighted in this article are applicable in organizations that are eager to implement KM2.0 initiative and they can measure the performance of KM2.0 activities therefore this research is applicable in goal oriented approach. According to the results, KM2.0 participation process consists of 3 stages and 8 steps as mentioned below: First stage which is presence, consists of 3 steps which are registration, visit and download. Second stage which is feedback consists of 3 steps which are conversation, applause and amplification. Finally, third stage which is creation consists of 2 steps which are codification and personalization. Ultimate contribution of this research is identifying and weighting KPIs of KM2.0 in conceptual framework of KM2.0. Based on developing a conceptual framework and participation process in KM2.0 and listing related KPIs as an applicable solution in order to measure and improve the performance of organizational social media, this research has unique innovation among related and other articles.

  9. Effect of hierarchical management on patients with lupus nephritis%狼疮性肾炎患者门诊分级管理的效果评价

    Institute of Scientific and Technical Information of China (English)

    史静; 杨燕; 徐晴文; 王青尔

    2013-01-01

    目的 探讨对狼疮性肾炎患者实施分级管理和护理干预的效果.方法 对86例狼疮性肾炎患者实施分级管理和护理干预,采用自制“狼疮性肾炎患者自我管理行为问卷”,包括保持良好的生活习惯、自我处置药物行为、自我监控症状行为、心理自我调整行为、出现新问题及时处理和定期随访6个项目,评价干预前后患者的自我管理能力.问卷的Cronbach's α系数为0.641.结果 分级管理和护理干预10个月后狼疮性肾炎患者自我管理行为总分为(8.13±0.96)分,干预前为(7.35 ±0.86)分,差异有统计学意义(t=5.786,P<0.01),问卷6个项目均分干预前后比较,差异均有统计学意义(P<0.01).结论 分级管理和护理干预可以提高狼疮性肾炎患者的自我管理能力.%Objective To explore the effect of hierarchical management and nursing intervention on lupus nephritis disease patients.Methods Eighty-six cases of lupus nephritis patients involving hierarchical management and nursing intervention were studied to show the effects in good habits maintaining,self drug monitoring,self symptom monitoring,psychological adjustment,new problems handling and regular follow-up.The Cronbach's α coefficient of questionnaire was 0.641.Results The total score of self management in lupus nephritis patients was (8.13 ± 0.96) ten months after hierarchical management and nursing intervention,and (7.35 ±0.86) before intervention,and the difference was statistically significant (t =5.786,P <0.01).The averages of six items in questionnaire were respectively compared before and after intervention,and the differences were statistically significant (P < 0.01).Conclusions Hierarchical management and nursing intervention can improve the self management ability of lupus nephritis disease patients.

  10. Management of investment-construction projects basing on the matrix of key events

    Directory of Open Access Journals (Sweden)

    Morozenko Andrey Aleksandrovich

    2016-11-01

    Full Text Available The article considers the current problematic issues in the management of investment-construction projects, examines the questions of efficiency increase of construction operations on the basis of the formation of a reflex-adaptive organizational structure. The authors analyzed the necessity of forming a matrix of key events in the investment-construction project (ICP, which will create the optimal structure of the project, basing on the work program for its implementation. For convenience of representing programs of the project implementation in time the authors make recommendations to consolidate the works into separate, economically independent functional blocks. It is proposed to use an algorithm of forming the matrix of an investment-construction project, considering the economic independence of the functional blocks and stages of the ICP implementation. The use of extended network model is justified, which is supplemented by organizational and structural constraints at different stages of the project, highlighting key events fundamentally influencing the further course of the ICP implementation.

  11. Prioritizing key resilience indicators to support coral reef management in a changing climate.

    Science.gov (United States)

    McClanahan, Tim R; Donner, Simon D; Maynard, Jeffrey A; MacNeil, M Aaron; Graham, Nicholas A J; Maina, Joseph; Baker, Andrew C; Alemu I, Jahson B; Beger, Maria; Campbell, Stuart J; Darling, Emily S; Eakin, C Mark; Heron, Scott F; Jupiter, Stacy D; Lundquist, Carolyn J; McLeod, Elizabeth; Mumby, Peter J; Paddack, Michelle J; Selig, Elizabeth R; van Woesik, Robert

    2012-01-01

    Managing coral reefs for resilience to climate change is a popular concept but has been difficult to implement because the empirical scientific evidence has either not been evaluated or is sometimes unsupportive of theory, which leads to uncertainty when considering methods and identifying priority reefs. We asked experts and reviewed the scientific literature for guidance on the multiple physical and biological factors that affect the ability of coral reefs to resist and recover from climate disturbance. Eleven key factors to inform decisions based on scaling scientific evidence and the achievability of quantifying the factors were identified. Factors important to resistance and recovery, which are important components of resilience, were not strongly related, and should be assessed independently. The abundance of resistant (heat-tolerant) coral species and past temperature variability were perceived to provide the greatest resistance to climate change, while coral recruitment rates, and macroalgae abundance were most influential in the recovery process. Based on the 11 key factors, we tested an evidence-based framework for climate change resilience in an Indonesian marine protected area. The results suggest our evidence-weighted framework improved upon existing un-weighted methods in terms of characterizing resilience and distinguishing priority sites. The evaluation supports the concept that, despite high ecological complexity, relatively few strong variables can be important in influencing ecosystem dynamics. This is the first rigorous assessment of factors promoting coral reef resilience based on their perceived importance, empirical evidence, and feasibility of measurement. There were few differences between scientists' perceptions of factor importance and the scientific evidence found in journal publications but more before and after impact studies will be required to fully test the validity of all the factors. The methods here will increase the feasibility

  12. Prioritizing key resilience indicators to support coral reef management in a changing climate.

    Directory of Open Access Journals (Sweden)

    Tim R McClanahan

    Full Text Available Managing coral reefs for resilience to climate change is a popular concept but has been difficult to implement because the empirical scientific evidence has either not been evaluated or is sometimes unsupportive of theory, which leads to uncertainty when considering methods and identifying priority reefs. We asked experts and reviewed the scientific literature for guidance on the multiple physical and biological factors that affect the ability of coral reefs to resist and recover from climate disturbance. Eleven key factors to inform decisions based on scaling scientific evidence and the achievability of quantifying the factors were identified. Factors important to resistance and recovery, which are important components of resilience, were not strongly related, and should be assessed independently. The abundance of resistant (heat-tolerant coral species and past temperature variability were perceived to provide the greatest resistance to climate change, while coral recruitment rates, and macroalgae abundance were most influential in the recovery process. Based on the 11 key factors, we tested an evidence-based framework for climate change resilience in an Indonesian marine protected area. The results suggest our evidence-weighted framework improved upon existing un-weighted methods in terms of characterizing resilience and distinguishing priority sites. The evaluation supports the concept that, despite high ecological complexity, relatively few strong variables can be important in influencing ecosystem dynamics. This is the first rigorous assessment of factors promoting coral reef resilience based on their perceived importance, empirical evidence, and feasibility of measurement. There were few differences between scientists' perceptions of factor importance and the scientific evidence found in journal publications but more before and after impact studies will be required to fully test the validity of all the factors. The methods here will

  13. Some key principles in implementing knowledge management: the views of employees in a small software company

    Directory of Open Access Journals (Sweden)

    Clair Wagner

    2002-09-01

    Full Text Available As the Knowledge Era replaces the Information Age the challenge is to transform information into knowledge and use this knowledge to create and sustain the competitive advantage of organisations. In this article four key principles for implementing knowledge management are discussed. These principles were derived from a survey and discussions with employees at a small software company. The four principles are: the need for a common definition of and vision for knowledge management, the interdependence between the human and technology track, the way employees punctuate ‘knowing’ and the structure of a reward system for sharing knowledge. Opsomming Organisasies word gekonfronteer met unieke uitdagings soos wat die Kennisera die Inligtingsera vervang. Een van die grootste uitdagings is om inligting te verander na betekenisvolle kennis en om die kennis te gebruik om ‘n kompeterende voorsprong te skep en te bou. In hierdie artikel word vier kern beginsels vir die implementering van kennisbestuur bespreek. Die beginsels is geskoei op ‘n opname van en onderhoude met werknemers in ‘n klein sagteware besigheid. Die vier beginsels is: die behoefte aan ‘n definisie en visie van kennisbestuur, die interafhanklikheid tussen mense en tegnologie, die wyse waarop werknemers kennis punktueer en die skep van ‘n beloningstruktuur vir die deel van kennis.

  14. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach.

    Science.gov (United States)

    Si, Sheng-Li; You, Xiao-Yue; Liu, Hu-Chen; Huang, Jia

    2017-08-19

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that "accidents/adverse events", "nosocomial infection", ''incidents/errors", "number of operations/procedures" are significant influential indicators. Also, the indicators of "length of stay", "bed occupancy" and "financial measures" play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions.

  15. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  16. Capacity building in water demand management as a key component for attaining millennium development goals

    Science.gov (United States)

    Gumbo, Bekithemba; Forster, Laura; Arntzen, Jaap

    Successful water demand management (WDM) implementation as a component of integrated water resource management (IWRM) can play a significant role in the alleviation of poverty through more efficient use of available water resources. The urban population in Southern African cities is characterised by so-called ‘water poor’ communities who typically expend a high percentage of their household income on poor quality water. Usually they have no access to an affordable alternative source. Although WDM as a component of IWRM is not a panacea for poverty, it can help alleviate poverty by facilitating water services management by municipal water supply agencies (MWSAs) in the region. WDM is a key strategy for achieving the millennium development goals (MDGs) and, as such, should be given due attention in the preparation of national IWRM and water efficiency plans. Various studies in the Southern African region have indicated that capacity building is necessary for nations to develop IWRM and water-use efficiency plans to meet the targets set out in the MDGs. WDM education and training of water professionals and end-users is particularly important in developing countries, which are resource and information-access poor. In response to these findings, The World Conservation Union (IUCN) and its consulting partners, the Training and Instructional Design Academy of South Africa (TIDASA), and Centre for Applied Research (CAR) designed, developed and presented a pilot WDM Guideline Training Module for MWSAs as part of Phase II of IUCN’s Southern Africa regional WDM project. Pilot training was conducted in July 2004 in Lusaka, Zambia for a group of 36 participants involved in municipal water supply from nine Southern African countries. This paper looks at the links between building the capacity of professionals, operational staff and other role-players in the municipal water supply chain to implement WDM as part of broader IWRM strategies, and the subsequent potential for

  17. EMSODEV and EPOS-IP: key findings for effective management of EU research infrastructure projects

    Science.gov (United States)

    Materia, Paola; Bozzoli, Sabrina; Beranzoli, Laura; Cocco, Massimo; Favali, Paolo; Freda, Carmela; Sangianantoni, Agata

    2017-04-01

    -2019) is a project of 47 partners, 6 associate partners and several international organizations for a total of 25 countries involved. EPOS IP is a key step in EPOS' mission of a pan-European Earth science integrated platform. It will deliver not only a suite of domain-specific and multidisciplinary data and services in one platform, but also the legal, governance and financial frameworks to ensure the infrastructure future operation and sustainability (EPOS ERIC). INGV experience over the years indicates that effective management of EU RIs projects should contain 5 basic elements: 1.Defined life cycle and milestones: Map of phases, deliverables, key milestones and sufficiency criteria for each group involved in the project using project management tools and software. 2.Shared organization, systems, roles: Defined roles for team members and responsibilities for functional managers are crucial. Similarly, a system of communication and team involvement is essential to success. Leadership and interpersonal/organizational skills are also important. 3.Quality assurance: Quality dimension should be aligned to the project objectives and specific criteria should be identified for each phase of the project. 4.Tracking and variance analysis: Regular reports and periodic meetings of the teams are crucial to identify when things are off target. Schedule slips, cost overruns, open issues, new risks and problems must be dealt with as early as possible. 5.Impact assessment by monitoring the achievement of results and socio-economic impact.

  18. An introduction to hierarchical linear modeling

    National Research Council Canada - National Science Library

    Woltman, Heather; Feldstain, Andrea; MacKay, J. Christine; Rocchi, Meredith

    2012-01-01

    This tutorial aims to introduce Hierarchical Linear Modeling (HLM). A simple explanation of HLM is provided that describes when to use this statistical technique and identifies key factors to consider before conducting this analysis...

  19. 一种基于分层 AP 的视频关键帧提取方法研究%Research on video key-frame extraction based on hierarchical affinity propagation clustering

    Institute of Scientific and Technical Information of China (English)

    党宏社; 白梅

    2016-01-01

    为从大量的视频资源中高效准确地提取关键帧图像来表达视频的主要内容,针对传统AP聚类方法提取关键帧无法适应大规模图像集的问题,提出一种分层AP的关键帧提取方法。提取所有视频序列的颜色和纹理特征,将待聚类的图像集进行分层,用传统AP聚类方法求取每个图像子集的聚类中心;用得到的聚类中心进行自适应的AP聚类,根据Silhouette指标选取最优的聚类结果,即可得到视频序列的关键帧代表。实验表明,该方法能快速准确地提取视频最优关键帧,在保证保真度指标的同时能提高关键帧提取的压缩比,且适用于不同类型的视频资源。%In order to extract key frames from large‐scale different videos more effectively and accurately ,since traditional AP algorithm is inappropriate to the large‐scale pictures cluste‐ring ,a hierarchical AP method for key frame extraction is proposed .First get the color and texture features of all video sequences ,the pictures set is divided into several subsets ,the tra‐ditional AP is used to obtain the exemplars of each subset ;Then the adaptive AP is imple‐mented on the obtained exemplars ,the key frames of video sequences are extracted according to the index of Silhouette for the best clustering result .The experimental result shows that proposed method is efficient in key‐frame extraction and suitable for all types video re‐sources ,has a high fidelity w hile the compression ratio is improved greatly .

  20. Diagnosis and management of heart failure with preserved ejection fraction: 10 key lessons.

    Science.gov (United States)

    Oktay, A Afşin; Shah, Sanjiv J

    2015-01-01

    Heart failure with preserved ejection fraction (HFpEF) is a common clinical syndrome associated with high rates of morbidity and mortality. Due to the lack of evidence-based therapies and increasing prevalence of HFpEF, clinicians are often confronted with these patients and yet have little guidance on how to effectively diagnose and manage them. Here we offer 10 key lessons to assist with the care of patients with HFpEF: (1) Know the difference between diastolic dysfunction, diastolic heart failure, and HFpEF; (2) diagnosing HFpEF is challenging, so be thorough and consider invasive hemodynamic testing to confirm the diagnosis; (3) a normal B-type natriuretic peptide does not exclude the diagnosis of HFpEF; (4) elevated pulmonary artery systolic pressure on echocardiography in the presence of a normal ejection fraction should prompt consideration of HFpEF; (5) use dynamic testing in evaluating the possibility of HFpEF in patients with unexplained dyspnea or exercise tolerance; (6) all patients with HFpEF should be systematically evaluated for the presence of coronary artery disease; (7) use targeted treatment for HFpEF patients based on their phenotypic classification; (8) treat HFpEF patients now by treating their comorbidities; (9) understand the importance of heart rate in HFpEF- lower is not always better; and (10) do not forget to consider rare diseases ("zebras") as causes for HFpEF when evaluating and treating patients. Taken together, these 10 key lessons can help clinicians care for challenging patients with HFpEF while we eagerly await the results of ongoing HFpEF clinical trials and observational studies.

  1. Closing the water cycle - the key role of water and wastewater management in a circular economy

    Science.gov (United States)

    Uhlenbrook, Stefan; Connor, Rick; Koncagul, Engin; Ortigara, Angela

    2017-04-01

    Planetary water boundaries are exceeded locally and regionally as water demand and use are escalating and per capita water availability is decreasing. However, wastewater represents an alternative yet reliable source containing for instance, nutrients (for use as fertilizer) and metals that can be extracted, and can be a source of energy. These characteristics mean that water and wastewater are set to play a key role in the circular economy. Furthermore, wastewater use can generate business opportunities and enhance water, food and energy security, therefore helping to alleviate poverty. However, to increase the collection, treatment and use of wastewater, investments in infrastructure and appropriate (low cost) technologies are needed. Ensuring the development of human and institutional capacity is also essential for proper wastewater management. The UN World Water Assessment Programme (WWAP) produces together with several UN-Water Members and Partners the annual World Water Development Report (WWDR). Its 2017 edition "Wastewater: The Untapped Resource" focuses on the critical role of wastewater management for vibrant economies, resilient societies and the maintenance of a healthy environment. Wastewater issues play also a central role in the 2030 Agenda for Sustainable Development, most notably through Sustainable Development Goal (SDG) target 6.3 that aims to improve water quality by reducing the proportion of untreated wastewater released to the environment and increasing its recycling and safe reuse globally. This target is interlinked with several other targets of SDG 6 ('the water goal') as well as to several other SDGs that relate to, poverty reduction, health, energy and food security, among others. The main policy-relevant messages of the WWDR 2017 will be introduced and linked to socio-hydrological approaches. These messages are an important input to the implementation of the water research agenda of the Panta Rhei initiative of IAHS.

  2. An empirical investigation on the effects of electronic banking on key customer relationship management

    Directory of Open Access Journals (Sweden)

    Kazem Chavoshi

    2013-12-01

    Full Text Available In recent years, there has been good progress on information and communication technology influencing businesses with a new emerging concept called customer relationship management (CRM and it has made significant changes in electronic banking. The primary objective of this paper is to survey electronic banking effects on key CRM components in one of Iranian banks in city of Tehran, Iran. The survey designs a questionnaire and distributes it among some experts in one of selected regions and the results are verified based on t-student and Freedman tests. Results show that all electronic banking services influence on CRM. In addition, that there are no significant differences among effects of electronic services on CRM but each CRM component has different effects on electronic services. In fact, according to freedman test, improving customer relationship process is the most important factor followed by providing appropriate service for each customer, providing appropriate service on appropriate time for each customer and providing appropriate service by appropriate channel for each customer.

  3. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Hauser, Katie R [ORNL; Lantz, Margaret W [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

  4. DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network

    Directory of Open Access Journals (Sweden)

    G.Padmavathi

    2012-02-01

    Full Text Available The wireless and dynamic nature of mobile ad hoc networks (MANETs leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication endpoints. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.

  5. Key Performance Indicators in Radiology: You Can't Manage What You Can't Measure.

    Science.gov (United States)

    Harvey, H Benjamin; Hassanzadeh, Elmira; Aran, Shima; Rosenthal, Daniel I; Thrall, James H; Abujudeh, Hani H

    2016-01-01

    Quality assurance (QA) is a fundamental component of every successful radiology operation. A radiology QA program must be able to efficiently and effectively monitor and respond to quality problems. However, as radiology QA has expanded into the depths of radiology operations, the task of defining and measuring quality has become more difficult. Key performance indicators (KPIs) are highly valuable data points and measurement tools that can be used to monitor and evaluate the quality of services provided by a radiology operation. As such, KPIs empower a radiology QA program to bridge normative understandings of health care quality with on-the-ground quality management. This review introduces the importance of KPIs in health care QA, a framework for structuring KPIs, a method to identify and tailor KPIs, and strategies to analyze and communicate KPI data that would drive process improvement. Adopting a KPI-driven QA program is both good for patient care and allows a radiology operation to demonstrate measurable value to other health care stakeholders.

  6. Motivation to Manage at the Top Executive Level: A Test of the Hierarchic Role-Motivation Theory.

    Science.gov (United States)

    Berman, Frederic E.; Miner, John B.

    1985-01-01

    Business executives, who had worked up a bureaucratic hierarchy, entrepreneurs, and managers completed the Miner Sentence Completion Scale (MSCS), a measure of managerial motivation. Results indicated that theory congruent top executives had higher managerial motivation than entrepreneurs or managers. Findings support the theory and the use of the…

  7. Deliberate change without hierarchical influence?

    DEFF Research Database (Denmark)

    Nørskov, Sladjana; Kesting, Peter; Ulhøi, John Parm

    2017-01-01

    Purpose This paper aims to present that deliberate change is strongly associated with formal structures and top-down influence. Hierarchical configurations have been used to structure processes, overcome resistance and get things done. But is deliberate change also possible without formal...... reveals that deliberate change is indeed achievable in a non-hierarchical collaborative OSS community context. However, it presupposes the presence and active involvement of informal change agents. The paper identifies and specifies four key drivers for change agents’ influence. Originality....../value The findings contribute to organisational analysis by providing a deeper understanding of the importance of leadership in making deliberate change possible in non-hierarchical settings. It points to the importance of “change-by-conviction”, essentially based on voluntary behaviour. This can open the door...

  8. A Location-aware and Secret-share Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunguang Ma

    2010-04-01

    Full Text Available Recently, Numerous dynamic key management schemes have been proposed for WSN, and it has long-lived networks, more sustained security and survivability, such as SHELL and LCOK. But most of these schemes are greatly depend on some central nodes (gateways, if these nodes were compromised, there will be great threat to the whole networks security and survivability. In this paper, we proposed a Location-aware and secret share based dynamic key management scheme to effectively replace the compromised central node and enhance the security level of the network.

  9. Clinical Nursing Care Management Purposes of Assessing the Effect of Nurse Hierarchical Management%临床护理管理中护理中护士分层管理的施行效果评定

    Institute of Scientific and Technical Information of China (English)

    吴超

    2016-01-01

    Objective To assess the effect of the implementation of the management of clinical nursing care nurse hierar_chical management. Methods Hospital nursing staff of the department of 70 as an observation target, according to the law touching the ball into the reference group (n = 35, implementation of the conventional management mode) and study group (n =35, nurses implement hierarchical management), to two overall satisfaction and quality of care patients appraisals. Re-sults The quality of the reference group of ward management, nursing records writing, quality of service and specialist care, basic care scores were significantly lower than the study group, the difference was statistically significant (P<0.05). Conclu-sion The clinical nurse nursing management to implement hierarchical management, will help improve quality of care ser_vices, with positive clinical use and promotion of significance.%目的:评定临床护理管理中护士分层管理的施行效果。方法选取该院各科室的70名护理人员作为观察目标,按照摸球法分为参照组(n=35,实施常规管理模式)和研究组(n=35,实施护士分层管理),对两组患者满意度及整体护理工作质量进行评比。结果参照组病区管理质量、护理文书书写、服务质量及专科护理、基础护理评分均显著低于研究组,差异具有统计学意义(P<0.05)。结论临床护理管理中实施护士分层管理,有利于提高整体护理服务质量,具有积极的临床使用和推广意义。

  10. Top management team composition and organizational ecology : A nested hierarchical selection theory of team reproduction and organizational diversity

    NARCIS (Netherlands)

    Boone, Christophe; Wezel, Filippo C.; van Witteloostuijn, Arjen; Baum, JAC; Dobrev, SD; VanWitteloostuijn, A

    2006-01-01

    The "upper echelon" literature has mainly produced static empirical studies on the impact of top management team composition on organizational outcomes, ignoring the dynamics of industrial demography. Organizational ecology explicitly studied the dynamics of organizational diversity at the populatio

  11. Estimating and modelling bias of the hierarchical partitioning public-domain software: implications in environmental management and conservation.

    Directory of Open Access Journals (Sweden)

    Pedro P Olea

    Full Text Available BACKGROUND: Hierarchical partitioning (HP is an analytical method of multiple regression that identifies the most likely causal factors while alleviating multicollinearity problems. Its use is increasing in ecology and conservation by its usefulness for complementing multiple regression analysis. A public-domain software "hier.part package" has been developed for running HP in R software. Its authors highlight a "minor rounding error" for hierarchies constructed from >9 variables, however potential bias by using this module has not yet been examined. Knowing this bias is pivotal because, for example, the ranking obtained in HP is being used as a criterion for establishing priorities of conservation. METHODOLOGY/PRINCIPAL FINDINGS: Using numerical simulations and two real examples, we assessed the robustness of this HP module in relation to the order the variables have in the analysis. Results indicated a considerable effect of the variable order on the amount of independent variance explained by predictors for models with >9 explanatory variables. For these models the nominal ranking of importance of the predictors changed with variable order, i.e. predictors declared important by its contribution in explaining the response variable frequently changed to be either most or less important with other variable orders. The probability of changing position of a variable was best explained by the difference in independent explanatory power between that variable and the previous one in the nominal ranking of importance. The lesser is this difference, the more likely is the change of position. CONCLUSIONS/SIGNIFICANCE: HP should be applied with caution when more than 9 explanatory variables are used to know ranking of covariate importance. The explained variance is not a useful parameter to use in models with more than 9 independent variables. The inconsistency in the results obtained by HP should be considered in future studies as well as in those

  12. KEY ASPECTS OF MANAGING AN INNOVATION PROJECT IN THE EU FRAMEWORK PROGRAMME HORIZON 2020

    Directory of Open Access Journals (Sweden)

    Siniša M. Arsić

    2015-01-01

    Full Text Available The program EU Horizon 2020 (ec.europa.eu is the largest source of resources for all legal entities from Europe, with the budget of 80 billion €. It is possible to use donations from the EU for various proposals and themes, from the 91 calls for projects, with subjects differing from sustainable transport to the innovation support of the SME sector. A group of Serbian authors decided to enter into somewhat of an ambitious endeavour (authors had individual experience on projects, they decided to send a project proposal in the framework of the „SME Instrument“ call, which is directed to inovation support project in the SME sector. The projects that are proposed for the financing by the EU Horizon 2020 program, are in the group of complex and very specific projects, so the authors presented the review of key aspects of projects that are engaged in realization of the inovation process that starts with a certain idea on paper, and ends with a verified product which is placed on the competitive EU market. The special chapter of this paper deals with the sinergy of the inovation project explorers, which must answer to the multidisciplinarity of research problems. The possibilities are examined in the research of the technical-technological sciences, by using organizational-informatic tools, developed for the needs of managing projects. The main use of this work for readers are illuminating of numerous unknown technical details regarding the proposal itself, and the process of connecting with the project partners, because the large number of proposals quits off right at the beginning. Then contribution is reflected in the fact that the paper signifies a sort of basis for a knowledge base, which can be served to higher education institutions and economy to focus a part of their intentions on lifting their own capacity for the struggle with the massive competition of EU that is expected in years and decades to come.

  13. Biometrics based key management of double random phase encoding scheme using error control codes

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  14. Secure multi-party communication with quantum key distribution managed by trusted authority

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  15. 护士分层管理结合绩效考核在妇科病房中的应用%The application of hierarchical management of nurses in department of gynecology and obstetrics

    Institute of Scientific and Technical Information of China (English)

    陈红梅; 彭燕; 张莹

    2015-01-01

    Objective:To discuss the application effect of nurses'hierarchical-level management with performance assessment in the management of nursing care in gynaecological ward. Methods:The management of nursing care in gynaecological ward has been given a contrast and a study before and after the ap-plication of nurses'hierarchical-level management with performance assessment. Results:After the application of nurses' hierarchical-level management with performance assessment in the management of nursing care in gynaecological ward,the quality of nursing care,satisfaction of patients and nurses were improved significantly. Conclusion:The implementation of nurse hierarchical management combined with performance assessment,help to improve the quality of nursing service,patient's satisfaction and the degree of satisfaction of nurses to nursing work.%目的:探讨实行护士分层管理结合绩效考核在妇科病房护理管理中的应用效果. 方法:制定科室护士层级设置与主要职责,对妇科病房实施护士分层管理结合绩效考核. 结果:实施后妇科病房护理工作质量、患者满意度、护士满意度较实施前显著提高,差异有统计学意义(P<0. 05). 结论:实行护士分层级管理结合绩效考核,有助于提升护理服务质量、患者满意度以及护士对护理工作的满意度.

  16. Announcing the Standard for Key Management Using ANSI X9.17

    Science.gov (United States)

    2007-11-02

    computer system, or b. cause a major adverse financial impact on the operator which is not offset by Governmentwide savings...acquire keys (and optionally an IV) and send the keys (and IV) in a KSM. Implementations which assume the role of Party A in the CKD ...environment requests keys (and an IV) from a CKD (see Option 23). Implementations which assume the role of Party A in the CKT or CKD

  17. Key factors in marketing management which affect the competitiveness of the graphic communication sector in Barranquilla city, Colombia

    Directory of Open Access Journals (Sweden)

    Ernesto Cantillo Guerrero

    2013-03-01

    Full Text Available Rev.esc.adm.neg This article describes the key factors of marketing management that impact the competitiveness of the graphic companies located in Barranquilla, based on managers´ opinions. Following a method of exploration and description analysis, an instrument was applied to a group of managers belonging to this economic sector, showing that there are six factors which affect competitiveness. Finally, a correlational analysis was performed to establish the relationships among all these factors and also to describe the influence of the managerial theory on marketing and the relationships among all these factors when designing marketing strategies.

  18. Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In traditional networks ,the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this paper, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short,the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust requirement of hosts better.

  19. A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks

    CERN Document Server

    Lee, Yunho

    2009-01-01

    Research on sensor networks has become much more active and is currently being applied to many different fields. However since sensor networks are limited to only collecting and reporting information regarding a certain event, and requires human intervention with that given information, it is often difficult to react to an event or situation immediately and proactively. To overcome this kind of limitation, Wireless Sensor and Actor Networks (WSANs) with immediate-response actor nodes have been proposed which adds greater mobility and activity to the existing sensor networks. Although WSANs share many common grounds with sensor networks, it is difficult to apply existing security technologies due to the fact that WSANs contain actor nodes that are resource-independent and mobile. Therefore, this research seeks to demonstrate ways to provide security, integrity, and authentication services for WSANs secure operation, by separating networks into hierarchical structure by each node's abilities and provides differ...

  20. How does crop residue removal affect soil organic carbon and yield? A hierarchical analysis of management and environmental factors

    NARCIS (Netherlands)

    Warren Raffa, D.; Bogdanski, A.; Tittonell, P.

    2015-01-01

    The current advancement of the bioenergy sector along with the need for sustainable agricultural systems call for context-specific crop residue management options - implying variable degrees of removal - across climatic regions, soil types and farming systems around the world. A large database

  1. Hierarchical Identity-Based Lossy Trapdoor Functions

    CERN Document Server

    Escala, Alex; Libert, Benoit; Rafols, Carla

    2012-01-01

    Lossy trapdoor functions, introduced by Peikert and Waters (STOC'08), have received a lot of attention in the last years, because of their wide range of applications in theoretical cryptography. The notion has been recently extended to the identity-based scenario by Bellare et al. (Eurocrypt'12). We provide one more step in this direction, by considering the notion of hierarchical identity-based lossy trapdoor functions (HIB-LTDFs). Hierarchical identity-based cryptography generalizes identitybased cryptography in the sense that identities are organized in a hierarchical way; a parent identity has more power than its descendants, because it can generate valid secret keys for them. Hierarchical identity-based cryptography has been proved very useful both for practical applications and to establish theoretical relations with other cryptographic primitives. In order to realize HIB-LTDFs, we first build a weakly secure hierarchical predicate encryption scheme. This scheme, which may be of independent interest, is...

  2. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    of different types of hierarchical networks. This is supplemented by a review of ring network design problems and a presentation of a model allowing for modeling most hierarchical networks. We use methods based on linear programming to design the hierarchical networks. Thus, a brief introduction to the various....... The thesis investigates models for hierarchical network design and methods used to design such networks. In addition, ring network design is considered, since ring networks commonly appear in the design of hierarchical networks. The thesis introduces hierarchical networks, including a classification scheme...... linear programming based methods is included. The thesis is thus suitable as a foundation for study of design of hierarchical networks. The major contribution of the thesis consists of seven papers which are included in the appendix. The papers address hierarchical network design and/or ring network...

  3. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    Science.gov (United States)

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  4. Hierarchical Multiagent Reinforcement Learning

    Science.gov (United States)

    2004-01-25

    In this paper, we investigate the use of hierarchical reinforcement learning (HRL) to speed up the acquisition of cooperative multiagent tasks. We...introduce a hierarchical multiagent reinforcement learning (RL) framework and propose a hierarchical multiagent RL algorithm called Cooperative HRL. In

  5. ANALYSIS OF THE KEY ACTIVITIES OF THE LIFE CYCLE OF KNOWLEDGE MANAGEMENT IN THE UNIVERSITY AND DEVELOPMENT OF THE CONCEPTUAL ARCHITECTURE OF THE KNOWLEDGE MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Eugene N. Tcheremsina

    2013-01-01

    Full Text Available This article gives an analysis of the key activities of the life cycle of knowledge management in terms of the features of knowledge management in higher education. Based on the analysis we propose the model of the conceptual architecture of virtual knowledge-space of a university. The proposed model is the basis for the development of kernel intercollegiate virtual knowledge-space, based on cloud technology. 

  6. 施工企业项目化管理的关键影响因素分析%Analysis of key factors influencing on construction enterprise management by project

    Institute of Scientific and Technical Information of China (English)

    文艳芳; 苏三庆

    2011-01-01

    随着我国市场经济体制的逐步确立,施工企业之间的竞争日趋激烈.如何提升项目化管理能力,成为施工企业发展的关键.在分析项目化管理内涵的基础上,构建了项目化管理指标体系,根据专家调研数据,用层次分析法构造判断矩阵,计算出指标层的权重,进行一致性检验,得出了施工企业项目化管理的关键影响因素.施工企业通过提高关键影响因素,可有效增强项目化管理能力,为企业持续发展提供参考.%Competition among construction enterprises becomes drastic while market economy is gradually established in China. So it is a key concern that how to boost construction enterprises project management ability. Based on the meaning of project management, index structure of management by project has been established. According to the investigation, the analytic hierarch process method is applied to set up judgment matrix, compute index weight and carry out a consistency test. The key factors on management by project are obtained. Through enhancing the key factors, ability of management by project can be strengthened. The method provides a reference for the development of construction enterprises.

  7. The Effects Observation of Nurse Hierarchical Management in Improving the Quality of Medical Care%护士分层管理对提高内科护理质量的影响观察

    Institute of Scientific and Technical Information of China (English)

    熊香玉

    2014-01-01

    Objective:To study the application effect of nurses hierarchical management in improving the quality of medical care,summarized the hierarchical care management methods and proposed precautions,to continuously improve the quality of medical care.Method:Selected from June 2011 to June 2013 as the experimental research phase.From June 2011 to June 2012 as the control phase,nurse management used conventional management methods.From July 2012 to June 2013 as experimental phase used nurse hierarchical management.The happiness of nurse and medical care’s quality after nurse hierarchical management be comparative observed.Result:The nurse’s happiness,medical care quality and nursing satisfaction of experimental phase were higher than the control phase,differences were statistically significant (P<0.05).Conclusion:In medicine nursing management,the hierarchical management methods can effectively improve the nurses’ happiness and medical care quality,is a better nursing management measure.%目的:研究分析护士分层管理在提高内科护理质量中的应用效果,总结分层护理管理的方法并提出注意事项,以不断提高内科护理质量。方法:以2011年6月-2013年6月为本次实验的研究阶段,其中2011年6月-2012年6月为对照阶段,护理管理使用常规的管理方法;2012年7月-2013年6月为实验阶段,在护理管理中采用护士分层护理管理。对比观察两阶段护理管理后护士的幸福感和内科护理质量。结果:实验阶段护士幸福感、内科护理质量以及护理满意度均高于对照阶段,差异有统计学意义(P<0.05)。结论:在内科护理管理中采用护士分层管理方法,可以有效提高护士的幸福感,提高内科护理质量,是一种较好的护理管理措施。

  8. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach

    National Research Council Canada - National Science Library

    Sheng-Li Si; Xiao-Yue You; Hu-Chen Liu; Jia Huang

    2017-01-01

    ...) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled...

  9. Design Principles for Secure Wireless Sensor Networks: Key Management Schemes and Malicious Attacks

    Science.gov (United States)

    2010-09-09

    focus in the first period (August 2006 through July 2007) was 1. to de- velop a new key pre-distribution method based on symmetric polynomials (which we...secure sensor net- work, in which sensor devices may also employ periodic sleep -active duty-cycling to conserve precious energy. We provided a...MKPS: A Multivariate Polynomial Scheme for Symmetric Key-Establishment in Distributed Sensor Networks,” in Proc. ACM Inter- national Wireless

  10. Hierarchical Storage Management at the NASA Center for Computational Sciences: From UniTree to SAM-QFS

    Science.gov (United States)

    Salmon, Ellen; Tarshish, Adina; Palm, Nancy; Patel, Sanjay; Saletta, Marty; Vanderlan, Ed; Rouch, Mike; Burns, Lisa; Duffy, Daniel; Caine, Robert

    2004-01-01

    This paper presents the data management issues associated with a large center like the NCCS and how these issues are addressed. More specifically, the focus of this paper is on the recent transition from a legacy UniTree (Legato) system to a SAM-QFS (Sun) system. Therefore, this paper will describe the motivations, from both a hardware and software perspective, for migrating from one system to another. Coupled with the migration from UniTree into SAM-QFS, the complete mass storage environment was upgraded to provide high availability, redundancy, and enhanced performance. This paper will describe the resulting solution and lessons learned throughout the migration process.

  11. Effective knowledge management as basis for holistic knowledge engineering – Knowledge as the key asset of an organization

    Directory of Open Access Journals (Sweden)

    Svetlana Lazović

    2013-03-01

    Full Text Available In knowledge management , human resources are in the foreground and their value is constantly rising. In the eyes of modern managers knowledge is the key asset of an organization. Effective management and management of knowledge processes are central preoccupations of modern managers and, at the same time, the most prominent feature of a knowledge-based organization. Like innovation and creativity, knowledge needs to be encouraged and treated with due care. Commitment to acquisition of new knowledge depends on how the interpersonal relationships are managed in an organization, therefore, those responsible for knowledge processes, the so-called modern knowledge managers, will develop partnership relation- ships with all members of their organization. In the core of such partnerships lie competences of individual employees and their creative application of knowledge. By encouraging learning, discussions and opinion exchange as well as personal and professional growth of their employees, management in knowledge-based organizations is improving the quality of work, and consequently, generation of new knowledge and their organization’s competitive advantage.

  12. The scenic impact of key forest attributes and long-term management alternatives for hardwood forests

    Science.gov (United States)

    R.G. Ribe

    1991-01-01

    The problem of identifying the scenic value of forest attributes and management plans is empirically explored. A sample of hardwood forests in Wisconsin, representing a diversity of management histories, is analyzed through photographs and field inventories. Scenic beauty judgements of the photographs by a diversity of respondents yield general scenic beauty estimates...

  13. Advances in multi-agency disaster management: Key elements in disaster research

    NARCIS (Netherlands)

    Janssen, M.; Lee, J.; Bharosa, N.; Cresswell, A.

    2009-01-01

    Multi-agency disaster management requires collaboration among geographically distributed public and private organizations to enable a rapid and effective response to an unexpected event. Many disaster management systems often lack the capability to cope with the complexity and uncertainty. In this i

  14. Interviewing Key Informants: Strategic Planning for a Global Public Health Management Program

    Science.gov (United States)

    Kun, Karen E.; Kassim, Anisa; Howze, Elizabeth; MacDonald, Goldie

    2013-01-01

    The Centers for Disease Control and Prevention's Sustainable Management Development Program (SMDP) partners with low- and middle-resource countries to develop management capacity so that effective global public health programs can be implemented and better health outcomes can be achieved. The program's impact however, was variable. Hence, there…

  15. DOD FINANCIAL MANAGEMENT: Integrated Approach, Accountability, and Incentives Are Keys to Effective Reform

    Science.gov (United States)

    2007-11-02

    leadership and management accountability for correcting problems; • cultural resistance to change , including service parochialism and stovepiped... resistance to change and service parochialism have also played a significant role in impeding DOD management reforms. DOD has acknowledged that it...inability to put aside parochial views and cultural resistance to change impeding reforms in the department’s weapon system acquisition and inventory

  16. Biodiversity in the city: key challenges for urban green space management

    Science.gov (United States)

    Myla F.J. Aronson; Christopher A. Lepczyk; Karl L. Evans; Mark A. Goddard; Susannah B. Lerman; J. Scott MacIvor; Charles H. Nilon; Timothy. Vargo

    2017-01-01

    Cities play important roles in the conservation of global biodiversity, particularly through the planning and management of urban green spaces (UGS). However, UGS management is subject to a complex assortment of interacting social, cultural, and economic factors, including governance, economics, social networks, multiple stakeholders, individual preferences, and social...

  17. Leadership and Quality Management: An Analysis of Three Key Features of the Greek Education System

    Science.gov (United States)

    Saiti, Anna

    2012-01-01

    Purpose: This paper aims to investigate whether educational leadership in Greece implements the values of total quality management and contributes to the improvement of the educational process, and to offer proposals for a framework of total quality management that would contribute to an improvement in the overall quality of the education process.…

  18. Keys to Successful Implementation and Sustainment of Managed Maintenance for Healthcare Facilities

    Science.gov (United States)

    2006-05-31

    Organizational Performance Managing anything effectively requires a clear set of objectives ( Arditi , 1999, J. White, 1998). The most important...Managing anything effectively requires a clear set of objectives ( Arditi , 1999; J. White, 1998). The most important reason to measure performance...translating.html, 21 July 2003. Arditi , David. “Issues in building Maintenance: Property Managers’ Perspective.” Journal of Architectural

  19. Key Authors in Business and Management Education Research: Productivity, Topics, and Future Directions

    Science.gov (United States)

    Arbaugh, J. B.; Asarta, Carlos J.; Hwang, Alvin; Fornaciari, Charles J.; Bento, Regina F.; Dean, Kathy Lund

    2017-01-01

    Previous studies of author productivity in business and management education (BME) research have focused on single disciplinary areas, and even single journals. This study is the first to examine the productivity of BME scholars across multiple disciplinary areas (i.e., accounting, economics, finance, information systems, management, marketing,…

  20. Leadership and Quality Management: An Analysis of Three Key Features of the Greek Education System

    Science.gov (United States)

    Saiti, Anna

    2012-01-01

    Purpose: This paper aims to investigate whether educational leadership in Greece implements the values of total quality management and contributes to the improvement of the educational process, and to offer proposals for a framework of total quality management that would contribute to an improvement in the overall quality of the education process.…

  1. Advances in multi-agency disaster management: Key elements in disaster research

    NARCIS (Netherlands)

    Janssen, M.; Lee, J.; Bharosa, N.; Cresswell, A.

    2009-01-01

    Multi-agency disaster management requires collaboration among geographically distributed public and private organizations to enable a rapid and effective response to an unexpected event. Many disaster management systems often lack the capability to cope with the complexity and uncertainty. In this i

  2. The Relationship Between Key Supply Chain Management Process Implementation, Competitive Advantage and Organizational Performance

    Science.gov (United States)

    2012-03-01

    performance and company performance, Tan, Kannan, and Handfield (1998) employed a survey to collect information on how companies manage three...42-53. Tan, K. C., Kannan, V. R., & Handfield , R. B. (1998). Supply Chain Management: Supplier Performance and Firm Performance. International

  3. RE: Forests and forest management plays a key role in mitigating climate change

    DEFF Research Database (Denmark)

    Bentsen, Niclas Scott; Nord-Larsen, Thomas; Larsen, Søren

    2016-01-01

    . The authors present an analysis of net carbon emissions from forest, but omit substitution effects related to the link between forest management and the fossil carbon pool. The link between fossil and terrestrial carbon pools is however critical for modelling climate impacts. To conclude as they do...... yield forest management was developed to meet demands for energy and materials for an increasing population and prevented a complete destruction of Europe’s forest. Particularly since 1850, forest management has increased Europe’s forest area and productivity, and thus also the forest carbon pool...... as also reported by Naudts et al. By ignoring the link between forestry and fossil carbon pools and not considering development in the absence of forest management, there is no accounting for the effect on GHG emissions, and no basis for estimating the contribution of forest management to cl...

  4. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks....... The thesis investigates models for hierarchical network design and methods used to design such networks. In addition, ring network design is considered, since ring networks commonly appear in the design of hierarchical networks. The thesis introduces hierarchical networks, including a classification scheme...

  5. INVAP and its project management capabilities: a key to company success

    Energy Technology Data Exchange (ETDEWEB)

    Salvatore, Marcelo; Delgado, Ricardo; Niklison, Carlos; Ordonez, Juan Pablo; Gerbino, Juan Jose Gil [INVAP, San Carlos de Bariloche, Rio Negro (Argentina). Div. Nuclear. Proyecto RRR

    2002-07-01

    Over the past 26 years, several factors have contributed to INVAP's projection into domestic and overseas operations. Of these, the most recognized is of course the technological capabilities INVAP keeps developing to satisfy our customer's requirements. In a second thought, the other factor is the strategic objective of providing specific purpose customer oriented solutions. The less obvious third important factor in this trilogy is the successful application of Project Management techniques and methods. INVAP's vision on Project Management encompasses well known concepts as: Integrated Management, Proactive solutions, Cost Control and Reporting, Quality Assurance, Target Schedules, Performance Requirements, Risk Management, Configuration Management and Integrated Logistic Support. After 2 years of execution of the Replacement Research Reactor Project for the Australian Nuclear Science and Technology Organization, our Project Management methodology have allowed us to timely meet all project milestones, complete basic and detail engineering, timely deliver the preliminary safety reports, manufacture and test technological concepts in specifically built mock ups and overcome risky situations -like the economical panorama in Argentina- without jeopardizing our Contractual commitments. Present paper depicts the practical approach INVAP has for Project Management -particularly within the Nuclear Division-, and a description of the tools to such aim developed. (author)

  6. Lean Information Management: Criteria For Selecting Key Performance Indicators At Shop Floor

    Science.gov (United States)

    Iuga, Maria Virginia; Kifor, Claudiu Vasile; Rosca, Liviu-Ion

    2015-07-01

    Most successful organizations worldwide use key performance indicators as an important part of their corporate strategy in order to forecast, measure and plan their businesses. Performance metrics vary in their purpose, definition and content. Therefore, the way organizations select what they think are the optimal indicators for their businesses varies from company to company, sometimes even from department to department. This study aims to answer the question of what is the most suitable way to define and select key performance indicators. More than that, it identifies the right criteria to select key performance indicators at shop floor level. This paper contributes to prior research by analysing and comparing previously researched selection criteria and proposes an original six-criteria-model, which caters towards choosing the most adequate KPIs. Furthermore, the authors take the research a step further by further steps to closed research gaps within this field of study.

  7. The keys to CERN conference rooms - Managing local collaboration facilities in large organisations

    CERN Multimedia

    Baron, T; Duran, G; Correia Fernandes, J; Ferreira, P; Gonzalez Lopez, J B; Jouberjean, F; Lavrut, L; Tarocco, N

    2013-01-01

    For a long time HEP has been ahead of the curve in its usage of remote collaboration tools, like videoconference and webcast, while the local CERN collaboration facilities were somewhat behind the expected quality standards for various reasons. This time is now over with the creation by the CERN IT department in 2012 of an integrated conference room service which provides guidance and installation services for new rooms (either equipped for video-conference or not), as well as maintenance and local support. Managing now nearly half of the 250 meeting rooms available on the CERN sites, this service has been built to cope with the management of all CERN rooms with limited human resources. This has been made possible by the intensive use of professional software to manage and monitor all the room equipment, maintenance and activity. This paper will focus on presenting these packages, either off-the-shelf commercial products (asset and maintenance management tool, remote audiovisual equipment monitoring systems, ...

  8. KEY FACTORS IN THE MANAGEMENT OF HORIZONTALLY INTEGRATED STRUCTURE OF MEDICAL SERVICES COMPANIES

    Directory of Open Access Journals (Sweden)

    Ivan Doshkov

    2017-02-01

    Full Text Available Marketing management in the sphere of health services is an activity, which has to do with evaluation of the potential (economic, demographic, morbidity etc. in a given geographical region and with outlining the framework of a competitive and profitable business. For the provision of effective management, a thorough economic analysis of the healthcare activities is necessary. With view to optimization of the results, economic evaluation at different levels needs to be made, including systematic consideration of the factors, which influence the decision for directing the resources to a given alternative use at the expense of other use. The management of a healthcare enterprise is successful, only if the management of its individual units is successful and if they work in line with one another for the achievement of the common targets of the organization.

  9. Understanding and Managing Diversity among Groups at Work: Key Issues for Organisational Training and Development.

    Science.gov (United States)

    Moore, Sarah

    1999-01-01

    Diversity is a multidimensional construct that affects all members of an organization. The relationship between diversity and organizational performance is not automatic. Diversity must be promoted, supported, and managed effectively to reap its benefits. (SK)

  10. [Trust as a fundamental key for management in the service of people: Robert Spaemann's work].

    Science.gov (United States)

    Marco Perles, Ginés Santiago

    2008-01-01

    In the present paper, we analyse the role of trust in the search for truthful health management in the service of people, bearing in mind the considerations of Robert Spaemann, Emeritus Professor of Ethics and Politics at the University of Munich. According to this author, trust is an intangible asset which helps the transmission of knowledge and the voluntary assumption of responsibility. In the first place, the transfer of knowledge, because the credibility of any professional involved in health management is threatened when such activity is carried out in a scenario in which managers may provide incentives for just the opposite of cooperative knowledge, so that transparency in the transmission of truth and "getting on" in one's career may appear in conflict. Secondly, the voluntary assumption of responsibilities, because the credibility of a health manager is lent weight when, in any contingency, he/she regularly puts the interests of patients before personal interests.

  11. Conference communication. Managing change in tourism destinations: Key issues and current trends.

    OpenAIRE

    Mariani, M.M.; Buhalis, Dimitrios; Longhi, C.; Vitouladiti, O.

    2013-01-01

    This conference communication illustrates the major outcomes emerging from the EIASM Conference on Tourism Management and Tourism Related Issues held in Nice (France), September 20-21, 2012. While a number of managerial issues pertaining to the tourism field were dealt with, this communication covers three specific areas of interest for destination management and marketing: (1) the increasing competition among tourism destinations and the rise and consolidation of BRIC countries as outbound t...

  12. Supply chain management as the key to a firm’s strategy in the global marketplace

    OpenAIRE

    González-Loureiro, M; Dabić, M; Kiessling, T.

    2015-01-01

    Purpose: This research aims to analyze the intersection of two literature streams: that of strategy and supply chain management (SCM). This review should create a better understanding of “strategic SCM” by focusing on relevant theories in the strategic management field and their intersection with SCM to develop a joint research agenda. Design/Methodology/Approach: We conducted a correspondence analysis on the content of 3,402 articles from the top SCM journals. This analysis provides a map of...

  13. The Role of Expatriate Managers in Global Economic Restructuring: Some Key Components and Constraints

    OpenAIRE

    H. Sakho

    1999-01-01

    This paper is about the role, place and function of senior expatriate managers in the "globalisation" process. Senior expatriate managers are considered by Transnational Corporations (TNCs) to possess high levels of technical and business expertise and are rewarded accordingly. They form the upper echelons of the core workforces of TNCs and are dispatched to foreign geographies to implement corporate globalisation strategies. The paper is also about some aspects of the impact of new technolog...

  14. ABC for network managers. Key to efficiency improvement; ABC voor netbeheerders. Sleutel tot efficiencyverbetering

    Energy Technology Data Exchange (ETDEWEB)

    Osse, M.J.E. [Ernst and Young Consulting, Utrecht (Netherlands)

    1999-12-01

    In order to give everyone who wants to supply electricity a fair chance, network managers must make costs transparent. Next to the rules for the tariff code, they can also make use of a cost charging method, the so-called ABC-N (Activity Based Costing for Networks). This method makes the costs transparent and therefore also helps the network managers to improve their efficiency. That is essential in view of the pressure from the supervisor for the Dutch electric power sector.

  15. Conference communication. Managing change in tourism destinations: Key issues and current trends.

    OpenAIRE

    2013-01-01

    This conference communication illustrates the major outcomes emerging from the EIASM Conference on Tourism Management and Tourism Related Issues held in Nice (France), September 20-21, 2012. While a number of managerial issues pertaining to the tourism field were dealt with, this communication covers three specific areas of interest for destination management and marketing: (1) the increasing competition among tourism destinations and the rise and consolidation of BRIC countries as outbound t...

  16. Hierarchical fringe tracking

    CERN Document Server

    Petrov, Romain G; Boskri, Abdelkarim; Folcher, Jean-Pierre; Lagarde, Stephane; Bresson, Yves; Benkhaldoum, Zouhair; Lazrek, Mohamed; Rakshit, Suvendu

    2014-01-01

    The limiting magnitude is a key issue for optical interferometry. Pairwise fringe trackers based on the integrated optics concepts used for example in GRAVITY seem limited to about K=10.5 with the 8m Unit Telescopes of the VLTI, and there is a general "common sense" statement that the efficiency of fringe tracking, and hence the sensitivity of optical interferometry, must decrease as the number of apertures increases, at least in the near infrared where we are still limited by detector readout noise. Here we present a Hierarchical Fringe Tracking (HFT) concept with sensitivity at least equal to this of a two apertures fringe trackers. HFT is based of the combination of the apertures in pairs, then in pairs of pairs then in pairs of groups. The key HFT module is a device that behaves like a spatial filter for two telescopes (2TSF) and transmits all or most of the flux of a cophased pair in a single mode beam. We give an example of such an achromatic 2TSF, based on very broadband dispersed fringes analyzed by g...

  17. The Effects of Quality Management Practices on Key Results: questionnaires sample for the industry of tourist accommodation in Spain

    Directory of Open Access Journals (Sweden)

    José Álvarez García

    2014-12-01

    Full Text Available In this research work, we examine the direct and indirect effects of quality management practices on key results and we identify the relationship between quality practices. To achieve the proposed objective, a structural model was used, taking into account the previous review of the literature, in order to identify the quality practices and causal relationships with the key results. The theoretical model and hypotheses are tested using data collected from a sample of 186 tourist accommodation companies certified with the “Q for Tourist Quality” standard in Spain, from a questionnaire based on quality practices identified in the literature and on the EFQM Model, taking some of the most relevant scales as a reference. The methodology used consists of the application of an Exploratory and Confirmatory Factorial Analysis to validate the scales (reliability, one-dimensionality and validity and define the number of items of each of the measuring instruments of the constructs proposed, to then estimate the causal model proposed, proceeding to test the hypotheses formulated by using the Structural Equation Model (SEM technique. The results achieved support the relationship between quality practices and the direct and positive impact of two of the practices, processes management and quality policy/planning, on the key results. It was also observed that the quality practices that most influence key results are quality policy/planning along with leadership, when considering the total effects (direct and indirect.

  18. Comprehensive Instructional Management System (CIMS). A Cyclical Mathematics Curriculum. Experimental. [Level 1] Answer Key.

    Science.gov (United States)

    New York City Board of Education, Brooklyn, NY. Div. of Curriculum and Instruction.

    This document is the answer key for level 1 of the teacher-developed mathematics curriculum for New York City Schools. Approximately 220 performance objectives are listed, with reference to the appropriate worksheet for each. The answers are indicated on replicas of the pages in the children's workbooks. (MNS)

  19. Comprehensive Instructional Management System (CIMS). A Cyclical Mathematics Curriculum. Experimental. [Level 6] Answer Key.

    Science.gov (United States)

    Johnson, Dorothy C.; And Others

    This document is the answer key for level 6 of the teacher-developed experimental mathematics curriculum for New York City schools. Approximately 250 performance objectives are listed, with reference to the appropriate worksheet(s) for each. The answers are typed in the appropriate space on each sheet. (YP)

  20. Five key attributes can increase marine protected areas performance for small-scale fisheries management

    Science.gov (United States)

    di Franco, Antonio; Thiriet, Pierre; di Carlo, Giuseppe; Dimitriadis, Charalampos; Francour, Patrice; Gutiérrez, Nicolas L.; Jeudy de Grissac, Alain; Koutsoubas, Drosos; Milazzo, Marco; Otero, María Del Mar; Piante, Catherine; Plass-Johnson, Jeremiah; Sainz-Trapaga, Susana; Santarossa, Luca; Tudela, Sergi; Guidetti, Paolo

    2016-12-01

    Marine protected areas (MPAs) have largely proven to be effective tools for conserving marine ecosystem, while socio-economic benefits generated by MPAs to fisheries are still under debate. Many MPAs embed a no-take zone, aiming to preserve natural populations and ecosystems, within a buffer zone where potentially sustainable activities are allowed. Small-scale fisheries (SSF) within buffer zones can be highly beneficial by promoting local socio-economies. However, guidelines to successfully manage SSFs within MPAs, ensuring both conservation and fisheries goals, and reaching a win-win scenario, are largely unavailable. From the peer-reviewed literature, grey-literature and interviews, we assembled a unique database of ecological, social and economic attributes of SSF in 25 Mediterranean MPAs. Using random forest with Boruta algorithm we identified a set of attributes determining successful SSFs management within MPAs. We show that fish stocks are healthier, fishermen incomes are higher and the social acceptance of management practices is fostered if five attributes are present (i.e. high MPA enforcement, presence of a management plan, fishermen engagement in MPA management, fishermen representative in the MPA board, and promotion of sustainable fishing). These findings are pivotal to Mediterranean coastal communities so they can achieve conservation goals while allowing for profitable exploitation of fisheries resources.

  1. The Key Principles of Process Manager Motivation in Production and Administration Processes in an Industrial Enterprise

    Directory of Open Access Journals (Sweden)

    Chromjakova Felicita

    2016-03-01

    Full Text Available The basic premise of sustainable development is that companies should completely re-evaluate their enterprise work logic and process organization. Most of the necessary changes concern employee stimulation and motivation. If we are truly interested in improving business results and the effectiveness of business processes – there would be no progress otherwise – we have to strive to break down the barriers between company management (leadership and employees in order to establish effective relationships between firms and customers. This paper presents research results of process manager activities in modern industrial enterprises, connected with a methodology proposal for the systematically-oriented process manager motivation of employees in accordance with the increased competitiveness of production and administration processes. It also presents an effective methodology of how to increase the positive effects of welldefined employee motivations from the process manager´s perspective. The core benefit of this methodology lies in the design of a systematic approach to the motivation process from the process manager side, allowing for radical performance improvement via production and administrative processes and the increased competitiveness of enterprise processes.

  2. The Difficulty in Following Project Schedule as a Key Project Management Challenge: Family Firm Perspective

    Directory of Open Access Journals (Sweden)

    Joanna SADKOWSKA

    2016-12-01

    Full Text Available The problem of how to manage projects successfully has been gaining growing interest for the last decades. The aforementioned is mainly caused by the fact that project management offers a wide range of methods and tools which, when properly used, can stimulate long-term growth of businesses. As a consequence it offers a particular development opportunity for family enterprises which, due to their specificity, have to overcome many difficulties. The primary objective of this paper is to examine whether family enterprises perceive, and to what extent, the factor of following project schedule as a difficulty in the area of project management. 154 Polish family firms representing different sectors were surveyed. The results of regression analysis show that family firms with global range of business activities, on the contrary to those with local or regional ones, do not find the factor of following project schedule as a difficulty. This results manly from the tools employed and the maturity level they have reached in project management. The findings support the current discussion on the specificity and uniqueness of family businesses in relationship to the knowledge area of project management. It also contributes to filling the gap on understanding the functioning of family firms in the emerging economies of Eastern Europe.

  3. 医院财务的重点环节管理%The Key Point Management in Hospital Financial Management

    Institute of Scientific and Technical Information of China (English)

    林国香; 郑更艳

    2014-01-01

    Hospital financial management can exert effect on the development scale and speed of hospital in certain degree. Transformations from "use money" to integrated financial management of "generate, accumulate and use money" and from "serving the hospital" to "decision-making management" should be made. More attention should also be paid to strengthening the cost accounting, budget management, payment system, trial of risk insurance, utility of financial tools and information technology to improve the financial management and promote the hospital development.%医院财务管理在一定程度上影响着医院发展的规模和速度,必须从单纯“用财”向“生财、聚财、用财”的综合理财转变,从服务型向决策管理型转变,着力通过加强成本核算、推行预算管理、实行薪酬制度、试行风险保险、借用金融工具、运用信息技术等措施,不断提高理财水平,推进医院的发展。

  4. Key differences and similarities in ways of managing and supporting radical pharmaceutical front end innovation

    DEFF Research Database (Denmark)

    Aagaard, Annabeth

    2015-01-01

    The purpose of this paper is to explore how Front End Innovation (FEI) is supported and managed among companies of different nationality within the context of pharmaceutical R&D. The present study is carried out in order to contribute to the development of a clearer understanding of active...... of the Danish and US based pharmaceutical company, H. Lundbeck A/S, and a comparative study including five European and American pharmaceutical companies. The findings from the study reveal a number of similarities and differences in innovation management and FEI support of radical projects and among...... the different nationalities. This presents propositions of important aspects to consider in facilitation of radical FEI in general and in multinational pharmaceutical companies. In addition, proposals are made for a global study of innovation management and FEI support including Chinese and other Asian...

  5. Information management and information technologies: keys to professional and business success.

    Science.gov (United States)

    Otten, K W

    1984-01-01

    Personal computers, spreadsheets, decision support software, electronic mail and video disks are just a few of the innovations of information technology which attract the attention of information professionals and managers alike: they are all concerned with the rapidly changing face of information technology and how to cope with a changing competitive environment, personally, and for the benefit of their companies. This paper is the first in a monthly series which tries to illuminate some of the factors and changes which shape our future as professionals and managers. In so doing, it guides and motivates the reader to become "information literate," a prerequisite for personal advancement in an information-based economy. This first paper outlines the relationship between technological innovations, use of information tools and information management and what to consider in order to benefit from the information revolution. It explains the risks of becoming professionally obsolete and alerts the reader to get personally involved to remain or become "information and computer literate."

  6. The integrated supplier: key to cost management and multi-franchise capitation contracting.

    Science.gov (United States)

    Schuweiler, R C

    1996-05-01

    Capitation...most healthcare providers do not work under it, comprehend it, or even want it, yet supply capitation contracting seminars are popping up everywhere creating the feeling that the bandwagon is leaving, and it might be time to get on board. Not true. Supply capitation is not for all organizations. Capitation contracting is not easy and there are not many successful models to help the uninitiated. If a panacea is sought for reducing supply costs, capitation is only one component of a systematic strategy to reduce materiel costs. This article suggests a direction using the Group Health Materiel Management (Group Health Cooperative of Puget Sound, WA) experience as a point of reference. It advocates a systematic approach that focuses on expense reduction in: cost of goods, holding cost of inventory, labor cost associated with all materiel processes, distribution cost (transportation and par stock pick, pack, and replenishment), product utilization, variation in product standards, and waste stream byproducts. At Group Health (GH) these issues are primarily addressed through the use of: information systems, supplier certification/selection processes, group purchasing compliance, supply channel management, supply capitation contracting programs, standardization, and utilization management. Because of managed care organizational structure, Group Health Cooperative supply capitation contracting, as performed at GH, is discussed not as a quick fix solution but in the spirit of sharing our experience with others who may be considering it as a cost savings tactic in the context of a broad-based materiel management strategy. This article highlights the experiences of GH beginning with materiel management's business process assumptions toward multiple-franchise supply capitation.

  7. Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions

    Science.gov (United States)

    Zhu, Sencun; Jajodia, Sushil

    Many multicast-based applications (e.g., pay-per-view, online auction, and teleconferencing) require a secure communication model to prevent disclosure of distributed data to unauthorized users. One solution for achieving this goal is to let all members in a group share a key that is used for encrypting data. To provide backward and forward confidentiality [23] (i.e., a new member should not be allowed to decrypt the earlier communication and a revoked user should not be able to decrypt the future communication), this shared group key should be updated and redistributed to all authorized members in a secure, reliable, and timely fashion upon a membership change. This process is referred to as group rekeying.

  8. Key European guidelines for the diagnosis and management of patients with phenylketonuria

    DEFF Research Database (Denmark)

    van Spronsen, Francjan J; van Wegberg, Annemiek Mj; Ahring, Kirsten

    2017-01-01

    /L for non-pregnant individuals older than 12 years. Minimum requirements for the management and follow-up of patients with PKU are scheduled according to age, adherence to treatment, and clinical status. Nutritional, clinical, and biochemical follow-up is necessary for all patients, regardless of therapy....... was available. From the 70 recommendations formulated, in this Review we describe ten that we deem as having the highest priority. Diet is the cornerstone of treatment, although some patients can benefit from tetrahydrobiopterin (BH4). Untreated blood phenylalanine concentrations determine management of people...

  9. [Key points for the management of dermatitis in Latin America. The SLAAI Consensus].

    Science.gov (United States)

    Sánchez, Jorge; Páez, Bruno; Macías-Weinmann, Alejandra; De Falco, Alicia

    2015-01-01

    The incidence of atopic dermatitis in Latin America, as in other regions, has been increasing in recent years. The SLAAI consensus is based on a systematic search for articles related to dermatitis, with focus in the pathophysiology and treatment and its impact on Latin America, and reviewed using the Delphi methodology (Revista Alergia Mexico 2014;61:178-211). In this article we highlight the key points of consensus and particular considerations in Latin America.

  10. Positioning the Learning Asset Portfolio as a Key Component in an Organization's Enterprise Risk Management Strategy

    Science.gov (United States)

    McAliney, Peter J.

    2009-01-01

    This article presents a process for valuing a portfolio of learning assets used by line executives across industries to value traditional business assets. Embedded within the context of enterprise risk management, this strategic asset allocation process is presented step by step, providing readers the operational considerations to implement this…

  11. The Keys to Managing Instruction and Behavior: Considering High Probability Practices

    Science.gov (United States)

    Cooper, Justin T.; Scott, Terrance M.

    2017-01-01

    Academics and behavior are inextricably linked, and as such, management of behavior should be considered not as an addition to the teacher's repertoire of skills but as an integral foundational component of effective instruction. Paradoxically, teachers report that students with challenging behavior are both their greatest challenge and that…

  12. Key-socio economic factors influencing sustainable land management investments in the West Usambara Highlands, Tanzania

    NARCIS (Netherlands)

    Nyanga, A.W.; Kessler, C.A.; Tenge, A.J.M.

    2016-01-01

    Low investments in sustainable land management (SLM) limit agricultural production in the East African Highlands, leading to increased soil erosion, low productivity of land and food insecurity. Recent studies in the region show that different socio-economic factors influence SLM investments by farm

  13. Change Management and the SENCo Role: Developing Key Performance Indicators in the Strategic Development of Inclusivity

    Science.gov (United States)

    Done, Liz; Murphy, Mike; Watt, Mia

    2016-01-01

    This article follows an earlier publication highlighting the changing role of special educational needs co-ordinators (SENCos) in England. SENCos are now required to manage change strategically and deliver inclusive school cultures. School-based action research undertaken by a teacher studying for the postgraduate National Award for SEN…

  14. Change Management and the SENCo Role: Developing Key Performance Indicators of Inclusivity

    Science.gov (United States)

    Done, Elizabeth; Murphy, Mike; Bedford, Clare

    2016-01-01

    This article highlights the changing role of special educational needs co-ordinators (SENCos) in England. SENCos are now required to manage change strategically and deliver inclusive school cultures. A school-based evaluative study undertaken by a teacher who is studying for the postgraduate National Award for SEN Co-ordination (NASENCO) for…

  15. Change Management and the SENCo Role: Developing Key Performance Indicators in the Strategic Development of Inclusivity

    Science.gov (United States)

    Done, Liz; Murphy, Mike; Watt, Mia

    2016-01-01

    This article follows an earlier publication highlighting the changing role of special educational needs co-ordinators (SENCos) in England. SENCos are now required to manage change strategically and deliver inclusive school cultures. School-based action research undertaken by a teacher studying for the postgraduate National Award for SEN…

  16. Change Management and the SENCo Role: Developing Key Performance Indicators of Inclusivity

    Science.gov (United States)

    Done, Elizabeth; Murphy, Mike; Bedford, Clare

    2016-01-01

    This article highlights the changing role of special educational needs co-ordinators (SENCos) in England. SENCos are now required to manage change strategically and deliver inclusive school cultures. A school-based evaluative study undertaken by a teacher who is studying for the postgraduate National Award for SEN Co-ordination (NASENCO) for…

  17. Integrated self-management for future radio access networks: Vision and key challenges

    NARCIS (Netherlands)

    Eisenblätter, A.; Conzalez Rodríguez, B.; Gunnarsson, F.; Kürner, T.; Litjens, R.; Sas, B.; Sayrac, B.; Schmelz, L.C.; Willcock, C.

    2013-01-01

    Future radio access networks will require new self-management solutions to handle the increasing operational complexity caused by multi-technology and multi-layer deployments. Current networks already include stand-alone SON (Self-Organizing Networks) solutions, but these are not sufficient to prope

  18. Building an Evaluative Culture: The Key to Effective Evaluation and Results Management

    Science.gov (United States)

    Mayne, John

    2009-01-01

    As many reviews of results-based performance systems have noted, a weak evaluative culture in an organization undermines attempts at building an effective evaluation and/or results management regime. This article sets out what constitutes a strong evaluative culture where information on performance results is deliberately sought in order to learn…

  19. An Analysis of Key Factors for the Success of the Communal Management of Knowledge

    CERN Document Server

    Bourdon, Isabelle

    2008-01-01

    This paper explores the links between Knowledge Management and new community-based models of the organization from both a theoretical and an empirical perspective. From a theoretical standpoint, we look at Communities of Practice (CoPs) and Knowledge Management (KM) and explore the links between the two as they relate to the use of information systems to manage knowledge. We begin by reviewing technologically supported approaches to KM and introduce the idea of "Systemes d'Aide a la Gestion des Connaissances" SAGC (Systems to aid the Management of Knowledge). Following this we examine the contribution that communal structures such as CoPs can make to intraorganizational KM and highlight some of 'success factors' for this approach to KM that are found in the literature. From an empirical standpoint, we present the results of a survey involving the Chief Knowledge Officers (CKOs) of twelve large French businesses; the objective of this study was to identify the factors that might influence the success of such a...

  20. RE: Forests and forest management plays a key role in mitigating climate change

    DEFF Research Database (Denmark)

    Bentsen, Niclas Scott; Nord-Larsen, Thomas; Larsen, Søren

    2016-01-01

    . The authors present an analysis of net carbon emissions from forest, but omit substitution effects related to the link between forest management and the fossil carbon pool. The link between fossil and terrestrial carbon pools is however critical for modelling climate impacts. To conclude as they do...

  1. Positioning the Learning Asset Portfolio as a Key Component in an Organization's Enterprise Risk Management Strategy

    Science.gov (United States)

    McAliney, Peter J.

    2009-01-01

    This article presents a process for valuing a portfolio of learning assets used by line executives across industries to value traditional business assets. Embedded within the context of enterprise risk management, this strategic asset allocation process is presented step by step, providing readers the operational considerations to implement this…

  2. Geodiversity, biodiversity and landscape - key elements in modern nature management strategies

    Science.gov (United States)

    Erikstad, Lars

    2014-05-01

    Nature consists of a diversity of systems of both abiotic and biotic character interlinked with each other. Often geodiversity provides fundamental elements for biodiversity in forming major ecosystem attributes. Bedrock geology and sediments contribute to nutrient and substrate conditions and terrain to drainage and moisture differences. But we also find the opposite relation, for example in formation of biogenetic sediments. Truly we are talking of nature diversity consisting of biodiversity and geodiversity in a variety of blends. This close scientific relationship should also be reflected in nature conservation practices to the benefit of both geodiversity and biodiversity. But as biodiversity has dominated the nature conservation debate for the last decades, geodiversity has had a tendency to be overlooked. This is unfortunate both for the sake of biodiversity as major parts of ecosystems that is not treated properly and geodiversity that does not get the recognition it deserves. Nature diversity can be described in a range of scale from the very small to the very great. A lot of management attention is put on a fairly detailed scale such as species (protection of species, red-listing of species etc.). The well-established imperative to look at different scales (from genes via species to ecosystems) is often too complicated for many management systems. The same can be the case in geoconservation were the focus on geosites (for scientific purposes) may favour the same detailed scale approach. On these scales the relation between geo- and biodiversity is easier to overlook. These detailed conservation efforts are sensible and necessary, but need to be supplemented by supplementary strategies that covers other scales. Exploring the relation between geodiversity and biodiversity makes the understanding and integration of geoconservation within nature management easier especially on a landscape scale. The landscapes have the potential to supplement the detailed

  3. Review of Key Management Mechanisms in Wireless Sensor Networks%无线传感网络中安全密钥管理机制

    Institute of Scientific and Technical Information of China (English)

    孙冬梅; 何冰

    2006-01-01

    Recent advancements in wireless communication and microchip techniques have accelated the development of wireless sensor networks (WSN). Key management in WSN is a critical and challenging problem because of the inner characteristics of sensor networks: deployed in hostile environments, limited resource and ad hoc nature. This paper investigates the constraints and special requirements of key management in sensor network environment, and some basic evaluation metrics are introduced. The key pre-distribution scheme is thought as the most suitable solution for key man agement problem in wireless sensor networks. It can be classified into four classes: pure probabilistic key pre-distribution, polynomial-based, Blom's matrix-based, and deterministic key pre-distribution schemes. In each class of methods, the related research papers are discussed based on the basic evaluation metrics. Finally, the possible research directions in key management are discussed.

  4. Analyzing the key factors affecting the green supply chain management: A case study of steel industry

    Directory of Open Access Journals (Sweden)

    Hamideh Shekari

    2011-10-01

    Full Text Available Green supply chain management (GSCM has emerged as a proactive approach for improving environmental performance of processes and products in accordance with the requirements of environmental regulations. The aim of this paper is to determine and model the drivers of GSCM to put environmental activities into practice. Thirty-four measurement items are developed on the basis of opinions from industrial experts and the literature and the necessary data are collected. To validate the measurement scales for GSCM, we perform a factor analysis. The results show that a six-factor measurement model (including internal environmental management, green purchasing, cleaner production, recovery, eco-design and pollution fits the data acceptably. All of the measurement items significantly loaded on the constructs on which they were hypothesized to load. These results gave us confidence that the measures are indeed valid and reliable.

  5. THE JAPANESE MANAGEMENT, A KEY ELEMENT OF TOYOTA’S SUCCESS

    Directory of Open Access Journals (Sweden)

    Toma Sorin-George

    2012-06-01

    Full Text Available After its defeat in the World War II, Japan was a country in ruin. The Japanese economy faced huge problems as unemployment and hyperinflation increased. The vast majority of its industry was destroyed and new industrial facilities had to be re-constructed from the ashes. In the 1970s Japan achieved a giant economic stature, evolving into the second largest economy of the world. There are many ways of analyzing the Japanese economic miracle, but in the final, management has to being considered as one of its most important factors. The aims of our paper are to emphasize some of the main features of the Japanese management in the globalization era, and to present the case of Toyota Motor Company. The research type is a literature review combined with a case study.

  6. Research on Key Techniques for Video Surveillance System Applied to Shipping Channel Management

    Institute of Scientific and Technical Information of China (English)

    WANG Lin; ZHUANG Yan-bin; ZHENG Cheng-zeng

    2007-01-01

    A video patrol and inspection system is an important part of the government's shipping channel information management. This system is mainly applied to video information gathering and processing as a patrol is carried out. The system described in this paper can preview, edit, and add essential explanation messages to the collected video data. It then transfers these data and messages to a video server for the leaders and engineering and technical personnel to retrieve, play, chart, download or print. Each department of the government will use the system's functions according to that department's mission. The system can provide an effective means for managing the shipping enterprise. It also provides a valuable reference for the modernizing of waterborne shipping.

  7. Emotionally intelligent leadership as a key determinant of strategic and effective management of human capital

    Directory of Open Access Journals (Sweden)

    Helena Viskupičová

    2016-06-01

    Full Text Available The purpose of this paper is to outline the strategic importance of Emotional Intelligence (EI in contemporary approaches to management of Human resources (HR. The aim of this study is to provide a conceptual theoretical insight of the relationship between EI and leadership. The paper also reflects the conditions within the present business environment in Slovakia with the emphasis on leadership in the context of EI (based on the research conducted in this field, while answering the following question: To what extent do Slovak organizations incorporate EI measures into the hiring process for managerial positions? The answer to this question would consequently disclose whether organizations in Slovakia consider Emotional Intelligence as a factor determining effective performance of managers – leaders.

  8. Management tools and organization as key factors towards quality care: reflections from experience.

    Science.gov (United States)

    Tonneau, D

    1997-06-01

    Health care organization in French hospitals has become an increasingly important issue, as efforts to ensure better cost control have increased financial constraints, as patients have demanded ever better results and quality, and as nurses' expectations for better working conditions have grown. Organizing a health care unit requires an articulation between individual efforts--necessary both for gathering accurate information on each patient and for providing patients with personalized care--as well as an integrated system of various logistics, specialized services such as nursing care, custodial care, technical examinations, and administrative procedures. Coordination between these different components continues to be a significant challenge to hospitals, as each category has developed independently its own specialty and sense of autonomy, resulting in different professional rationalities, cultures, approaches, and sometimes conflicting behaviour. Pointing out these difficulties is not sufficient to solve the problem, however, and since the management tools currently in use (activity measurements, procedures used to develop choices and judgements) are often kept in place for external reasons, they may actually perpetuate these behaviours. This paper is a set of reflections derived from a long period of experience and research in the management of French hospitals and health management institutions. It reports that the financial reforms implemented in budgeting procedures for French hospitals, and the efforts to control costs better in the national health insurance system, have resulted in new types of behaviour in physicians, nurses and health care managers, as well as the need for information that deals not only with health care activities but also with quality.

  9. Integrated Management Strategies Increase Cottonseed, Oil and Protein Production: The Key Role of Carbohydrate Metabolism

    Science.gov (United States)

    Yang, Hongkun; Zhang, Xinyue; Chen, Binglin; Meng, Yali; Wang, Youhua; Zhao, Wenqing; Zhou, Zhiguo

    2017-01-01

    Cottonseed, oil, and protein, as the by-products of cotton production, have the potential to provide commodities to meet the increasing demand of renewable bio-fuels and ruminant feed. An increase in crop yield per unit area requires high-yielding cultivar management with an economic nitrogen (N) rate, an optimal N application schedule, high-yielding plant populations and strong seedlings. Whether the integration of these agronomic practices into a coherent management system can increase the productivity of cotton fiber, embryo oil and protein requires experimental elucidation. In this 2-year study, conventional management practices (CM) were used as a control, and two integrated management strategies (IMS1 and IMS2) were considered at two soil fertility levels (high soil fertility and low soil fertility) to analyze the metabolic and biochemical traits of cotton embryos. The results illustrate that the cottonseed, oil, and protein yields for IMS1 and IMS2 were significantly higher than those under CM at both soil fertility levels and the fiber yield increased as well. The IMS regulated the maternal photo thermal environment by delaying the flowering date, resulting in increases in the seed weight. In developing cotton embryos, the IMS increased the embryo weight accumulation rate and biomass partitioning into oil and protein, which were associated with high activities of H+-ATPase, H+-PPase, sucrose synthase (SuSy), and cell wall invertase (C-INV) and low activities of sucrose phosphate synthase (SPS) and vacuole invertase (V-INV). Increased hexoses (D-fructose, D-glucose) content contributed to the oil and protein contents. These results suggest that increased sucrose/H+ symport, sucrose hydrolysis, hexoses synthesis, and cumulative photo-thermal product (PTP), especially in the early stage of embryo growth, play a dominant role in the high productivity of cotton oil and protein. PMID:28194156

  10. Key to GHG fluxes from organic soils: site characteristics, agricultural practices or water table management?

    Science.gov (United States)

    Tiemeyer, Bärbel

    2015-04-01

    Drained peatlands are hotspots of greenhouse gas (GHG) emissions. Agriculture is the major land use type for peatlands in Germany and other European countries, but strongly varies in its intensity regarding the groundwater level and the agricultural management. Although the mean annual water table depth is sometimes proposed as an overall predictor for GHG emissions, there is a strong variability of its effects on different peatlands. Furthermore, re-wetting measures generally decrease carbon dioxide emissions, but may strongly increase methane emissions. We synthesized 250 annual GHG budgets for 120 different sites in 13 German peatlands. Carbon dioxide (net ecosystem exchange and ecosystem respiration), nitrous oxide and methane fluxes were measured with transparent and opaque manual chambers. Land management ranged from very intensive use with arable land or grassland with up to five cuts per year to partially or completely re-wetted peatlands. Besides the GHG fluxes, biomass yield, fertilisation, groundwater level, climatic data, vegetation composition and soil properties were measured. Overall, we found a large variability of the total GHG budget ranging from small uptakes to extremely high emissions (> 70 t CO2-equivalents/(ha yr)). At nearly all sites, carbon dioxide was the major component of the GHG budget. Site conditions, especially the nitrogen content of the unsaturated zone and the intra-annual water level distribution, controlled the GHG emissions of the agricultural sites. Although these factors are influenced by natural conditions (peat type, regional hydrology), they could be modified by an improved water management. Agricultural management such as the number of cuts had only a minor influence on the GHG budgets. At the level of individual peatlands, higher water levels always decreased carbon dioxide emissions. In nearly all cases, the trade-off between reduced carbon dioxide and increased methane emissions turned out in favour of the re

  11. Complex adaptive systems (CAS: an overview of key elements, characteristics and application to management theory

    Directory of Open Access Journals (Sweden)

    Beverley Ellis

    2011-03-01

    Conclusions Complex adaptive system theory usefully describes evolutionary change processes, providing insight into how the origins of quality assurance were predicated on rational reductionism and linearity. New forms of governance do not neutralise previous models, but add further dimensions to them. Clinical governance models have moved from deterministic and 'objective' factors to incorporate cultural aspects with feedback about quality enabled by informatics. The socio-technical lessons highlighted should inform healthcare management.

  12. Diagnosis and management of growth disorders in Gulf Cooperation Council (GCC countries: Current procedures and key recommendations for best practice

    Directory of Open Access Journals (Sweden)

    Abdullah S. Al Herbish

    2016-09-01

    Full Text Available Diagnosis and management of growth disorders comprises an important area of pediatric practice. Current procedures in the different stages of the identification, referral, investigation, and treatment of growth disorders in the Gulf Cooperation Council (GCC countries have been summarized. Evidence-based procedures, relating specifically to height screening for identification of short stature, auxological criteria for patient referral from primary to secondary pediatric care, and general and endocrine investigations and diagnosis have been discussed and outlined. The management issues related to key disorders that are licensed for growth hormone (hGH therapy, namely GH deficiency, Turner syndrome, short stature related to birth size small for gestational age (SGA, and idiopathic short stature are discussed with recommendations described for best practice. Finally, two key components of short stature management, namely transitional care for the transfer of patients from pediatric to adult endocrinology services and adherence to recommended therapy with hGH, have been addressed with current practice outlines and recommendations presented.

  13. POSITIONING KNOWLEDGE MANAGEMENT AS KEY SUCCESS FACTOR IN THE GROWTH OF COOPERATIVES IN MALAYSIA

    Directory of Open Access Journals (Sweden)

    Yeop Hussin Bidin

    2007-01-01

    Full Text Available Economic and business challenges in the new millennium have shaped the manner cooperative movement in Malaysia charts its future outlook. After almost 82 years, a national policy was launched by the Government on January 2004 to assist in the comprehensive development of the cooperative movement. The National CooperativePolicy (NCP will ensure that the huge resources of the cooperatives can be harnessed to generate and contribute to the economic growth of the country. However, in the light of many issues such as weak structure and the absence of good corporate governance in some cooperatives, the present Cooperative Act 1993 is being reviewed and several new provisions would be added to increase supervision, monitoring and enforcement against existing cooperatives in alaysia. It is quite imperative that by regulating the operation of cooperatives will require also the managing of intellectual and human capital assets that exist in the movement. Through establishing a framework and terms of reference such that fundamental elements of knowledge management can be instilled areprerequisites to developing innovativeness in this growing economic sector. The sharing of knowledge among the cooperatives will eventually produce better and more educated human resources that are able to experience greater control over the works and the administration of their quality working life. Structural analysis of the cooperative movement indicates the significant influence of knowledge management in sustaining its future growth given the timely introduction of the NCP. Thus, measures taken to underline this influence will also be addressed to represent the cooperative movement's readiness to face economic and business challenges in Malaysia.

  14. A structured elicitation method to identify key direct risk factors for the management of natural resources.

    Science.gov (United States)

    Smith, Michael; Wallace, Ken; Lewis, Loretta; Wagner, Christian

    2015-11-01

    The high level of uncertainty inherent in natural resource management requires planners to apply comprehensive risk analyses, often in situations where there are few resources. In this paper, we demonstrate a broadly applicable, novel and structured elicitation approach to identify important direct risk factors. This new approach combines expert calibration and fuzzy based mathematics to capture and aggregate subjective expert estimates of the likelihood that a set of direct risk factors will cause management failure. A specific case study is used to demonstrate the approach; however, the described methods are widely applicable in risk analysis. For the case study, the management target was to retain all species that characterise a set of natural biological elements. The analysis was bounded by the spatial distribution of the biological elements under consideration and a 20-year time frame. Fourteen biological elements were expected to be at risk. Eleven important direct risk factors were identified that related to surrounding land use practices, climate change, problem species (e.g., feral predators), fire and hydrological change. In terms of their overall influence, the two most important risk factors were salinisation and a lack of water which together pose a considerable threat to the survival of nine biological elements. The described approach successfully overcame two concerns arising from previous risk analysis work: (1) the lack of an intuitive, yet comprehensive scoring method enabling the detection and clarification of expert agreement and associated levels of uncertainty; and (2) the ease with which results can be interpreted and communicated while preserving a rich level of detail essential for informed decision making.

  15. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Shafi Khan

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  16. Understanding the causes of bush encroachment in Africa: The key to effective management of savanna grasslands

    Directory of Open Access Journals (Sweden)

    Olaotswe E. Kgosikoma

    2013-12-01

    Full Text Available The increase in biomass and abundance of woody plant species, often thorny or unpalatable, coupled with the suppression of herbaceous plant cover, is a widely recognized form of rangeland degradation. Bush encroachment therefore has the potential to compromise rural livelihoods in Africa, as many depend on the natural resource base. The causes of bush encroachment are not without debate, but fire, herbivory, nutrient availability and rainfall patterns have been shown to be the key determinants of savanna vegetation structure and composition. In this paper, these determinants are discussed, with particular reference to arid and semi-arid environments of Africa. To improve our current understanding of causes of bush encroachment, an integrated approach, involving ecological and indigenous knowledge systems, is proposed. Only through our knowledge of causes of bush encroachment, both direct and indirect, can better livelihood adjustments be made, or control measures and restoration of savanna ecosystem functioning be realized.

  17. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Le Xuan Hung

    2008-12-01

    Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  18. Hierarchical Reverberation Mapping

    CERN Document Server

    Brewer, Brendon J

    2013-01-01

    Reverberation mapping (RM) is an important technique in studies of active galactic nuclei (AGN). The key idea of RM is to measure the time lag $\\tau$ between variations in the continuum emission from the accretion disc and subsequent response of the broad line region (BLR). The measurement of $\\tau$ is typically used to estimate the physical size of the BLR and is combined with other measurements to estimate the black hole mass $M_{\\rm BH}$. A major difficulty with RM campaigns is the large amount of data needed to measure $\\tau$. Recently, Fine et al (2012) introduced a new approach to RM where the BLR light curve is sparsely sampled, but this is counteracted by observing a large sample of AGN, rather than a single system. The results are combined to infer properties of the sample of AGN. In this letter we implement this method using a hierarchical Bayesian model and contrast this with the results from the previous stacked cross-correlation technique. We find that our inferences are more precise and allow fo...

  19. The key to health services in Turkey: new perspectives on leadership and hospital management.

    Science.gov (United States)

    Sahin, Alper A

    2014-01-01

    Health services are one of the most important criteria for making a country function. Turkey has mobilized all of its resources to provide high-quality, easily accessible and patient-friendly services for its population. To achieve this aim, the Turkish health care system has been undergoing a significant transformation through its Health Transformation Programme begun in 2005. The reforms focus on the introduction of a general health insurance system, changing hospital health services, improvements in hospital management and transformational leadership skills. Firstly, all state-run hospitals in the country were merged under the same umbrella, giving millions of people covered by the national security agency access to all of these hospitals. Secondly, all drugs and medical equipment used by patients were made free of charge. Thanks to these developments, hospitals were modernized, and this modernization process in the health sector is still continuing swiftly. On the other hand, for Turkish hospitals to survive, they need to modernize further and become closer to European models, and produce new leaders with new paradigms. In this new and changing health system, hospital leaders and executive officers should be visionaries and strategists advising when to change direction. Following this doctrine, most Turkish hospitals are now run by two top executives: the hospital manager and the chief executive officer who is in charge of business functions. These executives should clearly be the leaders of high-quality, health care organizations.

  20. Reputation management on facebook: awareness is key to protecting yourself, your practice, and the veterinary profession.

    Science.gov (United States)

    Weijs, Cynthia A; Coe, Jason B; Muise, Amy; Christofides, Emily; Desmarais, Serge

    2014-01-01

    From the Social media use by health professionals occurs in a digital environment where etiquette has yet to be solidly defined. The objectives of this study were to explore veterinarians' personal use of Facebook, knowledge of privacy settings, and factors related to sharing personal information online. All American Animal Hospital Association member veterinarians with a valid e-mail address (9469) were invited to complete an online survey about Facebook (e.g., time spent on Facebook, awareness of consequences, types of information posted). Questions assessing personality dimensions including trust, popularity, self-esteem and professional identity were included. The response rate was 17% (1594 of 9469); 72% of respondents (1148 of 1594) had a personal Facebook profile. Veterinarians were more likely to share information on Facebook than they would in general. Trust, need for popularity, and more time spent on Facebook predicted more disclosure of personal information on Facebook. Awareness of consequences and increased veterinary experience predicted lesser disclosure. As veterinary practices use Facebook to improve client services, they need also to manage risks associated with online disclosure by staff. Raising awareness of reputation management and consequences of posting certain types of information to Facebook is integral to protecting the individual, the practice, and the veterinary profession.

  1. Project management office in health care: a key strategy to support evidence-based practice change.

    Science.gov (United States)

    Lavoie-Tremblay, Mélanie; Bonneville-Roussy, Arielle; Richer, Marie-Claire; Aubry, Monique; Vezina, Michel; Deme, Mariama

    2012-01-01

    This article describes the contribution of a Transition Support Office (TSO) in a health care center in Canada to supporting changes in practice based on evidence and organizational performance in the early phase of a major organizational change. Semistructured individual interviews were conducted with 11 members of the TSO and 13 managers and clinicians from an ambulatory sector in the organization who received support from the TSO. The main themes addressed in the interviews were the description of the TSO, the context of implementation, and the impact. Using the Competing Value Framework by Quinn and Rohrbaugh [Public Product Rev. 1981;5(2):122-140], results revealed that the TSO is a source of expertise that facilitates innovation and implementation of change. It provides material support and human expertise for evidence-based projects. As a single organizational entity responsible for managing change, it gives a sense of cohesiveness. It also facilitates communication among human resources of the entire organization. The TSO is seen as an expertise provider that promotes competency development, training, and evidence-based practices. The impact of a TSO on change in practices and organizational performance in a health care system is discussed.

  2. Technology solutions for better outcomes: integrated information management in key to productivity increases in medicine.

    Science.gov (United States)

    Requardt, H

    2006-01-01

    The challenges to healthcare systems around the world are primarily impacted by two topics: demographic factors and progress in medicine. An ageing population inherently needs more medical services which add financial burdens, in particular, to public healthcare. Since the level of medical education is growing at the same time, we are observing an increased demand for sophisticated (in general expensive) medicine. Drastic changes in financing seem unavoidable. Multiple diagnoses, repeated examinations, trial-and-error, overcapacities and other signs of missing economical considerations are reinforced by reimbursement systems. In a world where, in principle, all information is available everywhere, more than a patient's history should be accessible. Other industries have knowledge management systems in place that make state-of-the-art expertise available everywhere. Intelligent patient databases could consist of learning cycles that (i) enable the individual to benefit from structured knowledge, in addition to personal experience of the physician, and (ii) use the knowledge generated from the individual to extend the database. The novel area of molecular medicine fits perfectly well into these scenarios. Only attached to an IT backbone can the flood of information be managed in a beneficial way. Efficiency improvements in healthcare address the needs of all parties in the system: patients, providers, and payers. The opportunities, however, can only materialize if everyone is prepared to change. IT will set the standards for the biggest challenge in healthcare: The paradigm shift in medicine.

  3. MARKETING MANAGEMENT AS A KEY ELEMENT FOR IMPLEMENTING CHANGE WITHIN ORGANIZATIONS

    Directory of Open Access Journals (Sweden)

    LIANA MARCU

    2011-01-01

    Full Text Available In the contemporary era, dominated by deep interests, an organization will only survive by being creative, based on professionalism, having the ability to decide. And as creativity, renewal and innovation are the pillars of customer satisfaction, this remains a problem, not enough conceptually defined and operationalised. This paper presents the state of knowledge regarding customer orientation as a marketing component, the level of influence of the main factors of change upon marketing management. The paper is based on several concepts from literature, on opinions of well known specialists but also on the reality of international crisis which shows an obvious lack of interest in studying and modelating customer orientation. The investigation is composed of two successive researches: a qualitative explorative research (interviews among specialists, focus-groups and a quantitative descriptive research. We consider that the results of this research have an innovative character and could be the base for new theoretical and mostly practical study programs or workshops for marketing managers as well as employees. Also, organizations affected by profound changes should realize that only a real orientation towards the needs of clients will ensure their long term success.

  4. Understanding Lolium rigidum Seeds: The Key to Managing a Problem Weed?

    Directory of Open Access Journals (Sweden)

    Kathryn J. Steadman

    2012-09-01

    Full Text Available The 40 million hectare southern Australian winter cropping region suffers from widespread infestation by Lolium rigidum (commonly known as annual or rigid ryegrass, a Mediterranean species initially introduced as a pasture plant. Along with its high competitiveness within crops, rapid adaptability and widespread resistance to herbicides, the dormancy of its seeds means that L. rigidum is the primary weed in southern Australian agriculture. With the individuals within a L. rigidum population exhibiting varying levels of seed dormancy, germination can be staggered across the crop-growing season, making complete weed removal virtually impossible, and ensuring that the weed seed bank is constantly replenished. By understanding the processes involved in induction and release of dormancy in L. rigidum seeds, it may be possible to develop strategies to more effectively manage this pest without further stretching herbicide resources. This review examines L. rigidum seed dormancy and germination from a weed-management perspective and explains how the seed bank can be depleted by control strategies encompassing all stages in the lifecycle of a seed, from development to germination.

  5. Producer responsibility for e-waste management: key issues for consideration - learning from the Swiss experience.

    Science.gov (United States)

    Khetriwal, Deepali Sinha; Kraeuchi, Philipp; Widmer, Rolf

    2009-01-01

    E-waste, a relatively recent addition to the waste stream in the form of discarded electronic and electric equipment, is getting increasing attention from policy makers as the quantity being generated is rising rapidly. One of the most promising policy options to address this issue is to extend the producers responsibility for their products beyond the point of sale, until end-of-product-life. This paper briefly introduces the concept of extended producer responsibility (EPR) and its applicability in the area of the end-of-life management of electronic and electrical equipment (EEE). It then examines the decade-long experience of Switzerland in using EPR to manage its e-waste, elaborating on the experience of the Swiss system in overcoming specific issues, and finally wrapping up with a synopsis of the lessons for policy makers. We consider each issue as an enquiry of questions confronting a policy maker and the choices that may present themselves. The five issues discussed are: (i) the challenges in getting an EPR based system started; (ii) securing financing to ensure a self-sustaining and smooth functioning system; (iii) organising a logistics network for the take back and collection of the e-waste; (iv) ensuring compliance of the various actors involved; and finally (v) reducing the threat of monopolistic practices.

  6. Depreciation Policy as a Key Element of Enterprise Technical Resources Management

    Directory of Open Access Journals (Sweden)

    Puyda Halya V.

    2014-01-01

    Full Text Available Depreciation policy and depreciation in particular play a number of functions at an enterprise. The modern stage of scientific studies describes the essence and breadth of the “depreciation” notion for an enterprise rather deeply. The article considers depreciation as a tool of managing technical resources at an enterprise. It conducts a critical review of modern approaches to determination of depreciation and identifies its functions. The author carries out a deep analysis of modern views on the existing concepts of depreciation essence and its place in managing enterprise assets. The article reveals the essence of the “depreciation policy” notion. It provides examples of influence of different types of the depreciation policy upon the state and rate of renovation of technical resources at an enterprise. In the result the author offers types of the depreciation policy of an enterprise depending on the desired rate of renovation of the technical base and desired volume of the capital released into circulation.

  7. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, R. K. [ORNL; Peters, Scott [Sypris Electronics, LLC

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  8. Design of high-encryption wireless network with distributed host management and dynamic key generation

    Science.gov (United States)

    Weber, Robert E.

    2001-11-01

    approximately 15 Gigabyte table of IV values can be used to encrypt any packet. On a network only partially infiltrated, bit-wise manipulated packets can spoof their validity using the linear nature of the CSC checksum. Any combination of passive and active attacks can be used to modify commands as they are being sent or login information can be taken for use on another network to access personal accounts. WEP also has a critical flaw outside of the sophisticated attacks that can be used to subvert its security. WEP uses a shared key known by both the client machines and the base stations. For this reason the key can be lost through human security problems. This includes the loss of equipment to theft, employee turnover and general mishandling of key information. In order to implement secure wireless networks it has become clear that a new scheme must be developed which can address the 3 security concerns mentioned earlier and at the same time function on existing hardware and software.

  9. Development of personnel motivation models as a key component of innovative activity management

    Directory of Open Access Journals (Sweden)

    D.O. Krykunenko

    2014-03-01

    Full Text Available The aim of the article. The aim of the article is to examine the algorithm, approaches and methods of development the model of staff motivation at high technology enterprises, to strengthen the creative-directed processes of developing new products, as well as analysis of additional factors that have contributed to the effective creative work of the staff. The results of the analysis. The problem of improving the efficiency of different economic systems in the situation of limited amount of resources and fierce competition among enterprises is highlighted in the article. The author found that the performance of the considered task can be achieved through the active use of creative abilities of employees. Entities of innovative business must address the development of management concepts creativity of staff motivation model of creative work, the development and application of a wide range of methods and instruments for the control creativity. In this case, the algorithm of motivation improvement involves defining the objective model of motivation, diagnosis of the existing system of staff incentives, building a creative ranking of employees, development of effective methods of creative work motivation. Scientific novelty of the present study is in organizing of staff creativity management, which involves the intensification and revitalization innovations of the company, the aim of which is in development and implementation of innovative products. An important phase of model motivation is to create additional motivators manifestation of the creative energy of employees, which will increase the cost-effectiveness of high-tech enterprises, to reduce the turnaround time for the development of innovative products. Thus, the development, implementation and operation of the motivation model to incorporate the creative abilities of the staff of the enterprise should be based on an integrated, generalized, systemic and integrated approach, taking into

  10. Online tutoring procedure for research project supervision: management, organization and key elements

    Directory of Open Access Journals (Sweden)

    Antònia Darder Mesquida

    2015-07-01

    Full Text Available Research project tutoring appears as a crucial element for teaching; it is a planned action based on the relationship between a tutor and a student. This paper presents the findings of a design and development research which has as its main aim to create an organization system for the tutoring of online research projects. That system seeks to facilitate the tutoring and supervision task with trainee researchers, providing guidance for its management and instruments for its implementation. The main conclusions arising from this research derive from considering the need to offer a solution to the problem of distance research project supervision and has materialized in organization and sequencing through a model about the variables that influence the research project tutoring problem.

  11. Measuring dosage: a key factor when assessing the relationship between prenatal case management and birth outcomes.

    Science.gov (United States)

    Slaughter, Jaime C; Issel, L Michele; Handler, Arden S; Rosenberg, Deborah; Kane, Debra J; Stayner, Leslie T

    2013-10-01

    To assess whether a measure of prenatal case management (PCM) dosage is more sensitive than a dichotomous PCM exposure measure when evaluating the effect of PCM on low birthweight (LBW) and preterm birth (PTB). We constructed a retrospective cohort study (N = 16,657) of Iowa Medicaid-insured women who had a singleton live birth from October 2005 to December 2006; 28 % of women received PCM. A PCM dosage measure was created to capture duration of enrollment, total time with a case manager, and intervention breadth. Propensity score (PS)-adjusted odds ratios (ORs), and 95 % confidence intervals (95 % CIs) were calculated to assess the risk of each outcome by PCM dosage and the dichotomous PCM exposure measure. PS-adjusted ORs of PTB were 0.88 (95 % CI 0.70-1.11), 0.58 (95 % CI 0.47-0.72), and 1.43 (95 % CI 1.23-1.67) for high, medium, and low PCM dosage, respectively. For LBW, the PS-adjusted ORs were 0.76 (95 % CI 0.57-1.00), 0.64 (95 % CI 0.50-0.82), and 1.36 (95 % CI 1.14-1.63), for high, medium, and low PCM dosage, respectively. The PCM dichotomous participation measure was not significantly associated with LBW (OR = 0.95, 95 % CI 0.82-1.09) or PTB (0.97, 95 % CI 0.87-1.10). The reference group in each analysis is No PCM. PCM was associated with a reduced risk of adverse pregnancy outcomes for Medicaid-insured women in Iowa. PCM dosage appeared to be a more sensitive measure than the dichotomous measure of PCM participation.

  12. Solid, non-skin, post-liver transplant tumors: Key role of lifestyle and immunosuppression management.

    Science.gov (United States)

    Carenco, Christophe; Faure, Stéphanie; Ursic-Bedoya, José; Herrero, Astrid; Pageaux, Georges Philippe

    2016-01-07

    Liver transplantation has been the treatment of choice for end-stage liver disease since 1983. Cancer has emerged as a major long-term cause of death for liver transplant recipients. Many retrospective studies that have explored standardized incidence ratio have reported increased rates of solid organ cancers post-liver transplantation; some have also studied risk factors. Liver transplantation results in a two to five-fold mean increase in the rate of solid organ cancers. Risk of head and neck, lung, esophageal, cervical cancers and Kaposi's sarcoma is high, but risk of colorectal cancer is not clearly demonstrated. There appears to be no excess risk of developing breast or prostate cancer. Environmental risk factors such as viral infection and tobacco consumption, and personal risk factors such as obesity play a key role, but recent data also implicate the role of calcineurin inhibitors, whose cumulative and dose-dependent effects on cell metabolism might play a direct role in oncogenesis. In this paper, we review the results of studies assessing the incidence of non-skin solid tumors in order to understand the mechanisms underlying solid cancers in post-liver transplant patients and, ultimately, discuss how to prevent these cancers. Immunosuppressive protocol changes, including a calcineurin inhibitor-free regimen, combined with dietary guidelines and smoking cessation, are theoretically the best preventive measures.

  13. Timing of surgery in Crohn's disease: A key issue in the management

    Institute of Scientific and Technical Information of China (English)

    Rafael Alós; Joaquín Hinojosa

    2008-01-01

    The timing of the decision for operation in Crohn's disease is based on an evaluation of the several factors such as the failure of medical treatment, complications due to the Crohn's disease or to the farmacological therapy, development of dysplasia or cancer and growth retardation. A complete evaluation of these factors should result in operation timed to the patient's best advantage, achieving maximal relief of symptoms with improvement of quality of life. Given the complexity and heterogeneity of the disease and the different options for treatment, is difficult to systematize when the optimal moment for the surgery is arrived. A very important factor in the management of Crohn's disease is the multidisciplinary approach and the patient preference should be a significant factor in determining the choice of therapy. The surgery should be considered such another option in the sequential treatment of Crohn's disease. We have analyzed the factors that are involved in the decision taking of the surgical treatment regarding to the experience and the published literature. When did the medical therapy fail? When is the appropriate moment to operate on the patient? Or which complications of Crohn's disease need a surgery? These are some of the questions we will try to answer.

  14. Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations.

    Science.gov (United States)

    Rachid, Caio T C C; Balieiro, Fabiano C; Fonseca, Eduardo S; Peixoto, Raquel Silva; Chaer, Guilherme M; Tiedje, James M; Rosado, Alexandre S

    2015-01-01

    Fungi are ubiquitous and important contributors to soil nutrient cycling, playing a vital role in C, N and P turnover, with many fungi having direct beneficial relationships with plants. However, the factors that modulate the soil fungal community are poorly understood. We studied the degree to which the composition of tree species affected the soil fungal community structure and diversity by pyrosequencing the 28S rRNA gene in soil DNA. We were also interested in whether intercropping (mixed plantation of two plant species) could be used to select fungal species. More than 50,000 high quality sequences were analyzed from three treatments: monoculture of Eucalyptus; monoculture of Acacia mangium; and a mixed plantation with both species sampled 2 and 3 years after planting. We found that the plant type had a major effect on the soil fungal community structure, with 75% of the sequences from the Eucalyptus soil belonging to Basidiomycota and 19% to Ascomycota, and the Acacia soil having a sequence distribution of 28% and 62%, respectively. The intercropping of Acacia mangium in a Eucalyptus plantation significantly increased the number of fungal genera and the diversity indices and introduced or increased the frequency of several genera that were not found in the monoculture cultivation samples. Our results suggest that management of soil fungi is possible by manipulating the composition of the plant community, and intercropped systems can be a means to achieve that.

  15. Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations.

    Directory of Open Access Journals (Sweden)

    Caio T C C Rachid

    Full Text Available Fungi are ubiquitous and important contributors to soil nutrient cycling, playing a vital role in C, N and P turnover, with many fungi having direct beneficial relationships with plants. However, the factors that modulate the soil fungal community are poorly understood. We studied the degree to which the composition of tree species affected the soil fungal community structure and diversity by pyrosequencing the 28S rRNA gene in soil DNA. We were also interested in whether intercropping (mixed plantation of two plant species could be used to select fungal species. More than 50,000 high quality sequences were analyzed from three treatments: monoculture of Eucalyptus; monoculture of Acacia mangium; and a mixed plantation with both species sampled 2 and 3 years after planting. We found that the plant type had a major effect on the soil fungal community structure, with 75% of the sequences from the Eucalyptus soil belonging to Basidiomycota and 19% to Ascomycota, and the Acacia soil having a sequence distribution of 28% and 62%, respectively. The intercropping of Acacia mangium in a Eucalyptus plantation significantly increased the number of fungal genera and the diversity indices and introduced or increased the frequency of several genera that were not found in the monoculture cultivation samples. Our results suggest that management of soil fungi is possible by manipulating the composition of the plant community, and intercropped systems can be a means to achieve that.

  16. Culture, management and finances as key aspects for healthy workplace initiatives.

    Science.gov (United States)

    Waterworth, Pippa; Pescud, Melanie; Chappell, Stacie; Davies, Christina; Roche, Dee; Shilton, Trevor; Ledger, Melissa; Slevin, Terry; Rosenberg, Michael

    2016-08-19

    The aim of this study was to qualitatively explore the barriers and enablers to implementing healthy workplace initiatives in a sample of workplaces based in Perth, Western Australia. In-depth interviews were conducted with representatives from 31 organizations representing small, medium and large businesses in the Perth metropolitan area which reported having healthy workplace initiatives. In total, 43 factors were mentioned as influencing the implementation of healthy workplace initiatives. Factors appearing to exert the most influence on the implementation of health promoting initiatives in this sample were culture; support from managers and staff; collaboration with industry providers; financial resources circumstances and the physical environment. These factors appeared to be mutually reinforcing and interconnected. Findings suggest there may be merit in applying an organizational development lens to the implementation of workplace health promotion initiatives as this could assist in leveraging enablers and minimizing barriers. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  17. The key to commercial-scale geological CO2 sequestration: Displaced fluid management

    Science.gov (United States)

    Surdam, R.C.; Jiao, Z.; Stauffer, P.; Miller, T.

    2011-01-01

    The Wyoming State Geological Survey has completed a thorough inventory and prioritization of all Wyoming stratigraphic units and geologic sites capable of sequestering commercial quantities of CO2 (5-15 Mt CO 2/year). This multi-year study identified the Paleozoic Tensleep/Weber Sandstone and Madison Limestone (and stratigraphic equivalent units) as the leading clastic and carbonate reservoir candidates for commercial-scale geological CO2 sequestration in Wyoming. This conclusion was based on unit thickness, overlying low permeability lithofacies, reservoir storage and continuity properties, regional distribution patterns, formation fluid chemistry characteristics, and preliminary fluid-flow modeling. This study also identified the Rock Springs Uplift in southwestern Wyoming as the most promising geological CO2 sequestration site in Wyoming and probably in any Rocky Mountain basin. The results of the WSGS CO2 geological sequestration inventory led the agency and colleagues at the UW School of Energy Resources Carbon Management Institute (CMI) to collect available geologic, petrophysical, geochemical, and geophysical data on the Rock Springs Uplift, and to build a regional 3-D geologic framework model of the Uplift. From the results of these tasks and using the FutureGen protocol, the WSGS showed that on the Rock Springs Uplift, the Weber Sandstone has sufficient pore space to sequester 18 billion tons (Gt) of CO2, and the Madison Limestone has sufficient pore space to sequester 8 Gt of CO2. ?? 2011 Published by Elsevier Ltd.

  18. SDAI: a key piece of software to manage the new wideband backend at Robledo

    Science.gov (United States)

    Rizzo, J. R.; Gutiérrez Bustos, M.; Kuiper, T. B. H.; Cernicharo, J.; Sotuela, I.; Pedreira, A.

    2012-09-01

    A joint collaborative project was recently developed to provide the Madrid Deep Space Communications Complex with a state-of-the-art wideband backend. This new backend provides from 100MHz to 6 GHz of instantaneous bandwidth, and spectral resolutions from 6 to 200 kHz. The backend includes a new intermediate-frequency processor, as well as a FPGA-based FFT spectrometer, which manage thousands of spectroscopic channels in real time. All these equipment need to be controlled and operated by a common software, which has to synchronize activities among affected devices, and also with the observing program. The final output should be a calibrated spectrum, readable by standard radio astronomical tools for further processing. The developed software at this end is named "Spectroscopic Data Acquisition Interface" (SDAI). SDAI is written in python 2.5, using PyQt4 for the User Interface. By an ethernet socket connection, SDAI receives astronomical information (source, frequencies, Doppler correction, etc.) and the antenna status from the observing program. Then it synchronizes the observations at the required frequency by tuning the synthesizers through their USB ports; finally SDAI controls the FFT spectrometers through UDP commands sent by sockets. Data are transmitted from the FFT spectrometers by TCP sockets, and written as standard FITS files. In this paper we describe the modules built, depict a typical observing session, and show some astronomical results using SDAI.

  19. The effect of the hierarchical management on nursing quality and nursing satisfaction%护士层级管理对护理质量及护士满意度的影响

    Institute of Scientific and Technical Information of China (English)

    张琼

    2013-01-01

    目的 探讨护士层级管理在护理管理中的应用效果.方法 选取我院外科36名护士为研究对象,对其实施护士层级管理,比较实施前后护理质量的变化及工作成就感的变化.结果 实施层级管理后,护士的专业技术考核、基础护理、护理文书、健康教育的评分均显著高于实施前(P<0.05).护士对职业满意度、自我实现愿望、自我价值体现和综合成就感显著高于实施前(P<0.05).结论 护士层级管理有利于更好地落实患者的基础护理,改善护理质量,提高护士对职业的满意度.%Objective To explore the application effects of the hierarchical management on nursing quality and nursing satisfaction.Methods A total of 36 cases of surgical nurses were selected as the research object,the changes of nursing quality and work achievement after the implementation of hierarchical management were compared with before it.Results Implementation of hierarchical management,the score of nurses professional and technical assessment,basic nursing,nursing document and health education after it were significantly higher than those before it (P < 0.05).The occupation satisfaction of nurses,fulfillment wish,self-worth and achievement were significantly higher than those before it (P < 0.05).Conclusions The hierarchical management helps manage basic nursing better of the patients; it can improve the nursing quality and the occupation satisfaction of nurses.

  20. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Directory of Open Access Journals (Sweden)

    Dimitrios Hatzinakos

    2008-03-01

    Full Text Available As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN, which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1 a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2 a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  1. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Science.gov (United States)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  2. Treatment Protocols as Hierarchical Structures

    Science.gov (United States)

    Ben-Bassat, Moshe; Carlson, Richard W.; Puri, Vinod K.; Weil, Max Harry

    1978-01-01

    We view a treatment protocol as a hierarchical structure of therapeutic modules. The lowest level of this structure consists of individual therapeutic actions. Combinations of individual actions define higher level modules, which we call routines. Routines are designed to manage limited clinical problems, such as the routine for fluid loading to correct hypovolemia. Combinations of routines and additional actions, together with comments, questions, or precautions organized in a branching logic, in turn, define the treatment protocol for a given disorder. Adoption of this modular approach may facilitate the formulation of treatment protocols, since the physician is not required to prepare complex flowcharts. This hierarchical approach also allows protocols to be updated and modified in a flexible manner. By use of such a standard format, individual components may be fitted together to create protocols for multiple disorders. The technique is suited for computer implementation. We believe that this hierarchical approach may facilitate standarization of patient care as well as aid in clinical teaching. A protocol for acute pancreatitis is used to illustrate this technique.

  3. Onboard hierarchical network

    Science.gov (United States)

    Tunesi, Luca; Armbruster, Philippe

    2004-02-01

    The objective of this paper is to demonstrate a suitable hierarchical networking solution to improve capabilities and performances of space systems, with significant recurrent costs saving and more efficient design & manufacturing flows. Classically, a satellite can be split in two functional sub-systems: the platform and the payload complement. The platform is in charge of providing power, attitude & orbit control and up/down-link services, whereas the payload represents the scientific and/or operational instruments/transponders and embodies the objectives of the mission. One major possibility to improve the performance of payloads, by limiting the data return to pertinent information, is to process data on board thanks to a proper implementation of the payload data system. In this way, it is possible to share non-recurring development costs by exploiting a system that can be adopted by the majority of space missions. It is believed that the Modular and Scalable Payload Data System, under development by ESA, provides a suitable solution to fulfil a large range of future mission requirements. The backbone of the system is the standardised high data rate SpaceWire network http://www.ecss.nl/. As complement, a lower speed command and control bus connecting peripherals is required. For instance, at instrument level, there is a need for a "local" low complexity bus, which gives the possibility to command and control sensors and actuators. Moreover, most of the connections at sub-system level are related to discrete signals management or simple telemetry acquisitions, which can easily and efficiently be handled by a local bus. An on-board hierarchical network can therefore be defined by interconnecting high-speed links and local buses. Additionally, it is worth stressing another important aspect of the design process: Agencies and ESA in particular are frequently confronted with a big consortium of geographically spread companies located in different countries, each one

  4. Endogenous Effort Norms in Hierarchical Firms

    NARCIS (Netherlands)

    J. Tichem (Jan)

    2013-01-01

    markdownabstract__Abstract__ This paper studies how a three-layer hierarchical firm (principal-supervisor-agent) optimally creates effort norms for its employees. The key assumption is that effort norms are affected by the example of superiors. In equilibrium, norms are eroded as one moves down

  5. Equivalence Checking of Hierarchical Combinational Circuits

    DEFF Research Database (Denmark)

    Williams, Poul Frederick; Hulgaard, Henrik; Andersen, Henrik Reif

    1999-01-01

    This paper presents a method for verifying that two hierarchical combinational circuits implement the same Boolean functions. The key new feature of the method is its ability to exploit the modularity of circuits to reuse results obtained from one part of the circuits in other parts. We demonstrate...... our method on large adder and multiplier circuits....

  6. Operational Details of the Five Domains Model and Its Key Applications to the Assessment and Management of Animal Welfare

    Science.gov (United States)

    Mellor, David J.

    2017-01-01

    Simple Summary The Five Domains Model is a focusing device to facilitate systematic, structured, comprehensive and coherent assessment of animal welfare; it is not a definition of animal welfare, nor is it intended to be an accurate representation of body structure and function. The purpose of each of the five domains is to draw attention to areas that are relevant to both animal welfare assessment and management. This paper begins by briefly describing the major features of the Model and the operational interactions between the five domains, and then it details seven interacting applications of the Model. These underlie its utility and increasing application to welfare assessment and management in diverse animal use sectors. Abstract In accord with contemporary animal welfare science understanding, the Five Domains Model has a significant focus on subjective experiences, known as affects, which collectively contribute to an animal’s overall welfare state. Operationally, the focus of the Model is on the presence or absence of various internal physical/functional states and external circumstances that give rise to welfare-relevant negative and/or positive mental experiences, i.e., affects. The internal states and external circumstances of animals are evaluated systematically by referring to each of the first four domains of the Model, designated “Nutrition”, “Environment”, “Health” and “Behaviour”. Then affects, considered carefully and cautiously to be generated by factors in these domains, are accumulated into the fifth domain, designated “Mental State”. The scientific foundations of this operational procedure, published in detail elsewhere, are described briefly here, and then seven key ways the Model may be applied to the assessment and management of animal welfare are considered. These applications have the following beneficial objectives—they (1) specify key general foci for animal welfare management; (2) highlight the foundations of

  7. Notification: FY 2017 Update of Proposed Key Management Challenges and Internal Control Weaknesses Confronting the U.S. Chemical Safety and Hazard Investigation Board

    Science.gov (United States)

    Jan 5, 2017. The EPA OIG is beginning work to update for fiscal year 2017 its list of proposed key management challenges and internal control weaknesses confronting the U.S. Chemical Safety and Hazard Investigation Board (CSB).

  8. 设立护理组长在护士层级管理中的实践与体会%Practice and experience of the establishment of nurse team leaders in the hierarchical management

    Institute of Scientific and Technical Information of China (English)

    黄师菊; 周雪玲; 李晓玲; 陈妙霞

    2010-01-01

    目的 探讨设立护理组长在临床护士层级管理工作中的实践.方法 对外科病房8个病区试行设立护理组长工作岗位,实行护士长-护理组长-责任护士-助理护士层级管理模式,由护理组长或替班组长实现二级护理质控网,将护理质控前移,确保护理工作质量.结果 实行护理组长后护理服务满意度97.3%,比实施前明显提高.结论 护士层级管理体现以患者为中心的管理理念,充分发挥各层级护理人员的作用,有利于合理安排使用人力资源,更好实施层级管理,有利于护理人才的培养,推动护理专业发展.%Objective To explore the feasibility of the establishment of nurse team leaders in the hierarchical management. Methods Eight nurses were assigned as nurse team leaders in eight surgeon wards. To ensure the quality of nursing, we established the hierarchical management mode of Head nurse-nurse team leader -primary nurse, made the nurse team leader or monitor take charge of the secondary nursing quality control networks, and brought the nurse quality control work forward. Results The patient' s satisfaction to nursing service increased significantly after nurse team leader system. Conclusions The hierarchical management reflects a patient-centered philosophy, makes full use of nursing staff at all levels, and it is beneficial to arrangt human resource and talent cultivation, it can make the implementation of the hierarchical management better and promote the nursing professional development.

  9. Micromechanics of hierarchical materials

    DEFF Research Database (Denmark)

    Mishnaevsky, Leon, Jr.

    2012-01-01

    A short overview of micromechanical models of hierarchical materials (hybrid composites, biomaterials, fractal materials, etc.) is given. Several examples of the modeling of strength and damage in hierarchical materials are summarized, among them, 3D FE model of hybrid composites...... with nanoengineered matrix, fiber bundle model of UD composites with hierarchically clustered fibers and 3D multilevel model of wood considered as a gradient, cellular material with layered composite cell walls. The main areas of research in micromechanics of hierarchical materials are identified, among them......, the investigations of the effects of load redistribution between reinforcing elements at different scale levels, of the possibilities to control different material properties and to ensure synergy of strengthening effects at different scale levels and using the nanoreinforcement effects. The main future directions...

  10. Hierarchical auxetic mechanical metamaterials.

    Science.gov (United States)

    Gatt, Ruben; Mizzi, Luke; Azzopardi, Joseph I; Azzopardi, Keith M; Attard, Daphne; Casha, Aaron; Briffa, Joseph; Grima, Joseph N

    2015-02-11

    Auxetic mechanical metamaterials are engineered systems that exhibit the unusual macroscopic property of a negative Poisson's ratio due to sub-unit structure rather than chemical composition. Although their unique behaviour makes them superior to conventional materials in many practical applications, they are limited in availability. Here, we propose a new class of hierarchical auxetics based on the rotating rigid units mechanism. These systems retain the enhanced properties from having a negative Poisson's ratio with the added benefits of being a hierarchical system. Using simulations on typical hierarchical multi-level rotating squares, we show that, through design, one can control the extent of auxeticity, degree of aperture and size of the different pores in the system. This makes the system more versatile than similar non-hierarchical ones, making them promising candidates for industrial and biomedical applications, such as stents and skin grafts.

  11. Introduction into Hierarchical Matrices

    KAUST Repository

    Litvinenko, Alexander

    2013-12-05

    Hierarchical matrices allow us to reduce computational storage and cost from cubic to almost linear. This technique can be applied for solving PDEs, integral equations, matrix equations and approximation of large covariance and precision matrices.

  12. Hierarchical Auxetic Mechanical Metamaterials

    Science.gov (United States)

    Gatt, Ruben; Mizzi, Luke; Azzopardi, Joseph I.; Azzopardi, Keith M.; Attard, Daphne; Casha, Aaron; Briffa, Joseph; Grima, Joseph N.

    2015-02-01

    Auxetic mechanical metamaterials are engineered systems that exhibit the unusual macroscopic property of a negative Poisson's ratio due to sub-unit structure rather than chemical composition. Although their unique behaviour makes them superior to conventional materials in many practical applications, they are limited in availability. Here, we propose a new class of hierarchical auxetics based on the rotating rigid units mechanism. These systems retain the enhanced properties from having a negative Poisson's ratio with the added benefits of being a hierarchical system. Using simulations on typical hierarchical multi-level rotating squares, we show that, through design, one can control the extent of auxeticity, degree of aperture and size of the different pores in the system. This makes the system more versatile than similar non-hierarchical ones, making them promising candidates for industrial and biomedical applications, such as stents and skin grafts.

  13. Applied Bayesian Hierarchical Methods

    CERN Document Server

    Congdon, Peter D

    2010-01-01

    Bayesian methods facilitate the analysis of complex models and data structures. Emphasizing data applications, alternative modeling specifications, and computer implementation, this book provides a practical overview of methods for Bayesian analysis of hierarchical models.

  14. Programming with Hierarchical Maps

    DEFF Research Database (Denmark)

    Ørbæk, Peter

    This report desribes the hierarchical maps used as a central data structure in the Corundum framework. We describe its most prominent features, ague for its usefulness and briefly describe some of the software prototypes implemented using the technology....

  15. Catalysis with hierarchical zeolites

    DEFF Research Database (Denmark)

    Holm, Martin Spangsberg; Taarning, Esben; Egeblad, Kresten

    2011-01-01

    Hierarchical (or mesoporous) zeolites have attracted significant attention during the first decade of the 21st century, and so far this interest continues to increase. There have already been several reviews giving detailed accounts of the developments emphasizing different aspects of this research...... topic. Until now, the main reason for developing hierarchical zeolites has been to achieve heterogeneous catalysts with improved performance but this particular facet has not yet been reviewed in detail. Thus, the present paper summaries and categorizes the catalytic studies utilizing hierarchical...... zeolites that have been reported hitherto. Prototypical examples from some of the different categories of catalytic reactions that have been studied using hierarchical zeolite catalysts are highlighted. This clearly illustrates the different ways that improved performance can be achieved with this family...

  16. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  17. 分布式集装箱数据中心的绿色层次化管理%Green Hierarchical Management for Distributed Datacenter Containers

    Institute of Scientific and Technical Information of China (English)

    侯小凤; 宋朋涛; 唐伟超; 李超; 梁晓峣

    2016-01-01

    In recent years ,modular datacenters (datacenter containers) have become promising IT infrastructure solutions due to their impressive efficiency and scalability .Pre‐fabricated containers can be deployed not only in existing warehouse‐scale datacenter facilities for capacity expansion ,but also in urban/remote areas to support onsite Internet of Things (IoT ) data processing . Combing conventional centralized datacenter servers with distributed containers can offer cloud providers new opportunities of exploiting local renewable energy resources and reducing unnecessary data movement overhead .This paper investigates a hierarchical management strategy for emerging geographically distributed datacenter containers .We logically group distributed datacenter containers into multiple classes that have different data accessing patterns .During runtime a central navigation system is used to monitor the utilization of each container class and perform dynamic sleeping scheduling to further improve the overall energy efficiency .Experimental results on our scaled‐dow n test‐bed show that the proposed mechanism can save 12% ~32% energy cost w hile ensuring high performance .%近几年,模块化数据中心(集装箱数据中心)因其高能效可拓展的特点而成为极具前景的IT 基础设施解决方案。预定制的集装箱数据中心不仅可以被部署在传统仓库级数据中心设施中以支持容量扩展,还能够被部署在城市/郊外以支持物联网数据的本地处理。把传统集中建设和管理的数据中心与地理上分布的模块化数据中心结合起来,能够更加方便地利用本地绿色能源发电以及减少数据传输成本。针对目前涌现的地理上分布的集装箱式数据中心模块提出了一种新型分层化管理模式,该技术将分布式集装箱数据中心逻辑上划分成多个性质和功能不同的层级。一个中央调配系统被用来监控每个层级的集装箱数

  18. The Research of Key Problems of CORBA-Based Network Management%基于CORBA的网络管理的若干关键问题研究

    Institute of Scientific and Technical Information of China (English)

    赵慧; 施伯乐

    2003-01-01

    CORBA-based Network Management provides stronger functions than SNMP,is easier than CMIP. The ar-chitecture and its model of CORBA-based network management are discussed. The translation of CORBA object mod-el and SNMP/CMIP information model is also researched. Those are the key problems of CORBA-based networkmanagement.

  19. 大客户商机管理模式研究%Research on Key Account Business Opportunity Management Mode

    Institute of Scientific and Technical Information of China (English)

    张国全

    2011-01-01

    This article analyzes the effect and necessity of the key account business opportunity management. Based on business opportunity filter mode, it proposes that business opportunity management is separated by five phases. In order to strengthen information security, we should follow the business opportunity share principles. At last it presents the important index in business opportunity operation analysis.%分析大客户商机管理的作用和必要性,基于商机漏斗管理模型提出商机管理划分为5个阶段,阐述商机共享的管理原则,提出从行业区隔、信息字段区隔、关键字屏蔽三个方面着手加强信息安全管理,提出商机经营分析需重点关注的指标。

  20. Hybrid cryptography key management.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Torgerson, Mark Dolan; Neumann, William Douglas; Gallup, Donald R.; Collins, Michael Joseph; Beaver, Cheryl Lynn

    2003-11-01

    Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited.

  1. Hybrid cryptography key management.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Torgerson, Mark Dolan; Neumann, William Douglas; Gallup, Donald R.; Collins, Michael Joseph; Beaver, Cheryl Lynn

    2003-11-01

    Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited.

  2. Genetic Algorithm for Hierarchical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sajid Hussain

    2007-09-01

    Full Text Available Large scale wireless sensor networks (WSNs can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, environment and habitat monitoring. As hierarchical clusters can reduce the energy consumption requirements for WSNs, we investigate intelligent techniques for cluster formation and management. A genetic algorithm (GA is used to create energy efficient clusters for data dissemination in wireless sensor networks. The simulation results show that the proposed intelligent hierarchical clustering technique can extend the network lifetime for different network deployment environments.

  3. Effect Analysis of Hierarchical Management to Improve the Quality of Nursing Service%分层次管理提高优质护理服务质量效果分析

    Institute of Scientific and Technical Information of China (English)

    吴珺

    2015-01-01

    Quality care refers to routine care, based on giving patients high comfort, and high efficiency of care philosophy. High-quality patient-centered care requirements, to meet their physical and psychological needs, and improve patient care benefits at the same time, harmonious nurse-patient relationship. Traditional management methods can not meet the basic needs of the development of nursing and nurses, so the use of hierarchical management is of great significance. In this paper, different levels of management to improve the quality of care for the quality of service application methods, the effect is to analyze and , in order to understand the value of hierarchical management.%优质护理是指在常规护理的基础上,给予患者高舒适感、高效率的护理理念。优质护理要求以患者为中心,满足其生理与心理所需,并在提高患者护理效果的同时,和谐护患关系。传统的管理方法无法满足护理工作的基本需求与护理人员的发展,因此采用分层次管理具有十分重要的意义。本文就分层次管理对于提高优质护理服务质量的应用方法、效果进行分析总结,以了解分层次管理的价值。

  4. The Revelation about the Information Network Planning and Construction by the Road Classification System and Hierarchical Planning Management Mode%道路分级体系和分层规划管理模式对信息管网规划及建设的启示

    Institute of Scientific and Technical Information of China (English)

    殷洁琰

    2013-01-01

    This paper condects a deep investigation about the road classification system and hierarchical planning management mode of China. It uses the characteristic of road classification system and hierarchical planning management mode for reference to analyzing the planning of information network. Based on the similarity between information network and road network, suggestions on the classification system and hierarchical planning management mode for information network are put forword.%  从信息网络与道路网络内涵的相关性、结构的相似性、建设的关联性出发,分析借鉴目前成熟的道路分级体系和分层规划管理模式,提出对信息管网在合理的等级体系和分层管理模式下进行统一规划建设的建议。

  5. Neutrosophic Hierarchical Clustering Algoritms

    Directory of Open Access Journals (Sweden)

    Rıdvan Şahin

    2014-03-01

    Full Text Available Interval neutrosophic set (INS is a generalization of interval valued intuitionistic fuzzy set (IVIFS, whose the membership and non-membership values of elements consist of fuzzy range, while single valued neutrosophic set (SVNS is regarded as extension of intuitionistic fuzzy set (IFS. In this paper, we extend the hierarchical clustering techniques proposed for IFSs and IVIFSs to SVNSs and INSs respectively. Based on the traditional hierarchical clustering procedure, the single valued neutrosophic aggregation operator, and the basic distance measures between SVNSs, we define a single valued neutrosophic hierarchical clustering algorithm for clustering SVNSs. Then we extend the algorithm to classify an interval neutrosophic data. Finally, we present some numerical examples in order to show the effectiveness and availability of the developed clustering algorithms.

  6. A general strategy to determine the congruence between a hierarchical and a non-hierarchical classification

    Directory of Open Access Journals (Sweden)

    Marín Ignacio

    2007-11-01

    Full Text Available Abstract Background Classification procedures are widely used in phylogenetic inference, the analysis of expression profiles, the study of biological networks, etc. Many algorithms have been proposed to establish the similarity between two different classifications of the same elements. However, methods to determine significant coincidences between hierarchical and non-hierarchical partitions are still poorly developed, in spite of the fact that the search for such coincidences is implicit in many analyses of massive data. Results We describe a novel strategy to compare a hierarchical and a dichotomic non-hierarchical classification of elements, in order to find clusters in a hierarchical tree in which elements of a given "flat" partition are overrepresented. The key improvement of our strategy respect to previous methods is using permutation analyses of ranked clusters to determine whether regions of the dendrograms present a significant enrichment. We show that this method is more sensitive than previously developed strategies and how it can be applied to several real cases, including microarray and interactome data. Particularly, we use it to compare a hierarchical representation of the yeast mitochondrial interactome and a catalogue of known mitochondrial protein complexes, demonstrating a high level of congruence between those two classifications. We also discuss extensions of this method to other cases which are conceptually related. Conclusion Our method is highly sensitive and outperforms previously described strategies. A PERL script that implements it is available at http://www.uv.es/~genomica/treetracker.

  7. Systemwide Power Management with Argo

    Energy Technology Data Exchange (ETDEWEB)

    Ellsworth, Daniel; Patki, Tapasya; Perarnau, Swann; Seo, Sangmin; Yoshii, Kazutomo; Hoffmann, Henry; Schulz, Martin; Beckman, Pete

    2016-05-23

    The Argo project is a DOE initiative for designing a modular operating system/runtime for the next generation of supercomputers. A key focus area in this project is power management, which is one of the main challenges on the path to exascale. In this paper, we discuss ideas for systemwide power management in the Argo project. We present a hierarchical and scalable approach to maintain a power bound at scale, and we highlight some early results.

  8. GIS environmental information analysis of the Darro River basin as the key for the management and hydrological forest restoration.

    Science.gov (United States)

    Fernandez, Paz; Delgado, Expectación; Lopez-Alonso, Mónica; Poyatos, José Manuel

    2017-09-23

    This article presents analyses of soil and environmental information for the Darro River basin (Granada-Spain) preliminary to its hydrological and forestry restoration. These analyses were carried out using a geographical information system (GIS) and employing a new procedure that adapts hydrological forest-restoration methods. The complete analysis encompasses morphological conditions, soil and climate characteristics as well as vegetation and land use. The study investigates soil erosion in the basin by using Universal Soil Loss Equation (USLE) and by mapping erosion fragility units. The results are presented in a set of maps and their analysis, providing the starting point for river basin management and the hydrological and forestry-restoration project that was approved at the end of 2015. The presence of soft substrates (e.g. gravel and sand) indicates that the area is susceptible to erosion, particularly the areas that are dominated by human activity and have little soil protection. Finally, land use and vegetation cover were identified as key factors in the soil erosion in the basin. According to the results, river authorities have included several measures in the restoration project aimed at reducing the erosion and helping to recover the environmental value of this river basin and to include it in recreation possibilities for the community of Granada. The presented analytical approach, designed by the authors, would be useful as a tool for environmental restoration in other small Mediterranean river basins. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Measurement Science for Prognostics and Health Management for Smart Manufacturing Systems: Key Findings from a Roadmapping Workshop

    Science.gov (United States)

    Weiss, Brian A.; Vogl, Gregory; Helu, Moneer; Qiao, Guixiu; Pellegrino, Joan; Justiniano, Mauricio; Raghunathan, Anand

    2017-01-01

    The National Institute of Standards and Technology (NIST) hosted the Roadmapping Workshop – Measurement Science for Prognostics and Health Management for Smart Manufacturing Systems (PHM4SMS) in Fall 2014 to discuss the needs and priorities of stakeholders in the PHM4SMS technology area. The workshop brought together over 70 members of the PHM community. The attendees included representatives from small, medium, and large manufacturers; technology developers and integrators; academic researchers; government organizations; trade associations; and standards bodies. The attendees discussed the current and anticipated measurement science challenges to advance PHM methods and techniques for smart manufacturing systems; the associated research and development needed to implement condition monitoring, diagnostic, and prognostic technologies within manufacturing environments; and the priorities to meet the needs of PHM in manufacturing. This paper will summarize the key findings of this workshop, and present some of the critical measurement science challenges and corresponding roadmaps, i.e., suggested courses of action, to advance PHM for manufacturing. Milestones and targeted capabilities will be presented for each roadmap across three areas: PHM Manufacturing Process Techniques; PHM Performance Assessment; and PHM Infrastructure – Hardware, Software, and Integration. An analysis of these roadmaps and crosscutting themes seen across the breakout sessions is also discussed. PMID:28664163

  10. THE IDENTIFICATION OF KEY SUCCESS FACTORS IN SUSTAINABLE COLD CHAIN MANAGEMENT: INSIGHTS FROM THE INDIAN FOOD INDUSTRY

    Directory of Open Access Journals (Sweden)

    Shashi

    2016-12-01

    Full Text Available Supply chain sustainability has emerged as an indispensable research agenda for the government, industry as well as non-profit orientation bodies. As a developing country, cold supply chain management in India is still in infancy. The demand pattern of food products has been dramatically changing since last few years. Nowadays, the customers are more conscious to use products for better health and highly expecting for food safety, toxic free and eco-friendly delivery of food products. However, sustainable cold supply chain has not yet received good heed throughout the world. Hence, in this paper an attempt has been made to address these important issues. A conceptual model was proposed in the consultation of practitioners and literature support to address the important issues in cold supply chain management for food companies. Therefore, in order to identify the key success factors for sustainable cold chain management, in this study a conceptual model developed. The proposed framework is then validated by an empirical research in the Indian food industry. This research has several alarming findings. Explicitly, in India i environmental issues and social responsibility are not as important as other ‎economical supplier selection criteria, ii among 19 food supplier selection criteria, the rank of social responsibility is 18‎, iii low carbon emission is less important value addition trait as compare to ‎other sustainable cold chain value addition (which means in India the buyers focus more on their individual and prompt received ‎benefits rather than long ‎lasting advantages, iv the use of life cycle analysis, renewable energy sources and passive cold chain are the least important ‎implemented sustainable cold chain practices (although this might be because of utilization complexities, v the joint development of product is implemented at the lowest extent judging against other dynamic capacity ‎factors, vii government usually backed

  11. Towards Business Process Management in networked ecosystems

    NARCIS (Netherlands)

    Grondelle, Jeroen; Zoet, Martijn; Versendaal, Johan

    2014-01-01

    Managing and supporting the collaboration between different actors is key in any organizational context, whether of a hierarchical or a networked nature. In the networked context of ecosystems of service providers and other stakeholders, BPM is faced with different challenges than in a conventional

  12. 基于RFID和ZigBee网络的通用分级考勤管理系统%Universal and Hierarchical Attendance Management System Based on RFID and ZigBee Network

    Institute of Scientific and Technical Information of China (English)

    张琼英; 王能河; 张伟刚; 瞿少成

    2016-01-01

    【目的】针对考勤管理移动性差、数据难以共享、过于依赖网络和后台计算机等缺陷,设计一种基于射频识别技术(RFID)和ZigBee网络的通用分级管理考勤系统。【方法】基于 MFRC500与 STC89C52设计被动非接触式RFID考勤读卡子系统;采用CC2530设计ZigBee无线传感网络;基于 Linux/QT完成 ARM主控平台开发。【结果】系统实现多 RFID读卡子系统的自组网、子节点与主控平台的分级管理。【结论】测试表明,该系统部署灵活,能适应复杂的楼宇环境,且性价比较高,具有一定推广价值。%[Objective]A design of universal and hierarchical attendance system,which uses RFID and ZigBee network,is proposed to fix the shortcomings of attendance management.[Methods]Based on MFRC500 and STC89C52,a passive contactless RFID reader subsystem is designed. Multi-RFID reader subsystems can be attached by ZigBee wireless sensor network using CC2530.A master platform based on Linux/QT is developed.[Results]This system can achieve hierarchical attendance management for child node and host platform,respectively.Also a web background data management system is provided for data mining in future.[Conclusion]Experi-ments show that the system can be easily implemented and works stable in complex environ-ment.

  13. Summary of key Management in Wireless Network%无线网络中密钥管理技术概述

    Institute of Scientific and Technical Information of China (English)

    何邓; 徐敏

    2011-01-01

    密钥管理技术是基本的安全技术之一,在无线网络中扮演重要的角色。无线网络中密钥管理技术的研究是近年来的热点。本文概述了无线网络中密钥管理技术,即无线传感器网络和无线自组网络中的密钥管理技术。%key management technology is one of the base secure technology.It is important role in wireless network.The key management in wireless network technology research is hot spot in recent years.This paper summarizes the wireless network key management technology,the main are wireless sensor network and Mobile Ad-hoc network.

  14. Mobile Node Speed Detection Mechanism in Hierarchical Mobile Internet Protocol (IPv6

    Directory of Open Access Journals (Sweden)

    Zulkeflee Kusin

    2011-01-01

    Full Text Available Problem statement: IETF has introduced Hierarchical Mobile IPv6 (HMIPv6 to support mobility problem in the next generation Internet Protocol (IPv6. The key concept behind this protocol is the usage of Mobility Anchor Point (MAP located at any level router of network to support hierarchical mobility management and seamless handover. The distance MAP selection in HMIPv6 causes MAP overloaded as the network grows. Approach: To address the issue in designing MAP selection scheme, we proposed a dynamic speed detection mechanism that integrates with the load control mechanism. Results: From the experimental results we obtained that the proposed scheme gives better distribution in MAP load and reduced binding update cost. Conclusion/Recommendations: The Next Generation Networks (NGN is expected to provide seamless handover in high speed wireless network environment. There is crucial need of very sophisticated protocols to support NGN QoS requirements.

  15. Hierarchical Porous Structures

    Energy Technology Data Exchange (ETDEWEB)

    Grote, Christopher John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-06-07

    Materials Design is often at the forefront of technological innovation. While there has always been a push to generate increasingly low density materials, such as aero or hydrogels, more recently the idea of bicontinuous structures has gone more into play. This review will cover some of the methods and applications for generating both porous, and hierarchically porous structures.

  16. Improved Adhesion and Compliancy of Hierarchical Fibrillar Adhesives.

    Science.gov (United States)

    Li, Yasong; Gates, Byron D; Menon, Carlo

    2015-08-01

    The gecko relies on van der Waals forces to cling onto surfaces with a variety of topography and composition. The hierarchical fibrillar structures on their climbing feet, ranging from mesoscale to nanoscale, are hypothesized to be key elements for the animal to conquer both smooth and rough surfaces. An epoxy-based artificial hierarchical fibrillar adhesive was prepared to study the influence of the hierarchical structures on the properties of a dry adhesive. The presented experiments highlight the advantages of a hierarchical structure despite a reduction of overall density and aspect ratio of nanofibrils. In contrast to an adhesive containing only nanometer-size fibrils, the hierarchical fibrillar adhesives exhibited a higher adhesion force and better compliancy when tested on an identical substrate.

  17. Application of nursing mode of responsibility system guided by hierar-chical management in pediatrics%层级责任制护理模式在儿科中的应用

    Institute of Scientific and Technical Information of China (English)

    林平娇

    2014-01-01

    目的:探讨层级责任制护理模式在儿科临床工作中的应用。方法将儿科病区13名护士进行分层级管理责任于人进行管床,设立护士长-高位责任护士-初级责任护士,按岗位分管床位,全面负责患儿的病情观察、治疗、护理、病区安全及家属沟通,使患儿得到及时、最适合的治疗和护理措施。结果基础知识技能、专业技能、急救技能、综合能力、病区安全管理、护理质量、护理文书等项目,实施层级责任制后显著优先实施前(P<0.05),患者对护理服务满意度差异有统计学意义(P<0.05);护士压力感降低。结论护理人员分层级管理,充分调动护士工作积极性,加强工作责任感,护士的综合素质和护理质量得到提升,充分利用现有护理人力资源,能提高工作质量和效率,使患儿得到更好更全面的照料,患者满意度提高,进一步提高了儿科优质护理服务的内涵。%Objective To explore the application of nursing mode of responsibility system guided by hierarchical man-agement in pediatrics. Methods Thirteen nurses were arranged to take care of patients under the nursing mode of re-sponsibility system guided by hierarchical management. They were graded into one head nurse, advanced responsible nurses and primary responsible nurses, and they were assigned with different duty according to their grades. They were responsible to observe the change of the illness, treatment, nursing, safety of the wards and communication with pa-tients' family members, to make sure patients can get prompt as well as suitable treatment and nursing. Results After the implement of responsibility system guided by hierarchical management, there were obvious improvements on basic knowledge, specialty skill, first aid, comprehensive ability, management of ward's safety nursing quality, nursing docu-ment, and so on(P<0.05). There was statistical significance in patients

  18. Autonomous On-orbit Health Management Architecture and Key Technologies for Manned Spacecrafts%载人航天器在轨自主健康管理系统体系结构及关键技术探讨

    Institute of Scientific and Technical Information of China (English)

    梁克; 邓凯文; 丁锐; 张森

    2014-01-01

    The design complexity , mission diversity and the mission duration of the manned space-craft have increased over the years , so there is an urgent need for the autonomous on-orbit health management .A hierarchical architecture where Observe-Orient-Decide-Act ( OODA ) loop was used to model the interaction was proposed so as to realize the precise and efficient health management . Then space station was taken as an example to study the key technologies including service deploy -ment, fault diagnosis, fault mode configuration and the implementation method based on software component .%针对载人航天器复杂化、任务多样化、在轨运行长期化的发展趋势,及由此对航天器在轨自主健康管理的能力提出的更迫切的需求,提出了一种在轨自主健康管理系统分层体系结构,并采用Observe-Orient-Decide-Act循环描述健康管理子行为之间的交互模型,可实现准确、高效的自主健康管理。并以空间站系统为例,研究了分层分级的服务部署、分类故障诊断、故障模型配置、基于构件的软件实现等关键技术。

  19. Is active management the key to the conservation of saproxylic biodiversity? Pollarding promotes the formation of tree hollows.

    Science.gov (United States)

    Sebek, Pavel; Altman, Jan; Platek, Michal; Cizek, Lukas

    2013-01-01

    Trees with hollows are key features sustaining biodiversity in wooded landscapes. They host rich assemblages of often highly specialised organisms. Hollow trees, however, have become rare and localised in Europe. Many of the associated biota is thus declining or endangered. The challenge of its conservation, therefore, is to safeguard the presence of hollow trees in sufficient numbers. Populations of numerous species associated with tree hollows and dead wood are often found in habitats that were formed by formerly common traditional silvicultural practices such as coppicing, pollarding or pasture. Although it has been occasionally mentioned that such practices increase the formation of hollows and the availability of often sun-exposed dead wood, their effect has never been quantified. Our study examined the hollow incidence in pollard and non-pollard (unmanaged) willows and the effect of pollarding on incremental growth rate by tree ring analysis. The probability of hollow occurrence was substantially higher in pollard than in non-pollard trees. Young pollards, especially, form hollows much more often than non-pollards; for instance, in trees of 50 cm DBH, the probability of hollow ocurrence was ∼0.75 in pollards, but only ∼0.3 in non-pollards. No difference in growth rate was found. Pollarding thus leads to the rapid formation of tree hollows, a habitat usually associated with old trees. It is therefore potentially a very important tool in the restoration of saproxylic habitats and conservation of hollow-dependent fauna. If applied along e.g. roads and watercourses, pollarding could also be used to increase landscape connectivity for saproxylic organisms. In reserves where pollarding was formerly practiced, its restoration would be necessary to prevent loss of saproxylic biodiversity. Our results point to the importance of active management measures for maintaining availability, and spatial and temporal continuity of deadwood microhabitats.

  20. Is active management the key to the conservation of saproxylic biodiversity? Pollarding promotes the formation of tree hollows.

    Directory of Open Access Journals (Sweden)

    Pavel Sebek

    Full Text Available Trees with hollows are key features sustaining biodiversity in wooded landscapes. They host rich assemblages of often highly specialised organisms. Hollow trees, however, have become rare and localised in Europe. Many of the associated biota is thus declining or endangered. The challenge of its conservation, therefore, is to safeguard the presence of hollow trees in sufficient numbers. Populations of numerous species associated with tree hollows and dead wood are often found in habitats that were formed by formerly common traditional silvicultural practices such as coppicing, pollarding or pasture. Although it has been occasionally mentioned that such practices increase the formation of hollows and the availability of often sun-exposed dead wood, their effect has never been quantified. Our study examined the hollow incidence in pollard and non-pollard (unmanaged willows and the effect of pollarding on incremental growth rate by tree ring analysis. The probability of hollow occurrence was substantially higher in pollard than in non-pollard trees. Young pollards, especially, form hollows much more often than non-pollards; for instance, in trees of 50 cm DBH, the probability of hollow ocurrence was ∼0.75 in pollards, but only ∼0.3 in non-pollards. No difference in growth rate was found. Pollarding thus leads to the rapid formation of tree hollows, a habitat usually associated with old trees. It is therefore potentially a very important tool in the restoration of saproxylic habitats and conservation of hollow-dependent fauna. If applied along e.g. roads and watercourses, pollarding could also be used to increase landscape connectivity for saproxylic organisms. In reserves where pollarding was formerly practiced, its restoration would be necessary to prevent loss of saproxylic biodiversity. Our results point to the importance of active management measures for maintaining availability, and spatial and temporal continuity of deadwood microhabitats.

  1. Challenges of Community Health Management of Patients with Schizophrenia Disorders in Hierarchical Health Care System%分级诊疗对精神分裂症患者社区健康管理的挑战与对策

    Institute of Scientific and Technical Information of China (English)

    骆名进; 宋海东; 赵圆; 孙晓花; 赵刚

    2016-01-01

    The new health care reform carried out "basic medicine system reform" and "primary care reform" again, which attached great importance to general practitioner construction as well as hierarchical diagnosis and treatment. With the increasing psychological problems and demands of community management of patients with mental disorder, it's imperative to establish hierarchical diagnosis and treatment and two-way referral system for patients with mental diseases. Combining the existing community mental health model, this article tried to analyze the challenges and countermeasures of mental disorders community health management with schizophrenia as an example.%新医改重开“基本药物制度”和“基层医疗机构改革”两张“处方”,全科医生制度建设和分级诊疗得到重视。随着精神(心理)问题日益突出,精神障碍患者的社区管理要求越来越高,建立精神疾病的分级诊疗和双向转诊势在必行。本文结合现有社区精神卫生工作模式,分析在分级诊疗的推动下,以精神分裂症患者为代表的社区健康管理工作面临的挑战和应对策略。

  2. HIERARCHICAL ACCESS CONTROL IN DYNAMIC PEER GROUPS USING SYMMETRIC POLYNOMIAL AND TREE BASED GROUP ELLIPTIC CURVE DIFFIE HELLMAN SCHEME

    Directory of Open Access Journals (Sweden)

    Nafeesa Begum Jeddy

    2014-01-01

    Full Text Available Hierarchical Access Control in group communication is an active area of research which is difficult to achieve it. Its primary objective is to allow users of a higher authority group to access information or resource held by lower group users and preventing the lower group users to access information held by higher class users. Large collection of collaborative applications in organizations inherently has hierarchical structures for functioning, where providing security by efficient group key management is a big challenging issue. While preserving centralized methods for hierarchical access control, it is difficult to achieve efficiency as a single membership change will result in lot of changes which are difficult to maintain. So, using distributed key agreement techniques is more appropriate for this scenario. This study explore on novel group key agreement approach, which combines both the symmetric polynomial scheme and Tree Based Group elliptic Curve key exchange. Also, it yields a secure protocol suite that is good in fault-tolerant and simple. The efficiency of SP-TGECDH is better than many other schemes. Using TGECDH makes the scheme suitable small Low powered devices.

  3. 基于V2X的混合动力汽车分层能量管理及优化%Hierarchical energy management and optimization of hybrid electric vehicles based on V2X

    Institute of Scientific and Technical Information of China (English)

    钱立军; 邱利宏; 林如宁; 辛付龙

    2016-01-01

    The control systems of hybrid electric vehicles (HEVs), which greatly affect their power performances, fuel economy and emissions are nonlinear, multi-variable, time-varying, and not differentiable, and they are the key objectives and the most difficult parts for HEVs. One of the most popular concerns about HEVs is the realization of real-time control. Researchers have come up with multiple architectures about the optimization of the energy management control of HEVs, and the most commonly used algorithms are dynamic programming (DP), equivalent consumption minimization strategy (ECMS), Pontryagin’s minimum strategy (PMP), as well as some algorithms developed from them. In order to achieve the optimal solutions with DP, a given route or velocity profile is required, which is yet normally impossible. Therefore, some researchers come up with the method of model predictive control (MPC) to obtain the predicted driving cycle, so that the need of prior-knowledge can be met. As the combination of DP and ECMS is time-consuming, some researchers finally find ECMS and PMP can be alternatives to achieve global optimal solutions or approximate to them. However, these methods mentioned above cannot realize real-time control, even though many efforts have been done to develop more time-efficient algorithms, and the controlled objects were simplified in different degrees and some details were ignored, such as driver’s intention, road conditions, signal lights and mutual effects among vehicles under real driving environment. With the development of intelligent traffic system (ITS), the real-time control based on vehicle connection becomes possible. In the connected vehicle environment, vehicles can communicate with each other and with traffic infrastructure, and they can also share their position and velocity information within the vehicle group with the help of the technologies of dedicated short range communication (DSRC), radio frequency identification devices (RFID

  4. Hierarchical Control of Droop-Controlled DC and AC Microgrids - A General Approach Towards Standardization

    DEFF Research Database (Denmark)

    Guerrero, Josep M.; Vásquez, Juan V.; Teodorescu, Remus

    2009-01-01

    DC and AC Microgrids are key elements to integrate renewable and distributed energy resources as well as distributed energy storage systems. In the last years, efforts toward the standardization of these Microgrids have been made. In this sense, this paper present the hierarchical control derived...... the deviations produced by the primary control; and iii) the tertiary control manage the power flow between the microgrid and the external electrical distribution system. Results from a hierarchicalcontrolled microgrid are provided to show the feasibility of the proposed approach....

  5. A hierarchical nest survival model integrating incomplete temporally varying covariates

    Science.gov (United States)

    Converse, Sarah J.; Royle, J. Andrew; Adler, Peter H.; Urbanek, Richard P.; Barzan, Jeb A.

    2013-01-01

    Nest success is a critical determinant of the dynamics of avian populations, and nest survival modeling has played a key role in advancing avian ecology and management. Beginning with the development of daily nest survival models, and proceeding through subsequent extensions, the capacity for modeling the effects of hypothesized factors on nest survival has expanded greatly. We extend nest survival models further by introducing an approach to deal with incompletely observed, temporally varying covariates using a hierarchical model. Hierarchical modeling offers a way to separate process and observational components of demographic models to obtain estimates of the parameters of primary interest, and to evaluate structural effects of ecological and management interest. We built a hierarchical model for daily nest survival to analyze nest data from reintroduced whooping cranes (Grus americana) in the Eastern Migratory Population. This reintroduction effort has been beset by poor reproduction, apparently due primarily to nest abandonment by breeding birds. We used the model to assess support for the hypothesis that nest abandonment is caused by harassment from biting insects. We obtained indices of blood-feeding insect populations based on the spatially interpolated counts of insects captured in carbon dioxide traps. However, insect trapping was not conducted daily, and so we had incomplete information on a temporally variable covariate of interest. We therefore supplemented our nest survival model with a parallel model for estimating the values of the missing insect covariates. We used Bayesian model selection to identify the best predictors of daily nest survival. Our results suggest that the black fly Simulium annulus may be negatively affecting nest survival of reintroduced whooping cranes, with decreasing nest survival as abundance of S. annulus increases. The modeling framework we have developed will be applied in the future to a larger data set to evaluate the

  6. Research progress of Group Key Management for Multi-layered Satellite Networks%多层卫星网络组密钥管理研究进展

    Institute of Scientific and Technical Information of China (English)

    余哲赋; 周海刚; 吴兆峰; 朱晓薇

    2012-01-01

    为保证多层卫星网络的通信安全,使用组密钥对通信进行加密是一个普遍而有效的方法。设计适合卫星网络的组密钥管理方案,是确保卫星通信安全的关键问题之一。本文介绍了多层卫星网络的概况,对现有多层卫星网络组密钥管理方案进行了分类,详细分析了几类典型的组密钥管理方案,指出了存在的问题,并对以后的研究方向作了展望。%Encrypting the contents of communication by using group key is an universal and effective method to ensure the security of communication in the Multi-layered satellite networks,and the design of a group key management scheme suitable for satellite networks is one of the key problems.This article provides an introduction of multi-layered satellite networks and classifies the routing protocols.This paper details several existing typical group key management schemes,and points out the corresponding disadvantages.The trends of group key management for multi-layered satellite networks are analyzed briefly.

  7. Collaborative Hierarchical Sparse Modeling

    CERN Document Server

    Sprechmann, Pablo; Sapiro, Guillermo; Eldar, Yonina C

    2010-01-01

    Sparse modeling is a powerful framework for data analysis and processing. Traditionally, encoding in this framework is done by solving an l_1-regularized linear regression problem, usually called Lasso. In this work we first combine the sparsity-inducing property of the Lasso model, at the individual feature level, with the block-sparsity property of the group Lasso model, where sparse groups of features are jointly encoded, obtaining a sparsity pattern hierarchically structured. This results in the hierarchical Lasso, which shows important practical modeling advantages. We then extend this approach to the collaborative case, where a set of simultaneously coded signals share the same sparsity pattern at the higher (group) level but not necessarily at the lower one. Signals then share the same active groups, or classes, but not necessarily the same active set. This is very well suited for applications such as source separation. An efficient optimization procedure, which guarantees convergence to the global opt...

  8. Scientific information and the Tongass land management plan: key findings derived from the scientific literature, species assessments, resource analyses, workshops, and risk assessment panels.

    Science.gov (United States)

    Douglas N. Swanston; Charles G. Shaw; Winston P. Smith; Kent R. Julin; Guy A. Cellier; Fred H. Everest

    1996-01-01

    This document highlights key items of information obtained from the published literature and from specific assessments, workshops, resource analyses, and various risk assessment panels conducted as part of the Tongass land management planning process. None of this information dictates any particular decision; however, it is important to consider during decisionmaking...

  9. Hierarchical manifold learning.

    Science.gov (United States)

    Bhatia, Kanwal K; Rao, Anil; Price, Anthony N; Wolz, Robin; Hajnal, Jo; Rueckert, Daniel

    2012-01-01

    We present a novel method of hierarchical manifold learning which aims to automatically discover regional variations within images. This involves constructing manifolds in a hierarchy of image patches of increasing granularity, while ensuring consistency between hierarchy levels. We demonstrate its utility in two very different settings: (1) to learn the regional correlations in motion within a sequence of time-resolved images of the thoracic cavity; (2) to find discriminative regions of 3D brain images in the classification of neurodegenerative disease,

  10. Community turnover of wood-inhabiting fungi across hierarchical spatial scales.

    Science.gov (United States)

    Abrego, Nerea; García-Baquero, Gonzalo; Halme, Panu; Ovaskainen, Otso; Salcedo, Isabel

    2014-01-01

    For efficient use of conservation resources it is important to determine how species diversity changes across spatial scales. In many poorly known species groups little is known about at which spatial scales the conservation efforts should be focused. Here we examined how the community turnover of wood-inhabiting fungi is realised at three hierarchical levels, and how much of community variation is explained by variation in resource composition and spatial proximity. The hierarchical study design consisted of management type (fixed factor), forest site (random factor, nested within management type) and study plots (randomly placed plots within each study site). To examine how species richness varied across the three hierarchical scales, randomized species accumulation curves and additive partitioning of species richness were applied. To analyse variation in wood-inhabiting species and dead wood composition at each scale, linear and Permanova modelling approaches were used. Wood-inhabiting fungal communities were dominated by rare and infrequent species. The similarity of fungal communities was higher within sites and within management categories than among sites or between the two management categories, and it decreased with increasing distance among the sampling plots and with decreasing similarity of dead wood resources. However, only a small part of community variation could be explained by these factors. The species present in managed forests were in a large extent a subset of those species present in natural forests. Our results suggest that in particular the protection of rare species requires a large total area. As managed forests have only little additional value complementing the diversity of natural forests, the conservation of natural forests is the key to ecologically effective conservation. As the dissimilarity of fungal communities increases with distance, the conserved natural forest sites should be broadly distributed in space, yet the individual

  11. Community turnover of wood-inhabiting fungi across hierarchical spatial scales.

    Directory of Open Access Journals (Sweden)

    Nerea Abrego

    Full Text Available For efficient use of conservation resources it is important to determine how species diversity changes across spatial scales. In many poorly known species groups little is known about at which spatial scales the conservation efforts should be focused. Here we examined how the community turnover of wood-inhabiting fungi is realised at three hierarchical levels, and how much of community variation is explained by variation in resource composition and spatial proximity. The hierarchical study design consisted of management type (fixed factor, forest site (random factor, nested within management type and study plots (randomly placed plots within each study site. To examine how species richness varied across the three hierarchical scales, randomized species accumulation curves and additive partitioning of species richness were applied. To analyse variation in wood-inhabiting species and dead wood composition at each scale, linear and Permanova modelling approaches were used. Wood-inhabiting fungal communities were dominated by rare and infrequent species. The similarity of fungal communities was higher within sites and within management categories than among sites or between the two management categories, and it decreased with increasing distance among the sampling plots and with decreasing similarity of dead wood resources. However, only a small part of community variation could be explained by these factors. The species present in managed forests were in a large extent a subset of those species present in natural forests. Our results suggest that in particular the protection of rare species requires a large total area. As managed forests have only little additional value complementing the diversity of natural forests, the conservation of natural forests is the key to ecologically effective conservation. As the dissimilarity of fungal communities increases with distance, the conserved natural forest sites should be broadly distributed in space, yet

  12. Understanding the cognitive basis for human-wildlife relationships as a key to successful protected-area management

    DEFF Research Database (Denmark)

    Teel, Tara L.; Manfredo, Michael J.; Jensen, Frank Søndergaard

    2010-01-01

    underlying conservation effectiveness, including the nature of people's relationships with wildlife. These relationships stem from the cognitive foundation that shapes human behavior toward wildlife. Our theory of wildlife value orientations contents that, at an individual level, broad cultural ideals...... or value orientations form basis for more specific cognitions that in turn drive individual action. We extend this cognitive hierarchy framework to account for the rolke of societal forces that give rise to cultural values and their orientations over time. Using empirical data from two cases, we surview....... Hierarchical linear modeling of these data supports a societal-level shift from domination to mutualism in response to modernization. Second, a 2007-8 exploratory application of outdoor approach in ten European countries provides further evidence of the role of value orientations in shaping individual response...

  13. Hierarchically Structured Electrospun Fibers

    Directory of Open Access Journals (Sweden)

    Nicole E. Zander

    2013-01-01

    Full Text Available Traditional electrospun nanofibers have a myriad of applications ranging from scaffolds for tissue engineering to components of biosensors and energy harvesting devices. The generally smooth one-dimensional structure of the fibers has stood as a limitation to several interesting novel applications. Control of fiber diameter, porosity and collector geometry will be briefly discussed, as will more traditional methods for controlling fiber morphology and fiber mat architecture. The remainder of the review will focus on new techniques to prepare hierarchically structured fibers. Fibers with hierarchical primary structures—including helical, buckled, and beads-on-a-string fibers, as well as fibers with secondary structures, such as nanopores, nanopillars, nanorods, and internally structured fibers and their applications—will be discussed. These new materials with helical/buckled morphology are expected to possess unique optical and mechanical properties with possible applications for negative refractive index materials, highly stretchable/high-tensile-strength materials, and components in microelectromechanical devices. Core-shell type fibers enable a much wider variety of materials to be electrospun and are expected to be widely applied in the sensing, drug delivery/controlled release fields, and in the encapsulation of live cells for biological applications. Materials with a hierarchical secondary structure are expected to provide new superhydrophobic and self-cleaning materials.

  14. Intrusion Tolerance UWSN Key Management Scheme%容忍入侵的UWSN密钥管理方案

    Institute of Scientific and Technical Information of China (English)

    姜涛; 王良民

    2011-01-01

    Unattended wireless sensor network (UWSN) collects the sensing data by using mobile sinks (MSs). It could overcome the drawback of traditional center mode multi-hop wireless sensor networks in which the nodes near the base station will consume more energy. Unfortunately, UWSN are usually deployed in unreachable and hostile environments, where sensors can be easily compromised. Besides, MSs would be given too much privilege when acting as the base station, which will cause security concern if compromised. Thus, the security issues should be carefully addressed in order to deal with node compromise. In this paper, we present a novel key management scheme to secure UWSNs. We employ the Blundo symmetric polynomial mechanism to guard against the newly compromised nodes in a period while utilizing the periodic key updating based on the reverse hash chain to block the compromised nodes and revoke the compromised MSs when the authentication failed. We show that our scheme is robust against node compromised attacks basing on the knowledge of information entropy and carry out comparison analysis on the communication overhead, computing and storage consumptions.%无照料的无线传感器网(unattended wireless sensor networks,UWSN)通过移动汇聚节点定期收集数据,克服了传统中心模式无线传感器网络靠近基站节点能耗过大的不足.但是,移动节点自身也存在被物理俘获的可能性,而现有针对UWSN的密钥管理方案赋予移动节点权限过大,以及移动节点被俘后无法及时更新的瓶颈问题.因此提出了一种容忍入侵的UWSN密钥管理方案,方案针对以群组部署方式获取的层次式拓扑结构,结合Blundo二元对称多项式机制的容侵机制和反向Hash链技术的单向性,对网络运行过程中的节点会话密钥进行按需周期性更新.进一步研究证明,该方案可有效阻止变节节点继续参与正常网络节点通信,也可对被俘移动节点进行替换,避免了

  15. Hierarchical Management of Diabetes Patients in Family Physician Office%家庭医生工作室分级管理糖尿病患者的效果研究

    Institute of Scientific and Technical Information of China (English)

    张敏; 李虹; 陈华; 乌日娜; 蔡红月

    2014-01-01

    Objective To explore the effectiveness of hierarchical management model for diabetes patients in family physician office. Methods A total of 433 diabetes patients managed by" Zhangmin's Office" of Zhoujiaqiao Community Health Service Center from February 2013 to January 2014 were enrolled in this study. One questionnaire,1 laboratory examination,1 physical examination were performed in the patients managed by family physician' office before management and 1 year after. The awareness of diabetes-related knowledge and the control rate of diabetes were observed and compared before management and 1 year after. Results The patients' awareness of the significance of glycated hemoglobin,macrovascular complications,diabetic nephropathy,lack of exercises affecting blood sugar metabolism,high -glycemic -index food influencing glucose metabolism was higher 1 year after management than before(P0. 05 ). The control rates of fasting blood glucose and glycosylated hemoglobin were higher 1 year after management than before(P0. 05 ). Conclusion Hierarchical management of diabetes patients in family physician office can effectively improve the patients' awareness of diabetes-related knowledge and the control rate of diabetes management.%目的:探讨家庭医生工作室分级管理模式对糖尿病患者管理的效果。方法选取上海市周家桥街道社区卫生服务中心“张敏工作室”2013年2月—2014年1月运用家庭医生工作室分级管理的糖尿病患者433例为研究对象。患者在经家庭医生工作室分级管理前及管理后1年各进行1次问卷调查、实验室检查和体格检查。对比家庭医生工作室分级管理前及管理后1年患者对糖尿病相关知识的知晓率(包括糖尿病诊断标准,糖尿病并发症,糖化血红蛋白检测意义,缺乏锻炼影响血糖代谢,高糖指数食品摄入影响糖代谢)和糖尿病管理达标率(包括空腹血糖、糖化血红蛋白、体质指数达标

  16. A Study on Top Managers' Competency Evaluation for Better Action Conforming to Natural Rules based on the Hierarchical Structure%面向层次结构的高管胜任特征竞优评价研究

    Institute of Scientific and Technical Information of China (English)

    贾建锋; 赵希男; 朱珠; 孙世敏

    2013-01-01

    Multi-dimension and hierarchy are often reflected in the structure of top managers' competency. The existing methods of better action conforming to natural rules are suitable for single-layer structure and have not solved the problem with hierarchical structure yet. In order to consider conforming to the natural rule, the method of goal programming is adopted to construct identification model of individuality advantage for hierarchical structure and the solution to the model is developed. Based on the identification result of individuality advantadge, two evaluation methods are proposed, namely, agent evaluation and comprehensive evaluation, where methodology is further enriched and developed. The feasibility and practicability of method is verified through an application example.%高管胜任特征的结构不仅表现为多维性,而且体现出层次性,而现有的竞优评价方法只是针对单层结构的情境,尚未解决面向层次结构的竞优评价问题.基于此,以竞优思想为指导,采用目标规划方法构建面向层次结构的个性优势识别模型并给出了求解方法,基于对个性优势的识别结果,提出代理评价与综合评价方法,进一步丰富与发展了竞优评价的方法体系.通过一个应用算例说明了方法的可行性和实用性.

  17. Key success factors in full-service restaurants in Finland : A qualitative study on operation management and strategy

    OpenAIRE

    Tran, Hoa Quynh

    2011-01-01

    The objective of the study was to find out critical success factors relates to superior per-formance in restaurant businesses. The research scope focused on full-service restaurants in Finland. The research approach is qualitative. The theoretical part of the research covers critical success factor, service management and restaurant operation management. The empirical study includes results of two semi-structured face-to-face interviews conducted with res-taurant managers during the autu...

  18. Very low level waste disposal in France. A key tool for the management for decommissioning wastes in France

    Energy Technology Data Exchange (ETDEWEB)

    Duetzer, Michel [Andra - Agence Nationale pour la Gestion des Dechets Radioactives, Chatenay-Malabry (France). Direction Industrielle

    2015-07-01

    At the end of the 90{sup th}, France had to deal with the emerging issue of the management of wastes resulting from decommissioning operations of nuclear facilities. A specific regulation was issued and Andra, the French National Radioactive Waste Management Agency, developed a dedicated near surface disposal facility to accommodate very low level radioactive wastes. After more than 10 years of operation, this facility demonstrated it can provide efficient and flexible solutions for the management of decomissioning wastes.

  19. Key Management for Multilevel Security in Distributed Applications%分布式应用中的多级安全密钥管理

    Institute of Scientific and Technical Information of China (English)

    卿斯汉; 蒙杨; 刘克龙

    2001-01-01

    本文提出一种分布式应用中的多级安全密钥管理体制,该体制采用BELL-LaPadula模型作为多级安全存取控制策略,利用中国剩余定理,引入“主密钥因子”,“次密钥因子”,“写入因子”,构造会话密钥的共享信息,该体制具有高效,安全,动态的特点.这种体制有广泛的应用前景,有效的解决了网上会议,网上讨论等实际应用中的密钥管理问题.%A key management scheme for multilevel security in distributedapplications is presented.The scheme adopts BELL-LaPadula model as multilevel access control policies.We use Chinese Remainder Theorem,introduce the notions of first-secret-key-element,second-secret-key-element and writing-element,and construct sharing information of session key.The scheme is efficient,secure and dynamic.At the same time,there are many practical applications involving the scheme for key management such as meeting in the network and talking in the network etc.

  20. Water Governance Decentralisation and River Basin Management Reforms in Hierarchical Systems: Do They Work for Water Treatment Policy in Mexico’s Tlaxcala Atoyac Sub-Basin?

    Directory of Open Access Journals (Sweden)

    Cesar Casiano Flores

    2016-05-01

    Full Text Available In the last decades, policy reforms, new instruments development, and economic resources investment have taken place in water sanitation in Mexico; however, the intended goals have not been accomplished. The percentage of treated wastewater as intended in the last two federal water plans has not been achieved. The creation of River Basin Commissions and the decentralisation process have also faced challenges. In the case of Tlaxcala, the River Basin Commission exists only on paper and the municipalities do not have the resources to fulfil the water treatment responsibilities transferred to them. This lack of results poses the question whether the context was sufficiently considered when the reforms were enacted. In this research, we will study the Tlaxcala Atoyac sub-basin, where water treatment policy reforms have taken place recently with a more context sensitive approach. We will apply the Governance Assessment Tool in order to find out whether the last reforms are indeed apt for the context. The Governance Assessment Tool includes four qualities, namely extent, coherence, flexibility, and intensity. The assessment allows deeper understanding of the governance context. Data collection involved semi-structured in-depth interviews with stakeholders. The research concludes that the observed combination of qualities creates a governance context that partially supports the implementation of the policy. This has helped to increase the percentage of wastewater treated, but the water quality goals set by the River Classification have not been achieved. With the last reforms, in this hierarchical context, decreasing the participation of municipal government levels has been shown to be instrumental for improving water treatment plants implementation policy, although many challenges remain to be addressed.

  1. Detecting Hierarchical Structure in Networks

    DEFF Research Database (Denmark)

    Herlau, Tue; Mørup, Morten; Schmidt, Mikkel Nørgaard;

    2012-01-01

    a generative Bayesian model that is able to infer whether hierarchies are present or not from a hypothesis space encompassing all types of hierarchical tree structures. For efficient inference we propose a collapsed Gibbs sampling procedure that jointly infers a partition and its hierarchical structure......Many real-world networks exhibit hierarchical organization. Previous models of hierarchies within relational data has focused on binary trees; however, for many networks it is unknown whether there is hierarchical structure, and if there is, a binary tree might not account well for it. We propose....... On synthetic and real data we demonstrate that our model can detect hierarchical structure leading to better link-prediction than competing models. Our model can be used to detect if a network exhibits hierarchical structure, thereby leading to a better comprehension and statistical account the network....

  2. Context updates are hierarchical

    Directory of Open Access Journals (Sweden)

    Anton Karl Ingason

    2016-10-01

    Full Text Available This squib studies the order in which elements are added to the shared context of interlocutors in a conversation. It focuses on context updates within one hierarchical structure and argues that structurally higher elements are entered into the context before lower elements, even if the structurally higher elements are pronounced after the lower elements. The crucial data are drawn from a comparison of relative clauses in two head-initial languages, English and Icelandic, and two head-final languages, Korean and Japanese. The findings have consequences for any theory of a dynamic semantics.

  3. A Critical Evaluation of Phrónêsis as a Key Tool for Professional Excellence for Modern Managers

    Science.gov (United States)

    Thomas, Shinto

    2017-01-01

    Phrónêsis or practical wisdom is an important element of Aristotelian virtue ethics. This paper is an attempt to study what is meant by Phrónêsis, how it might be understood, reinterpreted, applied, and extended in contemporary professional management practice and its role in enhancing professional excellence in modern managers. Phrónêsis can…

  4. Generic hierarchical engine for mask data preparation

    Science.gov (United States)

    Kalus, Christian K.; Roessl, Wolfgang; Schnitker, Uwe; Simecek, Michal

    2002-07-01

    Electronic layouts are usually flattened on their path from the hierarchical source downstream to the wafer. Mask data preparation has certainly been identified as a severe bottleneck since long. Data volumes are not only doubling every year along the ITRS roadmap. With the advent of optical proximity correction and phase-shifting masks data volumes are escalating up to non-manageable heights. Hierarchical treatment is one of the most powerful means to keep memory and CPU consumption in reasonable ranges. Only recently, however, has this technique acquired more public attention. Mask data preparation is the most critical area calling for a sound infrastructure to reduce the handling problem. Gaining more and more attention though, are other applications such as large area simulation and manufacturing rule checking (MRC). They all would profit from a generic engine capable to efficiently treat hierarchical data. In this paper we will present a generic engine for hierarchical treatment which solves the major problem, steady transitions along cell borders. Several alternatives exist how to walk through the hierarchy tree. They have, to date, not been thoroughly investigated. One is a bottom-up attempt to treat cells starting with the most elementary cells. The other one is a top-down approach which lends itself to creating a new hierarchy tree. In addition, since the variety, degree of hierarchy and quality of layouts extends over a wide range a generic engine has to take intelligent decisions when exploding the hierarchy tree. Several applications will be shown, in particular how far the limits can be pushed with the current hierarchical engine.

  5. Microsoft Access Small Business Solutions State-of-the-Art Database Models for Sales, Marketing, Customer Management, and More Key Business Activities

    CERN Document Server

    Hennig, Teresa; Linson, Larry; Purvis, Leigh; Spaulding, Brent

    2010-01-01

    Database models developed by a team of leading Microsoft Access MVPs that provide ready-to-use solutions for sales, marketing, customer management and other key business activities for most small businesses. As the most popular relational database in the world, Microsoft Access is widely used by small business owners. This book responds to the growing need for resources that help business managers and end users design and build effective Access database solutions for specific business functions. Coverage includes::; Elements of a Microsoft Access Database; Relational Data Model; Dealing with C

  6. 46{sup th} Annual meeting on nuclear technology (AMNT 2015). Key topic / Enhanced safety and operation excellence / Sustainable reactor operation management - safe, efficient, valuable

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, Erwin [E.ON Kernkraft GmbH, Global Unit Next Generation, Hannover (Germany)

    2015-08-15

    Summary report on the following Topical Session of the 46{sup th} Annual Conference on Nuclear Technology (AMNT 2015) held in Berlin, 5 to 7 May 2015: - Sustainable Reactor Operation Management - Safe, Efficient, Valuable (Erwin Fischer) The other Sessions of the Key Topics - ''Outstanding Know-How and Sustainable Innovations'', - ''Enhanced Safety and Operation Excellence'' and - ''Decommissioning Experience and Waste Management Solutions'' have been covered in atw 7 (2015) and will be covered in further issues of atw.

  7. Evaluation of key driver categories influencing sustainable waste management development with the analytic hierarchy process (AHP): Serbia example.

    Science.gov (United States)

    Tot, Bojana; Srđević, Bojan; Vujić, Bogdana; Russo, Mário Augusto Tavares; Vujić, Goran

    2016-08-01

    The problems of waste management have become increasingly complex in recent decades. The increasing amount of generated waste, adopted legislation in the field of waste management, administrative issues, economic impacts and social awareness are important drivers in achieving a sustainable waste management system. However, in practice, there are many other drivers that are often mutually in conflict. The purpose of this research is to define the precise driver and their corresponding sub-drivers, which are relevant for developing a waste management system and, on the basis of their importance, to determine which has the predominant influence on the slow development of a waste management system at the national and regional level, within the Republic of Serbia and similar countries of southeast Europe. This research presents two levels of decision making: the first is a pair-wise comparison of the drivers in relation to the goal and the second is a pair-wise comparison of the sub-drivers in relation to the driver and in relation to the goal. Results of performed analyses on the waste management drivers were integrated via the decision-making process supported by an analytic hierarchy process (AHP). The final results of this research shows that the Institutional-Administrative driver is the most important for developing a sustainable waste management system.

  8. COLLABORATE©: a universal competency-based paradigm for professional case management, Part III: key considerations for making the paradigm shift.

    Science.gov (United States)

    Treiger, Teresa M; Fink-Samnick, Ellen

    2014-01-01

    The purpose of the third of this 3-article series is to provide context and justification for a new paradigm of case management built upon a value-driven foundation that * improves the patient's experience of health care delivery, * provides consistency in approach applicable across health care populations, and * optimizes the potential for return on investment. Applicable to all health care sectors where case management is practiced. In moving forward the one fact that rings true is there will be constant change in our industry. As the health care terrain shifts and new influences continually surface, there will be consequences for case management practice. These impacts require nimble clinical professionals in possession of recognized and firmly established competencies. They must be agile to frame (and reframe) their professional practice to facilitate the best possible outcomes for their patients. Case managers can choose to be Gumby or Pokey. This is exactly why the definition of a competency-based case management model's time has come, one sufficiently fluid to fit into any setting of care. The practice of case management transcends the vast array of representative professional disciplines and educational levels. A majority of current models are driven by business priorities rather than the competencies critical to successful practice and quality patient outcomes. This results in a fragmented professional case management identity. While there is inherent value in what each discipline brings to the table, this advanced model unifies behind case management's unique, strengths-based identity instead of continuing to align within traditional divisions (e.g., discipline, work setting, population served). This model fosters case management's expanding career advancement opportunities, including a reflective clinical ladder.

  9. An Unsupervised Model for Exploring Hierarchical Semantics from Social Annotations

    Science.gov (United States)

    Zhou, Mianwei; Bao, Shenghua; Wu, Xian; Yu, Yong

    This paper deals with the problem of exploring hierarchical semantics from social annotations. Recently, social annotation services have become more and more popular in Semantic Web. It allows users to arbitrarily annotate web resources, thus, largely lowers the barrier to cooperation. Furthermore, through providing abundant meta-data resources, social annotation might become a key to the development of Semantic Web. However, on the other hand, social annotation has its own apparent limitations, for instance, 1) ambiguity and synonym phenomena and 2) lack of hierarchical information. In this paper, we propose an unsupervised model to automatically derive hierarchical semantics from social annotations. Using a social bookmark service Del.icio.us as example, we demonstrate that the derived hierarchical semantics has the ability to compensate those shortcomings. We further apply our model on another data set from Flickr to testify our model's applicability on different environments. The experimental results demonstrate our model's efficiency.

  10. Key Management Scheme of Personal Cloud Computing%面向个人云计算的数据存储密钥管理方案

    Institute of Scientific and Technical Information of China (English)

    陈富汉; 柳毅; 余琦

    2011-01-01

    个人云计算是云服务中的一个新兴领域。在分析了目前密钥管理技术的特点后.提出一个面向个人云计算的数据存储密钥管理方案。方案不仅能够保障个人云中的数据安全.而且具有实现简单、计算量低的特点。%Personal cloud computing is one of the interesting and popular cloud services. After analyzing the characteristics of key management methods existed, presents a key management scheme of personal cloud computing. This scheme not only assures security of data in personal cloud but also owns simple implementation and low computation.

  11. Public Management and the Metagovernance of Hierarchies, Networks and Markets: The feasibility of designing and managing governance style combinations

    NARCIS (Netherlands)

    A.A.M. Meuleman (Louis)

    2008-01-01

    textabstractWhat is modern governance? Is it the battle against "oldfashioned" hierarchy, or is it the restoration of key hierarchical values? Is it optimizing network management, or maximizing the benefits of market thinking in the publicsector? This book argues that it is the combination of all

  12. 47{sup th} Annual meeting on nuclear technology (AMNT 2016). Key Topics / Enhanced safety and operation excellence and decommissioning experience and Waste management solutions

    Energy Technology Data Exchange (ETDEWEB)

    Salnikova, Tatiana [AREVA GmbH, Erlangen (Germany); Schaffrath, Andreas [Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) gGmbH, Garching (Germany)

    2016-10-15

    Summary report on the Key Topics ''Enhanced Safety and Operation Excellence'' and ''Decommissioning Experience and Waste Management Solutions'' of the 47{sup th} Annual Conference on Nuclear Technology (AMNT 2016) held in Hamburg, 10 to 12 May 2016. Other Sessions of AMNT 2016 have been and will be covered in further issues of atw.

  13. THOUGHTS AND EXPERIENCES IN KEY ACCOUNT MANAGEMENT OF BUILDING ENTERPRISE%建筑企业“大客户”管理的思路和经验

    Institute of Scientific and Technical Information of China (English)

    张传成; 刘晶波

    2012-01-01

    Key Account of architectural industry has special characteristics and is different from that of traditional industries. Based on the characteristics of building enterprise, concept, characteristics and classification of Key Account as well as how to implement Key Account management are discussed, and some thoughts and experiences are put forward for reference.%建筑业的“大客户”不同于其他传统产业,具有其特殊性.结合建筑企业的自身特点,探讨“大客户”概念、特点与分类,以及建筑企业如何实施“大客户”管理,最后提出一些可供借鉴的思路和经验.

  14. 2007 - 2008 Florida Division of Emergency Management (FDEM) Lidar Project: Blocks 1 - 10 (Southeast Florida and Keys)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This Light Detection and Ranging (LiDAR) LAS dataset is a topographic survey conducted for the State of Florida Division of Emergency Management LiDAR Project. These...

  15. Extending stakeholder theory to promote resource management initiatives to key stakeholders: a case study of water transfers in Alberta, Canada.

    Science.gov (United States)

    Lafreniere, Katherine C; Deshpande, Sameer; Bjornlund, Henning; Hunter, M Gordon

    2013-11-15

    Many attempts to implement resource management initiatives in Canadian and international communities have been resisted by stakeholders despite inclusion of their representatives in the decision-making process. Managers' failure to understand stakeholders' perspectives when proposing initiatives is a potential cause of this resistance. Our study uses marketing thought to enhance stakeholder theory by bringing in an audience-centric perspective. We attempt to understand how stakeholders perceive their interests in an organization and consequently decide how to influence that organization. By doing so, we investigate whether a disconnect exists between the perceptions of managers and those of stakeholders. Natural resource managers can utilize this knowledge to garner stakeholder support for the organization and its activities. We support this claim with findings from a water transfer plebiscite held in the Canadian province of Alberta. Sixteen personal interviews employing narrative inquiry were conducted to document voters' (i.e., irrigators') interpretations.

  16. Defense Logistics. Lack of Key Information May Impede DOD’s Ability to Improve Supply Chain Management

    Science.gov (United States)

    2009-01-01

    Military operations in Iraq and Afghanistan have focused attention on the performance of the Department of Defense’s (DOD) supply chain management...According to DOD, it spent approximately $178 billion on its supply chain in fiscal year 2007. As a result of weaknesses in DOD’s management of its... supply chain , this area has been on GAO’s list of high-risk federal government programs since 1990. DOD released its Logistics Roadmap in July 2008 to

  17. Human Capital. Monitoring of Safeguards and Addressing Employee Perceptions Are Key to Implementing a Civilian Performance Management System in DOD

    Science.gov (United States)

    2009-10-01

    on employee motivation and morale, (2) the excessive amount of time spent navigating the performance management process, (3) challenges with job...supervisors continue to have consistent concerns and negative perceptions of NSPS. These included the following: (1) NSPS’s negative impact on employee ... motivation and morale; (2) the excessive amount of time spent navigating the performance management process; (3) challenges with job objectives; (4

  18. Hierarchical Agent-Based Integrated Modelling Approach for Microgrids with Adoption of EVs and HRES

    Directory of Open Access Journals (Sweden)

    Peng Han

    2014-01-01

    Full Text Available The large adoption of electric vehicles (EVs, hybrid renewable energy systems (HRESs, and the increasing of the loads shall bring significant challenges to the microgrid. The methodology to model microgrid with high EVs and HRESs penetrations is the key to EVs adoption assessment and optimized HRESs deployment. However, considering the complex interactions of the microgrid containing massive EVs and HRESs, any previous single modelling approaches are insufficient. Therefore in this paper, the methodology named Hierarchical Agent-based Integrated Modelling Approach (HAIMA is proposed. With the effective integration of the agent-based modelling with other advanced modelling approaches, the proposed approach theoretically contributes to a new microgrid model hierarchically constituted by microgrid management layer, component layer, and event layer. Then the HAIMA further links the key parameters and interconnects them to achieve the interactions of the whole model. Furthermore, HAIMA practically contributes to a comprehensive microgrid operation system, through which the assessment of the proposed model and the impact of the EVs adoption are achieved. Simulations show that the proposed HAIMA methodology will be beneficial for the microgrid study and EV’s operation assessment and shall be further utilized for the energy management, electricity consumption prediction, the EV scheduling control, and HRES deployment optimization.

  19. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  20. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.