WorldWideScience

Sample records for hierarchical key management

  1. A Hierarchical structure of key performance indicators for operation management and continuous improvement in production systems.

    Science.gov (United States)

    Kang, Ningxuan; Zhao, Cong; Li, Jingshan; Horst, John A

    2016-01-01

    Key performance indicators (KPIs) are critical for manufacturing operation management and continuous improvement (CI). In modern manufacturing systems, KPIs are defined as a set of metrics to reflect operation performance, such as efficiency, throughput, availability, from productivity, quality and maintenance perspectives. Through continuous monitoring and measurement of KPIs, meaningful quantification and identification of different aspects of operation activities can be obtained, which enable and direct CI efforts. A set of 34 KPIs has been introduced in ISO 22400. However, the KPIs in a manufacturing system are not independent, and they may have intrinsic mutual relationships. The goal of this paper is to introduce a multi-level structure for identification and analysis of KPIs and their intrinsic relationships in production systems. Specifically, through such a hierarchical structure, we define and layer KPIs into levels of basic KPIs, comprehensive KPIs and their supporting metrics, and use it to investigate the relationships and dependencies between KPIs. Such a study can provide a useful tool for manufacturing engineers and managers to measure and utilize KPIs for CI.

  2. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  3. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  4. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  5. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  6. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  7. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  8. Translating Management Practices in Hierarchical Organizations

    DEFF Research Database (Denmark)

    Wæraas, Arild; Nielsen, Jeppe Agger

    structures affect translators’ approaches taken towards management ideas. This paper reports the findings from a longitudinal case study of the translation of Leadership Pipeline in a Danish fire department and how the translators’ approach changed over time from a modifying to a reproducing mode. The study......This study examines how translators in a hierarchical context approach the translation of management practices. Although current translation theory and research emphasize the importance of contextual factors in translation processes, little research has investigated how strongly hierarchical...... finds that translation does not necessarily imply transformation of the management idea, pointing instead to aspects of exact imitation and copying of an ”original” idea. It also highlights how translation is likely to involve multiple and successive translation modes and, furthermore, that strongly...

  9. Creativity Management Key Elements

    Directory of Open Access Journals (Sweden)

    Rosa María Fuchs Ángeles

    2015-09-01

    Full Text Available Organizations are constantly looking towards innovation. In order to reach it they must foment creativity. This paper analyzes a series of elements considered in the organizational creativity management and proposes a model with the indispensable factors that organizations should consider to reach it. These elements are: culture and organizational environment, strategy, structure, communication, relation with customers, human resources (recruiting, training, job design, compensation, promotion, and performance evaluation, long term orientation and the organizational life cycle. Having the analysis of those elements as a basis, the indispensable pillars on management creativity are identified. The proposed model is based on 5 pillars: the alignment between strategic, culture and organizational structure, called by the authors 'Holy Trinity'; intern publicity; customer’s voice; recognition and a look towards future. Finally, the case of an innovative Peruvian enterprise is presented from the model’s perspective and the study conclusions.

  10. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  11. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  12. Discursive Hierarchical Patterning in Law and Management Cases

    Science.gov (United States)

    Lung, Jane

    2008-01-01

    This paper investigates the differences in the discursive patterning of cases in Law and Management. It examines a corpus of 271 Law and Management cases and discusses the kind of information that these two disciplines call for and how discourses are constructed in discursive hierarchical patterns. A discursive hierarchical pattern is a model…

  13. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  14. Hierarchical Trust Management of COI in Heterogeneous Mobile Networks

    Science.gov (United States)

    2017-08-01

    Report: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks The views, opinions and/or findings contained in this report are those of...Institute & State University Title: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks Report Term: 0-Other Email: irchen@vt.edu...Reconfigurability, Survivability and Intrusion Tolerance for Community of Interest (COI) Applications – Our proposed COI trust management protocol will

  15. Evaluating a Bilingual Text-Mining System with a Taxonomy of Key Words and Hierarchical Visualization for Understanding Learner-Generated Text

    Science.gov (United States)

    Kong, Siu Cheung; Li, Ping; Song, Yanjie

    2018-01-01

    This study evaluated a bilingual text-mining system, which incorporated a bilingual taxonomy of key words and provided hierarchical visualization, for understanding learner-generated text in the learning management systems through automatic identification and counting of matching key words. A class of 27 in-service teachers studied a course…

  16. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  17. SUPPLY CHAIN MANAGEMENTKEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  18. Hierarchical Portfolio Management: Theory and Applications

    NARCIS (Netherlands)

    H. Ning (Haikun)

    2007-01-01

    textabstractUnder his own preference, how should an investor coordinate the asset managers such that his aggregated portfolio is optimized? The efficiency of each managed sub portfolio and the aggregation of all the sub portfolios are the 2 main underlying problems considered in this dissertation.

  19. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    Directory of Open Access Journals (Sweden)

    Hyunsung Kim

    2014-12-01

    Full Text Available The digitization of patient health information (PHI for wireless health monitoring systems (WHMSs has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient’s PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient’s privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks.

  20. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    Science.gov (United States)

    Kim, Hyunsung

    2014-01-01

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks. PMID:25513824

  1. SUPPLY CHAIN MANAGEMENTKEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  2. 6 Keys to Identity Management

    Science.gov (United States)

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  3. Key characteristics of different management styles

    OpenAIRE

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  4. Development of balanced key performance indicators for emergency departments strategic dashboards following analytic hierarchical process.

    Science.gov (United States)

    Safdari, Reza; Ghazisaeedi, Marjan; Mirzaee, Mahboobeh; Farzi, Jebrail; Goodini, Azadeh

    2014-01-01

    Dynamic reporting tools, such as dashboards, should be developed to measure emergency department (ED) performance. However, choosing an effective balanced set of performance measures and key performance indicators (KPIs) is a main challenge to accomplish this. The aim of this study was to develop a balanced set of KPIs for use in ED strategic dashboards following an analytic hierarchical process. The study was carried out in 2 phases: constructing ED performance measures based on balanced scorecard perspectives and incorporating them into analytic hierarchical process framework to select the final KPIs. The respondents placed most importance on ED internal processes perspective especially on measures related to timeliness and accessibility of care in ED. Some measures from financial, customer, and learning and growth perspectives were also selected as other top KPIs. Measures of care effectiveness and care safety were placed as the next priorities too. The respondents placed least importance on disease-/condition-specific "time to" measures. The methodology can be presented as a reference model for development of KPIs in various performance related areas based on a consistent and fair approach. Dashboards that are designed based on such a balanced set of KPIs will help to establish comprehensive performance measurements and fair benchmarks and comparisons.

  5. The Key to Risk Management: Management

    OpenAIRE

    Adrian E. Tschoegl

    2000-01-01

    The Barings, Daiwa Bank and Sumitomo Corp. financial debacles in the mid-1990s suggest that management failures rather than misfortune, errors, or complexity are a major source of the risk of financial debacles. These errors are systematic and are a concommittant of the structure of trading and of human nature. Risk management systems must take these facts into account.

  6. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  7. Optimal grazing management strategies: evaluating key concepts ...

    African Journals Online (AJOL)

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  8. UNCERTAINTY HANDLING IN DISASTER MANAGEMENT USING HIERARCHICAL ROUGH SET GRANULATION

    Directory of Open Access Journals (Sweden)

    H. Sheikhian

    2015-08-01

    Full Text Available Uncertainty is one of the main concerns in geospatial data analysis. It affects different parts of decision making based on such data. In this paper, a new methodology to handle uncertainty for multi-criteria decision making problems is proposed. It integrates hierarchical rough granulation and rule extraction to build an accurate classifier. Rough granulation provides information granules with a detailed quality assessment. The granules are the basis for the rule extraction in granular computing, which applies quality measures on the rules to obtain the best set of classification rules. The proposed methodology is applied to assess seismic physical vulnerability in Tehran. Six effective criteria reflecting building age, height and material, topographic slope and earthquake intensity of the North Tehran fault have been tested. The criteria were discretized and the data set was granulated using a hierarchical rough method, where the best describing granules are determined according to the quality measures. The granules are fed into the granular computing algorithm resulting in classification rules that provide the highest prediction quality. This detailed uncertainty management resulted in 84% accuracy in prediction in a training data set. It was applied next to the whole study area to obtain the seismic vulnerability map of Tehran. A sensitivity analysis proved that earthquake intensity is the most effective criterion in the seismic vulnerability assessment of Tehran.

  9. Multifaceted Modularity: A Key for Stepwise Building of Hierarchical Complexity in Actinide Metal–Organic Frameworks

    Energy Technology Data Exchange (ETDEWEB)

    Dolgopolova, Ekaterina A. [Department; Ejegbavwo, Otega A. [Department; Martin, Corey R. [Department; Smith, Mark D. [Department; Setyawan, Wahyu [Pacific Northwest National Laboratory, Richland, Washington 99352, United States; Karakalos, Stavros G. [College; Henager, Charles H. [Pacific Northwest National Laboratory, Richland, Washington 99352, United States; zur Loye, Hans-Conrad [Department; Shustova, Natalia B. [Department

    2017-11-07

    Growing necessity for efficient nuclear waste management is a driving force for development of alternative architectures towards fundamental understanding of mechanisms involved in actinide integration inside extended structures. In this manuscript, metal-organic frameworks (MOFs) were investigated as a model system for engineering radionuclide containing materials through utilization of unprecedented MOF modularity, which cannot be replicated in any other type of materials. Through the implementation of recent synthetic advances in the MOF field, hierarchical complexity of An-materials were built stepwise, which was only feasible due to preparation of the first examples of actinide-based frameworks with “unsaturated” metal nodes. The first successful attempts of solid-state metathesis and metal node extension in An-MOFs are reported, and the results of the former approach revealed drastic differences in chemical behavior of extended structures versus molecular species. Successful utilization of MOF modularity also allowed us to structurally characterize the first example of bimetallic An-An nodes. To the best of our knowledge, through combination of solid-state metathesis, guest incorporation, and capping linker installation, we were able to achieve the highest Th wt% in mono- and bi-actinide frameworks with minimal structural density. Overall, combination of a multistep synthetic approach with homogeneous actinide distribution and moderate solvothermal conditions could make MOFs an exceptionally powerful tool to address fundamental questions responsible for chemical behavior of An-based extended structures, and therefore, shed light on possible optimization of nuclear waste administration.

  10. Hierarchical energy management mechanisms for an electricity market with microgrids

    Directory of Open Access Journals (Sweden)

    Hong-Tzer Yang

    2014-08-01

    Full Text Available This study addresses a micro-grid electricity market (MGEM with day-ahead (DA and real-time market mechanisms integrated. The bidding mechanisms for the market are described in this study, considering the generation cost of different distributed energy resources (DERs, like distributed generator, energy storage system and demand response. Including load and renewable generation forecasting systems and a fuzzy decision supporting system, a hierarchical micro-grid energy management system (MG-EMS is then proposed to ensure the benefits of involved micro-grid central controller, DER owners and customers. To verify the feasibility of the proposed system, the whole-year historical pricing and load data for New England independent system operator are employed. The numerical results show that the proposed MG-EMS is promising and effective for the operations of MGEM.

  11. Talent Management: Working lines and key processes

    Directory of Open Access Journals (Sweden)

    Alvaro Alonso

    2014-12-01

    Full Text Available Purpose: Talent management represents today a challenge for companies, since the contribution of value comes increasingly from the area of intangible capital. The current paradigm of expanding technology and competitive dynamics, makes talent management that companies realize a critical success factor in today's markets. However, there is no generally accepted theoretical framework and empirical studies sufficient to demonstrate the role of talent management in creating competitive advantage. Therefore, the first objective of this paper is to analyze the evolution of talent management, to understand more deeply their fundamental dimensions: people and key positions in the organization. From these dimensions, as a second objective of the research is proposed to classify and characterize the literature about four alternative ways of study, according to the treatment they receive such dimensions and thus improve understanding of the role of talent management in business strategyDesign/methodology: To develop this paper we have selected the major contributions to the field of talent management, with particular emphasis on certain meta-analysis very quoted by the scientific community (Lewis and Heckman, 2006; Mellahi and Collings, 2009; Tarique and Schuler, 2010. In addition we have select additional papers published in high impact journals seen in ABI/Inform, Science Direct, SCOPUS, and EBSCO (Business Source Complete, through the keywords "Gestion del talento", "Plan de Gestion del Talento" and "Modelo de Gestion de Talento" and its English equivalent "Talent Management ", "Talent Management Plans/Systems" and "Talent Management Framework/Model ".Findings: From this review, we extracted the existence of different ways of understanding and talent management apply in organizations and even different understandings of what is talent itself. For this, we describe the basic dimensions of talent management (people and key positions and four alternative

  12. Key personality traits of sales managers.

    Science.gov (United States)

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  13. Hierarchical Energy Management of Microgrids including Storage and Demand Response

    Directory of Open Access Journals (Sweden)

    Songli Fan

    2018-05-01

    Full Text Available Battery energy storage (BES and demand response (DR are considered to be promising technologies to cope with the uncertainty of renewable energy sources (RES and the load in the microgrid (MG. Considering the distinct prediction accuracies of the RES and load at different timescales, it is essential to incorporate the multi-timescale characteristics of BES and DR in MG energy management. Under this background, a hierarchical energy management framework is put forward for an MG including multi-timescale BES and DR to optimize operation with the uncertainty of RES as well as load. This framework comprises three stages of scheduling: day-ahead scheduling (DAS, hour-ahead scheduling (HAS, and real-time scheduling (RTS. In DAS, a scenario-based stochastic optimization model is established to minimize the expected operating cost of MG, while ensuring its safe operation. The HAS is utilized to bridge DAS and RTS. In RTS, a control strategy is proposed to eliminate the imbalanced power owing to the fluctuations of RES and load. Then, a decomposition-based algorithm is adopted to settle the models in DAS and HAS. Simulation results on a seven-bus MG validate the effectiveness of the proposed methodology.

  14. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  15. SARS: Key factors in crisis management.

    Science.gov (United States)

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  16. Key policy choices in groundwater quality management

    International Nuclear Information System (INIS)

    Batie, S.S.; Diebel, P.L.

    1990-01-01

    The fundamental policy choice of who has the right to do what to whom is a pivotal issue of governance. Over the last few decades, the answer to that question has become more restrictive to those who own and use natural resources as inputs into production processes. Increasingly, the beneficiaries of new policy initiatives are those who desire higher protection of groundwater quality. With respect to groundwater management, policy design increasingly reflects such diverse interests as agriculturists, industrialists, homeowners, local government officials and state officials. Policy design is becoming complex, in part because of this diversity and in part because scientific uncertainty hampers informed policy design. No umbrella federal legislation exists for managing groundwater resources. EPA's role has been mainly an advisory one on groundwater issues. The difficulties and responsibilities of protecting groundwater thus remain with the states. For the near future, it is the states that will address key policy choices with respect to groundwater quality management issues

  17. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  18. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  19. Preventing Distribution Grid Congestion by Integrating Indirect Control in a Hierarchical Electric Vehicles Management System

    DEFF Research Database (Denmark)

    Hu, Junjie; Si, Chengyong; Lind, Morten

    2016-01-01

    In this paper, a hierarchical management system is proposed to integrate electric vehicles (EVs) into a distribution grid. Three types of actors are included in the system: Distribution system operators (DSOs), Fleet operators (FOs) and EV owners. In contrast to a typical hierarchical control sys...

  20. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  1. Hierarchical Planning Methodology for a Supply Chain Management

    Directory of Open Access Journals (Sweden)

    Virna ORTIZ-ARAYA

    2012-01-01

    Full Text Available Hierarchical production planning is a widely utilized methodology for real world capacitated production planning systems with the aim of establishing different decision–making levels of the planning issues on the time horizon considered. This paper presents a hierarchical approach proposed to a company that produces reusable shopping bags in Chile and Perú, to determine the optimal allocation of resources at the tactical level as well as over the most immediate planning horizon to meet customer demands for the next weeks. Starting from an aggregated production planning model, the aggregated decisions are disaggregated into refined decisions in two levels, using a couple of optimization models that impose appropriate constraints to keep coherence of the plan on the production system. The main features of the hierarchical solution approach are presented.

  2. Uniformity: The key to better inventory management

    International Nuclear Information System (INIS)

    Boshears, G.

    1993-01-01

    The objective of this paper is to show how uniformity in describing parts and materials can be the key ingredient to more effective inventory management. Although most nuclear utilities have some type of computer system for maintenance management as well as materials tracking, few have a system to provide the various users with complete information about parts and material in stock. One of the industry's most perplexing problems is How do you know, and find, the item you need to repair a particular piece of equipment or component? In many instances it is easier to order a new one from the manufacturer rather than try to find it on-site, which can result in inaccurate usage records, over-stocking, frustration, and strain on cash flow. What is needed is a higher degree of uniformity within a station, and a utility, of catalog descriptions for parts and material that will satisfy all users-planners, craftsmen, warehouse personnel, and buyers. The results of attaining this uniformity are improved performance through searchability, duplicate stock avoidance, interchangeability, substitutability, and more accurate bills of material; economic benefits will also be noted

  3. Outreach: Key to Sustainable Nuclear Knowledge Management

    International Nuclear Information System (INIS)

    Segovia, V.

    2016-01-01

    Full text: With the numerous nuclear power plants being built globally and the prospects for many more, the challenge of the timely availability of a well-prepared, qualified, knowledgeable workforce is a key element in the “critical path” to commissioning these plants. All of these individuals will need quality education and training that is rooted in safety and established in experience. In addition, because many of these new plants are typically being built in developing countries, education, training, recruiting and retaining operations staff can be a significant challenge. Attracting sources of qualified employees for these nuclear power plants in local communities is paramount which implies a strong focus on the science and math education outreach programmes at all levels. This paper will highlight the Nuclear Power Institute’s integration of human resource development outreach strategies, education and training systems, and international cooperation to demonstrate how working in particular with the education sector can not only create interest in future careers in nuclear technology and capture valuable knowledge, but can also build community based support for nuclear power programmes with an emphasis of developing competent workers through education and training, mentoring and apprenticeships. Outreach has also become an important element of all nuclear knowledge management endeavours. (author

  4. An SSH key management system: easing the pain of managing key/user/account associations

    Science.gov (United States)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  5. An SSH key management system: easing the pain of managing key/user/account associations

    International Nuclear Information System (INIS)

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  6. Perceptions of food risk management among key stakeholders

    DEFF Research Database (Denmark)

    van Kleef, Ellen; Frewer, Lynn J.; Chryssochoidis, George M.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management.......In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management....

  7. Water management as a key component of integrated weed management

    Directory of Open Access Journals (Sweden)

    Antonio Berti

    2010-09-01

    Full Text Available Water management within the cropping system is a key factor for an integrated weed management. Soil moisture affects seed persistence and seed dormancy, thus influencing their germination, the establishment of seedlings as well as the competition at adult stage and the number, vitality and dormancy of the new seeds produced by the weeds. The interactions among water availability and competition are very complex and still not fully understood. A research effort in this sector should the be very relevant for the development of new approaches of weed management, such as “Ecological weed management”, aiming to reduce weed density and competitiveness and, in the medium term, to prevent undesired modifications of the weed flora.

  8. Research of user key management mechanisms in the cloud

    Directory of Open Access Journals (Sweden)

    Іван Федорович Аулов

    2016-06-01

    Full Text Available The results of comparison and recommendations on the use of existing user key management mechanisms in the cloud environment are given. New generation and installing mechanism of a private key pair between the N-means of key management in the cloud by using a modified Diffie-Hellman protocol is proposed

  9. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  10. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  11. INFOGRAPHIC MODELING OF THE HIERARCHICAL STRUCTURE OF THE MANAGEMENT SYSTEM EXPOSED TO AN INNOVATIVE CONFLICT

    Directory of Open Access Journals (Sweden)

    Chulkov Vitaliy Olegovich

    2012-12-01

    Full Text Available This article deals with the infographic modeling of hierarchical management systems exposed to innovative conflicts. The authors analyze the facts that serve as conflict drivers in the construction management environment. The reasons for innovative conflicts include changes in hierarchical structures of management systems, adjustment of workers to new management conditions, changes in the ideology, etc. Conflicts under consideration may involve contradictions between requests placed by customers and the legislation, any risks that may originate from the above contradiction, conflicts arising from any failure to comply with any accepted standards of conduct, etc. One of the main objectives of the theory of hierarchical structures is to develop a model capable of projecting potential innovative conflicts. Models described in the paper reflect dynamic changes in patterns of external impacts within the conflict area. The simplest model element is a monad, or an indivisible set of characteristics of participants at the pre-set level. Interaction between two monads forms a diad. Modeling of situations that involve a different number of monads, diads, resources and impacts can improve methods used to control and manage hierarchical structures in the construction industry. However, in the absence of any mathematical models employed to simulate conflict-related events, processes and situations, any research into, projection and management of interpersonal and group-to-group conflicts are to be performed in the legal environment

  12. Determinants of Key Account Management Effectiveness: The Case ...

    African Journals Online (AJOL)

    Dires Abebe Fenta

    maintaining enhanced relationships with strategic business customers named as. 'key accounts'. ... Key account management is one mechanism of treating strategic ..... Considering this report, correlation statistics was undergone to check the.

  13. Fire management over large landscapes: a hierarchical approach

    Science.gov (United States)

    Kenneth G. Boykin

    2008-01-01

    Management planning for fires becomes increasingly difficult as scale increases. Stratification provides land managers with multiple scales in which to prepare plans. Using statistical techniques, Geographic Information Systems (GIS), and meetings with land managers, we divided a large landscape of over 2 million acres (White Sands Missile Range) into parcels useful in...

  14. Nonverbal Cues: The Key to Classroom Management.

    Science.gov (United States)

    Petrie, Garth; Lindauer, Patricia; Bennett, Brenda; Gibson, Sherri

    1998-01-01

    Principals should familiarize teachers with the benefits of nonverbal procedures for classroom management and discipline enforcement. A behavior-management checklist of nonverbal techniques (eye contact, touching, smiling, and frowning) can be used in a series of short visits. At least 75% of control techniques should be nonverbal. Relying on…

  15. Key Intersections between HRD and Management

    Science.gov (United States)

    Egan, Toby M.

    2011-01-01

    This article is in part inspired by an HRD director's insight that his HRD staff should view themselves as HRD Family Doctors, suggesting that a doctor-patient relationship was similar in many respects to the HRD-manager consulting relationship. Although that is possible in some organizations, the author's interviews with corporate managers and…

  16. A Hierarchical Transactive Energy Management System for Energy Sharing in Residential Microgrids

    Directory of Open Access Journals (Sweden)

    Most Nahida Akter

    2017-12-01

    Full Text Available This paper presents an analytical framework to develop a hierarchical energy management system (EMS for energy sharing among neighbouring households in residential microgrids. The houses in residential microgrids are categorized into three different types, traditional, proactive and enthusiastic, based on the inclusion of solar photovoltaic (PV systems and battery energy storage systems (BESSs. Each of these three houses has an individual EMS, which is defined as the primary EMS. Two other EMSs (secondary and tertiary are also considered in the proposed hierarchical energy management framework for the purpose of effective energy sharing. The intelligences of each EMS are presented in this paper for the purpose of energy sharing in a residential microgrid along with the priorities. The effectiveness of the proposed hierarchical framework is evaluated on a residential microgrid in Australia. The analytical results clearly reflect that the proposed scheme effectively and efficiently shares the energy among neighbouring houses in a residential microgrid.

  17. Socialization as key process in knowledge management

    Directory of Open Access Journals (Sweden)

    Francisco José GARCÍA-PEÑALVO

    2016-07-01

    Full Text Available The editorial of this second issue of volume 17,corresponding to 2016, is devoted to socialization process in the knowledge management in order to complement the special section about Social Networks and Education.

  18. Energy Management Systems and tertiary regulation in hierarchical control architectures for islanded micro-grids

    DEFF Research Database (Denmark)

    Sanseverino, Eleonora Riva; Di Silvestre, Maria Luisa; Quang, Ninh Nguyen

    2015-01-01

    In this paper, the structure of the highest level of a hierarchical control architecture for micro-grids is proposed. Such structure includes two sub-levels: the Energy Management System, EMS, and the tertiary regulation. The first devoted to energy resources allocation in each time slot based...

  19. Environmental conflicts: Key issues and management implications ...

    African Journals Online (AJOL)

    Environmental crises and problems throughout the world are widespread and increasing rapidly. In relation to these concerns, the article discusses the following aspects: people and the environment, environmental conflicts, climate change and environmental conflicts, and management implications. The section on people ...

  20. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  1. Careful assessment key in managing prostatitis.

    Science.gov (United States)

    Gujadhur, Rahul; Aning, Jonathan

    2015-04-01

    Prostatitis is a common condition estimated to affect up to 30% of men in their lifetime, it is most prevalent in men aged between 35 and 50. Prostatitis is subclassified into: acute bacterial prostatitis, chronic bacterial prostatitis, chronic pelvic pain and asymptomatic inflammatory prostatitis. Acute bacterial prostatitis presents with acute onset pelvic pain which may or may not be related to voiding, lower urinary tract symptoms, sometimes haematuria or haematospermia and systemic symptoms such as fever and rigors. A documented history of recurrent urinary tract infections is the key feature of chronic bacterial prostatitis. Duration of symptoms > 3 months defines chronicity. The key symptom of chronic pelvic pain syndrome is pain. Patients may describe pain during or after ejaculation as their predominant symptom. Clinical assessment includes a thorough history and examination. A digital rectal examination should be performed after a midstream urine (MSU) sample has been collected for urine dipstick, microscopy and culture. The prostate should be checked for nodules. In acute bacterial prostatitis the MSU is the only laboratory investigation required. Chronic pelvic pain syndrome may be multifactorial and part of a more generalised pain disorder. Pelvic floor muscle abnormalities, altered neuroendocrine pathways, chemically induced inflammation, bacterial infection, autoimmune processes, dysfunctional voiding as well intraprostatic ductal reflux mechanisms have all been identified in men with chronic pelvic pain syndrome.

  2. Secure Key Management in the Cloud

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  3. Risk management of key issues of FPSO

    Science.gov (United States)

    Sun, Liping; Sun, Hai

    2012-12-01

    Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offloading system and fire accidents were analyzed based on the floating production, storage and offloading (FPSO) features. Fault tree analysis (FTA), and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS). Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases, statistical data, and risk control measures examined. Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process, using risk priority number (RPN) methods to evaluate their severity rank. The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offloading, and the fire FMEA gave the priorities and suggested processes. The research has practical importance for the security analysis problems of FPSO.

  4. Managing clinical education through understanding key principles.

    Science.gov (United States)

    Cunningham, Joanne; Wright, Caroline; Baird, Marilyn

    2015-01-01

    Traditionally, a practicum facilitated the integration of on-campus learning and practical workplace training. Over the past 3 decades, an educative practicum has evolved that promotes clinical reasoning, including analytical and evaluative abilities, through reflective practice. Anecdotal evidence indicates that the delivery of clinical education within medical radiation science entry-level programs continues to vacillate between traditional practicums and the new reflective practicums. To review the literature about clinical education within the medical radiation sciences and identify key principles for practitioners seeking to reflect upon and improve their approach to teaching and supporting students in the clinical environment. A search of 3 major journal databases, Internet searches, and hand searches of reference lists were conducted to identify literature about clinical education in the medical radiation sciences from January 1, 2000, to December 31, 2012. Twenty-two studies were included in this review. The 5 key elements associated with clinical education include the clinical support model and quality, overcoming the theory-practice gap, learning outcomes and reliable and valid assessment, preparing and supporting students, and accommodating differing teaching and learning needs. Many factors influence the quality of clinical education, including the culture of the clinical environment and clinical leadership roles. Several approaches can help students bridge the theory-practice gap, including simulators, role-playing activities, and reflective journals. In addition, clinical educators should use assessment strategies that objectively measure student progress, and they should be positive role models for their students. The successful clinical education of students in the medical radiation sciences depends upon the systems, structures, and people in the clinical environment. Clinical education is accomplished through the collaborative efforts of the

  5. Managing cumulative impacts: A key to sustainability?

    Energy Technology Data Exchange (ETDEWEB)

    Hunsaker, C.T.

    1994-12-31

    This paper addresses how science can be more effectively used in creating policy to manage cumulative effects on ecosystems. The paper focuses on the scientific techniques that we have to identify and to assess cumulative impacts on ecosystems. The term ``sustainable development`` was brought into common use by the World Commission on Environment and Development (The Brundtland Commission) in 1987. The Brundtland Commission report highlighted the need to simultaneously address developmental and environmental imperatives simultaneously by calling for development that ``meets the needs of the present generation without compromising the needs of future generations.`` We cannot claim to be working toward sustainable development until we can quantitatively assess cumulative impacts on the environment: The two concepts are inextricibally linked in that the elusiveness of cumulative effects likely has the greatest potential of keeping us from achieving sustainability. In this paper, assessment and management frameworks relevant to cumulative impacts are discussed along with recent literature on how to improve such assessments. When possible, examples are given for marine ecosystems.

  6. Key factors of efficient organization management

    OpenAIRE

    Firsankov, I. E.; Фирсанков, И. Е.

    2014-01-01

    Issues of efficiency of organization management are examined in the article. Aggressive competition between companies; what’s the difference between manager and leader; who is a leader; personal qualities of strong charismatic leaders etc. Particular attention is paid to the question of possibility to become a leader or to be born a leader. В статье рассмотрены основные черты настоящего лидера, затронута тема различия между лидером и менеджером, а также освещён вопрос о том, можно ли стать...

  7. Priority-Based Hierarchical Operational Management for Multiagent-Based Microgrids

    Directory of Open Access Journals (Sweden)

    Takumi Kato

    2014-03-01

    Full Text Available Electricity consumption in the world is constantly increasing, making our lives become more and more dependent on electricity. There are several new paradigms proposed in the field of power grids. In Japan, especially after the Great East Japan Earthquake in March 2011, the new power grid paradigms are expected to be more resilient to survive several difficulties during disasters. In this paper, we focus on microgrids and propose priority-based hierarchical operational management for multiagent-based microgrids. The proposed management is a new multiagent-based load shedding scheme and multiagent-based hierarchical architecture to realize such resilient microgrids. We developed a prototype system and performed an evaluation of the proposed management using the developed system. The result of the evaluation shows the effectiveness of our proposal in power shortage situations, such as disasters.

  8. Hierarchical level oF managers’ abilities: A Moderator between Quality Management Practices and Company Financial Performance

    Directory of Open Access Journals (Sweden)

    Wakhid Slamet Ciptono

    2007-09-01

    . Compared to the hierarchical level of managers’ abilities, the degree of autonomy may be a more comprehensive contribution in reference to managers’ abilities to influence an organizational system. Autonomy may not only act as a person enhancer to increase internal work motivation, but it may also serve to moderate the extent to which individuals are able to significantly influence a system. In addition, involvement and empowerment of all organizational members (including managers in cooperative and collaborative (interactive efforts to achieve quality improvements appear to be a key element to TQM. Results further reveal that world-class performance in operations (world-class company practices, operational excellence practices, and company non-financial performance positively mediates the impact of critical factors of quality management practices on company financial performance. Results also point out that three out of six critical factors of quality management practices are positively associated with world-class company practices and operational excellence practices under the moderating of hierarchical level of managers’ abilities. World-class company practices and operational excellence practices have direct and significant effects on company non-financial performance. Furthermore, empirical results suggest that there is a positive and significant relationship between company non-financial performance and company financial performance.

  9. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  10. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  11. Cryptographic Key Management in Delay Tolerant Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Sofia Anna Menesidou

    2017-06-01

    Full Text Available Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a security initialization, (b key establishment, and (c key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research.

  12. Key Issues in the Application of Knowledge Management in Education

    National Research Council Canada - National Science Library

    Mendoza, George A

    2005-01-01

    .... This shift in paradigms has made knowledge the key resource as organizations shift their focus from natural resources to intellectual assets, heralding the use of a concept called Knowledge Management (KM...

  13. Strategy Implementation through Hierarchical Couplings in a Management Control Package: An Explorative Case Study

    OpenAIRE

    van der Kolk, Berend; Schokker, Tom

    2016-01-01

    We examine how couplings of management control (MC) elements help to implement an organization’s strategy. Despite prior research stating that couplings between MC elements form fruitful soil for further research, empirical studies in this area are still scarce. We draw on coupling theory to explore three hierarchical relations between MC elements, and examine how these couplings help to implement the organization’s strategy. We conducted a single case study in a medium-sized Dutch municipali...

  14. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  15. Optimisation of key performance measures in air cargo demand management

    OpenAIRE

    Alexander May; Adrian Anslow; Udechukwu Ojiako; Yue Wu; Alasdair Marshall; Maxwell Chipulu

    2014-01-01

    This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that ...

  16. Information Systems Management: an Australian view of the key issues

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  17. Key aspects to perform a project on energy management

    International Nuclear Information System (INIS)

    Bachini, R.

    1993-01-01

    A general overview on elements and organisms playing a key role to launch a new industrial project is given, taking as base case an energy management project. Likewise the problematic of training personnel involved in the project is analyzed. Energy management becomes crucial in industries where energy costs represent a big portion of the whole production cost. Main aspects to be analyzed are: - Adequate production procedures to be competitive - Environment protection regarding waste management - Maximization of safety at production installations. (Author)

  18. A Multi-layer, Hierarchical Information Management System for the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Ning; Du, Pengwei; Paulson, Patrick R.; Greitzer, Frank L.; Guo, Xinxin; Hadley, Mark D.

    2011-10-10

    This paper presents the modeling approach, methodologies, and initial results of setting up a multi-layer, hierarchical information management system (IMS) for the smart grid. The IMS allows its users to analyze the data collected by multiple control and communication networks to characterize the states of the smart grid. Abnormal, corrupted, or erroneous measurement data and outliers are detected and analyzed to identify whether they are caused by random equipment failures, unintentional human errors, or deliberate tempering attempts. Data collected from different information networks are crosschecked for data integrity based on redundancy, dependency, correlation, or cross-correlations, which reveal the interdependency between data sets. A hierarchically structured reasoning mechanism is used to rank possible causes of an event to aid the system operators to proactively respond or provide mitigation recommendations to remove or neutralize the threats. The model provides satisfactory performance on identifying the cause of an event and significantly reduces the need of processing myriads of data collected.

  19. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  20. Key determinants of managing the marketing asset of global companies

    OpenAIRE

    Tatyana Tsygankova; Roman Ponomarenko

    2016-01-01

    As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development). The article identified the optimal set of key elements of the system of marketing assets, which are th...

  1. Scalable Multi-group Key Management for Advanced Metering Infrastructure

    OpenAIRE

    Benmalek , Mourad; Challal , Yacine; Bouabdallah , Abdelmadjid

    2015-01-01

    International audience; Advanced Metering Infrastructure (AMI) is composed of systems and networks to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy efficiency targets. AMI is a privileged target for security attacks with potentially great damage against infrastructures and privacy. For this reason, Key Management has been identified as one of the most challenging topics in AMI development. In this paper, we propose a new Scalable multi-group key ...

  2. Optimisation of key performance measures in air cargo demand management

    Directory of Open Access Journals (Sweden)

    Alexander May

    2014-04-01

    Full Text Available This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that for Air Cargo Revenue Management, ‘Network Optimisation’ represents a critical outcome-based performance indicator. This collaborative study contributes to existing logistics management literature, especially in the area of Revenue Management, and it seeks to enhance Revenue Management practice. It also provides a platform for Air Cargo operators seeking to improve reliability values for their key performance indicators as a means of enhancing operational monitoring power.

  3. DNA based random key generation and management for OTP encryption.

    Science.gov (United States)

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  4. Optimal energy management of urban rail systems: Key performance indicators

    International Nuclear Information System (INIS)

    González-Gil, A.; Palacin, R.; Batty, P.

    2015-01-01

    Highlights: • An overall picture of urban rail energy use is provided. • Performance indicators are developed for urban rail system energy optimisation. • A multi-level methodology for assessing energy efficiency measures is presented. - Abstract: Urban rail systems are facing increasing pressure to minimise their energy consumption and thusly reduce their operational costs and environmental impact. However, given the complexity of such systems, this can only be effectively achieved through a holistic approach which considers the numerous interdependences between subsystems (i.e. vehicles, operations and infrastructure). Such an approach requires a comprehensive set of energy consumption-related Key Performance Indicators (KEPIs) that enable: a multilevel analysis of the actual energy performance of the system; an assessment of potential energy saving strategies; and the monitoring of the results of implemented measures. This paper proposes an original, complete list of KEPIs developed through a scientific approach validated by different stakeholders. It consists of a hierarchical list of 22 indicators divided into two levels: 10 key performance indicators, to ascertain the performance of the whole system and complete subsystems; and 12 performance indicators, to evaluate the performance of single units within subsystems, for example, a single rail vehicle or station. Additionally, the paper gives a brief insight into urban rail energy usage by providing an adequate context in which to understand the proposed KEPIs, together with a methodology describing their application when optimising the energy consumption of urban rail systems

  5. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  6. Hierarchical level oF managers’ abilities: A Moderator between Quality Management Practices and Company Financial Performance

    OpenAIRE

    Ciptono, Wakhid Slamet

    2007-01-01

    This study investigates the moderating impacts of hierarchical level of managers’ abilities on the form and strength of all structural relationships between quality management practices and company financial performance. This study describes the structural relationships among the research constructs —six critical factors of quality management practices (quality improvement program, supervisory leadership, supplier involvement, management commitment, training to improve products/services, cros...

  7. Knowledge Management – the Key Resource in the Knowledge Economy

    Directory of Open Access Journals (Sweden)

    Domingo NEVADO PEÑA

    2010-06-01

    Full Text Available The influence of global information and communication technology changes and globalization have transformed our society by favoring the economy and innovation as key driver of global competition. Creation and exploitation of knowledge has become key resource in the new economy. All advanced economies are technologically knowledgebased economy. Many of today's managers and their employees, still guided by the definition given by Francis Bacon (1597 “Knowledge is power” instead of “sharing and managing knowledge is power”. Knowing taken alone may not bring value if not shared before and then managed in an efficient manner. This article seeks to demonstrate what knowledge, what the knowledge management is and what are its main implications in the new economy, a knowledge-based economy.

  8. Hierarchical Downlink Resource Management Framework for OFDMA based WiMAX Systems

    DEFF Research Database (Denmark)

    Wang, Hua; Iversen, Villy Bæk

    2008-01-01

    IEEE 802.16, known as WiMAX, has received much attention for its capability to support multiple types of applications with diverse QoS requirements. Beyond what the standard has defined, radio resource management (RRM) still remains an open issue. In this paper, we propose a hierarchical downlink...... belonging to different service classes with the objective of increasing the spectral efficiency while satisfying the diverse QoS requirements in each service class. CAC highlights how to limit the number of ongoing connections preventing the system capacity from being overused. Through system...

  9. Network Information Management: The Key To Providing High WAN Availability.

    Science.gov (United States)

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  10. Institutional Data Management in Higher Education. ECAR Key Findings

    Science.gov (United States)

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  11. Economic–environmental hierarchical frequency management of a droop-controlled islanded microgrid

    International Nuclear Information System (INIS)

    Rezaei, Navid; Kalantar, Mohsen

    2014-01-01

    Highlights: • Modeling the steady-state frequency of the droop-controlled microgrids. • Precise formulation the hierarchical control levels of islanded microgrids. • Economic–environmental frequency management using mixed-integer linear programming. • Proposing a novel objective function based on the microgrid daily frequency profile. • Scheduling primary and secondary control reserves using a stochastic optimization. - Abstract: This paper presents a novel energy management system (EMS) for a microgrid to enhance the power system security in a cost-effective manner. Small size of the islanded microgrids, high levels of intermittency and energy fluctuations, lower inertia potential of inverter-interfaced distributed energy resources (DERs) makes the frequency a vital factor in the microgrid energy management system that should be managed subject to the economic–environmental policies of the microgrid EMS. The proposed model is based on precise energy and reserve scheduling of the DERs in a droop-controlled islanded microgrid to manage the possible microgrid frequency excursions. The expected value of the microgrid frequency excursions stem from system power deviations is employed as a new objective function in this study, which is aimed to be minimized using a two stage stochastic mixed-integer linear programming method. In order to model the hierarchical control structure of the islanded microgrid, the frequency dependent behavior of the droop-controlled inverter-interfaced DERs is formulated thoroughly. The proposed model is applied to a typical microgrid test system. The primary and secondary frequency control reserves are appropriately scheduled over a 24 h period. A methodology based on the Monte-Carlo simulation strategy is adapted to generate some random scenarios corresponding to renewable generation variations, load consumption deviations and contingencies of line/unit outages. The generated scenarios are reduced and applied to the

  12. Key determinants of managing the marketing asset of global companies

    Directory of Open Access Journals (Sweden)

    Tatyana Tsygankova

    2016-12-01

    Full Text Available As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development. The article identified the optimal set of key elements of the system of marketing assets, which are the brand, customer loyalty, reputation, network cooperation, marketing strategy, internal marketing, marketing information system and marketing innovation. Due to correlation and regression analysis of the impact of each system elements on performance of global companies, the model of the "marketing asset octagon" was built as an integrative management tool. Also, as a result of construction of the said model, the authors identified the most profitable marketing assets, return on investment and development of competencies in the field of efficient management will bring the highest profit to the company. On the basis of summarizing the regional and branch features of managing the disparate elements of the marketing assets of global companies, the key regional and sectoral priorities of formation, development and improvement of existing concepts of the international marketing management were identified, particularly in terms of building an author’s integrative octagon model.

  13. Cellular Decomposition Based Hybrid-Hierarchical Control Systems with Applications to Flight Management Systems

    Science.gov (United States)

    Caines, P. E.

    1999-01-01

    The work in this research project has been focused on the construction of a hierarchical hybrid control theory which is applicable to flight management systems. The motivation and underlying philosophical position for this work has been that the scale, inherent complexity and the large number of agents (aircraft) involved in an air traffic system imply that a hierarchical modelling and control methodology is required for its management and real time control. In the current work the complex discrete or continuous state space of a system with a small number of agents is aggregated in such a way that discrete (finite state machine or supervisory automaton) controlled dynamics are abstracted from the system's behaviour. High level control may then be either directly applied at this abstracted level, or, if this is in itself of significant complexity, further layers of abstractions may be created to produce a system with an acceptable degree of complexity at each level. By the nature of this construction, high level commands are necessarily realizable at lower levels in the system.

  14. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  15. Hierarchically Coordinated Power Management for Target Tracking in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Feng Juan

    2013-10-01

    Full Text Available Energy efficiency is very important for wireless sensor networks (WSNs since sensor nodes have a limited energy supply from a battery. So far, a lot research has focused on this issue, while less emphasis has been placed on the adaptive sleep time for each node with a consideration for the application constraints. In this paper, we propose a hierarchically coordinated power management (HCPM approach, which both addresses the energy conservation problem and reduces the packet forwarding delay for target tracking WSNs based on a virtual-grid-based network structure. We extend the network lifetime by adopting an adaptive sleep scheduling scheme that combines the local power management (PM and the adaptive coordinate PM strategies to schedule the activities of the sensor nodes at the surveillance stage. Furthermore, we propose a hierarchical structure for the tracking stage. Experimental results show that the proposed approach has a greater capability of extending the network lifetime while maintaining a short transmission delay when compared with the protocol which does not consider the application constraints in target tracking sensor networks.

  16. Optimization of workflow scheduling in Utility Management System with hierarchical neural network

    Directory of Open Access Journals (Sweden)

    Srdjan Vukmirovic

    2011-08-01

    Full Text Available Grid computing could be the future computing paradigm for enterprise applications, one of its benefits being that it can be used for executing large scale applications. Utility Management Systems execute very large numbers of workflows with very high resource requirements. This paper proposes architecture for a new scheduling mechanism that dynamically executes a scheduling algorithm using feedback about the current status Grid nodes. Two Artificial Neural Networks were created in order to solve the scheduling problem. A case study is created for the Meter Data Management system with measurements from the Smart Metering system for the city of Novi Sad, Serbia. Performance tests show that significant improvement of overall execution time can be achieved by Hierarchical Artificial Neural Networks.

  17. Managing the systems approach to training using a flexible Hierarchical data base

    International Nuclear Information System (INIS)

    Housman, E.; Bush, E.R.

    1993-01-01

    Task analysis/curriculum design for a nuclear power station results in a massive amount of data, which must be sequenced and ordered to create an effective program design. This is an almost impossible task without the use of computerized data base. Beginning in 1989, San Onofre nuclear generating station (SONGS) undertook a task analysis/program design project to verify the structure and sequence (design) of all accredited training program. A flex hierarchical data-base management system was designed to store and manage the data collected during the project. For the Operations Training Programm alone ∼8000 tasks, 90,000 knowledges and abilities, and 10,000 learning objectives were entered into this data base

  18. Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data

    Science.gov (United States)

    Fröschle, Sibylle; Steel, Graham

    We extend Delaune, Kremer and Steel’s framework for analysis of PKCS#11-based APIs from bounded to unbounded fresh data. We achieve this by: formally defining the notion of an attribute policy; showing that a well-designed API should have a certain class of policy we call complete; showing that APIs with complete policies may be safely abstracted to APIs where the attributes are fixed; and proving that these static APIs can be analysed in a small bounded model such that security properties will hold for the unbounded case. We automate analysis in our framework using the SAT-based security protocol model checker SATMC. We show that a symmetric key management subset of the Eracom PKCS#11 API, used in their ProtectServer product, preserves the secrecy of sensitive keys for unbounded numbers of fresh keys and handles, i.e. pointers to keys. We also show that this API is not robust: if an encryption key is lost to the intruder, SATMC finds an attack whereby all the keys may be compromised.

  19. The Assistant Manager - a Key Factor of the Managerial Team

    Directory of Open Access Journals (Sweden)

    Lecturer Ph. D. Niculina Vargolici

    2009-05-01

    Full Text Available The new economic context, marked by the crisis and by radical transformations of the labor market, generates the need for more and more sophisticated skills for the assistant manager. That is because the efficiency of the secretarial activity implies both strategic skills and complex abilities, starting from knowledge about the specific activity of the company/institution where the person works as assistant manager, to connected areas such as: management, marketing, human resources, brand communication, company’s culture etc. Whether the manager changes his job together with the “boss”, or the boss is changed and he is bond to adapt to new conditions, a strong team spirit between the manager and his assistant is one of the most important elements that contribute to the productivity and efficiency of the both. The loyalty to the boss and to the company where he works, his adaptation capacity, his competence and his professionalism make the today’s assistant manager a key factor of the managerial team. The essence of the assistant manager job consists in making more efficient the managerial activities, namely, to make it respond to the expectations expressed or not of the manager, or even to anticipate them.

  20. Knowledge management - A key issue for EnBW

    International Nuclear Information System (INIS)

    Zimmer, H.J.

    2007-01-01

    Full text: The motivation for knowledge management can be summarised with the words of EnBW CEO Prof. Claassen, 2002 'knowledge manager of the year' in Germany: 'Against the backdrop of the ever-increasing complexity of strategic planning and activities on the operational front, knowledge management is a key factor in the long-term success of our business.' Professional knowledge management motivates and supports employees, helping to create networks in which they can lay the foundations for the future success of the company. It must be emphasised that knowledge management is the responsibility of management, and EnBW has established a suitable framework consisting of different action levels and goals: 1) Normative level (corporate culture): creating a knowledge-aware and knowledge-friendly corporate culture 2) Strategic level (human resources): systematic gearing of internal intangible potentials towards future requirements. 3) Operational level (information/communication): making the required knowledge available in the necessary scope and quality, in the right place and at the right time. If knowledge management can generally be seen as basic requirement for successful companies, then it is even more important for nuclear operators. Today, nuclear energy is an important generating technology in Europe, for Germany and for EnBW with major future potential, but a technology that must be employed with great caution and attaching top priority to safe operation. For nuclear operators, the rule is always 'safety first'. But knowledge management implemented and used in the right way can also enhance both safety and competitive operation of the plants at the same time. In this connection, successful knowledge management plays a key role due to the complex interplay of many different disciplines within a demanding legal and regulatory framework, the paramount importance of collective past experience and the high demands on the expertise of the employees operating nuclear

  1. Key Management Infrastructure Increment 2 (KMI Inc 2)

    Science.gov (United States)

    2016-03-01

    Infrastructure (KMI) is a unified, scalable, interoperable, and trusted infrastructure that provides net-centric key management services to systems that rely ...products to human users and devices (hereinafter referred to as "supported" or "security-enabled") to enable secure communications. The objectives for...Threshold met during Spiral 1 IOT &E and FOT&E. Connected Networks: Network Identification KMI products and services shall be provided to KMI clients via

  2. Managing key capabilities: A challenge for nuclear plant building companies

    International Nuclear Information System (INIS)

    Pascal Corbel

    2003-01-01

    The nuclear plant building industry faces a paradoxical situation. The use of nuclear reactors to produce energy for civil purposes is both a promising technology, with potentially huge outlets, and a technology facing declining demand. One of the key problems is then: how to maintain the capabilities necessary to benefit from the potential recovery? The resource-based view of strategic management has shown the importance of different types of resources and capabilities in gaining a sustainable competitive advantage. Successful incumbents in the market of nuclear station building have built those kinds of distinctive capabilities that give them a competitive advantage over potential new entrants. But we show that, without a permanent activity in plant building, preserving those capabilities necessitates specific strategic action. We firstly develop the argument that the nuclear plant building industry is in a paradoxical situation in terms of demand and technical performance trends. Secondly, we try to identify the key capabilities of the incumbents. We show that companies in that field use mainly three types of distinctive capabilities: pure technical and scientific knowledge in direct relation to the use of nuclear as an energy generator, competences in risk management and competences in large project management, including financing. Thirdly, we show that although some of those capabilities are used through other nuclear-related activities such as plant maintenance or fuel supply, some of them necessitate taking strategic actions in order to be preserved. We argue that this should be a priority of nuclear equipment company managers in the next few years. (author)

  3. Managing Key Risks in Post-Merger IS Integration

    DEFF Research Database (Denmark)

    Alaranta, Mar; Mathiassen, L

    2014-01-01

    Mergers and acquisitions (M&A) require organizations to blend together different information system (IS) configurations. Unfortunately, less than 50 percent of M&A's achieve their goals, with IS integration being a major problem. Here, the authors offer a framework to help managers prepare for......, analyze, and mitigate risks during post-merger IS integration. They identify key risks relating to IS integration content, process, and context, and present five strategies for mitigating those risks. Their framework aims to help managers proactively reduce the impact of adverse events. Adopting...... the framework supported by their templates is straightforward and the time and resources required are minimal. When properly executed, adoption increases the likelihood of successful merger outcomes; the framework is thus a valuable addition to the management tool box and can be applied in collaboration...

  4. Active listening: The key of successful communication in hospital managers.

    Science.gov (United States)

    Jahromi, Vahid Kohpeima; Tabatabaee, Seyed Saeed; Abdar, Zahra Esmaeili; Rajabi, Mahboobeh

    2016-03-01

    One of the important causes of medical errors and unintentional harm to patients is ineffective communication. The important part of this skill, in case it has been forgotten, is listening. The objective of this study was to determine whether managers in hospitals listen actively. This study was conducted between May and June 2014 among three levels of managers at teaching hospitals in Kerman, Iran. Active Listening skill among hospital managers was measured by self-made Active Listening Skill Scale (ALSS), which consists of the key elements of active listening and has five subscales, i.e., Avoiding Interruption, Maintaining Interest, Postponing Evaluation, Organizing Information, and Showing Interest. The data were analyzed by IBM-SPSS software, version 20, and the Pearson product-moment correlation coefficient, the chi-squared test, and multiple linear regressions. The mean score of active listening in hospital managers was 2.32 out of 3.The highest score (2.27) was obtained by the first-level managers, and the top managers got the lowest score (2.16). Hospital mangers were best in showing interest and worst in avoiding interruptions. The area of employment was a significant predictor of avoiding interruption and the managers' gender was a strong predictor of skill in maintaining interest (p < 0.05). The type of management and education can predict postponing evaluation, and the length of employment can predict showing interest (p < 0.05). There is a necessity for the development of strategies to create more awareness among the hospital managers concerning their active listening skills.

  5. Information Systems Management: an Australasian view of key issues - 1996

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1997-11-01

    Full Text Available As part of a longitudinal study of key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by the IS executives as being important, problematic and critical over the next three to five years. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, communications, disaster recovery, strategic management issues (competitive advantage, IS planning, aligning the IS organisation, people management issues (organisational learning, educating senior management in IT, systems development and data management issues (effective use of the data resource, and end-user computing. This reflects the need for a balance of business, technical, and people skills in an IS executive. Non-critical issues were mostly related to systems development and the individual technologies which must be integrated and managed to ensure a responsive IT infrastructure. The study also reveals that some issues are much more important than problematic (disaster recovery, competitive advantage, information architecture, and IS alignment while others are much more problematic than important (end-user computing, IS role and contribution, and BPR. The former reflects a growing level of knowledge in handling these issues, while the latter reflects a continuing problem with them. The differences between this study and similar studies conducted in 1988 and 1992 show that there is a growing confidence in the IS executive's ability to manage the strategic issues, a continuing concern about providing a responsive IT infrastructure (especially communications, and a continuing concern with educating all 'customers' in the organisation in the effective use of IT, including senior management.

  6. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  7. Safe management of nuclear energy. A key towards sustainable development

    International Nuclear Information System (INIS)

    Dreimanis, Andrejs

    2011-01-01

    Management of nuclear risks - crucial factor for acceptance of novel nuclear projects. We propose an interdisciplinary approach to societal optimization of nuclear energy management. As the keystones we choose: self-organization concept, 2) the principle of the requisite variety. A primary source of growth of internal variety - information and knowledge. Comprehensive knowledge management and informational support firstly is needed in: Technical issues: a) nuclear energy indicators of safety and reliability, b) extensive research and development of advanced technologies, c) multilateral cooperation in common projects; Societal issues: a) general nuclear awareness, b) risk management, engagement in decision-making, personnel education and training, staff renascence, c) public education, stakeholder involvement. There is shown: public education and social learning - efficient self-organization mechanisms, thereby forming a learning and knowledge-creating community. Such an acquired and created knowledge could facilitate solution of key socio-technical issues of nuclear safety as a) public acceptance, in particular, of siting of novel nuclear power plant and radioactive waste disposal objects, b) promotion of adequate perception of risk, equity and trust factors, and c) elevation of safety level of nuclear facilities and adequate management of nuclear risks. The importance of multi-level confidence building at global, regional and national levels is emphasized. (author)

  8. Leading processes of patient care and treatment in hierarchical healthcare organizations in Sweden--process managers' experiences.

    Science.gov (United States)

    Nilsson, Kerstin; Sandoff, Mette

    2015-01-01

    The purpose of this study is to gain better understanding of the roles and functions of process managers by describing Swedish process managers' experiences of leading processes involving patient care and treatment when working in a hierarchical health-care organization. This study is based on an explorative design. The data were gathered from interviews with 12 process managers at three Swedish hospitals. These data underwent qualitative and interpretative analysis with a modified editing style. The process managers' experiences of leading processes in a hierarchical health-care organization are described under three themes: having or not having a mandate, exposure to conflict situations and leading process development. The results indicate a need for clarity regarding process manager's responsibility and work content, which need to be communicated to all managers and staff involved in the patient care and treatment process, irrespective of department. There also needs to be an emphasis on realistic expectations and orientation of the goals that are an intrinsic part of the task of being a process manager. Generalizations from the results of the qualitative interview studies are limited, but a deeper understanding of the phenomenon was reached, which, in turn, can be transferred to similar settings. This study contributes qualitative descriptions of leading care and treatment processes in a functional, hierarchical health-care organization from process managers' experiences, a subject that has not been investigated earlier.

  9. Distributed mixed-integer fuzzy hierarchical programming for municipal solid waste management. Part II: scheme analysis and mechanism revelation.

    Science.gov (United States)

    Cheng, Guanhui; Huang, Guohe; Dong, Cong; Xu, Ye; Chen, Jiapei; Chen, Xiujuan; Li, Kailong

    2017-03-01

    As presented in the first companion paper, distributed mixed-integer fuzzy hierarchical programming (DMIFHP) was developed for municipal solid waste management (MSWM) under complexities of heterogeneities, hierarchy, discreteness, and interactions. Beijing was selected as a representative case. This paper focuses on presenting the obtained schemes and the revealed mechanisms of the Beijing MSWM system. The optimal MSWM schemes for Beijing under various solid waste treatment policies and their differences are deliberated. The impacts of facility expansion, hierarchy, and spatial heterogeneities and potential extensions of DMIFHP are also discussed. A few of findings are revealed from the results and a series of comparisons and analyses. For instance, DMIFHP is capable of robustly reflecting these complexities in MSWM systems, especially for Beijing. The optimal MSWM schemes are of fragmented patterns due to the dominant role of the proximity principle in allocating solid waste treatment resources, and they are closely related to regulated ratios of landfilling, incineration, and composting. Communities without significant differences among distances to different types of treatment facilities are more sensitive to these ratios than others. The complexities of hierarchy and heterogeneities pose significant impacts on MSWM practices. Spatial dislocation of MSW generation rates and facility capacities caused by unreasonable planning in the past may result in insufficient utilization of treatment capacities under substantial influences of transportation costs. The problems of unreasonable MSWM planning, e.g., severe imbalance among different technologies and complete vacancy of ten facilities, should be gained deliberation of the public and the municipal or local governments in Beijing. These findings are helpful for gaining insights into MSWM systems under these complexities, mitigating key challenges in the planning of these systems, improving the related management

  10. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  11. A high performance hierarchical storage management system for the Canadian tier-1 centre at TRIUMF

    International Nuclear Information System (INIS)

    Deatrich, D C; Liu, S X; Tafirout, R

    2010-01-01

    We describe in this paper the design and implementation of Tapeguy, a high performance non-proprietary Hierarchical Storage Management (HSM) system which is interfaced to dCache for efficient tertiary storage operations. The system has been successfully implemented at the Canadian Tier-1 Centre at TRIUMF. The ATLAS experiment will collect a large amount of data (approximately 3.5 Petabytes each year). An efficient HSM system will play a crucial role in the success of the ATLAS Computing Model which is driven by intensive large-scale data analysis activities that will be performed on the Worldwide LHC Computing Grid infrastructure continuously. Tapeguy is Perl-based. It controls and manages data and tape libraries. Its architecture is scalable and includes Dataset Writing control, a Read-back Queuing mechanism and I/O tape drive load balancing as well as on-demand allocation of resources. A central MySQL database records metadata information for every file and transaction (for audit and performance evaluation), as well as an inventory of library elements. Tapeguy Dataset Writing was implemented to group files which are close in time and of similar type. Optional dataset path control dynamically allocates tape families and assign tapes to it. Tape flushing is based on various strategies: time, threshold or external callbacks mechanisms. Tapeguy Read-back Queuing reorders all read requests by using an elevator algorithm, avoiding unnecessary tape loading and unloading. Implementation of priorities will guarantee file delivery to all clients in a timely manner.

  12. Optimising waste management performance - The key to successful decommissioning

    International Nuclear Information System (INIS)

    Keep, Matthew

    2007-01-01

    Available in abstract form only. Full text of publication follows: On the 1. of April 2005 the United Kingdom's Nuclear Decommissioning Authority became responsible for the enormous task of decommissioning the UK's civilian nuclear liabilities. The success of the NDA in delivering its key objectives of safer, cheaper and faster decommissioning depends on a wide range factors. It is self-evident, however, that the development of robust waste management practices by those charged with decommissioning liability will be at the heart of the NDA's business. In addition, the implementation of rigorous waste minimisation techniques throughout decommissioning will deliver tangible environmental benefits as well as better value for money and release funds to accelerate the decommissioning program. There are mixed views as to whether waste minimisation can be achieved during decommissioning. There are those that argue that the radioactive inventory already exists, that the amount of radioactivity cannot be minimised and that the focus of activities should be focused on waste management rather than waste minimisation. Others argue that the management and decommissioning of the UK's civilian nuclear liability will generate significant volumes of additional radioactive waste and it is in this area where the opportunities for waste minimisation can be realised. (author)

  13. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  14. Web Application for Hierarchical Organizational Structure Optimization – Human Resource Management Case Study

    Directory of Open Access Journals (Sweden)

    Kofjač Davorin

    2015-08-01

    Full Text Available Background and Purpose: In a complex strictly hierarchical organizational structure, undesired oscillations may occur, which have not yet been adequately addressed. Therefore, parameter values, which define fluctuations and transitions from one state to another, need to be optimized to prevent oscillations and to keep parameter values between lower and upper bounds. The objective was to develop a simulation model of hierarchical organizational structure as a web application to help in solving the aforementioned problem.

  15. A pollutant load hierarchical allocation method integrated in an environmental capacity management system for Zhushan Bay, Taihu Lake.

    Science.gov (United States)

    Liang, Shidong; Jia, Haifeng; Yang, Cong; Melching, Charles; Yuan, Yongping

    2015-11-15

    An environmental capacity management (ECM) system was developed to help practically implement a Total Maximum Daily Load (TMDL) for a key bay in a highly eutrophic lake in China. The ECM system consists of a simulation platform for pollutant load calculation and a pollutant load hierarchical allocation (PLHA) system. The simulation platform was developed by linking the Environmental Fluid Dynamics Code (EFDC) and Water Quality Analysis Simulation Program (WASP). In the PLHA, pollutant loads were allocated top-down in several levels based on characteristics of the pollutant sources. Different allocation methods could be used for the different levels with the advantages of each method combined over the entire allocation. Zhushan Bay of Taihu Lake, one of the most eutrophic lakes in China, was selected as a case study. The allowable loads of total nitrogen, total phosphorus, ammonia, and chemical oxygen demand were found to be 2122.2, 94.9, 1230.4, and 5260.0 t·yr(-1), respectively. The PLHA for the case study consists of 5 levels. At level 0, loads are allocated to those from the lakeshore direct drainage, atmospheric deposition, internal release, and tributary inflows. At level 1 the loads allocated to tributary inflows are allocated to the 3 tributaries. At level 2, the loads allocated to one inflow tributary are allocated to upstream areas and local sources along the tributary. At level 3, the loads allocated to local sources are allocated to the point and non-point sources from different towns. At level 4, the loads allocated to non-point sources in each town are allocated to different villages. Compared with traditional forms of pollutant load allocation methods, PLHA can combine the advantages of different methods which put different priority weights on equity and efficiency, and the PLHA is easy to understand for stakeholders and more flexible to adjust when applied in practical cases. Copyright © 2015 Elsevier B.V. All rights reserved.

  16. Designing and implementing a key account management strategy

    OpenAIRE

    M. A. Sisti

    2011-01-01

    Sales Management offers a global perspective on the opportunities and issues facing today's sales managers. Current textbooks have failed to move beyond the US context; Sales Management provides unique access to European and international experts, with globally relevant case studies.

  17. A data management proposal to connect in a hierarchical way nodes of the Spanish Long Term Ecological Research (LTER) network

    Science.gov (United States)

    Fuentes, Daniel; Pérez-Luque, Antonio J.; Bonet García, Francisco J.; Moreno-LLorca, Ricardo A.; Sánchez-Cano, Francisco M.; Suárez-Muñoz, María

    2017-04-01

    The Long Term Ecological Research (LTER) network aims to provide the scientific community, policy makers, and society with the knowledge and predictive understanding necessary to conserve, protect, and manage the ecosystems. LTER is organized into networks ranging from the global to national scale. In the top of network, the International Long Term Ecological Research (ILTER) Network coordinates among ecological researchers and LTER research networks at local, regional and global scales. In Spain, the Spanish Long Term Ecological Research (LTER-Spain) network was built to foster the collaboration and coordination between longest-lived ecological researchers and networks on a local scale. Currently composed by nine nodes, this network facilitates the data exchange, documentation and preservation encouraging the development of cross-disciplinary works. However, most nodes have no specific information systems, tools or qualified personnel to manage their data for continued conservation and there are no harmonized methodologies for long-term monitoring protocols. Hence, the main challenge is to place the nodes in its correct position in the network, providing the best tools that allow them to manage their data autonomously and make it easier for them to access information and knowledge in the network. This work proposes a connected structure composed by four LTER nodes located in southern Spain. The structure is built considering hierarchical approach: nodes that create information which is documented using metadata standards (such as Ecological Metadata Language, EML); and others nodes that gather metadata and information. We also take into account the capacity of each node to manage their own data and the premise that the data and metadata must be maintained where it is generated. The current state of the nodes is a follows: two of them have their own information management system (Sierra Nevada-Granada and Doñana Long-Term Socio-ecological Research Platform) and

  18. Organizational agility key factors for dynamic business process management

    OpenAIRE

    Triaa , Wafa; Gzara , Lilia; Verjus , Hervé

    2016-01-01

    International audience; For several years, Business Process Management (BPM) is recognized as a holistic management approach that promotes business effectiveness and efficiency. Increasingly, corporates find themselves, operating in business environments filled with unpredictable, complex and continuous change. Driven by these dynamic competitive conditions, they look for a dynamic management of their business processes to maintain their processes performance. To be competitive, companies hav...

  19. SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor

    Science.gov (United States)

    2016-11-01

    cryptographic functions such as Advanced Encryption Standard ( AES ) [5] to produce keywraps to orchestrate key exchanges between groups of devices. These...Storage (MPMS). This is done for two reasons: first, the mission package is encrypted using AES keywrap mode with the CEK [7], which is a special version...Zone 1) denoting ephemeral secrets such as dynamic keys. AES encryption is employed as a one-way function leading from the ephemeral Zone 1 to the

  20. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.

    We present a decentralized key management architecture for wireless sensor networks, covering the aspects of key deployment, key refreshment and key establishment. Our architecture is based on a clear set of assumptions and guidelines. Balance between security and energy consumption is achieved by

  1. Leadership – The Key Element in Improving Quality Management

    Directory of Open Access Journals (Sweden)

    Iveta Paulová

    2011-10-01

    Full Text Available The present contribution is processed partial results of the survey application of leadership as one of the fundamental principles of quality management in organizations in the Slovak Republic. This survey was conducted in the research project VEGA No. 1/0229/08 Perspectives of quality management development in coherence with requirements of Slovak republic market. Results from the survey were the basis for proposals to improve the quality management in Slovak industrial organizations

  2. Financial Management: Opportunities to Improve Experience and Training of Key Navy Comptrollers

    National Research Council Canada - National Science Library

    1997-01-01

    .... Furthermore, accurate financial data are needed for measuring performance under GPRA. One key factor in agencies being able to achieve these objectives will be having trained and experienced financial management staff in key positions...

  3. Successful customer value management : Key lessons and emerging trends

    NARCIS (Netherlands)

    Verhoef, P.C.; Lemon, Katherine

    In the past decade, firms have paid increasing attention to customer value management (CVM). Through customer-centric management systems, firms aim to maximize customer value. In this article, we put forth six important lessons that firms can employ for successful CVM, integrating available research

  4. Quality Management and Key Performance Indicators in Oncologic Esophageal Surgery.

    Science.gov (United States)

    Gockel, Ines; Ahlbrand, Constantin Johannes; Arras, Michael; Schreiber, Elke Maria; Lang, Hauke

    2015-12-01

    Ranking systems and comparisons of quality and performance indicators will be of increasing relevance for complex "high-risk" procedures such as esophageal cancer surgery. The identification of evidence-based standards relevant for key performance indicators in esophageal surgery is essential for establishing monitoring systems and furthermore a requirement to enhance treatment quality. In the course of this review, we analyze the key performance indicators case volume, radicality of resection, and postoperative morbidity and mortality, leading to continuous quality improvement. Ranking systems established on this basis will gain increased relevance in highly complex procedures within the national and international comparison and furthermore improve the treatment of patients with esophageal carcinoma.

  5. The role of primary care in adult weight management: qualitative interviews with key stakeholders in weight management services

    OpenAIRE

    Blane, David N.; Macdonald, Sara; Morrison, David; O’Donnell, Catherine A.

    2017-01-01

    Background Primary care has a key role to play in the prevention and management of obesity, but there remain barriers to engagement in weight management by primary care practitioners. The aim of this study was to explore the views of key stakeholders in adult weight management services on the role of primary care in adult weight management. Methods Qualitative study involving semi-structured interviews with nine senior dietitians involved in NHS weight management from seven Scottish health bo...

  6. Hierarchical control of vehicular fuel cell / battery hybrid powertrain

    OpenAIRE

    Xu, Liangfei; Ouyang, Minggao; Li, Jianqiu; Hua, Jianfeng

    2010-01-01

    In a proton exchange membrane (PEM) fuel cell/battery hybrid vehicle, a fuel cell system fulfills the stationary power demand, and a traction battery provides the accelerating power and recycles braking energy. The entire system is coordinated by a distributed control system, incorporating three key strategies: 1) vehicle control, 2) fuel cell control and 3) battery management. They make up a hierarchical control system. This paper introduces a hierarchical control strategy for a fuel cell / ...

  7. Determinants of Key Account Management Effectiveness: The Case ...

    African Journals Online (AJOL)

    Ethiopian Journal of Business and Economics (The) ... the postulated seven determinants of KAM effectiveness (strategy, solution, people, management, ... The findings provide the empirical application of the KAM model theorized by Zupancic ...

  8. Key challenges facing water resource management in South Africa

    CSIR Research Space (South Africa)

    Ashton, P

    2008-11-01

    Full Text Available Resource Managers The Dichotomy of Water Source of destruction, dispute and poverty • Drought and desertification • Flooding and erosion • Salinization • Malnutrition and starvation • Contamination • Epidemics and diseases • Dispute...

  9. Key Practice for Green Building Management In Malaysia

    OpenAIRE

    Aghili Nasim; Bin Mohammed Abdul Hakim; Sheau-Ting Low

    2016-01-01

    This paper identifies the management practices for green building management in Malaysia. A set of practices was ascertained from the reviewed of various established Green Building Standard in the world. Green building practices are significant role in attaining sustainability particularly in the construction industry. Green building is constructed for minimizing impacts to environment as well as decreasing building effects on occupants. To achieve the goals of green buildings, set of managem...

  10. Managing the pursuit of health and wealth: the key challenges.

    Science.gov (United States)

    Fidler, David P; Drager, Nick; Lee, Kelley

    2009-01-24

    This article forms part of a six-part Series on trade and health, and sets the stage for this Series by analysing key aspects of the relationship between trade and health. The Series takes stock of this relation and provides timely analysis of the key challenges facing efforts to achieve an appropriate balance between trade and health across a diverse range of issues. This introductory article reviews how trade and health have risen and expanded on global policy agendas in the past decade in unprecedented ways, describes how trade and health issues are respectively governed in international relations, examines the ongoing search for policy coherence between the two policy spheres, and highlights the topics of the remaining articles in the Series.

  11. Managing Water in the Rural-Urban Interface : the Key to Climate ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Managing Water in the Rural-Urban Interface : the Key to Climate Change Resilient Cities ... cities - one in East and the other in West Africa - through better management ... Sustaining water use : stakeholders' strategies under different climate ...

  12. MASY: Management of secret keys in federated wireless sensor networks

    OpenAIRE

    Maerien, Jef; Michiels, Sam; Huygens, Christophe; Joosen, Wouter

    2010-01-01

    Wireless Sensor Networks are becoming federated and mobile environments. These new capabilities pose a lot of new possibilities and challenges. One of these challenges is to create a secure environment to allow multiple trusted companies to share and merge their sensor network infrastructure. The most basic need for a secure environment is the deployment of key material. However, most current day research assumes pre-shared secrets between the sensor nodes of most, if not all, companies in a ...

  13. Customer service: the key to remaining competitive in managed care.

    Science.gov (United States)

    Howard, J E

    2000-01-01

    The health care industry is undergoing a rapid transformation to meet the ever-increasing needs and demands of its patient population. Employers and managed care organizations are demanding better service and higher quality care, while providers are trying to tackle reimbursement cutbacks, streamlining of services, and serving a diverse population. Providers have begun to realize that to overcome these obstacles and meet the needs of their health plans and consumers, they must focus on the demands of their customers. Health care organizations have found they can meet the demands of both the consumer and the managed care industry through initiating and maintaining a customer service program. This essay explains the importance of customer service and its link to success in the managed care environment.

  14. Program management: The keys to a successful ERWM contract

    International Nuclear Information System (INIS)

    Lenyk, R.G.; Cusack, J.G.

    1995-01-01

    Program management for a large Environmental Restoration and Waste Management (ERWM) task order contract is both a skill and an art. Unlike project management, program management deals with global and political issues, with both client and home organizations, as well as with day-to-day operations. Program management requires up-front planning and nurturing, for no contract matures successfully by itself. This paper identifies the many opportunities presented in the planning and initial implementation of the contract. Potential traps are identified so that they can be recognized and avoided or mitigated. Teaming and subcontracting are also addressed. The authors rely on years of program management experience to explore such questions as the following: Can you have an integrated team? What needs to be done before you sign Your contract? Do you know who your client(s) is(are)? Have you incorporated the relevant, especially any new, procurement strategies? The US Department of Energy-Oak Ridge Operations (DOE-ORO) ERWM Remedial Design Contract with Foster Wheeler Environmental Corporation is used as a model for exploring these topics. This ERWM Program-which focuses on the Oak Ridge National Laboratory, the Y-12 Weapons Plant, and the K-25 Site in Oak Ridge, Tennessee; the Paducah Gaseous Diffusion Plant in Paducah, Kentucky; and the Portsmouth Gaseous Diffusion Plant in Portsmouth, Ohio-is in its fifth year with over 225 task orders. The program has been highly successful and has obtained from DOE outstanding marks for achieving quality, responsiveness, timeliness, and subcontracting goals

  15. Clusters Regarding Key Factors Affecting Changes in Accounting, Finance, Administration and Management Control

    Directory of Open Access Journals (Sweden)

    Rodica Gabriela Blidisel

    2010-01-01

    Full Text Available During the last decade, important changes have occurred in public governance, which has evolved in this time from hierarchical bureaucracy to participatory governance, where the role of citizens in public decision-making process is more direct. There were performed reforms in finance, management administration and finances of public sector. Starting from the factors that influenced during the history the accounting, finances, administration and management control, we want to test the factors that affect the changes of these elements in Romanian environment.

  16. Networking: A Key to Career Communication and Management Consulting Success

    Science.gov (United States)

    Clark, Thomas

    2009-01-01

    Now that job security with one organization is a relic of the past and companies are outsourcing training and other "nonessential" functions, the author suggests in his career communication classes that students develop the same inventive strategies to plan their employment futures that management consultants use to market themselves in the 21st…

  17. Key characteristics relevant for selecting knowledge management software tools

    CSIR Research Space (South Africa)

    Smuts, H

    2011-07-01

    Full Text Available The shift to knowledge as the primary source of value results in the new economy being led by those who manage knowledge effectively. Today’s organisations are creating and leveraging knowledge, data and information at an unprecedented pace – a...

  18. Key Institutions in Business and Management Education Research

    Science.gov (United States)

    Fornaciari, Charles J.; Arbaugh, J. B.; Asarta, Carlos J.; Bento, Regina F.; Hwang, Alvin; Lund Dean, Kathy

    2017-01-01

    The authors investigate institutional productivity in business and management education (BME) research based on the analysis of 4,464 articles published by 7,210 authors across 17 BME journals over a 10-year period, involving approximately 1,900 schools worldwide. Departing from traditional disciplinary silos, they examine the BME research field…

  19. Waste to energy – key element for sustainable waste management

    International Nuclear Information System (INIS)

    Brunner, Paul H.; Rechberger, Helmut

    2015-01-01

    Highlights: • First paper on the importance of incineration from a urban metabolism point of view. • Proves that incineration is necessary for sustainable waste management. • Historical and technical overview of 100 years development of MSW incineration. - Abstract: Human activities inevitably result in wastes. The higher the material turnover, and the more complex and divers the materials produced, the more challenging it is for waste management to reach the goals of “protection of men and environment” and “resource conservation”. Waste incineration, introduced originally for volume reduction and hygienic reasons, went through a long and intense development. Together with prevention and recycling measures, waste to energy (WTE) facilities contribute significantly to reaching the goals of waste management. Sophisticated air pollution control (APC) devices ensure that emissions are environmentally safe. Incinerators are crucial and unique for the complete destruction of hazardous organic materials, to reduce risks due to pathogenic microorganisms and viruses, and for concentrating valuable as well as toxic metals in certain fractions. Bottom ash and APC residues have become new sources of secondary metals, hence incineration has become a materials recycling facility, too. WTE plants are supporting decisions about waste and environmental management: They can routinely and cost effectively supply information about chemical waste composition as well as about the ratio of biogenic to fossil carbon in MSW and off-gas

  20. Cultural Intelligence as a Key Construct for Global Talent Management

    NARCIS (Netherlands)

    Bücker, J.J.L.E.; Al Ariss, A.

    2014-01-01

    This chapter focuses on the competencies needed to undertake global talent management (GTM), according to the concept of cultural intelligence (CQ) and its four main dimensions. Using real-world examples and excerpts from interviews with relevant actors in this field, this chapter outlines the CQ

  1. Key Elements of the Tutorial Support Management Model

    Science.gov (United States)

    Lynch, Grace; Paasuke, Philip

    2011-01-01

    In response to an exponential growth in enrolments the "Tutorial Support Management" (TSM) model has been adopted by Open Universities Australia (OUA) after a two-year project on the provision of online tutor support in first year, online undergraduate units. The essential focus of the TSM model was the development of a systemic approach…

  2. Resource management as a key factor for sustainable urban planning

    NARCIS (Netherlands)

    Agudelo Vera, C.M.; Mels, A.R.; Keesman, K.J.; Rijnaarts, H.H.M.

    2011-01-01

    Due to fast urbanization and increasing living standards, the environmental sustainability of our global society becomes more and more questionable. In this historical review we investigate the role of resources management (RM) and urban planning (UP) and propose ways for integration in sustainable

  3. Media Management Education: Key Themes, Pedagogies, and Challenges

    Science.gov (United States)

    Förster, Kati; Rohn, Ulrike

    2015-01-01

    The media sphere has changed significantly as a result of globalization, technology, and new habits of media use. Scholars in journalism and mass communication thus call on a transformation and reinvention of higher education in the field. The purpose of this article is to investigate how media management is taught across different institutions,…

  4. Waste to energy – key element for sustainable waste management

    Energy Technology Data Exchange (ETDEWEB)

    Brunner, Paul H., E-mail: paul.h.brunner@tuwien.ac.at; Rechberger, Helmut

    2015-03-15

    Highlights: • First paper on the importance of incineration from a urban metabolism point of view. • Proves that incineration is necessary for sustainable waste management. • Historical and technical overview of 100 years development of MSW incineration. - Abstract: Human activities inevitably result in wastes. The higher the material turnover, and the more complex and divers the materials produced, the more challenging it is for waste management to reach the goals of “protection of men and environment” and “resource conservation”. Waste incineration, introduced originally for volume reduction and hygienic reasons, went through a long and intense development. Together with prevention and recycling measures, waste to energy (WTE) facilities contribute significantly to reaching the goals of waste management. Sophisticated air pollution control (APC) devices ensure that emissions are environmentally safe. Incinerators are crucial and unique for the complete destruction of hazardous organic materials, to reduce risks due to pathogenic microorganisms and viruses, and for concentrating valuable as well as toxic metals in certain fractions. Bottom ash and APC residues have become new sources of secondary metals, hence incineration has become a materials recycling facility, too. WTE plants are supporting decisions about waste and environmental management: They can routinely and cost effectively supply information about chemical waste composition as well as about the ratio of biogenic to fossil carbon in MSW and off-gas.

  5. Key Determinants of Human Resource Management in Hospitals: Stakeholder Perspective

    Directory of Open Access Journals (Sweden)

    Buchelt Beata Irma

    2017-06-01

    Full Text Available Over the past decade, theoretical and empirical research on the various aspects of human resources (HR within the healthcare (HC sector has grown extensively due to its′ strategic importance in the sector. There is a visible tendency among researchers to pursue an effective human resource management (HRM strategies, methods, and tools. Countries implement policies which should increase the amount and competences of employees within healthcare. Providers of HC services (i.e. hospitals tend to enforce modern HRM solutions adapted from business organisations to attract, retain and develop HR. However, these seem not be as effective as they could (Hyde et al., 2013. Because of this, authors approached a researched reality from the point of view of a contextual paradigm, assuming that HRM solutions to be effective should match the reality of HC providers (Pocztowski, 2008. The aim of the research was to detect determinants which might influence the management of medical personnel in hospitals and identify the possible strength of these determinants so a more adjusted organisational and human resource management strategy could be elaborated. The list of possible determinants of hospital operations as the result of meta-analysis was elaborated. The list created the basis for interviews conducted among stakeholders and experts. Respondents were asked to appraise the factors with the usage of numerical scale considering their influence on medical personnel management in hospitals (physicians, nurses and others. In total, there were 28 interviews completed. The general conclusion which can be drawn from the analysis of these data is that hospitals should reorient their HRM practices in such the way that not only the quantitative but also the qualitative aspect of performance would be properly handled. This paper draws from HRM theory (contextual approach, stakeholder theory, and healthcare management theory, adding new insight to each in the context of

  6. Six key elements' analysis of FAC effective management in nuclear power plant

    International Nuclear Information System (INIS)

    Zhong Zhaojiang; Chen Hanming

    2010-01-01

    Corporate Commitment, Analysis, Operating Experience, Inspection, Training and Engineering Judgment, Long-Term Strategy are the six key elements of FAC effective management in nuclear power plant. Corporate commitment is the economy base of FAC management and ensure of management system, Analysis is the method of FAC's optimization and consummation, Operating experience is the reference and complementarity of FAC, Inspection is the base of accumulating FAC data, Training and engineering judgment is the technical complementarity and deepening, Long-term strategy is successful key of FAC management. Six key elements supplement each other, and make up of a full system of FAC effective management. For present FAC management in our national nuclear power plant, six key elements are the core and bring out the best in each other to found the FAC effective management system and prevent great FAC occurrence. (authors)

  7. Audit as Key Element of System Management Improvement in Company

    Directory of Open Access Journals (Sweden)

    L. Wojtynek

    2007-07-01

    Full Text Available This article presents what is an audit for a company, tries to regularize the quality audits, presents main differences between separate types of audits and between audit and control. There are also some exemplary types of nonconformance in a company. Each system has a risk of deficiencies. They can result from material defects or human imperfection. A good quality system should allow the company to detect them in an organized and systematical manner. It guarantees that the irregularities will be removed before they cause a defective production. Quality management consists of planning the quality via quality plans, control and research plans, and supervision and verification by audits and controls. The objective of this paper is to present a special message of audit for organizations which is the improvement of management system in company. Quality audit is used with reference to quality system and its elements, to process, products and services. It compares the real values with expected ones with reference to the activities connected with quality and their results, and planned data. Thanks to quality audits, it is possible to state if the quality management instruments achieve the desired effect. Quality audit can be conducted for the internal and external purposes. One of the quality audit purposes is to estimate if the improvement is necessary or to take corrective actions. The universality of audit, which is completed by periodic system review preformed by head management, allows the use of its application effects both on the strategic and operational effects. Audit is often misled with quality monitoring or control, i.e. activities which aim to control the process or accept the product. Therefore this paper shows the differences between the notions. The information used to conduct an audit is only based on facts (evidence objective, which really exist, independent on emotions or prejudice. They can be documented, declared, based on observed

  8. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  9. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Science.gov (United States)

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  10. Management of key pension plan risks from the user aspects

    Directory of Open Access Journals (Sweden)

    Rakonjac-Antić Tatjana

    2013-01-01

    Full Text Available The pension system is an important form of protection of individuals, i.e. of their ensuring for a period of living after retirement, when they are no longer able for working engagement. On the other hand, as a form of long-term insurance, this system presents a strong investment incentive for each economy. Pension plans are an important element of the pension system. There are defined benefit plans, defined contribution plans and hybrid plans, which represent a combination of the two previously mentioned plans. The aim of the work is to define the key risks for each of these types of pension plans in order to determine their advantages and disadvantages, from the aspect of their potential users, on the basis of their comparative analysis.

  11. VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems

    OpenAIRE

    Benmalek , Mourad; Challal , Yacine; Derhab , Abdelouahid; Bouabdallah , Abdelmadjid

    2018-01-01

    International audience; In this paper, we propose four new key management schemes for Advanced Metering Infrastructure (AMI) to secure data communications in the Smart Grid (SG). The schemes are based on individual and batch rekeying operations using a novel multi-group key graph structure, are also versatile in the sense that they can support broadcast, unicast, as well as multicast communications. Security analysis shows that our schemes satisfy key management security properties. Furthermo...

  12. Knowledge communication: a key to successful crisis management.

    Science.gov (United States)

    Johansson, Anders; Härenstam, Malin

    2013-09-01

    A winning concept of crisis management can be summarized in 2 words: knowledge communication. If decision makers, communicators, experts, and the public understand what the crisis is about and share their knowledge, the process of handling it will be optimized. Effective crisis communication implies the necessity of an unhindered but purposeful exchange of information within and between authorities, organizations, media, involved individuals, and groups before, during, and after a crisis. This article focuses on the importance of the before, or prevention, part of a crisis since it holds a rich possibility to enhance the chances for successful crisis management of a bioterrorism incident. An extended perspective on crisis communication efficiently links to a more thorough understanding of risk perception with various stakeholders and the public, which also will be helpful for situational awareness. Furthermore, the grounded baseline for the dialogue type of crisis communication suitable in modern society and to modern social media is achieved by linking to those risk communication efforts that are made. The link between risk and crisis should be afforded more attention since, especially in biosecurity, there would be no crisis without risk negligence and poor or malfunctioning preventive efforts.

  13. Geriatric hip fracture management: keys to providing a successful program.

    Science.gov (United States)

    Basu, N; Natour, M; Mounasamy, V; Kates, S L

    2016-10-01

    Hip fractures are a common event in older adults and are associated with significant morbidity, mortality and costs. This review examines the necessary elements required to implement a successful geriatric fracture program and identifies some of the barriers faced when implementing a successful program. The Geriatric Fracture Center (GFC) is a treatment model that standardizes the approach to the geriatric fracture patient. It is based on five principles: surgical fracture management; early operative intervention; medical co-management with geriatricians; patient-centered, standard order sets to employ best practices; and early discharge planning with a focus on early functional rehabilitation. Implementing a geriatric fracture program begins with an assessment of the hospital's data on hip fractures and standard care metrics such as length of stay, complications, time to surgery, readmission rates and costs. Business planning is essential along with the medical planning process. To successfully develop and implement such a program, strong physician leadership is necessary to articulate both a short- and long-term plan for implementation. Good communication is essential-those organizing a geriatric fracture program must be able to implement standardized plans of care working with all members of the healthcare team and must also be able to foster relationships both within the hospital and with other institutions in the community. Finally, a program of continual quality improvement must be undertaken to ensure that performance outcomes are improving patient care.

  14. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  15. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  16. Adaptability and flexibility : keys towards successful SCAT data management

    International Nuclear Information System (INIS)

    Lamarche, A.

    2008-01-01

    The Shoreline Cleanup Assessment Technique (SCAT) is the standard method used in North America to document oiling conditions in the aftermath of an oil spill. The data generated by SCAT can support all aspects of shoreline spill response, including treatment strategies, selecting treatment methods, providing detailed instructions to response personnel and evaluating the response effort. However, some adaptations were needed, such as adding shoreline types specific to the impacted area, accommodating multiple teams surveying the same shoreline segment, and adding descriptors to characterize unique practical aspects of oil conditions. This paper presented a review, description and examples of the various adaptations that were needed to provide SCAT data management support during a number of spill response incidents. 10 refs., 3 tabs., 12 figs

  17. Resource management as a key factor for sustainable urban planning.

    Science.gov (United States)

    Agudelo-Vera, Claudia M; Mels, Adriaan R; Keesman, Karel J; Rijnaarts, Huub H M

    2011-10-01

    Due to fast urbanization and increasing living standards, the environmental sustainability of our global society becomes more and more questionable. In this historical review we investigate the role of resources management (RM) and urban planning (UP) and propose ways for integration in sustainable development (SD). RM follows the principle of circular causation, and we reflect on to what extent RM has been an element for urban planning. Since the existence of the first settlements, a close relationship between RM, urbanization and technological development has been present. RM followed the demand for urban resources like water, energy, and food. In history, RM has been fostered by innovation and technology developments and has driven population growth and urbanization. Recent massive resource demand, especially in relation to energy and material flows, has altered natural ecosystems and has resulted in environmental degradation. UP has developed separately in response to different questions. UP followed the demand for improved living conditions, often associated to safety, good manufacturing and trading conditions and appropriate sanitation and waste management. In history UP has been a developing research area, especially since the industrial era and the related strong urbanization at the end of the 18th century. UP responded to new emerging problems in urban areas and became increasingly complex. Nowadays, UP has to address many objectives that are often conflicting, including, the urban sustainability. Our current urban un-sustainability is rooted in massive resource consumption and waste production beyond natural limits, and the absence of flows from waste to resources. Therefore, sustainable urban development requires integration of RM into UP. We propose new ways to this integration. Copyright © 2011 Elsevier Ltd. All rights reserved.

  18. Symmetric Link Key Management for Secure Neighbor Discovery in a Decentralized Wireless Sensor Network

    Science.gov (United States)

    2017-09-01

    KEY MANAGEMENT FOR SECURE NEIGHBOR DISCOVERY IN A DECENTRALIZED WIRELESS SENSOR NETWORK by Kelvin T. Chew September 2017 Thesis Advisor...and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT...DATE September 2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE SYMMETRIC LINK KEY MANAGEMENT FOR SECURE NEIGHBOR

  19. Key Account Management and Quality in Business-to-Business Relationships

    OpenAIRE

    Ojasalo, Jukka

    2000-01-01

    What are the main elements of successful Key Account Management (KAM)? What is the nature of quality for the company and for the individual in business-to-business relationships? What kind of managerial practices are required at the company and individual level in Key Account Management? This paper focuses on these central aspects of KAM. It describes the main elements of KAM, which is a systematic marketing management approach in the business-to-business context with the objective to build p...

  20. Key Account Management - nøglen til vækst?

    DEFF Research Database (Denmark)

    Skogberg, Simon

    2011-01-01

    Artiklen tager afsæt i en beskrivelse af begrebet Key Account Management samt den udvikling begrebet har gennemgået de senere år. Artiklen diskuterer problemstillingen om hvorvidt virksomheder skal implementere Key Account Management som et styringsredskab, men sætter samtidig spørgsmålstegn ved om...... Key Account Management nu også er den frelser som faglitteraturen ofte betegner det som. Artiklen inddrager eksempler fra en nordjysk energivirksomhed, hvis aktuelle situation illustrerer de udfordringer mange virksomheder i praksis står overfor....

  1. Hierarchical energy management system for stand-alone hybrid system based on generation costs and cascade control

    International Nuclear Information System (INIS)

    Torreglosa, J.P.; García, P.; Fernández, L.M.; Jurado, F.

    2014-01-01

    Highlights: • We present an energy management system for a stand-alone WT/PV/hydrogen/battery hybrid system. • Hierarchical control composed by master and slave control strategies. • Control assures reliable electricity support for stand-alone applications subject to technical and economic criteria. - Abstract: This paper presents an energy management system (EMS) for stand-alone hybrid systems composed by photovoltaic (PV) solar panels and a wind turbine (WT) as primary energy sources and two energy storage systems, which are a hydrogen system and a battery. The hydrogen system is composed of fuel cell (FC), electrolyzer and hydrogen storage tank. The EMS is a hierarchical control composed by a master control strategy and a slave control strategy. On the one hand, the master control generates the reference powers to meet several premises (such as to satisfy the load power demand, and to maintain the hydrogen tank level and the state of charge (SOC) of the battery between their target margins), taking also into account economic aspects to discriminate between using the battery or hydrogen system. On the other hand, the slave control modifies the reference powers generated by the master control according to the energy sources dynamic limitations, and maintains the DC bus voltage at its reference value. The models, implemented in MATLAB-Simulink environment, have been developed from commercially available components. To check the viability of the proposed EMS, two kinds of simulations were carried out: (1) A long-term simulation of 25 years (expected lifetime of the system) with a sample time of one hour to validate the master control of the EMS; and (2) A short-term simulation with sudden net power variations to validate the slave control of the EMS

  2. Key Element Performance In Occupational Safety And Health Management System In Organization (A Literature

    Directory of Open Access Journals (Sweden)

    Agus Salim Nuzaihan Aras

    2016-01-01

    Full Text Available Setting an effective safety and health management system is crucial in order to reduce problem relating to accident and ill in management organizational. It is involve with multiple level of management and stakeholders who empower the organization to the management in handling the safety and health cases and issues in organizational. It is necessary to prepare a well knowledge about safety and health management systems and preparing the framework for setting a certain scale in measuring its performance in this area. The successful or failure of management does showing the capability of the organization in delivering the responsible to management levels [1]. The problem in safe work issues and practices cause by the management commitment and involvement that create improper safety program and procedures, and this crisis keep continuing till present [2]. This paper describes about key element of safety and health management system and measuring the performance in order to get an effective management system in organization that describes the process in achieving effectiveness in management. The literature review will be conducted through the data collection from research findings and defined the strong character of key element in which focusing on measuring performance. A guide on key element performance in occupational safety and health management system is specifically drawn to prepare for a future research.

  3. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-03-05

    detection 49 [6,7] , authentication, access control, key management, iso- 50 lating misbehaving nodes for effective routing [6,8,9] , and 51 many other...83 84 85 aims to achieve: (a) resiliency against misbehaving nodes 86 in the network to maintain minimum security vulnerabil- 87 ity; (b...neighbor will decreas the misbehaving node’s direct competence trust. Fur thermore, this neighbor when acting as a recommended public key management in

  4. Managing and developing key supplier relationships : An introduction to the special issue, discussion and implications

    NARCIS (Netherlands)

    Ivens, B.; van de Vijver, M.A.R.; Vos, G.C.J.M.

    2013-01-01

    This article provides an introduction to this special issue on managing and developing key supplier relationships. Key suppliers are increasingly seen as strategic assets of buying companies which need careful nurturing to fully utilize their potential for value creation. The six articles of this

  5. ERP as an organization innovation : Key users and cross-boundary knowledge management

    NARCIS (Netherlands)

    Maas, J.-B.; van Fenema, P.C.; Soeters, J.M.M.L.

    2016-01-01

    Purpose The purpose of this study is to provide more insight in the ways key users act as knowledge managers and boundary spanners during the enterprise resource planning (ERP) system usage phase. Despite the recognized importance of key users during the implementation phase of an ERP system, little

  6. Hierarchical video summarization

    Science.gov (United States)

    Ratakonda, Krishna; Sezan, M. Ibrahim; Crinon, Regis J.

    1998-12-01

    We address the problem of key-frame summarization of vide in the absence of any a priori information about its content. This is a common problem that is encountered in home videos. We propose a hierarchical key-frame summarization algorithm where a coarse-to-fine key-frame summary is generated. A hierarchical key-frame summary facilitates multi-level browsing where the user can quickly discover the content of the video by accessing its coarsest but most compact summary and then view a desired segment of the video with increasingly more detail. At the finest level, the summary is generated on the basis of color features of video frames, using an extension of a recently proposed key-frame extraction algorithm. The finest level key-frames are recursively clustered using a novel pairwise K-means clustering approach with temporal consecutiveness constraint. We also address summarization of MPEG-2 compressed video without fully decoding the bitstream. We also propose efficient mechanisms that facilitate decoding the video when the hierarchical summary is utilized in browsing and playback of video segments starting at selected key-frames.

  7. Dynamics of Hierarchical Urban Green Space Patches and Implications for Management Policy.

    Science.gov (United States)

    Yu, Zhoulu; Wang, Yaohui; Deng, Jinsong; Shen, Zhangquan; Wang, Ke; Zhu, Jinxia; Gan, Muye

    2017-06-06

    Accurately quantifying the variation of urban green space is the prerequisite for fully understanding its ecosystem services. However, knowledge about the spatiotemporal dynamics of urban green space is still insufficient due to multiple challenges that remain in mapping green spaces within heterogeneous urban environments. This paper uses the city of Hangzhou to demonstrate an analysis methodology that integrates sub-pixel mapping technology and landscape analysis to fully investigate the spatiotemporal pattern and variation of hierarchical urban green space patches. Firstly, multiple endmember spectral mixture analysis was applied to time series Landsat data to derive green space coverage at the sub-pixel level. Landscape metric analysis was then employed to characterize the variation pattern of urban green space patches. Results indicate that Hangzhou has experienced a significant loss of urban greenness, producing a more fragmented and isolated vegetation landscape. Additionally, a remarkable amelioration of urban greenness occurred in the city core from 2002 to 2013, characterized by the significant increase of small-sized green space patches. The green space network has been formed as a consequence of new urban greening strategies in Hangzhou. These strategies have greatly fragmented the built-up areas and enriched the diversity of the urban landscape. Gradient analysis further revealed a distinct pattern of urban green space landscape variation in the process of urbanization. By integrating both sub-pixel mapping technology and landscape analysis, our approach revealed the subtle variation of urban green space patches which are otherwise easy to overlook. Findings from this study will help us to refine our understanding of the evolution of heterogeneous urban environments.

  8. Healthcare restructuring and hierarchical alignment: why do staff and managers perceive change outcomes differently?

    Science.gov (United States)

    Walston, Stephen L; Chou, Ann F

    2006-09-01

    Healthcare organizations have undergone major change efforts in the past decade. Sustained change is related to continued alignment among organizational participants and may fail with incongruent perceptions of change. This study identifies factors contributing to the alignment in perceptions of organizational change outcomes between executives and all other employees. The sample included 10 hospitals with survey responses from 421 executives and other employees. Using hierarchical linear modeling (HLM), perceptual alignment was modeled at the first level as a function of goal commitment, goal clarity, goal acceptance, goal specificity, staff participation, available skill set, and knowledge and at the second level as organizational size. Descriptive statistics showed employee perception of outcomes differed among personnel levels. HLM results showed that goal specificity, appropriate staff training, reward incentives, effective communication, information sharing, and organization's ability to sustain changes induced perceptual alignment in change outcomes. Staff involvement in designing change efforts increased perceptual misalignment, whereas involvement during implementation and maintenance phases increased alignment. This research uses cross-sectional data from 10 hospitals. Data were gathered from surveys that may have recall bias as hospitals were surveyed at different times after the implementation of their restructuring. Our findings enhance the understanding of processes and mechanisms that enable healthcare organizations to align organizational participants' efforts during change. Results suggest that decision-makers should create incentives to encourage innovative practices, institute effective communication mechanisms, selectively disseminate information, and involve participants in implementing and maintaining changes to achieve intended outcomes. ORIGINALITY/VALUE OF ARTICLE: This article provides unique insight into the importance and causes of

  9. Effects of management intervention on post-disturbance community composition: an experimental analysis using bayesian hierarchical models.

    Directory of Open Access Journals (Sweden)

    Jack Giovanini

    Full Text Available As human demand for ecosystem products increases, management intervention may become more frequent after environmental disturbances. Evaluations of ecological responses to cumulative effects of management interventions and natural disturbances provide critical decision-support tools for managers who strive to balance environmental conservation and economic development. We conducted an experiment to evaluate the effects of salvage logging on avian community composition in lodgepole pine (Pinus contorta forests affected by beetle outbreaks in Oregon, USA, 1996-1998. Treatments consisted of the removal of lodgepole pine snags only, and live trees were not harvested. We used a bayesian hierarchical model to quantify occupancy dynamics for 27 breeding species, while accounting for variation in the detection process. We examined how magnitude and precision of treatment effects varied when incorporating prior information from a separate intervention study that occurred in a similar ecological system. Regardless of which prior we evaluated, we found no evidence that the harvest treatment had a negative impact on species richness, with an estimated average of 0.2-2.2 more species in harvested stands than unharvested stands. Estimated average similarity between control and treatment stands ranged from 0.82-0.87 (1 indicating complete similarity between a pair of stands and suggested that treatment stands did not contain novel assemblies of species responding to the harvesting prescription. Estimated treatment effects were positive for twenty-four (90% of the species, although the credible intervals contained 0 in all cases. These results suggest that, unlike most post-fire salvage logging prescriptions, selective harvesting after beetle outbreaks may meet multiple management objectives, including the maintenance of avian community richness comparable to what is found in unharvested stands. Our results provide managers with prescription alternatives to

  10. Agri-Environmental Resource Management by Large-Scale Collective Action: Determining KEY Success Factors

    Science.gov (United States)

    Uetake, Tetsuya

    2015-01-01

    Purpose: Large-scale collective action is necessary when managing agricultural natural resources such as biodiversity and water quality. This paper determines the key factors to the success of such action. Design/Methodology/Approach: This paper analyses four large-scale collective actions used to manage agri-environmental resources in Canada and…

  11. Perceptions of food risk management among key stakeholders: Results from a cross-European study

    NARCIS (Netherlands)

    Kleef, van E.; Frewer, L.J.; Chryssochoidis, G.M.; Houghton, J.R.; Korzen-Bohr, S.; Krystallis, T.; Lassen, J.; Pfenning, U.; Rowe, G.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management. The objective of this study is to identify similarities and differences in perceptions of, and attitudes

  12. Distributed mixed-integer fuzzy hierarchical programming for municipal solid waste management. Part I: System identification and methodology development.

    Science.gov (United States)

    Cheng, Guanhui; Huang, Guohe; Dong, Cong; Xu, Ye; Chen, Xiujuan; Chen, Jiapei

    2017-03-01

    Due to the existence of complexities of heterogeneities, hierarchy, discreteness, and interactions in municipal solid waste management (MSWM) systems such as Beijing, China, a series of socio-economic and eco-environmental problems may emerge or worsen and result in irredeemable damages in the following decades. Meanwhile, existing studies, especially ones focusing on MSWM in Beijing, could hardly reflect these complexities in system simulations and provide reliable decision support for management practices. Thus, a framework of distributed mixed-integer fuzzy hierarchical programming (DMIFHP) is developed in this study for MSWM under these complexities. Beijing is selected as a representative case. The Beijing MSWM system is comprehensively analyzed in many aspects such as socio-economic conditions, natural conditions, spatial heterogeneities, treatment facilities, and system complexities, building a solid foundation for system simulation and optimization. Correspondingly, the MSWM system in Beijing is discretized as 235 grids to reflect spatial heterogeneity. A DMIFHP model which is a nonlinear programming problem is constructed to parameterize the Beijing MSWM system. To enable scientific solving of it, a solution algorithm is proposed based on coupling of fuzzy programming and mixed-integer linear programming. Innovations and advantages of the DMIFHP framework are discussed. The optimal MSWM schemes and mechanism revelations will be discussed in another companion paper due to length limitation.

  13. The most important key-performance indicators at BC Timişoara management

    Directory of Open Access Journals (Sweden)

    Silvia GRĂDINARU

    2017-02-01

    Full Text Available This article explores the management of objectives at BC Timisoara, motivation and performance analysis. The aim of this paper is to analyze the most important key factors involved in a basketball team performance. The basketball team analyzed is BC Timisoara, a well established club in this city of Western Romania. The article combines information gathered from BC Timisoara’s manager and management theories relevant to the topic. Goal setting is affected by financial and human resource factors as well control and regulation functions. Finally motivation plays a key role in players performance.

  14. Managing malocclusion in the mixed dentition: six keys to success. Part 1.

    Science.gov (United States)

    Fleming, Padhraig S; Johal, Ama; DiBiase, Andrew T

    2008-11-01

    Indications of developing malocclusion are often present in the mixed dentition.With judicious supervision and timely intervention their effects can be minimized. The general dental practitioner is ideally placed to recognize, manage and correct many such incipient problems. This first of two papers considers three keys to success involving, normal dental development, deviations from normal eruption patterns, crossbite correction and habit cessation. The appropriate management of developing malocclusion may simplify later orthodontic management or indeed make such intervention unnecessary.

  15. Efficient Utilization of Hierarchical iJTAG Networks for Interrupts Management

    NARCIS (Netherlands)

    Ibrahim, Ahmed Mohammed Youssef; Kerkhoff, Hans G.

    2016-01-01

    Modern systems-on-chips rely on embedded instruments for testing and debugging, the same instruments could be used for managing the lifetime dependability of the chips. The IEEE 1687 (iJTAG) standard introduces an access network to the instruments based on reconfigurable scan paths. During lifetime,

  16. Strategy Implementation through Hierarchical Couplings in a Management Control Package : An Explorative Case Study

    NARCIS (Netherlands)

    van der Kolk, Berend; Schokker, Tom

    2016-01-01

    We examine how couplings of management control (MC) elements help to implement an organization’s strategy. Despite prior research stating that couplings between MC elements form fruitful soil for further research, empirical studies in this area are still scarce. We draw on coupling theory to explore

  17. Adding Hierarchical Objects to Relational Database General-Purpose XML-Based Information Managements

    Science.gov (United States)

    Lin, Shu-Chun; Knight, Chris; La, Tracy; Maluf, David; Bell, David; Tran, Khai Peter; Gawdiak, Yuri

    2006-01-01

    NETMARK is a flexible, high-throughput software system for managing, storing, and rapid searching of unstructured and semi-structured documents. NETMARK transforms such documents from their original highly complex, constantly changing, heterogeneous data formats into well-structured, common data formats in using Hypertext Markup Language (HTML) and/or Extensible Markup Language (XML). The software implements an object-relational database system that combines the best practices of the relational model utilizing Structured Query Language (SQL) with those of the object-oriented, semantic database model for creating complex data. In particular, NETMARK takes advantage of the Oracle 8i object-relational database model using physical-address data types for very efficient keyword searches of records across both context and content. NETMARK also supports multiple international standards such as WEBDAV for drag-and-drop file management and SOAP for integrated information management using Web services. The document-organization and -searching capabilities afforded by NETMARK are likely to make this software attractive for use in disciplines as diverse as science, auditing, and law enforcement.

  18. Key Supplier Relationship Management: The Case of Croatian Medium-Sized and Large Manufacturing Companies

    Directory of Open Access Journals (Sweden)

    Dario Miočević

    2011-06-01

    Full Text Available The key supplier relationship management represents a vital organizational process. Companies should pay attention not only to managing customer relationships but also to managing relationships with suppliers in order to perform well. They should identify the extent to which a certain supplier adds value through the procurement process. In this line of reasoning, both theory and practice make a distinction between strategic (key and non-strategic (transactional suppliers. By employing the segmentation of the supply market, companies balance their supplier portfolio and are capable of identifying the key suppliers. They can also develop specific programs and initiatives that are aimed at preserving these relationships. In the empirical part of the paper, a survey was conducted on a sample of 123 medium-sized and large Croatian manufacturing companies. The structural model involving the relationship between the key supplier relationship management and value-oriented purchasing was tested. The results indicate that there is a statistically direct, positive and significant relationship between these two constructs. Likewise, the results stress that a theoretical conceptualization and operationalization of the key supplier relationship management construct is both valid and justified. Finally, the theoretical and practical implications and limitations of this study are offered.

  19. Key elements on implementing an occupational health and safety management system using ISO 45001 standard

    Directory of Open Access Journals (Sweden)

    Darabont Doru Costin

    2017-01-01

    Full Text Available Occupational health and safety (OHS management system is one of the main elements of the company’s general management system. During last decade, Romanian companies gained a valuable experience on implementing this type of management systems, using OHSAS 18001 referential and standard. However, the projected release of the ISO 45001 represents a new approach which requires the companies to take in consideration new key elements for a successful implementation of the OHS management system. The aim of the paper is to identify and analyse these key elements, by integration of the following issues: standard requirements, Romanian OHS legislation and good practice examples, including the general control measures for new and emerging risks such as psycho-social risks, workforce ageing and new technologies. The study results represent an important work instrument for each company interested to implement or upgrade its OHS management system using ISO 45001 standard and could be used regardless the company size or activity domain.

  20. A Study on the Key Management Strategy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon KO

    2015-05-01

    Full Text Available Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.

  1. The Synthesis of the Hierarchical Structure of Information Resources for Management of Electronic Commerce Entities

    Directory of Open Access Journals (Sweden)

    Krutova Anzhelika S.

    2017-06-01

    Full Text Available The aim of the article is to develop the theoretical bases for the classification and coding of economic information and the scientific justification of the content of information resources of an electronic commerce enterprise. The essence of information resources for management of electronic business entities is investigated. It is proved that the organization of accounting in e-commerce systems is advisable to be built on the basis of two circuits: accounting for financial flows and accounting associated with transformation of business factors in products and services as a result of production activities. There presented a sequence of accounting organization that allows to combine the both circuits in a single information system, which provides a possibility for the integrated replenishment and distributed simultaneous use of the e-commerce system by all groups of users. It is proved that the guarantee of efficient activity of the information management system of electronic commerce entities is a proper systematization of the aggregate of information resources on economic facts and operations of an enterprise in accordance with the management tasks by building the hierarchy of accounting nomenclatures. It is suggested to understand nomenclature as an objective, primary information aggregate concerning a certain fact of the economic activity of an enterprise, which is characterized by minimum requisites, is entered into the database of the information system and is to be reflected in the accounting system. It is proposed to build a database of e-commerce systems as a part of directories (constants, personnel, goods / products, suppliers, buyers and the hierarchy of accounting nomenclatures. The package of documents regulating the organization of accounting at an enterprise should include: the provision on the accounting services, the order on the accounting policy, the job descriptions, the schedules of information exchange, the report card and

  2. Parallel hierarchical radiosity rendering

    Energy Technology Data Exchange (ETDEWEB)

    Carter, Michael [Iowa State Univ., Ames, IA (United States)

    1993-07-01

    In this dissertation, the step-by-step development of a scalable parallel hierarchical radiosity renderer is documented. First, a new look is taken at the traditional radiosity equation, and a new form is presented in which the matrix of linear system coefficients is transformed into a symmetric matrix, thereby simplifying the problem and enabling a new solution technique to be applied. Next, the state-of-the-art hierarchical radiosity methods are examined for their suitability to parallel implementation, and scalability. Significant enhancements are also discovered which both improve their theoretical foundations and improve the images they generate. The resultant hierarchical radiosity algorithm is then examined for sources of parallelism, and for an architectural mapping. Several architectural mappings are discussed. A few key algorithmic changes are suggested during the process of making the algorithm parallel. Next, the performance, efficiency, and scalability of the algorithm are analyzed. The dissertation closes with a discussion of several ideas which have the potential to further enhance the hierarchical radiosity method, or provide an entirely new forum for the application of hierarchical methods.

  3. A class Hierarchical, object-oriented approach to virtual memory management

    Science.gov (United States)

    Russo, Vincent F.; Campbell, Roy H.; Johnston, Gary M.

    1989-01-01

    The Choices family of operating systems exploits class hierarchies and object-oriented programming to facilitate the construction of customized operating systems for shared memory and networked multiprocessors. The software is being used in the Tapestry laboratory to study the performance of algorithms, mechanisms, and policies for parallel systems. Described here are the architectural design and class hierarchy of the Choices virtual memory management system. The software and hardware mechanisms and policies of a virtual memory system implement a memory hierarchy that exploits the trade-off between response times and storage capacities. In Choices, the notion of a memory hierarchy is captured by abstract classes. Concrete subclasses of those abstractions implement a virtual address space, segmentation, paging, physical memory management, secondary storage, and remote (that is, networked) storage. Captured in the notion of a memory hierarchy are classes that represent memory objects. These classes provide a storage mechanism that contains encapsulated data and have methods to read or write the memory object. Each of these classes provides specializations to represent the memory hierarchy.

  4. Signcryption-Based Key Management for MANETs Applications in Mobile Commerce

    Institute of Scientific and Technical Information of China (English)

    LI Jingfeng; ZHU Yuefei; ZHANG Yajuan; PAN Heng

    2006-01-01

    Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management.

  5. Metabolonote: A wiki-based database for managing hierarchical metadata of metabolome analyses

    Directory of Open Access Journals (Sweden)

    Takeshi eAra

    2015-04-01

    Full Text Available Metabolomics—technology for comprehensive detection of small molecules in an organism—lags behind the other omics in terms of publication and dissemination of experimental data. Among the reasons for this are difficulty precisely recording information about complicated analytical experiments (metadata, existence of various databases with their own metadata descriptions, and low reusability of the published data, resulting in submitters (the researchers who generate the data being insufficiently motivated. To tackle these issues, we developed Metabolonote, a Semantic MediaWiki-based database designed specifically for managing metabolomic metadata. We also defined a metadata and data description format, called TogoMD, with an ID system that is required for unique access to each level of the tree-structured metadata such as study purpose, sample, analytical method, and data analysis. Separation of the management of metadata from that of data and permission to attach related information to the metadata provide advantages for submitters, readers, and database developers. The metadata are enriched with information such as links to comparable data, thereby functioning as a hub of related data resources. They also enhance not only readers' understanding and use of data, but also submitters' motivation to publish the data. The metadata are computationally shared among other systems via APIs, which facilitates the construction of novel databases by database developers. A permission system that allows publication of immature metadata and feedback from readers also helps submitters to improve their metadata. Hence, this aspect of Metabolonote, as a metadata preparation tool, is complementary to high-quality and persistent data repositories such as MetaboLights. A total of 808 metadata for analyzed data obtained from 35 biological species are published currently. Metabolonote and related tools are available free of cost at http://metabolonote.kazusa.or.jp/.

  6. Effects of a group-based reproductive management extension programme on key management outcomes affecting reproductive performance.

    Science.gov (United States)

    Brownlie, Tom S; Morton, John M; Heuer, Cord; McDougall, Scott

    2015-02-01

    A group-based reproductive management extension programme has been designed to help managers of dairy herds improve herd reproductive performance. The aims of this study were, firstly, to assess effects of participation by key decision makers (KDMs) in a farmer action group programme in 2009 and 2010 on six key management outcomes (KMOs) that affect reproductive performance over 2 years (2009-2010 and 2010-2011), and secondly, to describe KDM intentions to change management behaviour(s) affecting each management outcome after participation in the programme. Seasonal calving dairy herds from four regions of New Zealand were enrolled in the study. Intentions to modify management behaviour were recorded using the formal written action plans developed during the extension programme. KMOs assessed were calving pattern of the herd, pre-calving heifer liveweight, pre-calving and premating body condition score (BCS), oestrus detection, anoestrus cow management and bull management. Participation was associated with improvements in heifer liveweight, more heifers calving in the first 6 weeks of the seasonal calving period, premating BCS and oestrus detection. No significant effects were observed on anoestrus cow management or bull management. KDMs with greater numbers of proposed actions had lower 6 week in-calf rates in the second study year than KDMs who proposed fewer actions. A more effective strategy to ensure more appropriate objectives is proposed. Strategies to help KDMs to implement proposed actions more successfully should be investigated to improve the programme further. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool

    OpenAIRE

    Hazem A Elbaz

    2015-01-01

    The mostly cloud computing authentication mechanisms use public key infrastructure (PKI). Hierarchical Identity Based Cryptography (HIBC) has several advantages that sound well align with the demands of cloud computing. The main objectives of cloud computing authentication protocols are security and efficiency. In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we...

  8. Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments

    OpenAIRE

    Saha, Amal; Sanyal, Sugata

    2014-01-01

    After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet. Cloud wallet is an emerging payment method and is gaining momentum very fast. Anticipating that the wallet product managers and security s...

  9. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  10. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  11. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  12. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks

    NARCIS (Netherlands)

    Gong, Zheng; Tang, Qiang; Law, Y.W.; Chen, Hongyang; Lai, X.; Yung, M.

    2010-01-01

    The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model

  13. Securing Metering Infrastructure of Smart Grid: A Machine Learning and Localization Based Key Management Approach

    Directory of Open Access Journals (Sweden)

    Imtiaz Parvez

    2016-08-01

    Full Text Available In smart cities, advanced metering infrastructure (AMI of the smart grid facilitates automated metering, control and monitoring of power distribution by employing a wireless network. Due to this wireless nature of communication, there exist potential threats to the data privacy in AMI. Decoding the energy consumption reading, injecting false data/command signals and jamming the networks are some hazardous measures against this technology. Since a smart meter possesses limited memory and computational capability, AMI demands a light, but robust security scheme. In this paper, we propose a localization-based key management system for meter data encryption. Data are encrypted by the key associated with the coordinate of the meter and a random key index. The encryption keys are managed and distributed by a trusted third party (TTP. Localization of the meter is proposed by a method based on received signal strength (RSS using the maximum likelihood estimator (MLE. The received packets are decrypted at the control center with the key mapped with the key index and the meter’s coordinates. Additionally, we propose the k-nearest neighbors (kNN algorithm for node/meter authentication, capitalizing further on data transmission security. Finally, we evaluate the security strength of a data packet numerically for our method.

  14. Key Performance Indicators for Maintenance Management Effectiveness of Public Hospital Building

    Directory of Open Access Journals (Sweden)

    Farhana Omar Mardhiah

    2017-01-01

    Full Text Available Effectiveness of management in maintenance aspect holds the key element in influencing the performance of overall maintenance management. Similarly, public hospital building needs an effective maintenance management as this type of building in nature is one of the most complex issues in the field of maintenance. Improper building maintenance management adopted by the organization significantly will interrupt the overall operation of the building. Therefore, this paper is aim to identifying the key performance indicator (KPI of effectiveness of maintenance management for the public hospital building. A total of 32 set of questionnaires were distributed to the maintenance manager for each hospital in the northern region of peninsular Malaysia by using self-administration strategy. The survey answer was analyzed by performing descriptive analysis in SPSS. Overall, the result of descriptive analysis shows that all the ten factors of effectiveness of maintenance management are accepted as KPI since the mean value is at least 3.93 which classified as important and significant. The most significant factor of effectiveness of maintenance management is task planning and scheduling with the mean score of 4.35. While less significant factor is identify as maintenance approach with the value of mean score is 3.93. The both results indicates that the management need to have well-structured planning for the maintenance works and also need to embrace the exact strategy of maintenance approach in order to achieved better overall performance of maintenance management. This study may draw a standard practice for the government in assessing the performance of public facilities in terms of maintenance management.

  15. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Danyang Qin

    2016-01-01

    Full Text Available Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.

  16. The Platform Architecture and Key Technology of Cloud Service that Support Wisdom City Management

    Directory of Open Access Journals (Sweden)

    Liang Xiao

    2013-05-01

    Full Text Available According to the new requirement of constructing “resource sharing and service on demand” wisdom city system, this paper put forward the platform architecture of cloud service for wisdom city management which support IaaS, PaaS and SaaS three types of service model on the basis of researching the operation mode of the wisdom city which under cloud computing environment and through the research of mass storing technology of cloud data, building technology of cloud resource pool, scheduling management methods and monitoring technology of cloud resource, security management and control technology of cloud platform and other key technologies. The platform supports wisdom city system to achieve business or resource scheduling management optimization and the unified and efficient management of large-scale hardware and software, which has the characteristics of cross-domain resource scheduling, cross-domain data sharing, cross-domain facilities integration and cross-domain service integration.

  17. Optimization of Key Parameters of Energy Management Strategy for Hybrid Electric Vehicle Using DIRECT Algorithm

    Directory of Open Access Journals (Sweden)

    Jingxian Hao

    2016-11-01

    Full Text Available The rule-based logic threshold control strategy has been frequently used in energy management strategies for hybrid electric vehicles (HEVs owing to its convenience in adjusting parameters, real-time performance, stability, and robustness. However, the logic threshold control parameters cannot usually ensure the best vehicle performance at different driving cycles and conditions. For this reason, the optimization of key parameters is important to improve the fuel economy, dynamic performance, and drivability. In principle, this is a multiparameter nonlinear optimization problem. The logic threshold energy management strategy for an all-wheel-drive HEV is comprehensively analyzed and developed in this study. Seven key parameters to be optimized are extracted. The optimization model of key parameters is proposed from the perspective of fuel economy. The global optimization method, DIRECT algorithm, which has good real-time performance, low computational burden, rapid convergence, is selected to optimize the extracted key parameters globally. The results show that with the optimized parameters, the engine operates more at the high efficiency range resulting into a fuel savings of 7% compared with non-optimized parameters. The proposed method can provide guidance for calibrating the parameters of the vehicle energy management strategy from the perspective of fuel economy.

  18. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  19. Efficient Key Management System for Large-scale Smart RFID Applications

    Directory of Open Access Journals (Sweden)

    Mohammad Fal Sadikin

    2015-08-01

    Full Text Available Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all RFID tags in order to update their security properties (e.g. update their private keys. On the other hand, using common key management solution like standard TLS/SSL is too heavy-weight that can drain and overload the limited resources. Furthermore, most of existing solutions are highly susceptible to various threats reaching from privacy threats, physical attacks to various technics of Man-in-the-Middle attacks. This paper introduces novel key management system, tailored to the limited resources of smart RFID system. It proposes light-weight mutual authentication and identity protection to mitigate the existing threats.

  20. Sustainable Materials Management (SMM) - Materials and Waste Management in the United States Key Facts and Figures

    Data.gov (United States)

    U.S. Environmental Protection Agency — Each year EPA produces a report called Advancing Sustainable Materials Management: Facts and Figures. It includes information on municipal solid waste (MSW)...

  1. National disease management plans for key chronic non-communicable diseases in Singapore.

    Science.gov (United States)

    Tan, C C

    2002-07-01

    In Singapore, chronic, non-communicable diseases, namely coronary heart disease, stroke and cancer, account for more than 60% of all deaths and a high burden of disability and healthcare expenditure. The burden of these diseases is likely to rise with our rapidly ageing population and changing lifestyles, and will present profound challenges to our healthcare delivery and financing systems over the next 20 to 30 years. The containment and optimal management of these conditions require a strong emphasis on patient education and the development of integrated models of healthcare delivery in place of the present uncoordinated, compartmentalised way of delivering healthcare. To meet these challenges, the Ministry of Health's major thrusts are disease control measures which focus mainly on primary prevention; and disease management, which coordinates the national effort to reduce the incidence of these key diseases and their predisposing factors and to ameliorate their long-term impact by optimising control to reduce mortality, morbidity and complications, and improving functional status through rehabilitation. The key initiatives include restructuring of the public sector healthcare institutions into two clusters, each comprising a network of primary health care polyclinics, regional hospitals and tertiary institutions. The functional integration of these healthcare elements within each cluster under a common senior administrative and professional management, and the development of common clinical IT systems will greatly facilitate the implementation of disease management programmes. Secondly, the Ministry is establishing National Disease Registries in coronary heart disease, cancer, stroke, myopia and kidney failure, which will be valuable sources of clinical and outcomes data. Thirdly, in partnership with expert groups, national committees and professional agencies, the Ministry will produce clinical practice guidelines which will assist doctors and healthcare

  2. RE: Forests and forest management plays a key role in mitigating climate change

    DEFF Research Database (Denmark)

    Bentsen, Niclas Scott; Nord-Larsen, Thomas; Larsen, Søren

    2016-01-01

    as also reported by Naudts et al. By ignoring the link between forestry and fossil carbon pools and not considering development in the absence of forest management, there is no accounting for the effect on GHG emissions, and no basis for estimating the contribution of forest management to cl......The report by Naudts et al. concludes that forest management in Europe during the last 260 years has failed to result in net CO2 removal from the atmosphere. The authors have reached this conclusion through their failure to consider a key factor in their otherwise comprehensive analysis....... The authors present an analysis of net carbon emissions from forest, but omit substitution effects related to the link between forest management and the fossil carbon pool. The link between fossil and terrestrial carbon pools is however critical for modelling climate impacts. To conclude as they do...

  3. Complex of Key Instruments of Management of Operation Activity of a Small Business Trade Enterprise

    Directory of Open Access Journals (Sweden)

    Serdyuk Vira M.

    2013-11-01

    Full Text Available The article offers a complex of key instruments of management of operation activity of a small business trade enterprise, including: 1 budgeting of operation activity; 2 its accounting by norms and deviations from them; 3 monitoring of operational activity of an enterprise, which envisages analysis of revealed deviations. The article shows the most efficient way of realisation and practical use of the presented concept – application of the “standard-cost” scheme within the framework of which the following tasks are solved: 1 budgeting of income from operational activity; 2 establishment of standards of costs; 3 accumulation of data on factual income and expenditures; 4 analysis of deviations and reporting; and 5 introduction of necessary amendments. The article also offers an imitation model of analysis of dynamics of trade processes, which allows detection of key spheres of management of operation activity of a small trade enterprise and principles of carrying out an efficient and well thought over financial policy.

  4. A brief review on key technologies in the battery management system of electric vehicles

    Science.gov (United States)

    Liu, Kailong; Li, Kang; Peng, Qiao; Zhang, Cheng

    2018-04-01

    Batteries have been widely applied in many high-power applications, such as electric vehicles (EVs) and hybrid electric vehicles, where a suitable battery management system (BMS) is vital in ensuring safe and reliable operation of batteries. This paper aims to give a brief review on several key technologies of BMS, including battery modelling, state estimation and battery charging. First, popular battery types used in EVs are surveyed, followed by the introduction of key technologies used in BMS. Various battery models, including the electric model, thermal model and coupled electro-thermal model are reviewed. Then, battery state estimations for the state of charge, state of health and internal temperature are comprehensively surveyed. Finally, several key and traditional battery charging approaches with associated optimization methods are discussed.

  5. Policy legitimacy - The key to long term Management of Radioactive Waste

    International Nuclear Information System (INIS)

    Atherton, E.; Dalton, J.; Wild, D.

    2003-01-01

    Experience in the UK has shown that the central theme of delivering a solution is contingent on building a broad base of support for the long term management project. This is multi-layered, both in terms of local, regional and national political actors, but also across societal groups. Legitimacy is the key to success and needs to be understood in three main domains - equity, competence and economics. Finding the appropriate balance is essential for progress in the long term. (authors)

  6. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems

    OpenAIRE

    Lei, Ao; Cruickshank, Haitham; Cao, Y; Asuquo, Philip; Anyigor Ogah, Chibueze Pascal; Sun, Zhili

    2017-01-01

    As modern vehicle and communication technologies advanced apace, people begin to believe that Intelligent Transportation System (ITS) would be achievable in one decade.\\ud ITS introduces information technology to the transportation infrastructures and aims to improve road safety and traffic efficiency. However, security is still a main concern in Vehicular Communication Systems (VCS). This can be addressed through secured group broadcast. Therefore, secure key management schemes are considere...

  7. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Science.gov (United States)

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  8. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    Institute of Scientific and Technical Information of China (English)

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  9. Impact of a community-based diabetes self-management program on key metabolic parameters

    Directory of Open Access Journals (Sweden)

    Johnson C

    2014-12-01

    Full Text Available Objective: Characterize the impact of a pharmacist-led diabetes self-management program on three key metabolic parameters: glycosylated hemoglobin (HbA1c, low-density lipoprotein cholesterol (LDL-C, and mean arterial blood pressure (MAP among employee health program participants. Methods: A self-insured company in the Kansas City metropolitan area began offering a pharmacist-led diabetes self-management program to eligible company employees and their dependents in 2008. A retrospective pre-post analysis was conducted to determine if the program affected key metabolic parameters in participants by determining mean change after one year of participation. Results: Among 183 program participants, 65 participants met inclusion criteria. All three key metabolic parameters were significantly reduced from baseline to one year of program participation: HbA1c decreased from 8.1% to 7.3% (p=0.007; LDL-C decreased from 108.3 mg/dL to 96.4 mg/dL (p=0.009; and MAP decreased from 96.1 to 92.3 mm Hg (p=0.005. Conclusions: The pharmacist-led diabetes self-management program demonstrated significant reductions in HbA1c, LDL-C, and MAP from baseline to one year of program participation. Improvements were statistically significant and clinically relevant for each parameter. Previous studies indicate these reductions may cause reduced overall healthcare costs.

  10. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    I-Hsien Lin

    2010-08-01

    Full Text Available Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  11. Clinical risk management in hospitals: strategy, central coordination and dialogue as key enablers.

    Science.gov (United States)

    Briner, Matthias; Manser, Tanja; Kessler, Oliver

    2013-04-01

    The study aims to identify key enablers fostering clinical risk management (CRM) in hospitals to guide health care in this vital area of patient safety. A cross-sectional survey was conducted at the national level in 324 Swiss hospitals in 2007-2008 to assess the relationship between key elements and systematic CRM. Therefore, a comprehensive monitoring instrument for CRM was used for the first time. Organizational factors (e.g. strategy, coordination, resources) and structural conditions (e.g. hospital size) were tested as key elements. CRM was assessed by evaluating its maturity (i.e. the level of CRM development) by 12 theoretically derived indices joining together essential aspects of CRM at the hospital level and the service level. Chi-square measures were used to analyse the relationships between organizational factors or structural conditions and maturity of CRM. Participation in this voluntary survey was good, with CRM experts of 138 out of 324 hospitals responding (response rate 43%). Three key enablers for CRM were identified: implementing a function for central CRM coordination, assuring dialogue with and between the different hospital services, and developing strategic CRM objectives. This study offers, for the first time, an assessment of the maturity of hospitals' CRM and identifies key enablers related to CRM. This is a feasible first step in guiding hospitals to shape their CRM and presents a basis for future studies, for example, linking CRM to outcome data. © 2012 Blackwell Publishing Ltd.

  12. The Proposal of Key Performance Indicators in Facility Management and Determination the Weights of Significance

    Science.gov (United States)

    Rimbalová, Jarmila; Vilčeková, Silvia

    2013-11-01

    The practice of facilities management is rapidly evolving with the increasing interest in the discourse of sustainable development. The industry and its market are forecasted to develop to include non-core functions, activities traditionally not associated with this profession, but which are increasingly being addressed by facilities managers. The scale of growth in the built environment and the consequential growth of the facility management sector is anticipated to be enormous. Key Performance Indicators (KPI) are measure that provides essential information about performance of facility services delivery. In selecting KPI, it is critical to limit them to those factors that are essential to the organization reaching its goals. It is also important to keep the number of KPI small just to keep everyone's attention focused on achieving the same KPIs. This paper deals with the determination of weights of KPI of FM in terms of the design and use of sustainable buildings.

  13. Key factors of case management interventions for frequent users of healthcare services: a thematic analysis review.

    Science.gov (United States)

    Hudon, Catherine; Chouinard, Maud-Christine; Lambert, Mireille; Diadiou, Fatoumata; Bouliane, Danielle; Beaudin, Jérémie

    2017-10-22

    The aim of this paper was to identify the key factors of case management (CM) interventions among frequent users of healthcare services found in empirical studies of effectiveness. Thematic analysis review of CM studies. We built on a previously published review that aimed to report the effectiveness of CM interventions for frequent users of healthcare services, using the Medline, Scopus and CINAHL databases covering the January 2004-December 2015 period, then updated to July 2017, with the keywords 'CM' and 'frequent use'. We extracted factors of successful (n=7) and unsuccessful (n=6) CM interventions and conducted a mixed thematic analysis to synthesise findings. Chaudoir's implementation of health innovations framework was used to organise results into four broad levels of factors: (1) ,environmental/organisational level, (2) practitioner level, (3) patient level and (4) programme level. Access to, and close partnerships with, healthcare providers and community services resources were key factors of successful CM interventions that should target patients with the greatest needs and promote frequent contacts with the healthcare team. The selection and training of the case manager was also an important factor to foster patient engagement in CM. Coordination of care, self-management support and assistance with care navigation were key CM activities. The main issues reported by unsuccessful CM interventions were problems with case finding or lack of care integration. CM interventions for frequent users of healthcare services should ensure adequate case finding processes, rigorous selection and training of the case manager, sufficient intensity of the intervention, as well as good care integration among all partners. Other studies could further evaluate the influence of contextual factors on intervention impacts. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted

  14. Conceptual framework for holistic dialysis management based on key performance indicators.

    Science.gov (United States)

    Liu, Hu-Chen; Itoh, Kenji

    2013-10-01

    This paper develops a theoretical framework of holistic hospital management based on performance indicators that can be applied to dialysis hospitals, clinics or departments in Japan. Selection of a key indicator set and its validity tests were performed primarily by a questionnaire survey to dialysis experts as well as their statements obtained through interviews. The expert questionnaire asked respondents to rate the degree of "usefulness" for each of 66 indicators on a three-point scale (19 responses collected). Applying the theoretical framework, we selected a minimum set of key performance indicators for dialysis management that can be used in the Japanese context. The indicator set comprised 27 indicators and items that will be collected through three surveys: patient satisfaction, employee satisfaction, and safety culture. The indicators were confirmed by expert judgment from viewpoints of face, content and construct validity as well as their usefulness. This paper established a theoretical framework of performance measurement for holistic dialysis management from primary healthcare stakeholders' perspectives. In this framework, performance indicators were largely divided into healthcare outcomes and performance shaping factors. Indicators of the former type may be applied for the detection of operational problems or weaknesses in a dialysis hospital, clinic or department, while latent causes of each problem can be more effectively addressed by the latter type of indicators in terms of process, structure and culture/climate within the organization. © 2013 The Authors. Therapeutic Apheresis and Dialysis © 2013 International Society for Apheresis.

  15. Hierarchical species distribution models

    Science.gov (United States)

    Hefley, Trevor J.; Hooten, Mevin B.

    2016-01-01

    Determining the distribution pattern of a species is important to increase scientific knowledge, inform management decisions, and conserve biodiversity. To infer spatial and temporal patterns, species distribution models have been developed for use with many sampling designs and types of data. Recently, it has been shown that count, presence-absence, and presence-only data can be conceptualized as arising from a point process distribution. Therefore, it is important to understand properties of the point process distribution. We examine how the hierarchical species distribution modeling framework has been used to incorporate a wide array of regression and theory-based components while accounting for the data collection process and making use of auxiliary information. The hierarchical modeling framework allows us to demonstrate how several commonly used species distribution models can be derived from the point process distribution, highlight areas of potential overlap between different models, and suggest areas where further research is needed.

  16. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor network (WSN applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.

  17. A CEO View of Key Issues in Australian Information Systems Management - 1997

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1998-05-01

    Full Text Available As part of a research programme on key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by their chief executive officers (CEOs as being important, problematic and critical over the next three to five years. The results reported are based on a relatively low response rate (though perhaps reasonable for the target group so should be regarded as only exploratory. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, disaster recovery, strategic management issues (BPR, competitive advantage, information architecture, people management issues (organisational learning, systems development and data management issues (effective use of the data resource, effectiveness/productivity of IS, effectiveness of software development, and their own support systems (EIS/DSS. This reflects their interest in a wide range of issues, but all with an organisation-wide focus. Non-critical issues were mostly related to the individual technologies and the place and role of IS in the organisation. While the CEOs showed some agreement with their chief information officers (CIOs on issues such as the IT infrastructure, competitive advantage, and organisational learning some distinct differences exist, particularly in relation to the quality and effectiveness of systems and processes and also how CEOs and CIOs perceive each other.

  18. COST ACCOUNTING AS THE KEY INFORMATION CORE OF THE COMPANY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Radmila Jablan STEFANOVIĆ

    2010-12-01

    Full Text Available The management is expected to lead the company towards the achievement of set objectives which, in the contemporary settings of marked external and internal complexity, inevitably requires sophisticated expert knowledge and skills, as well as quality information support. Cost accounting generates cost and performance information with the goal of qualitatively meeting information needs of, above all, internal users. It represents the essential part of the company’s accounting information system as a whole and it is often stressed as the key information core and a reliable information support for the company’s management in performing their managerial activities. The contemporary business environment inevitably requires the restructuring of cost accounting and new approaches to costing and cost management, in the attempt to improve the quality of cost information that has always been the object of particular interest. Moreover, only a flexibly designed cost accounting information system can qualitatively respond to the increasingly numerous and various information requirements. In this paper we discuss the role cost accounting has in offering adequate information support to managers at all managerial levels. We emphasize some of the new tools, techniques, concepts and approaches to costing and cost management

  19. Research on and design of key circuits in RFID tag chip for container management

    Directory of Open Access Journals (Sweden)

    Wang Wenjie

    2016-01-01

    Full Text Available This paper introduces the design of semi-passive RFID tag chip capable of monitoring container safety. A system framework complying with requirements by ISO/IEC 18000-6C is firstly presented, and then differences from the key units of common passive chip, such as switch-state monitoring circuit, power management unit and anti-shake design in baseband processor, are elaborated. The main function of such a chip is to record the container opening frequency during transportation. Finally, the realizations of each unit’s function are simulated.

  20. Lifetime assessment and lifetime management for key components of nuclear power plants

    International Nuclear Information System (INIS)

    Dou Yikang; Sun Hanhong; Qu Jiadi

    2000-01-01

    On the bases of investigation on recent development of plant lifetime management in the world, the author gives some points of view on how to establish plant lifetime assessment (PLA) and management (PLM) systems for Chinese nuclear power plants. The main points lie in: 1) safety regulatory organizations, utilities and R and D institutes work cooperatively for PLA and PLM; 2) PLA and PLM make a interdependent cycle, which means that a good PLM system ensures authentic input for PLA, while veritable PLA provides valuable feedback for PLM improvement; 3) PLA and PLM should be initiated for some key components. The author also analyzes some important problems to be tackled in PLA and PLM from the view angle of a R and D institute

  1. Emergency management in health: key issues and challenges in the UK.

    Science.gov (United States)

    Lee, Andrew C K; Phillips, Wendy; Challen, Kirsty; Goodacre, Steve

    2012-10-19

    Emergency planning in the UK has grown considerably in recent years, galvanised by the threat of terrorism. However, deficiencies in NHS emergency planning were identified and the evidence-base that underpins it is questionable. Inconsistencies in terminologies and concepts also exist. Different models of emergency management exist internationally but the optimal system is unknown. This study examines the evidence-base and evidence requirements for emergency planning in the UK health context. The study involved semi-structured interviews with key stakeholders and opinion leaders. Purposive sampling was used to obtain a breadth of views from various agencies involved in emergency planning and response. Interviews were then analysed using a grounded approach using standard framework analysis techniques. We conducted 17 key informant interviews. Interviewees identified greater gaps in operational than technical aspects of emergency planning. Social and behavioural knowledge gaps were highlighted with regards to how individuals and organisations deal with risk and behave in emergencies. Evidence-based approaches to public engagement and for developing community resilience to disasters are lacking. Other gaps included how knowledge was developed and used. Conflicting views with regards to the optimal configuration and operation of the emergency management system were voiced. Four thematic categories for future research emerged:(i) Knowledge-base for emergency management: Further exploration is needed of how knowledge is acquired, valued, disseminated, adopted and retained.(ii) Social and behavioural issues: Greater understanding of how individuals approach risk and behave in emergencies is required.(iii) Organisational issues in emergencies: Several conflicting organisational issues were identified; value of planning versus plans, flexible versus standardized procedures, top-down versus bottom-up engagement, generic versus specific planning, and reactive versus

  2. Key Technologies in the Context of Future Networks: Operational and Management Requirements

    Directory of Open Access Journals (Sweden)

    Lorena Isabel Barona López

    2016-12-01

    Full Text Available The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, three main fields must be improved: radio, network, and operation and management. In particular, operation and management capabilities are intended to enable business agility and operational sustainability, where the addition of new services does not imply an excessive increase in capital or operational expenditures. In this context, a set of key-enabled technologies have emerged in order to aid in this field. Concepts such as Software Defined Network (SDN, Network Function Virtualization (NFV and Self-Organized Networks (SON are pushing traditional systems towards the next 5G network generation.This paper presents an overview of the current status of these promising technologies and ongoing works to fulfill the operational and management requirements of mobile infrastructures. This work also details the use cases and the challenges, taking into account not only SDN, NFV, cloud computing and SON but also other paradigms.

  3. Modelling management process of key drivers for economic sustainability in the modern conditions of economic development

    Directory of Open Access Journals (Sweden)

    Pishchulina E.S.

    2017-01-01

    Full Text Available The text is about issues concerning the management of driver for manufacturing enterprise economic sustainability and manufacturing enterprise sustainability assessment as the key aspect of the management of enterprise economic sustainability. The given issues become topical as new requirements for the methods of manufacturing enterprise management in the modern conditions of market economy occur. An economic sustainability model that is considered in the article is an integration of enterprise economic growth, economic balance of external and internal environment and economic sustainability. The method of assessment of economic sustainability of a manufacturing enterprise proposed in the study allows to reveal some weaknesses in the enterprise performance, and untapped reserves, which can be further used to improve the economic sustainability and efficiency of the enterprise. The management of manufacturing enterprise economic sustainability is one of the most important factors of business functioning and development in modern market economy. The relevance of this trend is increasing in accordance with the objective requirements of the growing volumes of production and sale, the increasing complexity of economic relations, changing external environment of an enterprise.

  4. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    Science.gov (United States)

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  5. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach

    Directory of Open Access Journals (Sweden)

    Ramon Sanchez-Iborra

    2018-06-01

    Full Text Available Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN, which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa and its layer-two supporter LoRa Wide Area Network (LoRaWAN, which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie–Hellman Over COSE (EDHOC is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  6. Deviation Management: Key Management Subsystem Driver of Knowledge-Based Continuous Improvement in the Henry Ford Production System.

    Science.gov (United States)

    Zarbo, Richard J; Copeland, Jacqueline R; Varney, Ruan C

    2017-10-01

    To develop a business subsystem fulfilling International Organization for Standardization 15189 nonconformance management regulatory standard, facilitating employee engagement in problem identification and resolution to effect quality improvement and risk mitigation. From 2012 to 2016, the integrated laboratories of the Henry Ford Health System used a quality technical team to develop and improve a management subsystem designed to identify, track, trend, and summarize nonconformances based on frequency, risk, and root cause for elimination at the level of the work. Programmatic improvements and training resulted in markedly increased documentation culminating in 71,641 deviations in 2016 classified by a taxonomy of 281 defect types into preanalytic (74.8%), analytic (23.6%), and postanalytic (1.6%) testing phases. The top 10 deviations accounted for 55,843 (78%) of the total. Deviation management is a key subsystem of managers' standard work whereby knowledge of nonconformities assists in directing corrective actions and continuous improvements that promote consistent execution and higher levels of performance. © American Society for Clinical Pathology, 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  7. Group assessment of key indicators of sustainable waste management in developing countries.

    Science.gov (United States)

    Tot, Bojana; Vujić, Goran; Srđević, Zorica; Ubavin, Dejan; Russo, Mário Augusto Tavares

    2017-09-01

    Decision makers in developing countries are struggling to solve the present problems of solid waste management. Prioritisation and ranking of the most important indicators that influence the waste management system is very useful for any decision maker for the future planning and implementation of a sustainable waste management system. The aim of this study is to evaluate key indicators and their related sub-indicators in a group decision-making environment. In order to gain insight into the subject it was necessary to obtain the qualified opinions of decision makers from different countries who understand the situation in the sector of waste management in developing countries. An assessment is performed by 43 decision makers from both developed and developing countries, and the applied methodology is based on a combined use of the analytic hierarchy process, from the multi-criteria decision-making set of tools, and the preferential voting method known as Borda Count, which belongs to social choice theory. Pairwise comparison of indicators is performed with the analytic hierarchy process, and the ranking of indicators once obtained is assessed with Borda Count. Detailed analysis of the final results showed that the Institutional-Administrative indicator was the most important one, with the maximum weight as derived by both groups of decision makers. The results also showed that the combined use of the analytic hierarchy process and Borda Count contributes to the credibility and objectivity of the decision-making process, allowing its use in more complex waste management group decision-making problems to be recommended.

  8. Key performance indicators in plant asset management: hype, burden or real help?

    Energy Technology Data Exchange (ETDEWEB)

    Jovanovic, A. (Steinbeis Advanced Risk Technologies, Stuttgart (Germany)); Bareiss, J.M. (EnBW, Stuttgart (Germany))

    2010-05-15

    The paper tackles the increasing role and use of indicators (e.g. the key performance indicators, KPIs) in asset management in power and process plants, in particular for risk and safety management (safety performance indicators, SPIs), inspection, maintenance, emerging risks analysis and aging management. The two main aspects of the use of indicators are monitoring of performance (e.g. of a single unit) and benchmarking (e.g. among different units). The basis for the considerations presented in the paper are several international projects in the field, showing that the main issue in the field is not and cannot be just the introduction of new indicators as such. They deal with the principles of establishing indicators, establishing generally accepted indicators (goal 'globally accepted' indicators), creating of 'repositories' of indicators in industry and respective tools. The repository/tool developed in the EU project iNTeg-Risk is presented in more detail. The main proposed criteria for successful introduction are the acceptance, transparency and clear added value, e.g. when the indicators help in finding solutions for the issues where the conventional analysis, e.g. the one based on engineering models and analysis is too expensive, complex or simply unavailable. Three practical cases are briefly shown in the paper: one for the improved asset management in a refinery, one for the identification of indicators helping to deal with emerging risks (how to identify them and how to assess risks of a new technology) and one for the implementation of a complex aging management program for industrial plants. (orig.)

  9. Key performance indicators in plant asset management: hype, burden or real help?

    International Nuclear Information System (INIS)

    Jovanovic, A.; Bareiss, J.M.

    2010-01-01

    The paper tackles the increasing role and use of indicators (e.g. the key performance indicators, KPIs) in asset management in power and process plants, in particular for risk and safety management (safety performance indicators, SPIs), inspection, maintenance, emerging risks analysis and aging management. The two main aspects of the use of indicators are monitoring of performance (e.g. of a single unit) and benchmarking (e.g. among different units). The basis for the considerations presented in the paper are several international projects in the field, showing that the main issue in the field is not and cannot be just the introduction of new indicators as such. They deal with the principles of establishing indicators, establishing generally accepted indicators (goal 'globally accepted' indicators), creating of 'repositories' of indicators in industry and respective tools. The repository/tool developed in the EU project iNTeg-Risk is presented in more detail. The main proposed criteria for successful introduction are the acceptance, transparency and clear added value, e.g. when the indicators help in finding solutions for the issues where the conventional analysis, e.g. the one based on engineering models and analysis is too expensive, complex or simply unavailable. Three practical cases are briefly shown in the paper: one for the improved asset management in a refinery, one for the identification of indicators helping to deal with emerging risks (how to identify them and how to assess risks of a new technology) and one for the implementation of a complex aging management program for industrial plants. (orig.)

  10. Hierarchical population monitoring of greater sage-grouse (Centrocercus urophasianus) in Nevada and California—Identifying populations for management at the appropriate spatial scale

    Science.gov (United States)

    Coates, Peter S.; Prochazka, Brian G.; Ricca, Mark A.; Wann, Gregory T.; Aldridge, Cameron L.; Hanser, Steven E.; Doherty, Kevin E.; O'Donnell, Michael S.; Edmunds, David R.; Espinosa, Shawn P.

    2017-08-10

    Population ecologists have long recognized the importance of ecological scale in understanding processes that guide observed demographic patterns for wildlife species. However, directly incorporating spatial and temporal scale into monitoring strategies that detect whether trajectories are driven by local or regional factors is challenging and rarely implemented. Identifying the appropriate scale is critical to the development of management actions that can attenuate or reverse population declines. We describe a novel example of a monitoring framework for estimating annual rates of population change for greater sage-grouse (Centrocercus urophasianus) within a hierarchical and spatially nested structure. Specifically, we conducted Bayesian analyses on a 17-year dataset (2000–2016) of lek counts in Nevada and northeastern California to estimate annual rates of population change, and compared trends across nested spatial scales. We identified leks and larger scale populations in immediate need of management, based on the occurrence of two criteria: (1) crossing of a destabilizing threshold designed to identify significant rates of population decline at a particular nested scale; and (2) crossing of decoupling thresholds designed to identify rates of population decline at smaller scales that decouple from rates of population change at a larger spatial scale. This approach establishes how declines affected by local disturbances can be separated from those operating at larger scales (for example, broad-scale wildfire and region-wide drought). Given the threshold output from our analysis, this adaptive management framework can be implemented readily and annually to facilitate responsive and effective actions for sage-grouse populations in the Great Basin. The rules of the framework can also be modified to identify populations responding positively to management action or demonstrating strong resilience to disturbance. Similar hierarchical approaches might be beneficial

  11. Stakeholder Confidence and Radioactive Waste management - An annotated glossary of key terms

    International Nuclear Information System (INIS)

    Martell, Meritxell; Pescatore, Claudio; Mays, Claire

    2013-01-01

    The OECD Nuclear Energy Agency (NEA) Forum on Stakeholder Confidence (FSC) Annotated Glossary is a review of concepts central to societal decision making about radioactive waste management. It records the evolution in understanding that has taken place in the group as the FSC has worked with these concepts over time. This should be a useful resource not only for new FSC participants but also for others: this annotated glossary forms a good reference handbook for future texts regarding societal aspects of radioactive waste management and its governance. Each glossary entry is structured, to the extent possible, as follows: - The term and its variants, if any, in FSC literature are identified. - The common FSC understanding of the concept and any guidance are captured, based upon a review of all FSC documents to date. - Any evolution of the concept observed over the decade of FSC work is analysed. - The FSC interpretation of the symbolic dimension is explored. - The current status of outlook in the FSC, and intended activities according to the current Programme of Work (2010 and beyond) are assessed. Overall, although different persons and groups may assign different meanings to words, and although terminology will continue to evolve, this glossary is the FSC's 'state-of-the-art' guide to key terms in use. As such, it should prove to be a handy reference for all those interested in the governance of radioactive waste management

  12. Asthma referrals: a key component of asthma management that needs to be addressed

    Directory of Open Access Journals (Sweden)

    Price D

    2017-07-01

    Full Text Available David Price,1,2 Leif Bjermer,3 David A Bergin,4 Rafael Martinez5 1Centre of Academic Primary Care, University of Aberdeen, Aberdeen, UK; 2Observational and Pragmatic Research Institute, Singapore; 3Department of Respiratory Medicine and Allergology, Lund University, Lund, Sweden; 4Novartis Ireland Limited, Dublin, Ireland; 5Novartis Pharma AG, Basel, Switzerland Abstract: Heterogeneity of asthma and difficulty in achieving optimal control are the major challenges in the management of asthma. To help attain the best possible clinical outcomes in patients with asthma, several guidelines provide recommendations for patients who will require a referral to a specialist. Such referrals can help in clearing the uncertainty from the initial diagnosis, provide tailored treatment options to patients with persistent symptoms and offer the patients access to health care providers with expertise in the management of the asthma; thus, specialist referrals have a substantial impact on disease prognosis and the patient’s health status. Hurdles in implementing these recommendations include lack of their dissemination among health care providers and nonadherence to these guidelines; these hurdles considerably limit the implementation of specialist referrals, eventually affecting the rate of referrals. In this review, recommendations for specialist referrals from several key international and national asthma guidelines and other relevant published literature are evaluated. Furthermore, we highlight why referrals are not happening, how this can be improved, and ultimately, what should be done in the specialist setting, based on existing evidence in published literature. Keywords: asthma, disease management, specialization, primary care physicians, referral

  13. Deliberate change without hierarchical influence?

    DEFF Research Database (Denmark)

    Nørskov, Sladjana; Kesting, Peter; Ulhøi, John Parm

    2017-01-01

    reveals that deliberate change is indeed achievable in a non-hierarchical collaborative OSS community context. However, it presupposes the presence and active involvement of informal change agents. The paper identifies and specifies four key drivers for change agents’ influence. Originality....../value The findings contribute to organisational analysis by providing a deeper understanding of the importance of leadership in making deliberate change possible in non-hierarchical settings. It points to the importance of “change-by-conviction”, essentially based on voluntary behaviour. This can open the door...

  14. Research on key technology of prognostic and health management for autonomous underwater vehicle

    Science.gov (United States)

    Zhou, Zhi

    2017-12-01

    Autonomous Underwater Vehicles (AUVs) are non-cable and autonomous motional underwater robotics. With a wide range of activities, it can reach thousands of kilometers. Because it has the advantages of wide range, good maneuverability, safety and intellectualization, it becomes an important tool for various underwater tasks. How to improve diagnosis accuracy of the AUVs electrical system faults, and how to repair AUVs by the information are the focus of navy in the world. In turn, ensuring safe and reliable operation of the system has very important significance to improve AUVs sailing performance. To solve these problems, in the paper the prognostic and health management(PHM) technology is researched and used to AUV, and the overall framework and key technology are proposed, such as data acquisition, feature extraction, fault diagnosis, failure prediction and so on.

  15. Ecological thresholds: The key to successful enviromental management or an important concept with no practical application?

    Science.gov (United States)

    Groffman, P.M.; Baron, Jill S.; Blett, T.; Gold, A.J.; Goodman, I.; Gunderson, L.H.; Levinson, B.M.; Palmer, Margaret A.; Paerl, H.W.; Peterson, G.D.; Poff, N.L.; Rejeski, D.W.; Reynolds, J.F.; Turner, M.G.; Weathers, K.C.; Wiens, J.

    2006-01-01

    An ecological threshold is the point at which there is an abrupt change in an ecosystem quality, property or phenomenon, or where small changes in an environmental driver produce large responses in the ecosystem. Analysis of thresholds is complicated by nonlinear dynamics and by multiple factor controls that operate at diverse spatial and temporal scales. These complexities have challenged the use and utility of threshold concepts in environmental management despite great concern about preventing dramatic state changes in valued ecosystems, the need for determining critical pollutant loads and the ubiquity of other threshold-based environmental problems. In this paper we define the scope of the thresholds concept in ecological science and discuss methods for identifying and investigating thresholds using a variety of examples from terrestrial and aquatic environments, at ecosystem, landscape and regional scales. We end with a discussion of key research needs in this area.

  16. Identifying and weighting of key performance indicators of knowledge management2.0 in organizations

    Directory of Open Access Journals (Sweden)

    Saeed Khalilazar

    2016-03-01

    Full Text Available Main purpose of this research is identifying and weighting of key performance indicators of knowledge management2.0 in organizations. According to widespread permeation of technology, especially social media in different organizational dimensions and functional view to this phenomenon in knowledge management, performance measurement of this kind of media in order to meet organizational goals seems necessary. KM2.0 key performance indicators in this article has been identified and weighted through Delphi methodology, via questionnaire in three rounds. KM2.0 KPIs which are identified and weighted in this article are applicable in organizations that are eager to implement KM2.0 initiative and they can measure the performance of KM2.0 activities therefore this research is applicable in goal oriented approach. According to the results, KM2.0 participation process consists of 3 stages and 8 steps as mentioned below: First stage which is presence, consists of 3 steps which are registration, visit and download. Second stage which is feedback consists of 3 steps which are conversation, applause and amplification. Finally, third stage which is creation consists of 2 steps which are codification and personalization. Ultimate contribution of this research is identifying and weighting KPIs of KM2.0 in conceptual framework of KM2.0. Based on developing a conceptual framework and participation process in KM2.0 and listing related KPIs as an applicable solution in order to measure and improve the performance of organizational social media, this research has unique innovation among related and other articles.

  17. Risk based knowledge assessments: towards a toolbox for managing key knowledge assets

    International Nuclear Information System (INIS)

    Bright, Clive

    2008-01-01

    Full text: It is now well acknowledged that considerable Knowledge Management (KM) issues are faced by national and international nuclear communities. Much of these problems relate to issues of an ageing workforce and the significantly reduced influx of new generation of nuclear engineers and scientists. The management discipline of KM contains a broad spectrum of methods and techniques. However, the effective implementation of a KM strategy requires the selection and deployment of appropriate and targeted approaches that are pertinent to the particular issues of the technical or business area within an organisation. A clear strategy is contingent upon an assessment of what are the knowledge areas and what are the key (knowledge) risk areas. In particular the following issues have to be addressed: 'what knowledge exists?', 'what is the nature and format of that knowledge?' and 'what knowledge is key to our continued, safe, and effective operation?'. Answers to such questions will enable an organisation to prioritise KM effort and employ subsequent KM approaches that are appropriate. Subsequent approaches ranging from the utilisation of information technologies, such as databases; knowledge retention methods; and the setting up of Community of Practices to share knowledge and experience. This paper considers a risk assessment based approach to KM. In so doing the paper extends work previously reported on an approach to conducting knowledge audits by considering the integration of that approach with approaches to (knowledge) risk assessment. The paper also provides a brief review of the various KM approaches that can act to reduce the level of risk faced by an organisation. The paper concludes by reflecting upon the role, value of deploying such a risk based approach. (author)

  18. The key incident monitoring and management system - history and role in quality improvement.

    Science.gov (United States)

    Badrick, Tony; Gay, Stephanie; Mackay, Mark; Sikaris, Ken

    2018-01-26

    The determination of reliable, practical Quality Indicators (QIs) from presentation of the patient with a pathology request form through to the clinician receiving the report (the Total Testing Process or TTP) is a key step in identifying areas where improvement is necessary in laboratories. The Australasian QIs programme Key Incident Monitoring and Management System (KIMMS) began in 2008. It records incidents (process defects) and episodes (occasions at which incidents may occur) to calculate incident rates. KIMMS also uses the Failure Mode Effects Analysis (FMEA) to assign quantified risk to each incident type. The system defines risk as incident frequency multiplied by both a harm rating (on a 1-10 scale) and detection difficulty score (also a 1-10 scale). Between 2008 and 2016, laboratories participating rose from 22 to 69. Episodes rose from 13.2 to 43.4 million; incidents rose from 114,082 to 756,432. We attribute the rise in incident rate from 0.86% to 1.75% to increased monitoring. Haemolysis shows the highest incidence (22.6% of total incidents) and the highest risk (26.68% of total risk). "Sample is suspected to be from the wrong patient" has the second lowest frequency, but receives the highest harm rating (10/10) and detection difficulty score (10/10), so it is calculated to be the 8th highest risk (2.92%). Similarly, retracted (incorrect) reports QI has the 10th highest frequency (3.9%) but the harm/difficulty calculation confers the second highest risk (11.17%). TTP incident rates are generally low (less than 2% of observed episodes), however, incident risks, their frequencies multiplied by both ratings of harm and discovery difficulty scores, concentrate improvement attention and resources on the monitored incident types most important to manage.

  19. Prioritizing key resilience indicators to support coral reef management in a changing climate.

    Science.gov (United States)

    McClanahan, Tim R; Donner, Simon D; Maynard, Jeffrey A; MacNeil, M Aaron; Graham, Nicholas A J; Maina, Joseph; Baker, Andrew C; Alemu I, Jahson B; Beger, Maria; Campbell, Stuart J; Darling, Emily S; Eakin, C Mark; Heron, Scott F; Jupiter, Stacy D; Lundquist, Carolyn J; McLeod, Elizabeth; Mumby, Peter J; Paddack, Michelle J; Selig, Elizabeth R; van Woesik, Robert

    2012-01-01

    Managing coral reefs for resilience to climate change is a popular concept but has been difficult to implement because the empirical scientific evidence has either not been evaluated or is sometimes unsupportive of theory, which leads to uncertainty when considering methods and identifying priority reefs. We asked experts and reviewed the scientific literature for guidance on the multiple physical and biological factors that affect the ability of coral reefs to resist and recover from climate disturbance. Eleven key factors to inform decisions based on scaling scientific evidence and the achievability of quantifying the factors were identified. Factors important to resistance and recovery, which are important components of resilience, were not strongly related, and should be assessed independently. The abundance of resistant (heat-tolerant) coral species and past temperature variability were perceived to provide the greatest resistance to climate change, while coral recruitment rates, and macroalgae abundance were most influential in the recovery process. Based on the 11 key factors, we tested an evidence-based framework for climate change resilience in an Indonesian marine protected area. The results suggest our evidence-weighted framework improved upon existing un-weighted methods in terms of characterizing resilience and distinguishing priority sites. The evaluation supports the concept that, despite high ecological complexity, relatively few strong variables can be important in influencing ecosystem dynamics. This is the first rigorous assessment of factors promoting coral reef resilience based on their perceived importance, empirical evidence, and feasibility of measurement. There were few differences between scientists' perceptions of factor importance and the scientific evidence found in journal publications but more before and after impact studies will be required to fully test the validity of all the factors. The methods here will increase the feasibility

  20. Prioritizing key resilience indicators to support coral reef management in a changing climate.

    Directory of Open Access Journals (Sweden)

    Tim R McClanahan

    Full Text Available Managing coral reefs for resilience to climate change is a popular concept but has been difficult to implement because the empirical scientific evidence has either not been evaluated or is sometimes unsupportive of theory, which leads to uncertainty when considering methods and identifying priority reefs. We asked experts and reviewed the scientific literature for guidance on the multiple physical and biological factors that affect the ability of coral reefs to resist and recover from climate disturbance. Eleven key factors to inform decisions based on scaling scientific evidence and the achievability of quantifying the factors were identified. Factors important to resistance and recovery, which are important components of resilience, were not strongly related, and should be assessed independently. The abundance of resistant (heat-tolerant coral species and past temperature variability were perceived to provide the greatest resistance to climate change, while coral recruitment rates, and macroalgae abundance were most influential in the recovery process. Based on the 11 key factors, we tested an evidence-based framework for climate change resilience in an Indonesian marine protected area. The results suggest our evidence-weighted framework improved upon existing un-weighted methods in terms of characterizing resilience and distinguishing priority sites. The evaluation supports the concept that, despite high ecological complexity, relatively few strong variables can be important in influencing ecosystem dynamics. This is the first rigorous assessment of factors promoting coral reef resilience based on their perceived importance, empirical evidence, and feasibility of measurement. There were few differences between scientists' perceptions of factor importance and the scientific evidence found in journal publications but more before and after impact studies will be required to fully test the validity of all the factors. The methods here will

  1. Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jugminder Kaur

    2016-01-01

    Full Text Available Security is always a major concern in wireless sensor networks (WSNs. Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This route is then updated by isolating the malicious or compromised nodes from the route, if any, and a dedicated link is created between every pair of nodes in the selected route with the help of “q” composite random key predistribution scheme (RKPS to ensure data delivery from source to destination. The performance of trust aware secure routing framework (TSRF is compared with the proposed routing scheme. The results indicate that STKF provides an effective mechanism for finding out a secure route with better trustworthiness than TSRF which avoids the data dropping, thereby increasing the data delivery ratio. Also the distance required to reach the destination in the proposed protocol is less hence effectively utilizing the resources.

  2. Management of investment-construction projects basing on the matrix of key events

    Directory of Open Access Journals (Sweden)

    Morozenko Andrey Aleksandrovich

    2016-11-01

    Full Text Available The article considers the current problematic issues in the management of investment-construction projects, examines the questions of efficiency increase of construction operations on the basis of the formation of a reflex-adaptive organizational structure. The authors analyzed the necessity of forming a matrix of key events in the investment-construction project (ICP, which will create the optimal structure of the project, basing on the work program for its implementation. For convenience of representing programs of the project implementation in time the authors make recommendations to consolidate the works into separate, economically independent functional blocks. It is proposed to use an algorithm of forming the matrix of an investment-construction project, considering the economic independence of the functional blocks and stages of the ICP implementation. The use of extended network model is justified, which is supplemented by organizational and structural constraints at different stages of the project, highlighting key events fundamentally influencing the further course of the ICP implementation.

  3. Processing of hierarchical syntactic structure in music.

    Science.gov (United States)

    Koelsch, Stefan; Rohrmeier, Martin; Torrecuso, Renzo; Jentschke, Sebastian

    2013-09-17

    Hierarchical structure with nested nonlocal dependencies is a key feature of human language and can be identified theoretically in most pieces of tonal music. However, previous studies have argued against the perception of such structures in music. Here, we show processing of nonlocal dependencies in music. We presented chorales by J. S. Bach and modified versions in which the hierarchical structure was rendered irregular whereas the local structure was kept intact. Brain electric responses differed between regular and irregular hierarchical structures, in both musicians and nonmusicians. This finding indicates that, when listening to music, humans apply cognitive processes that are capable of dealing with long-distance dependencies resulting from hierarchically organized syntactic structures. Our results reveal that a brain mechanism fundamental for syntactic processing is engaged during the perception of music, indicating that processing of hierarchical structure with nested nonlocal dependencies is not just a key component of human language, but a multidomain capacity of human cognition.

  4. Some key principles in implementing knowledge management: the views of employees in a small software company

    Directory of Open Access Journals (Sweden)

    Clair Wagner

    2002-09-01

    Full Text Available As the Knowledge Era replaces the Information Age the challenge is to transform information into knowledge and use this knowledge to create and sustain the competitive advantage of organisations. In this article four key principles for implementing knowledge management are discussed. These principles were derived from a survey and discussions with employees at a small software company. The four principles are: the need for a common definition of and vision for knowledge management, the interdependence between the human and technology track, the way employees punctuate ‘knowing’ and the structure of a reward system for sharing knowledge. Opsomming Organisasies word gekonfronteer met unieke uitdagings soos wat die Kennisera die Inligtingsera vervang. Een van die grootste uitdagings is om inligting te verander na betekenisvolle kennis en om die kennis te gebruik om ‘n kompeterende voorsprong te skep en te bou. In hierdie artikel word vier kern beginsels vir die implementering van kennisbestuur bespreek. Die beginsels is geskoei op ‘n opname van en onderhoude met werknemers in ‘n klein sagteware besigheid. Die vier beginsels is: die behoefte aan ‘n definisie en visie van kennisbestuur, die interafhanklikheid tussen mense en tegnologie, die wyse waarop werknemers kennis punktueer en die skep van ‘n beloningstruktuur vir die deel van kennis.

  5. Mechanisms of chronic pain - key considerations for appropriate physical therapy management.

    Science.gov (United States)

    Courtney, Carol A; Fernández-de-Las-Peñas, César; Bond, Samantha

    2017-07-01

    In last decades, knowledge of nociceptive pain mechanisms has expanded rapidly. The use of quantitative sensory testing has provided evidence that peripheral and central sensitization mechanisms play a relevant role in localized and widespread chronic pain syndromes. In fact, almost any patient suffering with a chronic pain condition will demonstrate impairments in the central nervous system. In addition, it is accepted that pain is associated with different types of trigger factors including social, physiological, and psychological. This rational has provoked a change in the understanding of potential mechanisms of manual therapies, changing from a biomechanical/medical viewpoint, to a neurophysiological/nociceptive viewpoint. Therefore, interventions for patients with chronic pain should be applied based on current knowledge of nociceptive mechanisms since determining potential drivers of the sensitization process is critical for effective management. The current paper reviews mechanisms of chronic pain from a clinical and neurophysiological point of view and summarizes key messages for clinicians for proper management of individuals with chronic pain.

  6. Key Design Considerations When Calculating Cost Savings for Population Health Management Programs in an Observational Setting.

    Science.gov (United States)

    Murphy, Shannon M E; Hough, Douglas E; Sylvia, Martha L; Dunbar, Linda J; Frick, Kevin D

    2018-02-08

    To illustrate the impact of key quasi-experimental design elements on cost savings measurement for population health management (PHM) programs. Population health management program records and Medicaid claims and enrollment data from December 2011 through March 2016. The study uses a difference-in-difference design to compare changes in cost and utilization outcomes between program participants and propensity score-matched nonparticipants. Comparisons of measured savings are made based on (1) stable versus dynamic population enrollment and (2) all eligible versus enrolled-only participant definitions. Options for the operationalization of time are also discussed. Individual-level Medicaid administrative and claims data and PHM program records are used to match study groups on baseline risk factors and assess changes in costs and utilization. Savings estimates are statistically similar but smaller in magnitude when eliminating variability based on duration of population enrollment and when evaluating program impact on the entire target population. Measurement in calendar time, when possible, simplifies interpretability. Program evaluation design elements, including population stability and participant definitions, can influence the estimated magnitude of program savings for the payer and should be considered carefully. Time specifications can also affect interpretability and usefulness. © Health Research and Educational Trust.

  7. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach.

    Science.gov (United States)

    Si, Sheng-Li; You, Xiao-Yue; Liu, Hu-Chen; Huang, Jia

    2017-08-19

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that "accidents/adverse events", "nosocomial infection", ''incidents/errors", "number of operations/procedures" are significant influential indicators. Also, the indicators of "length of stay", "bed occupancy" and "financial measures" play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions.

  8. Capacity building in water demand management as a key component for attaining millennium development goals

    Science.gov (United States)

    Gumbo, Bekithemba; Forster, Laura; Arntzen, Jaap

    Successful water demand management (WDM) implementation as a component of integrated water resource management (IWRM) can play a significant role in the alleviation of poverty through more efficient use of available water resources. The urban population in Southern African cities is characterised by so-called ‘water poor’ communities who typically expend a high percentage of their household income on poor quality water. Usually they have no access to an affordable alternative source. Although WDM as a component of IWRM is not a panacea for poverty, it can help alleviate poverty by facilitating water services management by municipal water supply agencies (MWSAs) in the region. WDM is a key strategy for achieving the millennium development goals (MDGs) and, as such, should be given due attention in the preparation of national IWRM and water efficiency plans. Various studies in the Southern African region have indicated that capacity building is necessary for nations to develop IWRM and water-use efficiency plans to meet the targets set out in the MDGs. WDM education and training of water professionals and end-users is particularly important in developing countries, which are resource and information-access poor. In response to these findings, The World Conservation Union (IUCN) and its consulting partners, the Training and Instructional Design Academy of South Africa (TIDASA), and Centre for Applied Research (CAR) designed, developed and presented a pilot WDM Guideline Training Module for MWSAs as part of Phase II of IUCN’s Southern Africa regional WDM project. Pilot training was conducted in July 2004 in Lusaka, Zambia for a group of 36 participants involved in municipal water supply from nine Southern African countries. This paper looks at the links between building the capacity of professionals, operational staff and other role-players in the municipal water supply chain to implement WDM as part of broader IWRM strategies, and the subsequent potential for

  9. Policies for managing urban growth and landscape change: a key to conservation in the 21st century

    Science.gov (United States)

    David N., tech. ed. Bengston

    2005-01-01

    Protecting natural areas in the face of urbanization is one of the most important challenges for conservation in the 21st century. The papers in this collection examine key issues related to growth management and selected approaches to managing urban growth and minimizing its social and environmental costs. They were presented at the 2004 annual meeting of the Society...

  10. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  11. EMSODEV and EPOS-IP: key findings for effective management of EU research infrastructure projects

    Science.gov (United States)

    Materia, Paola; Bozzoli, Sabrina; Beranzoli, Laura; Cocco, Massimo; Favali, Paolo; Freda, Carmela; Sangianantoni, Agata

    2017-04-01

    -2019) is a project of 47 partners, 6 associate partners and several international organizations for a total of 25 countries involved. EPOS IP is a key step in EPOS' mission of a pan-European Earth science integrated platform. It will deliver not only a suite of domain-specific and multidisciplinary data and services in one platform, but also the legal, governance and financial frameworks to ensure the infrastructure future operation and sustainability (EPOS ERIC). INGV experience over the years indicates that effective management of EU RIs projects should contain 5 basic elements: 1.Defined life cycle and milestones: Map of phases, deliverables, key milestones and sufficiency criteria for each group involved in the project using project management tools and software. 2.Shared organization, systems, roles: Defined roles for team members and responsibilities for functional managers are crucial. Similarly, a system of communication and team involvement is essential to success. Leadership and interpersonal/organizational skills are also important. 3.Quality assurance: Quality dimension should be aligned to the project objectives and specific criteria should be identified for each phase of the project. 4.Tracking and variance analysis: Regular reports and periodic meetings of the teams are crucial to identify when things are off target. Schedule slips, cost overruns, open issues, new risks and problems must be dealt with as early as possible. 5.Impact assessment by monitoring the achievement of results and socio-economic impact.

  12. [Application of laboratory information system in the management of the key indicators of quality inspection].

    Science.gov (United States)

    Guo, Ye; Chen, Qian; Wu, Wei; Cui, Wei

    2015-03-31

    To establish a system of monitoring the key indicator of quality for inspection (KIQI) on a laboratory information system (LIS), and to have a better management of KIQI. Clinical sample made in PUMCH were collected during the whole of 2014. Next, interactive input program were designed to accomplish data collecting of the disqualification rate of samples, the mistake rate of samples and the occasions of losing samples, etc. Then, a series moment of sample collection, laboratory sample arrived, sample test, sample check, response to critical value, namely, trajectory information left on LIS were recorded and the qualification rate of TAT, the notification rate of endangering result were calculated. Finally, the information about quality control were collected to build an internal quality control database and the KIQI, such as the out-of-control rate of quality control and the total error of test items were monitored. The inspection of the sample management shows the disqualification rates in 2014 were all below the target, but the rates in January and February were a little high and the rates of four wards were above 2%. The mistake rates of samples was 0.47 cases/10 000 cases, attaining the target (laboratory reports shows the qualification rates of TAT was within the acceptable range (> 95%), however the rates of blood routine in November (94.75%) was out of range. We have solved the problem by optimizing the processes. The notification rate of endangering result attained the target (≥ 98%), while the rate of timely notification is needed to improve. Quality inspection shows the CV of APTT in August (5.02%) was rising significantly, beyond the accepted CV (5.0%). We have solved the problem by changing the reagent. The CV of TT in 2014 were all below the allowable CV, thus the allowable CV of the next year lower to 10%. It is an objective and effective method to manage KIQI with the powerful management mode of database and information process capability on LIS.

  13. Closing the water cycle - the key role of water and wastewater management in a circular economy

    Science.gov (United States)

    Uhlenbrook, Stefan; Connor, Rick; Koncagul, Engin; Ortigara, Angela

    2017-04-01

    Planetary water boundaries are exceeded locally and regionally as water demand and use are escalating and per capita water availability is decreasing. However, wastewater represents an alternative yet reliable source containing for instance, nutrients (for use as fertilizer) and metals that can be extracted, and can be a source of energy. These characteristics mean that water and wastewater are set to play a key role in the circular economy. Furthermore, wastewater use can generate business opportunities and enhance water, food and energy security, therefore helping to alleviate poverty. However, to increase the collection, treatment and use of wastewater, investments in infrastructure and appropriate (low cost) technologies are needed. Ensuring the development of human and institutional capacity is also essential for proper wastewater management. The UN World Water Assessment Programme (WWAP) produces together with several UN-Water Members and Partners the annual World Water Development Report (WWDR). Its 2017 edition "Wastewater: The Untapped Resource" focuses on the critical role of wastewater management for vibrant economies, resilient societies and the maintenance of a healthy environment. Wastewater issues play also a central role in the 2030 Agenda for Sustainable Development, most notably through Sustainable Development Goal (SDG) target 6.3 that aims to improve water quality by reducing the proportion of untreated wastewater released to the environment and increasing its recycling and safe reuse globally. This target is interlinked with several other targets of SDG 6 ('the water goal') as well as to several other SDGs that relate to, poverty reduction, health, energy and food security, among others. The main policy-relevant messages of the WWDR 2017 will be introduced and linked to socio-hydrological approaches. These messages are an important input to the implementation of the water research agenda of the Panta Rhei initiative of IAHS.

  14. Energy management in production: A novel method to develop key performance indicators for improving energy efficiency

    International Nuclear Information System (INIS)

    May, Gökan; Barletta, Ilaria; Stahl, Bojan; Taisch, Marco

    2015-01-01

    Highlights: • We propose a 7-step methodology to develop firm-tailored energy-related KPIs (e-KPIs). • We provide a practical guide for companies to identify their most important e-KPIs. • e-KPIs support identification of energy efficiency improvement areas in production. • The method employs an action plan for achieving energy saving targets. • The paper strengthens theoretical base for energy-based decision making in manufacturing. - Abstract: Measuring energy efficiency performance of equipments, processes and factories is the first step to effective energy management in production. Thus, enabled energy-related information allows the assessment of the progress of manufacturing companies toward their energy efficiency goals. In that respect, the study addresses this challenge where current industrial approaches lack the means and appropriate performance indicators to compare energy-use profiles of machines and processes, and for the comparison of their energy efficiency performance to that of competitors’. Focusing on this challenge, the main objective of the paper is to present a method which supports manufacturing companies in the development of energy-based performance indicators. For this purpose, we provide a 7-step method to develop production-tailored and energy-related key performance indicators (e-KPIs). These indicators allow the interpretation of cause-effect relationships and therefore support companies in their operative decision-making process. Consequently, the proposed method supports the identification of weaknesses and areas for energy efficiency improvements related to the management of production and operations. The study therefore aims to strengthen the theoretical base necessary to support energy-based decision making in manufacturing industries

  15. Human and organisational factors as key levers of performance in D and D project management - 59323

    International Nuclear Information System (INIS)

    Flament, Thierry; Willmann, Bertrand; Laval, Gregoire de; Lemarch, Jean-Louis; Cordoba, Alain

    2012-01-01

    Document available in abstract form only. Full text of publication follows: In a number pf D and D projects, the type of installations to be dismantled and the variety of their equipments (glove-boxes, tanks..) and the products present on site (plutonium, uranium) in the form of powder are making many operations manual ones. Key phases in HR and organisation management: - The first D and D experience, the learning curve ramp-up - To begin any project, you usually try to benefit from benchmark of similar projects to be able to build up the first scenario, by using the best practices. The first experimental team consisted of operators who already had experienced dismantling at least once in the course of their career. This first dismantling operation is preferably to be conducted on an installation relatively poorly contaminated. This was to implement the correct techniques thus reducing the consequences of a possible unforeseen event. The capitalisation on the return on experience The success of this first dismantling site operation allowed us to implement a process of experience feedback to build the scenarios and the operating procedures of the following sites. In particular, targeted safety-security stop points are positioned for validation on the operations by people responsible for safety and security

  16. Key Performance Indicators in Radiology: You Can't Manage What You Can't Measure.

    Science.gov (United States)

    Harvey, H Benjamin; Hassanzadeh, Elmira; Aran, Shima; Rosenthal, Daniel I; Thrall, James H; Abujudeh, Hani H

    2016-01-01

    Quality assurance (QA) is a fundamental component of every successful radiology operation. A radiology QA program must be able to efficiently and effectively monitor and respond to quality problems. However, as radiology QA has expanded into the depths of radiology operations, the task of defining and measuring quality has become more difficult. Key performance indicators (KPIs) are highly valuable data points and measurement tools that can be used to monitor and evaluate the quality of services provided by a radiology operation. As such, KPIs empower a radiology QA program to bridge normative understandings of health care quality with on-the-ground quality management. This review introduces the importance of KPIs in health care QA, a framework for structuring KPIs, a method to identify and tailor KPIs, and strategies to analyze and communicate KPI data that would drive process improvement. Adopting a KPI-driven QA program is both good for patient care and allows a radiology operation to demonstrate measurable value to other health care stakeholders. Copyright © 2015 Mosby, Inc. All rights reserved.

  17. An empirical investigation on the effects of electronic banking on key customer relationship management

    Directory of Open Access Journals (Sweden)

    Kazem Chavoshi

    2013-12-01

    Full Text Available In recent years, there has been good progress on information and communication technology influencing businesses with a new emerging concept called customer relationship management (CRM and it has made significant changes in electronic banking. The primary objective of this paper is to survey electronic banking effects on key CRM components in one of Iranian banks in city of Tehran, Iran. The survey designs a questionnaire and distributes it among some experts in one of selected regions and the results are verified based on t-student and Freedman tests. Results show that all electronic banking services influence on CRM. In addition, that there are no significant differences among effects of electronic services on CRM but each CRM component has different effects on electronic services. In fact, according to freedman test, improving customer relationship process is the most important factor followed by providing appropriate service for each customer, providing appropriate service on appropriate time for each customer and providing appropriate service by appropriate channel for each customer.

  18. Understanding the cognitive basis for human-wildlife relationships as a key to successful protected-area management

    DEFF Research Database (Denmark)

    Teel, Tara L.; Manfredo, Michael J.; Jensen, Frank Søndergaard

    2010-01-01

    or value orientations form basis for more specific cognitions that in turn drive individual action. We extend this cognitive hierarchy framework to account for the rolke of societal forces that give rise to cultural values and their orientations over time. Using empirical data from two cases, we surview...... this micro-macro approach and explore its implications for protected-area management. First, data from nineteen-state study conducted in 2004 via mail survey in the united States show how two contrasting orientations - dominations and mutualism - produce different attitudes and behaviors toward wildlife....... Hierarchical linear modeling of these data supports a societal-level shift from domination to mutualism in response to modernization. Second, a 2007-8 exploratory application of outdoor approach in ten European countries provides further evidence of the role of value orientations in shaping individual response...

  19. Top management team composition and organizational ecology : A nested hierarchical selection theory of team reproduction and organizational diversity

    NARCIS (Netherlands)

    Boone, Christophe; Wezel, Filippo C.; van Witteloostuijn, Arjen; Baum, JAC; Dobrev, SD; VanWitteloostuijn, A

    2006-01-01

    The "upper echelon" literature has mainly produced static empirical studies on the impact of top management team composition on organizational outcomes, ignoring the dynamics of industrial demography. Organizational ecology explicitly studied the dynamics of organizational diversity at the

  20. Where is the competitive advantage going?: a management model that incorporates people as a key element of the business strategy

    Directory of Open Access Journals (Sweden)

    Emilio García Vega

    2015-09-01

    Full Text Available Competitive advantage is a concept that has evolved in an accelerated way during the last few years. Some scholars and executives claim that people are a fundamental element of its construction. In this line, business management has shown an inclination towards the human resources management – also called “talents” – as the key element of its organizational success. In this journey, the ideas, paradigms and conceptions have been modified in an interesting way. This paper tries to propose these new conceptions facing the organization management challenge, and proposes a management model based on the importance of the people in the competitive advantage administration.

  1. Biometrics based key management of double random phase encoding scheme using error control codes

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  2. KEY ASPECTS OF MANAGING AN INNOVATION PROJECT IN THE EU FRAMEWORK PROGRAMME HORIZON 2020

    Directory of Open Access Journals (Sweden)

    Siniša M. Arsić

    2015-01-01

    Full Text Available The program EU Horizon 2020 (ec.europa.eu is the largest source of resources for all legal entities from Europe, with the budget of 80 billion €. It is possible to use donations from the EU for various proposals and themes, from the 91 calls for projects, with subjects differing from sustainable transport to the innovation support of the SME sector. A group of Serbian authors decided to enter into somewhat of an ambitious endeavour (authors had individual experience on projects, they decided to send a project proposal in the framework of the „SME Instrument“ call, which is directed to inovation support project in the SME sector. The projects that are proposed for the financing by the EU Horizon 2020 program, are in the group of complex and very specific projects, so the authors presented the review of key aspects of projects that are engaged in realization of the inovation process that starts with a certain idea on paper, and ends with a verified product which is placed on the competitive EU market. The special chapter of this paper deals with the sinergy of the inovation project explorers, which must answer to the multidisciplinarity of research problems. The possibilities are examined in the research of the technical-technological sciences, by using organizational-informatic tools, developed for the needs of managing projects. The main use of this work for readers are illuminating of numerous unknown technical details regarding the proposal itself, and the process of connecting with the project partners, because the large number of proposals quits off right at the beginning. Then contribution is reflected in the fact that the paper signifies a sort of basis for a knowledge base, which can be served to higher education institutions and economy to focus a part of their intentions on lifting their own capacity for the struggle with the massive competition of EU that is expected in years and decades to come.

  3. Omega West Reactor program management and communication key to successful Decontamination and Decommissioning (D and D)

    Energy Technology Data Exchange (ETDEWEB)

    Mee, Stephen F.; Rendell, Keith R.; Peifer, Martin J. [Los Alamos National Laboratory, PO Box 1663, Los Alamos, NM 87545 (United States); Gallegos, John A. [National Nuclear Security Administration, P.O. Box 5400, Albuquerque, NM 87185 (United States); Straehr, James P.; Stringer, Joe B. [Framatome ANP, Tour AREVA, 92084 - Paris la Defense (France)

    2003-07-01

    This paper describes what differentiates the Omega West Reactor (OWR) Decommissioning and Decontamination (D and D) Project from other projects with similar scope and how the project was successfully completed ahead of schedule. With less than 26 months to scope, schedule, advertise, select a contractor and complete the actual D and D, Los Alamos National Laboratory (LANL) needed a new approach to form the foundation for the project's success and ensure that the project was completed on time and within the original contract value. This paper describes the three key elements of this new approach - including team building, strong project management and technical innovation. LANL and WD3, a joint venture between Framatome ANP, Inc. and Washington Group Inc., teamed through a fixed price best value contract to perform the D and D of the OWR. The project was initiated in an effort to reduce the risk to LANL facilities identified in the aftermath of the Cerro Grande fires. Between May 4 and June 10, 2000, a devastating wildfire swept across the Bandelier National Monument in the Jemez Mountains of northern New Mexico and onto the Department of Energy's (DOE's) LANL. The Cerro Grande fire burned about 43,000 acres, including 7,500 acres of LANL property. Large areas of vegetation in the Jemez Mountains surrounding LANL were destroyed. The DOE, LANL, other federal agencies, and the State of New Mexico initiated prompt actions to identify and mitigate the risks from the fire aftermath. Assessments conducted after the fire determined that serious environmental and safety problems associated with flash floods, erosion, and contaminant run-off would persist at LANL for a number of years. Since the OWR was located in a potential flash flood area it was decided to accelerate the D and D of the facility. (authors)

  4. Key role of lipid management in nitrogen and aroma metabolism in an evolved wine yeast strain.

    Science.gov (United States)

    Rollero, Stéphanie; Mouret, Jean-Roch; Sanchez, Isabelle; Camarasa, Carole; Ortiz-Julien, Anne; Sablayrolles, Jean-Marie; Dequin, Sylvie

    2016-02-09

    Fermentative aromas play a key role in the organoleptic profile of young wines. Their production depends both on yeast strain and fermentation conditions. A present-day trend in the wine industry consists in developing new strains with aromatic properties using adaptive evolution approaches. An evolved strain, Affinity™ ECA5, overproducing esters, was recently obtained. In this study, dynamics of nitrogen consumption and of the fermentative aroma synthesis of the evolved and its ancestral strains were compared and coupled with a transcriptomic analysis approach to better understand the metabolic reshaping of Affinity™ ECA5. Nitrogen assimilation was different between the two strains, particularly amino acids transported by carriers regulated by nitrogen catabolite repression. We also observed differences in the kinetics of fermentative aroma production, especially in the bioconversion of higher alcohols into acetate esters. Finally, transcriptomic data showed that the enhanced bioconversion into acetate esters by the evolved strain was associated with the repression of genes involved in sterol biosynthesis rather than an enhanced expression of ATF1 and ATF2 (genes coding for the enzymes responsible for the synthesis of acetate esters from higher alcohols). An integrated approach to yeast metabolism-combining transcriptomic analyses and online monitoring data-showed differences between the two strains at different levels. Differences in nitrogen source consumption were observed suggesting modifications of NCR in the evolved strain. Moreover, the evolved strain showed a different way of managing the lipid source, which notably affected the production of acetate esters, likely because of a greater availability of acetyl-CoA for the evolved strain.

  5. Omega West Reactor program management and communication key to successful Decontamination and Decommissioning (D and D)

    International Nuclear Information System (INIS)

    Mee, Stephen F.; Rendell, Keith R.; Peifer, Martin J.; Gallegos, John A.; Straehr, James P.; Stringer, Joe B.

    2003-01-01

    This paper describes what differentiates the Omega West Reactor (OWR) Decommissioning and Decontamination (D and D) Project from other projects with similar scope and how the project was successfully completed ahead of schedule. With less than 26 months to scope, schedule, advertise, select a contractor and complete the actual D and D, Los Alamos National Laboratory (LANL) needed a new approach to form the foundation for the project's success and ensure that the project was completed on time and within the original contract value. This paper describes the three key elements of this new approach - including team building, strong project management and technical innovation. LANL and WD3, a joint venture between Framatome ANP, Inc. and Washington Group Inc., teamed through a fixed price best value contract to perform the D and D of the OWR. The project was initiated in an effort to reduce the risk to LANL facilities identified in the aftermath of the Cerro Grande fires. Between May 4 and June 10, 2000, a devastating wildfire swept across the Bandelier National Monument in the Jemez Mountains of northern New Mexico and onto the Department of Energy's (DOE's) LANL. The Cerro Grande fire burned about 43,000 acres, including 7,500 acres of LANL property. Large areas of vegetation in the Jemez Mountains surrounding LANL were destroyed. The DOE, LANL, other federal agencies, and the State of New Mexico initiated prompt actions to identify and mitigate the risks from the fire aftermath. Assessments conducted after the fire determined that serious environmental and safety problems associated with flash floods, erosion, and contaminant run-off would persist at LANL for a number of years. Since the OWR was located in a potential flash flood area it was decided to accelerate the D and D of the facility. (authors)

  6. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  7. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  8. A Public-key based Information Management Model for Mobile Agents

    OpenAIRE

    Rodriguez, Diego; Sobrado, Igor

    2000-01-01

    Mobile code based computing requires development of protection schemes that allow digital signature and encryption of data collected by the agents in untrusted hosts. These algorithms could not rely on carrying encryption keys if these keys could be stolen or used to counterfeit data by hostile hosts and agents. As a consequence, both information and keys must be protected in a way that only authorized hosts, that is the host that provides information and the server that has sent the mobile a...

  9. Optimal control of greenhouse gas emissions and system cost for integrated municipal solid waste management with considering a hierarchical structure.

    Science.gov (United States)

    Li, Jing; He, Li; Fan, Xing; Chen, Yizhong; Lu, Hongwei

    2017-08-01

    This study presents a synergic optimization of control for greenhouse gas (GHG) emissions and system cost in integrated municipal solid waste (MSW) management on a basis of bi-level programming. The bi-level programming is formulated by integrating minimizations of GHG emissions at the leader level and system cost at the follower level into a general MSW framework. Different from traditional single- or multi-objective approaches, the proposed bi-level programming is capable of not only addressing the tradeoffs but also dealing with the leader-follower relationship between different decision makers, who have dissimilar perspectives interests. GHG emission control is placed at the leader level could emphasize the significant environmental concern in MSW management. A bi-level decision-making process based on satisfactory degree is then suitable for solving highly nonlinear problems with computationally effectiveness. The capabilities and effectiveness of the proposed bi-level programming are illustrated by an application of a MSW management problem in Canada. Results show that the obtained optimal management strategy can bring considerable revenues, approximately from 76 to 97 million dollars. Considering control of GHG emissions, it would give priority to the development of the recycling facility throughout the whole period, especially in latter periods. In terms of capacity, the existing landfill is enough in the future 30 years without development of new landfills, while expansion to the composting and recycling facilities should be paid more attention.

  10. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    Science.gov (United States)

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  11. Management competences become key factor for success. Competition market energy; Managementkompetenzen werden Schluesselfaktor fuer Erfolg. Wettbewerbsmarkt Energie

    Energy Technology Data Exchange (ETDEWEB)

    Bausch, A. [Allgemeine Betriebswirtschaftlehre/Internationales Management, Friedrich-Schiller-Univ. Jena (Germany); Strategisches Management und Controlling, Jacobs Univ. Bremen (Germany); Fritz, T. [Jacobs University Bremen (Germany); Werthschulte, S.; Schumacher, T.; Holst, A.; Schiegg, T. [Accenture GmbH (Germany)

    2007-07-09

    In view of deregulation, enhanced competition and a multitude of options for action, clear strategic positioning and a strong operative management have become key factors of success. The authors of the study 'Value Creator III' investigated the approaches that made current industrial leaders successful and the challenges to be met in the future. (orig.)

  12. A survey of selected key areas of management of South African ...

    African Journals Online (AJOL)

    Background: Previous surveys of neurosurgical patient management, including a South African (SA) survey conducted in 2001, confirmed the existence of significant dissimilarities in management on national and international levels. This survey aimed to determine current SA neurosurgical patient management and to ...

  13. Productivity--a key to managing cost-per-case. Part 1.

    Science.gov (United States)

    Orefice, J J; Jennings, M C

    1983-08-01

    Productivity and productivity management are critical to effective case-mix management. Case-mix management expands on traditional productivity management to include the relationship between such intermediate products as patient days, tests and meals, and the ultimate end product, the case. As hospitals search to increase the profitability of specific case types, they must focus on two critical productivity control points. First, they must examine length of stay and ancillary utilization as one level of productivity. Then they must turn to more traditional analyses and review departmental productivity in the production of the intermediate products. No case-mix management system is complete unless it focuses on both of these critical relationships. Part two of this article will explore performance reporting and its role in managing both productivity and case mix.

  14. THE KEY ACTIVITIES OF GREEN LOGISTICS MANAGEMENT IN THE THAI AUTOMOTIVE INDUSTRY

    OpenAIRE

    Thanyaphat Muangpan; Mana Chaowarat; Jutaporn Neamvonk

    2016-01-01

    Thai automotive industry needs to be developed for understanding activities management on inbound logistics that is an essential element of business operations for a manufacturing firm. The purpose of research is to study the main activities of green logistics management (inbound logistics) in the Thai automotive industry. Survey research was used in this study to collect data by sampling from the people in the field of logistics and environmental management of Thai automotive industry to exa...

  15. Understanding the cultures of fishing communities: a key to fisheries management and food security

    National Research Council Canada - National Science Library

    McGoodwin, James R

    2001-01-01

    .... The paper suggests methods that might help fisheries managers to obtain reliable information about fishing cultures in an ethical manner, including the rapid acquisition of important information...

  16. [Discussion on developing a data management plan and its key factors in clinical study based on electronic data capture system].

    Science.gov (United States)

    Li, Qing-na; Huang, Xiu-ling; Gao, Rui; Lu, Fang

    2012-08-01

    Data management has significant impact on the quality control of clinical studies. Every clinical study should have a data management plan to provide overall work instructions and ensure that all of these tasks are completed according to the Good Clinical Data Management Practice (GCDMP). Meanwhile, the data management plan (DMP) is an auditable document requested by regulatory inspectors and must be written in a manner that is realistic and of high quality. The significance of DMP, the minimum standards and the best practices provided by GCDMP, the main contents of DMP based on electronic data capture (EDC) and some key factors of DMP influencing the quality of clinical study were elaborated in this paper. Specifically, DMP generally consists of 15 parts, namely, the approval page, the protocol summary, role and training, timelines, database design, creation, maintenance and security, data entry, data validation, quality control and quality assurance, the management of external data, serious adverse event data reconciliation, coding, database lock, data management reports, the communication plan and the abbreviated terms. Among them, the following three parts are regarded as the key factors: designing a standardized database of the clinical study, entering data in time and cleansing data efficiently. In the last part of this article, the authors also analyzed the problems in clinical research of traditional Chinese medicine using the EDC system and put forward some suggestions for improvement.

  17. How coaching can play a key role in the development of nurse managers.

    Science.gov (United States)

    Westcott, Liz

    2016-09-01

    The aim of this study was to explore empirically the role that coaching plays in the development of nurse managers in order to inform further research and policy makers about the potential utility and value of this means of development. There is evidence of the importance of the role of nurse managers who are first line managers of a team of nurses within any health sector. However, there appears to be little understanding of the United Kingdom wide scope of nurse manager development across the United Kingdom and the means to increase its effectiveness. At the same time, it appears that some nurse managers receive coaching to help in their development. This is a mixed methods study, using a pragmatist paradigm. Data was gathered from a quantitative survey and qualitative interviews. This paper is reporting the results of the qualitative interviews only. Twenty-one qualitative interviews were undertaken with nurse managers, coaches and directors of nursing to draw out their own experiences of coaching for nurse managers. Thematic analysis framework was used for data interrogation, identifying new patterns and emerging themes. Themes that emerged from interviews include how nurse managers were introduced to coaching, how they balanced transitions, the role of reflection, the value of relationships and overlaps between clinical supervision, mentoring and coaching. Findings show that following coaching, nurse managers gained increased resilience, confidence and better coping mechanisms. This resulted in perceived improved team management and cohesion and appeared to lead to better quality of care for patients. This study suggests the importance of nurse managers accessing coaching, to enable transformational leadership of their teams of nurses. It suggests also the importance of organisations supporting a coaching culture, to ensure staff satisfaction, motivation and improved quality of patient care. © 2016 John Wiley & Sons Ltd.

  18. Exploration of Route to Establish the Office Administrative Management Matching the Key Colleges

    Directory of Open Access Journals (Sweden)

    Xu Lili

    2015-01-01

    Full Text Available Based on the analysis on the main problems in office administrative work in the modern higher vocational colleges, I put forward some suggestions on improving the office management by changing administrative management idea, strengthening the service consciousness and professional skills, perfecting the rules and regulations, enhancing staff training and so on.

  19. Key convention on safe management of spent fuel and radioactive waste to enter into force

    International Nuclear Information System (INIS)

    2001-01-01

    At a ceremony at IAEA Headquarters today, Ireland deposited its instrument of ratification to an important convention on the safe management of spent fuel and radioactive waste, thereby ensuring its entry into force. The Convention will be the first international instrument to address the safety of management and storage of radioactive wastes and spent fuels in countries with and without nuclear programmes

  20. Key Authors in Business and Management Education Research: Productivity, Topics, and Future Directions

    Science.gov (United States)

    Arbaugh, J. B.; Asarta, Carlos J.; Hwang, Alvin; Fornaciari, Charles J.; Bento, Regina F.; Dean, Kathy Lund

    2017-01-01

    Previous studies of author productivity in business and management education (BME) research have focused on single disciplinary areas, and even single journals. This study is the first to examine the productivity of BME scholars across multiple disciplinary areas (i.e., accounting, economics, finance, information systems, management, marketing,…

  1. Leadership and Quality Management: An Analysis of Three Key Features of the Greek Education System

    Science.gov (United States)

    Saiti, Anna

    2012-01-01

    Purpose: This paper aims to investigate whether educational leadership in Greece implements the values of total quality management and contributes to the improvement of the educational process, and to offer proposals for a framework of total quality management that would contribute to an improvement in the overall quality of the education process.…

  2. Biodiversity in the city: key challenges for urban green space management

    Science.gov (United States)

    Myla F.J. Aronson; Christopher A. Lepczyk; Karl L. Evans; Mark A. Goddard; Susannah B. Lerman; J. Scott MacIvor; Charles H. Nilon; Timothy. Vargo

    2017-01-01

    Cities play important roles in the conservation of global biodiversity, particularly through the planning and management of urban green spaces (UGS). However, UGS management is subject to a complex assortment of interacting social, cultural, and economic factors, including governance, economics, social networks, multiple stakeholders, individual preferences, and social...

  3. Interviewing Key Informants: Strategic Planning for a Global Public Health Management Program

    Science.gov (United States)

    Kun, Karen E.; Kassim, Anisa; Howze, Elizabeth; MacDonald, Goldie

    2013-01-01

    The Centers for Disease Control and Prevention's Sustainable Management Development Program (SMDP) partners with low- and middle-resource countries to develop management capacity so that effective global public health programs can be implemented and better health outcomes can be achieved. The program's impact however, was variable. Hence, there…

  4. Lean Information Management: Criteria For Selecting Key Performance Indicators At Shop Floor

    Science.gov (United States)

    Iuga, Maria Virginia; Kifor, Claudiu Vasile; Rosca, Liviu-Ion

    2015-07-01

    Most successful organizations worldwide use key performance indicators as an important part of their corporate strategy in order to forecast, measure and plan their businesses. Performance metrics vary in their purpose, definition and content. Therefore, the way organizations select what they think are the optimal indicators for their businesses varies from company to company, sometimes even from department to department. This study aims to answer the question of what is the most suitable way to define and select key performance indicators. More than that, it identifies the right criteria to select key performance indicators at shop floor level. This paper contributes to prior research by analysing and comparing previously researched selection criteria and proposes an original six-criteria-model, which caters towards choosing the most adequate KPIs. Furthermore, the authors take the research a step further by further steps to closed research gaps within this field of study.

  5. ANALYSIS OF THE KEY ACTIVITIES OF THE LIFE CYCLE OF KNOWLEDGE MANAGEMENT IN THE UNIVERSITY AND DEVELOPMENT OF THE CONCEPTUAL ARCHITECTURE OF THE KNOWLEDGE MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Eugene N. Tcheremsina

    2013-01-01

    Full Text Available This article gives an analysis of the key activities of the life cycle of knowledge management in terms of the features of knowledge management in higher education. Based on the analysis we propose the model of the conceptual architecture of virtual knowledge-space of a university. The proposed model is the basis for the development of kernel intercollegiate virtual knowledge-space, based on cloud technology. 

  6. INVAP and its project management capabilities: a key to company success

    International Nuclear Information System (INIS)

    Salvatore, Marcelo; Delgado, Ricardo; Niklison, Carlos; Ordonez, Juan Pablo; Gerbino, Juan Jose Gil

    2002-01-01

    Over the past 26 years, several factors have contributed to INVAP's projection into domestic and overseas operations. Of these, the most recognized is of course the technological capabilities INVAP keeps developing to satisfy our customer's requirements. In a second thought, the other factor is the strategic objective of providing specific purpose customer oriented solutions. The less obvious third important factor in this trilogy is the successful application of Project Management techniques and methods. INVAP's vision on Project Management encompasses well known concepts as: Integrated Management, Proactive solutions, Cost Control and Reporting, Quality Assurance, Target Schedules, Performance Requirements, Risk Management, Configuration Management and Integrated Logistic Support. After 2 years of execution of the Replacement Research Reactor Project for the Australian Nuclear Science and Technology Organization, our Project Management methodology have allowed us to timely meet all project milestones, complete basic and detail engineering, timely deliver the preliminary safety reports, manufacture and test technological concepts in specifically built mock ups and overcome risky situations -like the economical panorama in Argentina- without jeopardizing our Contractual commitments. Present paper depicts the practical approach INVAP has for Project Management -particularly within the Nuclear Division-, and a description of the tools to such aim developed. (author)

  7. Effective knowledge management as basis for holistic knowledge engineering – Knowledge as the key asset of an organization

    Directory of Open Access Journals (Sweden)

    Svetlana Lazović

    2013-03-01

    Full Text Available In knowledge management , human resources are in the foreground and their value is constantly rising. In the eyes of modern managers knowledge is the key asset of an organization. Effective management and management of knowledge processes are central preoccupations of modern managers and, at the same time, the most prominent feature of a knowledge-based organization. Like innovation and creativity, knowledge needs to be encouraged and treated with due care. Commitment to acquisition of new knowledge depends on how the interpersonal relationships are managed in an organization, therefore, those responsible for knowledge processes, the so-called modern knowledge managers, will develop partnership relation- ships with all members of their organization. In the core of such partnerships lie competences of individual employees and their creative application of knowledge. By encouraging learning, discussions and opinion exchange as well as personal and professional growth of their employees, management in knowledge-based organizations is improving the quality of work, and consequently, generation of new knowledge and their organization’s competitive advantage.

  8. Key Management Theories ... and What They Have to Say with Regards to Contemporary Headquarters Structures

    DEFF Research Database (Denmark)

    Nell, Phillip Christopher

    2018-01-01

    Multinational and multibusiness headquarters increasingly structure their headquarters in novel ways. They use several locations spread around the world, differentiate different types of headquarters activities in a very fine-grained way, they temporarily relocate top management teams, or relocate...

  9. The keys to CERN conference rooms - Managing local collaboration facilities in large organisations

    CERN Multimedia

    Baron, T; Duran, G; Correia Fernandes, J; Ferreira, P; Gonzalez Lopez, J B; Jouberjean, F; Lavrut, L; Tarocco, N

    2013-01-01

    For a long time HEP has been ahead of the curve in its usage of remote collaboration tools, like videoconference and webcast, while the local CERN collaboration facilities were somewhat behind the expected quality standards for various reasons. This time is now over with the creation by the CERN IT department in 2012 of an integrated conference room service which provides guidance and installation services for new rooms (either equipped for video-conference or not), as well as maintenance and local support. Managing now nearly half of the 250 meeting rooms available on the CERN sites, this service has been built to cope with the management of all CERN rooms with limited human resources. This has been made possible by the intensive use of professional software to manage and monitor all the room equipment, maintenance and activity. This paper will focus on presenting these packages, either off-the-shelf commercial products (asset and maintenance management tool, remote audiovisual equipment monitoring systems, ...

  10. Five Key Changes for the Management of UK Defence - An Agenda for Research?

    National Research Council Canada - National Science Library

    Tatham, Peter; Taylor, Trevor

    2008-01-01

    .... Given the paucity of academic research into the general area of defence management, it is suggested that there is considerable potential for focused application of ideas and concepts from a broad...

  11. Conference communication. Managing change in tourism destinations: Key issues and current trends.

    OpenAIRE

    Mariani, M.M.; Buhalis, Dimitrios; Longhi, C.; Vitouladiti, O.

    2013-01-01

    This conference communication illustrates the major outcomes emerging from the EIASM Conference on Tourism Management and Tourism Related Issues held in Nice (France), September 20-21, 2012. While a number of managerial issues pertaining to the tourism field were dealt with, this communication covers three specific areas of interest for destination management and marketing: (1) the increasing competition among tourism destinations and the rise and consolidation of BRIC countries as outbound t...

  12. Managers’ Support – A Key Driver behind Enterprise Risk Management Maturity

    Directory of Open Access Journals (Sweden)

    Sprčić Danijela Miloš

    2017-04-01

    Full Text Available Severe consequences of the global fi nancial crisis resulted in re-thinking the risk management processes and approaches, highlighting the need for a comprehensive risk management framework. Consequently, more and more companies are moving away from the Traditional “silo-based” Risk Management (TRM to a more holistic approach known as Enterprise Risk Management (ERM. This paper presents results of both exploratory and empirical research. First, we develop ERM Index that measures maturity of ERM process within the company. Then, we present empirical results on the level of maturity and determinants of risk management system development in listed Croatian companies. Research indicates low levels of ERM development: even 38 per cent of analysed companies have no elements of ERM system, from which 22 per cent do not manage corporate risks at all. Except the company’s size supported by the economies of scale argument, managers’ support is the most important determinant of ERM system maturity in Croatian companies.

  13. National Low-Level Waste Management Program final summary report of key activities and accomplishments for fiscal year 1995

    International Nuclear Information System (INIS)

    Forman, S.

    1995-12-01

    To assist the Department of Energy (DOE) in fulfilling its responsibilities under the Low-Level Radioactive Waste Policy Amendments Act of 1985, the National Low-Level Waste Management Program (NLLWMP) outlines the key activities that the NLLWMP will accomplish in the following fiscal year. Additional activities are added during the fiscal year as necessary to accomplish programmatic goals. This report summarizes the activities and accomplishments of the NLLWMP during fiscal year 1995

  14. National Low-Level Waste Management Program final summary report of key activities and accomplishments for fiscal year 1996

    International Nuclear Information System (INIS)

    Garcia, R.S.

    1996-12-01

    To assist the Department of Energy (DOE) in fulfilling its responsibilities under the Low-Level Radioactive Waste Policy Amendments Act of 1985, the National Low-Level Waste Management Program (NLLWMP) outlines the key activities tat the NLLWMP will accomplish in the following fiscal year. Additional activities are added during the fiscal year as necessary to accomplish programmatic goals. This report summarizes the activities and accomplishments of the NLLWMP during Fiscal Year 1996

  15. The Effects of Quality Management Practices on Key Results: questionnaires sample for the industry of tourist accommodation in Spain

    Directory of Open Access Journals (Sweden)

    José Álvarez García

    2014-12-01

    Full Text Available In this research work, we examine the direct and indirect effects of quality management practices on key results and we identify the relationship between quality practices. To achieve the proposed objective, a structural model was used, taking into account the previous review of the literature, in order to identify the quality practices and causal relationships with the key results. The theoretical model and hypotheses are tested using data collected from a sample of 186 tourist accommodation companies certified with the “Q for Tourist Quality” standard in Spain, from a questionnaire based on quality practices identified in the literature and on the EFQM Model, taking some of the most relevant scales as a reference. The methodology used consists of the application of an Exploratory and Confirmatory Factorial Analysis to validate the scales (reliability, one-dimensionality and validity and define the number of items of each of the measuring instruments of the constructs proposed, to then estimate the causal model proposed, proceeding to test the hypotheses formulated by using the Structural Equation Model (SEM technique. The results achieved support the relationship between quality practices and the direct and positive impact of two of the practices, processes management and quality policy/planning, on the key results. It was also observed that the quality practices that most influence key results are quality policy/planning along with leadership, when considering the total effects (direct and indirect.

  16. Key articles and guidelines in the management of pulmonary arterial hypertension: 2011 update.

    Science.gov (United States)

    Johnson, Samuel G; Kayser, Steven R; Attridge, Rebecca L; Duvall, Laura; Kiser, Tyree H; Moote, Rebecca; Reed, Brent N; Rodgers, Jo E; Erstad, Brian

    2012-06-01

    Pharmacotherapeutic approaches for the management of pulmonary arterial hypertension (PAH) have expanded greatly in the last 10 years. Pulmonary arterial hypertension is a relatively rare disease and is associated with myriad disease processes. The older term for PAH, primary PAH, has been changed to represent these differences and to distinguish it from postcapillary PAH associated with left-sided heart failure. Limitations in evaluating treatment approaches for PAH include its rarity, the small number of patients included in clinical trials, and issues regarding the use of placebo-controlled trials in a disease with such a high mortality rate if left untreated. Management options include the use of prostacyclin and prostacyclin analogues, endothelin receptor antagonists, and phosphodiesterase inhibitors, as well as traditional background therapy with diuretics, digoxin, calcium channel blockers, and warfarin. Numerous drugs are under investigation to evaluate their possible roles in management. Combination therapy is increasingly becoming a standard approach to therapy, with mounting literature to document effectiveness. Current or emerging roles for the pharmacist in the management of PAH largely involves ensuring access to drug therapy, facilitating specialty pharmacy dispensing, and providing patient counseling. Newer roles may include future drug development, optimized use of investigational drugs, and specialized disease management programs. This compilation includes a series of articles identifying important literature in cardiovascular pharmacotherapy. This bibliography focuses on pharmacotherapeutic management of pulmonary arterial hypertension (PAH). Most of the cited works present the results of significant human clinical studies that have shaped the management of patients with PAH. Limited primary literature is available for some topics, so in addition, consensus documents prepared by expert panels are reviewed. This compilation may serve as a

  17. AIS as key component in modern vessel traffic management and information systems

    Energy Technology Data Exchange (ETDEWEB)

    Lamers, W. [DaimlerChrysler Aerospace AG (DASA), Ulm (Germany)

    1999-07-01

    The objective of this paper is to provide information in respect to universal shipborne identification system (UAIS) as main sensor in various vessel traffic applications. The presented paper will give general information concerning AIS functionality and the standardisation process. Based on experience from recent projects and various IALA working group activities, a typical future VTMIS architectures is also presented being based on AIS as key sensor. The required key performance of AIS associated with the HW components will be described. The results from European technology study Indris are presented and discussed. Finally, a summary and conclusion from the presented material will complete the technical paper. The elaboration of this presentation has been carried out as a joint task between Mr. Andre van Berg, MDS Suedafrika und Mr. Walter Lamers, DASA Ulm. (orig.)

  18. [Key points for the management of dermatitis in Latin America. The SLAAI Consensus].

    Science.gov (United States)

    Sánchez, Jorge; Páez, Bruno; Macías-Weinmann, Alejandra; De Falco, Alicia

    2015-01-01

    The incidence of atopic dermatitis in Latin America, as in other regions, has been increasing in recent years. The SLAAI consensus is based on a systematic search for articles related to dermatitis, with focus in the pathophysiology and treatment and its impact on Latin America, and reviewed using the Delphi methodology (Revista Alergia Mexico 2014;61:178-211). In this article we highlight the key points of consensus and particular considerations in Latin America.

  19. The Key Principles of Process Manager Motivation in Production and Administration Processes in an Industrial Enterprise

    Directory of Open Access Journals (Sweden)

    Chromjakova Felicita

    2016-03-01

    Full Text Available The basic premise of sustainable development is that companies should completely re-evaluate their enterprise work logic and process organization. Most of the necessary changes concern employee stimulation and motivation. If we are truly interested in improving business results and the effectiveness of business processes – there would be no progress otherwise – we have to strive to break down the barriers between company management (leadership and employees in order to establish effective relationships between firms and customers. This paper presents research results of process manager activities in modern industrial enterprises, connected with a methodology proposal for the systematically-oriented process manager motivation of employees in accordance with the increased competitiveness of production and administration processes. It also presents an effective methodology of how to increase the positive effects of welldefined employee motivations from the process manager´s perspective. The core benefit of this methodology lies in the design of a systematic approach to the motivation process from the process manager side, allowing for radical performance improvement via production and administrative processes and the increased competitiveness of enterprise processes.

  20. The Difficulty in Following Project Schedule as a Key Project Management Challenge: Family Firm Perspective

    Directory of Open Access Journals (Sweden)

    Joanna SADKOWSKA

    2016-12-01

    Full Text Available The problem of how to manage projects successfully has been gaining growing interest for the last decades. The aforementioned is mainly caused by the fact that project management offers a wide range of methods and tools which, when properly used, can stimulate long-term growth of businesses. As a consequence it offers a particular development opportunity for family enterprises which, due to their specificity, have to overcome many difficulties. The primary objective of this paper is to examine whether family enterprises perceive, and to what extent, the factor of following project schedule as a difficulty in the area of project management. 154 Polish family firms representing different sectors were surveyed. The results of regression analysis show that family firms with global range of business activities, on the contrary to those with local or regional ones, do not find the factor of following project schedule as a difficulty. This results manly from the tools employed and the maturity level they have reached in project management. The findings support the current discussion on the specificity and uniqueness of family businesses in relationship to the knowledge area of project management. It also contributes to filling the gap on understanding the functioning of family firms in the emerging economies of Eastern Europe.

  1. The key to successful management of STS operations: An integrated production planning system

    Science.gov (United States)

    Johnson, W. A.; Thomasen, C. T.

    1985-01-01

    Space Transportation System operations managers are being confronted with a unique set of challenges as a result of increasing flight rates, the demand for flight manifest/production schedule flexibility and an emphasis on continued cost reduction. These challenges have created the need for an integrated production planning system that provides managers with the capability to plan, schedule, status and account for an orderly flow of products and services across a large, multi-discipline organization. With increased visibility into the end-to-end production flow for individual and parallel missions in process, managers can assess the integrated impact of changes, identify and measure the interrelationships of resource, schedule, and technical performance requirements and prioritize productivity enhancements.

  2. The integrated supplier: key to cost management and multi-franchise capitation contracting.

    Science.gov (United States)

    Schuweiler, R C

    1996-05-01

    Capitation...most healthcare providers do not work under it, comprehend it, or even want it, yet supply capitation contracting seminars are popping up everywhere creating the feeling that the bandwagon is leaving, and it might be time to get on board. Not true. Supply capitation is not for all organizations. Capitation contracting is not easy and there are not many successful models to help the uninitiated. If a panacea is sought for reducing supply costs, capitation is only one component of a systematic strategy to reduce materiel costs. This article suggests a direction using the Group Health Materiel Management (Group Health Cooperative of Puget Sound, WA) experience as a point of reference. It advocates a systematic approach that focuses on expense reduction in: cost of goods, holding cost of inventory, labor cost associated with all materiel processes, distribution cost (transportation and par stock pick, pack, and replenishment), product utilization, variation in product standards, and waste stream byproducts. At Group Health (GH) these issues are primarily addressed through the use of: information systems, supplier certification/selection processes, group purchasing compliance, supply channel management, supply capitation contracting programs, standardization, and utilization management. Because of managed care organizational structure, Group Health Cooperative supply capitation contracting, as performed at GH, is discussed not as a quick fix solution but in the spirit of sharing our experience with others who may be considering it as a cost savings tactic in the context of a broad-based materiel management strategy. This article highlights the experiences of GH beginning with materiel management's business process assumptions toward multiple-franchise supply capitation.

  3. Strategic Planning, Key Tool for Brand Management in the New Advertising Context

    Directory of Open Access Journals (Sweden)

    Santiago Mayorga-Escalada

    2016-07-01

    Full Text Available New market conditions combined with continuous technological development in Communication, push brands to take decisions in order to ensure viability. This adaptation process makes corporations to rethink new methods of Advertising Communication. Consumers have also changed, they are well informed and discerning buyers, a fact that forces brands to build relevant relationships with their audiences letting brands to develop powerful positioning connections and create added value. These new conditions lead brands to professionalize their management practices, developing comprehensive strategic planning process to manage their brand image building through the marketing mix also called branding.

  4. Hierarchical modeling of active materials

    International Nuclear Information System (INIS)

    Taya, Minoru

    2003-01-01

    Intelligent (or smart) materials are increasingly becoming key materials for use in actuators and sensors. If an intelligent material is used as a sensor, it can be embedded in a variety of structure functioning as a health monitoring system to make their life longer with high reliability. If an intelligent material is used as an active material in an actuator, it plays a key role of making dynamic movement of the actuator under a set of stimuli. This talk intends to cover two different active materials in actuators, (1) piezoelectric laminate with FGM microstructure, (2) ferromagnetic shape memory alloy (FSMA). The advantage of using the FGM piezo laminate is to enhance its fatigue life while maintaining large bending displacement, while that of use in FSMA is its fast actuation while providing a large force and stroke capability. Use of hierarchical modeling of the above active materials is a key design step in optimizing its microstructure for enhancement of their performance. I will discuss briefly hierarchical modeling of the above two active materials. For FGM piezo laminate, we will use both micromechanical model and laminate theory, while for FSMA, the modeling interfacing nano-structure, microstructure and macro-behavior is discussed. (author)

  5. The emergent demand chain management: key features and illustration from the beef business

    NARCIS (Netherlands)

    Canever, M.D.; Trijp, van J.C.M.; Beers, G.

    2008-01-01

    Abstract Purpose - The paper seeks to delineate the emergence of demand chain management (DCM) from a theoretical perspective and to illustrate its occurrence in practice. Design/methodology/approach ¿ The DCM concept is examined empirically through a case study with retailers involved in the beef

  6. Change Management and the SENCo Role: Developing Key Performance Indicators of Inclusivity

    Science.gov (United States)

    Done, Elizabeth; Murphy, Mike; Bedford, Clare

    2016-01-01

    This article highlights the changing role of special educational needs co-ordinators (SENCos) in England. SENCos are now required to manage change strategically and deliver inclusive school cultures. A school-based evaluative study undertaken by a teacher who is studying for the postgraduate National Award for SEN Co-ordination (NASENCO) for…

  7. Enhancing chronic disease management: a review of key issues and strategies.

    Science.gov (United States)

    Willison, Kevin D; Williams, Paul; Andrews, Gavin J

    2007-11-01

    This paper highlights three selected issues and potential strategies towards meeting chronic disease management needs. First, the orientation of the biomedical science model often gives insufficient attention to chronic health care needs. A second issue is that the use of complementary and alternative medicine (CAM) may offer for some an opportunity to enhance their chronic disease management efforts. A third issue is that our understanding of this potential is limited, as many who use CAM do not disclose such use. With reference to proposed solutions/strategies, first, an improved focus to respect patient/client values and goals may encourage people to disclose their use of CAM. Second, a community-based participatory approach shows promise in enhancing communication plus helps integrate CAM within new models of chronic disease management. Lastly, those in public health could help facilitate such an approach plus be a monitor of CAM practices. Overall, this review provides a springboard for further research and practice in CAM and the management of chronic diseases.

  8. Change Management and the SENCo Role: Developing Key Performance Indicators in the Strategic Development of Inclusivity

    Science.gov (United States)

    Done, Liz; Murphy, Mike; Watt, Mia

    2016-01-01

    This article follows an earlier publication highlighting the changing role of special educational needs co-ordinators (SENCos) in England. SENCos are now required to manage change strategically and deliver inclusive school cultures. School-based action research undertaken by a teacher studying for the postgraduate National Award for SEN…

  9. The keys to CERN conference rooms - Managing local collaboration facilities in large organisations

    International Nuclear Information System (INIS)

    Baron, T; Domaracky, M; Duran, G; Fernandes, J; Ferreira, P; Lopez, J B Gonzalez; Jouberjean, F; Lavrut, L; Tarocco, N

    2014-01-01

    For a long time HEP has been ahead of the curve in its usage of remote collaboration tools, like videoconference and webcast, while the local CERN collaboration facilities were somewhat behind the expected quality standards for various reasons. This time is now over with the creation by the CERN IT department in 2012 of an integrated conference room service which provides guidance and installation services for new rooms (either equipped for videoconference or not), as well as maintenance and local support. Managing now nearly half of the 246 meeting rooms available on the CERN sites, this service has been built to cope with the management of all CERN rooms with limited human resources. This has been made possible by the intensive use of professional software to manage and monitor all the room equipment, maintenance and activity. This paper focuses on presenting these packages, either off-the-shelf commercial products (asset and maintenance management tool, remote audio-visual equipment monitoring systems, local automation devices, new generation touch screen interfaces for interacting with the room) when available or locally developed integration and operational layers (generic audio-visual control and monitoring framework) and how they help overcoming the challenges presented by such a service. The aim is to minimise local human interventions while preserving the highest service quality and placing the end user back in the centre of this collaboration platform.

  10. Right-of-way management: A key to controlling the spread of cogograss (Imperata cylindrica)

    Science.gov (United States)

    W.H. Faircloth; M.G. Patterson; James H. Miller; D.H. Teem

    2004-01-01

    Cogongrass [Imperata cylindrica(L.) Beauv.] is an undesired species on highway rights-of-way (ROWS) due to its displacenent of native and/or more manageable grasses, unsightly growth characteristic, and propensity for fire. Fire not only poses a danger to motorists but could cause property loss to adjoining landowners. Most importantly, ROWS provide...

  11. Key-socio economic factors influencing sustainable land management investments in the West Usambara Highlands, Tanzania

    NARCIS (Netherlands)

    Nyanga, A.W.; Kessler, C.A.; Tenge, A.J.M.

    2016-01-01

    Low investments in sustainable land management (SLM) limit agricultural production in the East African Highlands, leading to increased soil erosion, low productivity of land and food insecurity. Recent studies in the region show that different socio-economic factors influence SLM investments by

  12. Positioning the Learning Asset Portfolio as a Key Component in an Organization's Enterprise Risk Management Strategy

    Science.gov (United States)

    McAliney, Peter J.

    2009-01-01

    This article presents a process for valuing a portfolio of learning assets used by line executives across industries to value traditional business assets. Embedded within the context of enterprise risk management, this strategic asset allocation process is presented step by step, providing readers the operational considerations to implement this…

  13. Long-Term Soil Experiments: A Key to Managing Earth's Rapidly Changing Critical Zones

    Science.gov (United States)

    Richter, D., Jr.

    2014-12-01

    In a few decades, managers of Earth's Critical Zones (biota, humans, land, and water) will be challenged to double food and fiber production and diminish adverse effects of management on the wider environment. To meet these challenges, an array of scientific approaches is being used to increase understanding of Critical Zone functioning and evolution, and one amongst these approaches needs to be long-term soil field studies to move us beyond black boxing the belowground Critical Zone, i.e., to further understanding of processes driving changes in the soil environment. Long-term soil experiments (LTSEs) provide direct observations of soil change and functioning across time scales of decades, data critical for biological, biogeochemical, and environmental assessments of sustainability; for predictions of soil fertility, productivity, and soil-environment interactions; and for developing models at a wide range of temporal and spatial scales. Unfortunately, LTSEs globally are not in a good state, and they take years to mature, are vulnerable to loss, and even today remain to be fully inventoried. Of the 250 LTSEs in a web-based network, results demonstrate that soils and belowground Critical Zones are highly dynamic and responsive to human management. The objective of this study is to review the contemporary state of LTSEs and consider how they contribute to three open questions: (1) can soils sustain a doubling of food production in the coming decades without further impinging on the wider environment, (2) how do soils interact with the global C cycle, and (3) how can soil management establish greater control over nutrient cycling. While LTSEs produce significant data and perspectives for all three questions, there is on-going need and opportunity for reviews of the long-term soil-research base, for establishment of an efficiently run network of LTSEs aimed at sustainability and improving management control over C and nutrient cycling, and for research teams that

  14. An Effective Key Management Approach to Differential Access Control in Dynamic Environments

    OpenAIRE

    Yogesh Karandikar; Xukai Zou; Yuanshun Dai

    2006-01-01

    Applications like e-newspaper or interactive online gaming have more than one resource and a large number of users. There is a many-to-many relationship between users and resources; each user can access multiple resources and multiple users can access each resource. The resources are independent and each resource needs to be encrypted by a different Resource Encryption Key (REK). Each REK needs to be distributed to all subscribers of the resource and each subscriber must get all the REKs he/s...

  15. THE JAPANESE MANAGEMENT, A KEY ELEMENT OF TOYOTA’S SUCCESS

    Directory of Open Access Journals (Sweden)

    Toma Sorin-George

    2012-06-01

    Full Text Available After its defeat in the World War II, Japan was a country in ruin. The Japanese economy faced huge problems as unemployment and hyperinflation increased. The vast majority of its industry was destroyed and new industrial facilities had to be re-constructed from the ashes. In the 1970s Japan achieved a giant economic stature, evolving into the second largest economy of the world. There are many ways of analyzing the Japanese economic miracle, but in the final, management has to being considered as one of its most important factors. The aims of our paper are to emphasize some of the main features of the Japanese management in the globalization era, and to present the case of Toyota Motor Company. The research type is a literature review combined with a case study.

  16. Emotionally intelligent leadership as a key determinant of strategic and effective management of human capital

    Directory of Open Access Journals (Sweden)

    Helena Viskupičová

    2016-06-01

    Full Text Available The purpose of this paper is to outline the strategic importance of Emotional Intelligence (EI in contemporary approaches to management of Human resources (HR. The aim of this study is to provide a conceptual theoretical insight of the relationship between EI and leadership. The paper also reflects the conditions within the present business environment in Slovakia with the emphasis on leadership in the context of EI (based on the research conducted in this field, while answering the following question: To what extent do Slovak organizations incorporate EI measures into the hiring process for managerial positions? The answer to this question would consequently disclose whether organizations in Slovakia consider Emotional Intelligence as a factor determining effective performance of managers – leaders.

  17. Management of waste from french nuclear fuel cycle: what are the key issues?

    International Nuclear Information System (INIS)

    Londres, V.; Do Quang, R.; Fournier, P.

    2000-01-01

    Like any other industry, the nuclear industry generates waste. This waste arises in the different successive stages of the fuel cycle, including nuclear power plants, and its physical and chemical properties vary greatly. What is special about it is the radioactivity it contains. Management of waste generated by spent fuel conditioning in nuclear reprocessing facilities, and which cannot be stored in surface repositories, according to current French regulations (ILW and HLW), is specifically discussed in this paper. (authors)

  18. The key role of shared participation in changing occupational self-efficacy through stress management courses

    OpenAIRE

    Füllemann, Désirée; Jenny, Gregor J; Brauchli, Rebecca; Bauer, Georg F

    2015-01-01

    This study is the first that longitudinally examined change in occupational self-efficacy (OSE) through individual and shared participation in occupational stress management courses (SMC). Applying the framework of social cognitive theory (Bandura, 1986, Social foundations of thought and action: A social cognitive theory. Englewood Cliffs, NJ: Prentice-Hall), we assumed that participation in SMC facilitates OSE perceptions. We further assumed that the psychosocial environment promotes change ...

  19. Five Key Changes for the Management of UK Defence - An Agenda for Research?

    Science.gov (United States)

    2008-04-23

    in which the high-level commander’s Strategic Intent is clearly spelled out. Subordinates are then encouraged and empowered to implement this...provision of so-called “C” vehicles7 announced in June 2005, and the Future Strategic Tanker Aircraft (FSTA) which requires industry to raise some £3...management. For example, writers in this field such as Hamel & Prahalad (1994) and Johnson, Scholes and Whittington (2005) recommend that companies should

  20. Motivation and job satisfaction as a key element of successful business management.

    OpenAIRE

    Kazachok, Alina

    2011-01-01

    The subject of this thesis is motivation and job satisfaction of employees. The theoretical part deals with basic terms in the field of motivation and job satisfaction, motivation principles, factors that influence motivation and job satisfaction. Also the theoretical part gives consideration to the methods of measuring job satisfaction, manager's role in the sphere of motivation and job satisfaction. The part contains the description of the major motivational theories. The second part is dev...

  1. Key accountization at Bosch Automotive Aftermarket (BAA) Italy: managing and implementing a strategic change

    OpenAIRE

    P.Guenzi

    2014-01-01

    The goal of this chapter is to describe how a multinational company adopted a KAM program in a local branch, using the lenses of a well-established framework. Starting from a change in Strategy, the company had to modify its Shared values (culture), leadership Style, organization Structure, support Systems, Skills and Staff characteristics. To do this, we first review the sparse literature on KAM and change management, and summarize it. Next, we introduce the background information abo...

  2. Toward a national policy for managing low-level radioactive waste: key issues and recommendations

    International Nuclear Information System (INIS)

    Duerksen, C.J.; Mantell, M.; Thompson, G.P.

    1981-06-01

    The Conservation Foundation, a not-for-profit research and public education organization, asked individuals with diverse backgrounds and viewpoints to come together under Foundation leadership as a Dialogue Group on Low-Level Radioactive Waste Management. The group, including persons who represent waste generators, concerned citizens, state regulators, and environmentalists, met over an 18-month period to discuss issues crucial to the development of a national policy on low-level wastes. The Dialogue Group agreed that three principles, if accepted broadly, would form the basis of a sound national policy for managing low-level radioactive wastes: with proper implementation, technology exists to manage low-level waste safely; generators and their customers should pay disposal costs; and greater public involvement at all stages can improve the disposal system. These principles acted as polestars for the group as it worked toward a series of policy recommendations in four main areas: (1) cleaning up closed commercial sites; (2) remodeling a system for defining and classifying low-level radioactive waste; (3) siting new low-level waste disposal facilities; and (4) decommissioning, long-term care, and liability. This report presents an extensive discussion of these recommendations covering qualifications, limitations, and alternatives

  3. Managing the nation's high-level radioactive waste: key issues and recommendations

    International Nuclear Information System (INIS)

    1981-07-01

    To date, no unified national plan has been adopted to develop and implement a comprehensive system of management and disposal of high-level radioactive waste in the United States. Growing public concern about this problem has resulted in a number of recent efforts to develop a national high-level waste management policy. The 96th Congress strove to resolve the central issues, but ultimately failed to pass legislation, partly because of disagreements about the appropriate role of states in the siting of repositories for military waste. Outside government, a number of organizations convened representatives of diverse groups concerned with national high-level radioactive waste management to seek agreement on the major elements of national policy. One such organization was RESOLVE, Center for Environmental Conflict Resolution, which in May 1981 was merged into The Conservation Foundation. RESOLVE convened Forum II, a series of discussions among representatives of environmental, industrial, governmental, and citizen interest groups, in 1981 specifically to address the issues blocking Congressional agreement on high-level waste policy. This report contains the recommendations which resulted from these deliberations. Reprocessing, interim storage, respository development, and licensing requirements are addressed. Federal, state, and public participation in decision making are also discussed

  4. Learning Lessons from TMI to Fukushima and Other Industrial Accidents: Keys for Assessing Safety Management Practices

    International Nuclear Information System (INIS)

    Dechy, N.; Rousseau, J.-M.; Dien, Y.; Montmayeul, R.; Llory, M.

    2016-01-01

    The main objective of the paper is to discuss and to argue about transfer, from an industrial sector to another industrial sector, of lessons learnt from accidents. It will be achieved through the discussion of some theoretical foundations and through the illustration of examples of application cases in assessment of safety management practices in Nuclear Power Plant (NPP). The nuclear energy production industry has faced three big ones in 30 years (TMI, Chernobyl, Fukushima) involving three different reactor technologies operated in three quite different cultural, organizational and regulatory contexts. Each of those accident has been the origin of questions, but also generator of lessons, some changing the worldview (see Wilpert and Fahlbruch, 1998) of what does cause an accident in addition to the engineering view about the importance of technical failures (human error, safety culture, sociotechnical interactions). Some of their main lessons were implemented such as improvements of human-machine interfaces ergonomics, recast of some emergency operating procedures, severe accident mitigation strategies and crisis management. Some lessons did not really provide deep changes. It is the case for organizational lessons such as, organizational complexity, management of production pressures, regulatory capture, and failure to learn, etc.

  5. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Shafi Khan

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  6. POSITIONING KNOWLEDGE MANAGEMENT AS KEY SUCCESS FACTOR IN THE GROWTH OF COOPERATIVES IN MALAYSIA

    Directory of Open Access Journals (Sweden)

    Yeop Hussin Bidin

    2007-01-01

    Full Text Available Economic and business challenges in the new millennium have shaped the manner cooperative movement in Malaysia charts its future outlook. After almost 82 years, a national policy was launched by the Government on January 2004 to assist in the comprehensive development of the cooperative movement. The National CooperativePolicy (NCP will ensure that the huge resources of the cooperatives can be harnessed to generate and contribute to the economic growth of the country. However, in the light of many issues such as weak structure and the absence of good corporate governance in some cooperatives, the present Cooperative Act 1993 is being reviewed and several new provisions would be added to increase supervision, monitoring and enforcement against existing cooperatives in alaysia. It is quite imperative that by regulating the operation of cooperatives will require also the managing of intellectual and human capital assets that exist in the movement. Through establishing a framework and terms of reference such that fundamental elements of knowledge management can be instilled areprerequisites to developing innovativeness in this growing economic sector. The sharing of knowledge among the cooperatives will eventually produce better and more educated human resources that are able to experience greater control over the works and the administration of their quality working life. Structural analysis of the cooperative movement indicates the significant influence of knowledge management in sustaining its future growth given the timely introduction of the NCP. Thus, measures taken to underline this influence will also be addressed to represent the cooperative movement's readiness to face economic and business challenges in Malaysia.

  7. Management of graphite material: a key issue for High Temperature Gas Reactor system (HTGR)

    International Nuclear Information System (INIS)

    Bourdeloie, C.; Marimbeau, P.; Robin, J.C.; Cellier, F.

    2005-01-01

    Graphite material is used in nuclear High Temperature Gas-cooled Reactors (HTGR, Fig.1) as moderator, thermal absorber and also as structural components of the core (Fig.2). This type of reactor was selected by the Generation IV forum as a potential high temperature provider for supplying hydrogen production plants and is under development in France in the frame of the AREVA ANTARES program. In order to select graphite grades to be used in these future reactors, the requirements for mechanical, thermal, physical-chemical properties must match the internal environment of the nuclear core, especially with regard to irradiation effect. Another important aspect that must be addressed early in design is the waste issue. Indeed, it is necessary to reduce the amount of nuclear waste produced by operation of the reactor during its lifetime. Preliminary assessment of the nuclear waste output for an ANTARES type 280 MWe HTGR over 60 year-lifetime gives an estimated 6000 m 3 of activated graphite waste. Thus, reducing the graphite waste production is an important issue for any HTGR system. First, this paper presents a preliminary inventory of graphite waste fluxes coming from a HTGR, in mass and volume, with magnitudes of radiological activities based on activation calculations of graphite during its stay in the core of the reactor. Normalized data corresponding to an output of 1 GWe.year electricity allows comparison of the waste production with other nuclear reactor systems. Second, possible routes to manage irradiated graphite waste are addressed in both the context of French nuclear waste management rules and by comparison to other national regulations. Routes for graphite waste disposal studied in different countries (concerning existing irradiated graphite waste) will be discussed with regard to new issues of large graphite waste from HTGR. Alternative or complementary solutions aiming at lowering volume of graphite waste to be managed will be presented. For example

  8. A structured elicitation method to identify key direct risk factors for the management of natural resources

    Directory of Open Access Journals (Sweden)

    Michael Smith

    2015-11-01

    Full Text Available The high level of uncertainty inherent in natural resource management requires planners to apply comprehensive risk analyses, often in situations where there are few resources. In this paper, we demonstrate a broadly applicable, novel and structured elicitation approach to identify important direct risk factors. This new approach combines expert calibration and fuzzy based mathematics to capture and aggregate subjective expert estimates of the likelihood that a set of direct risk factors will cause management failure. A specific case study is used to demonstrate the approach; however, the described methods are widely applicable in risk analysis. For the case study, the management target was to retain all species that characterise a set of natural biological elements. The analysis was bounded by the spatial distribution of the biological elements under consideration and a 20-year time frame. Fourteen biological elements were expected to be at risk. Eleven important direct risk factors were identified that related to surrounding land use practices, climate change, problem species (e.g., feral predators, fire and hydrological change. In terms of their overall influence, the two most important risk factors were salinisation and a lack of water which together pose a considerable threat to the survival of nine biological elements. The described approach successfully overcame two concerns arising from previous risk analysis work: (1 the lack of an intuitive, yet comprehensive scoring method enabling the detection and clarification of expert agreement and associated levels of uncertainty; and (2 the ease with which results can be interpreted and communicated while preserving a rich level of detail essential for informed decision making.

  9. Key differences and similarities in ways of managing and supporting radical pharmaceutical front end innovation

    DEFF Research Database (Denmark)

    Aagaard, Annabeth

    2015-01-01

    of the Danish and US based pharmaceutical company, H. Lundbeck A/S, and a comparative study including five European and American pharmaceutical companies. The findings from the study reveal a number of similarities and differences in innovation management and FEI support of radical projects and among...... pharmaceutical companies, which represent a growing market. The value added and the contribution of this paper to the existing FEI literature is therefore in the specificity of the empirical setting in which the issue is investigated. Read More: http://www.worldscientific.com/doi/abs/10.1142/S1363919615500115...

  10. Governance and New Technologies: Key Reflections of Informatization on Administrative Management of Judiciary

    Directory of Open Access Journals (Sweden)

    Roberto Correia Da Silva Gomes Caldas

    2016-12-01

    Full Text Available The article deals with the consequences of new technologies in the administrativeorganization of the Judiciary and has good management practices that combine economic and social outcomes allies sustainability. The objective is to analyze how new technologies help in the governance of the Judiciary, especially regarding the transposition of the traditional support process paper to electronic court case. We opted for the bibliographical and documentary research using the deductive method. Justified the search because of democracy and globalization connect judicial governance computerization where it seeks to reconcile an administration results with sustainable practices.

  11. Catalysis with hierarchical zeolites

    DEFF Research Database (Denmark)

    Holm, Martin Spangsberg; Taarning, Esben; Egeblad, Kresten

    2011-01-01

    Hierarchical (or mesoporous) zeolites have attracted significant attention during the first decade of the 21st century, and so far this interest continues to increase. There have already been several reviews giving detailed accounts of the developments emphasizing different aspects of this research...... topic. Until now, the main reason for developing hierarchical zeolites has been to achieve heterogeneous catalysts with improved performance but this particular facet has not yet been reviewed in detail. Thus, the present paper summaries and categorizes the catalytic studies utilizing hierarchical...... zeolites that have been reported hitherto. Prototypical examples from some of the different categories of catalytic reactions that have been studied using hierarchical zeolite catalysts are highlighted. This clearly illustrates the different ways that improved performance can be achieved with this family...

  12. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... with changing and increasing demands. Two-layer networks consist of one backbone network, which interconnects cluster networks. The clusters consist of nodes and links, which connect the nodes. One node in each cluster is a hub node, and the backbone interconnects the hub nodes of each cluster and thus...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks...

  13. Micromechanics of hierarchical materials

    DEFF Research Database (Denmark)

    Mishnaevsky, Leon, Jr.

    2012-01-01

    A short overview of micromechanical models of hierarchical materials (hybrid composites, biomaterials, fractal materials, etc.) is given. Several examples of the modeling of strength and damage in hierarchical materials are summarized, among them, 3D FE model of hybrid composites...... with nanoengineered matrix, fiber bundle model of UD composites with hierarchically clustered fibers and 3D multilevel model of wood considered as a gradient, cellular material with layered composite cell walls. The main areas of research in micromechanics of hierarchical materials are identified, among them......, the investigations of the effects of load redistribution between reinforcing elements at different scale levels, of the possibilities to control different material properties and to ensure synergy of strengthening effects at different scale levels and using the nanoreinforcement effects. The main future directions...

  14. Programming with Hierarchical Maps

    DEFF Research Database (Denmark)

    Ørbæk, Peter

    This report desribes the hierarchical maps used as a central data structure in the Corundum framework. We describe its most prominent features, ague for its usefulness and briefly describe some of the software prototypes implemented using the technology....

  15. Introduction into Hierarchical Matrices

    KAUST Repository

    Litvinenko, Alexander

    2013-12-05

    Hierarchical matrices allow us to reduce computational storage and cost from cubic to almost linear. This technique can be applied for solving PDEs, integral equations, matrix equations and approximation of large covariance and precision matrices.

  16. Introduction into Hierarchical Matrices

    KAUST Repository

    Litvinenko, Alexander

    2013-01-01

    Hierarchical matrices allow us to reduce computational storage and cost from cubic to almost linear. This technique can be applied for solving PDEs, integral equations, matrix equations and approximation of large covariance and precision matrices.

  17. Understanding Lolium rigidum Seeds: The Key to Managing a Problem Weed?

    Directory of Open Access Journals (Sweden)

    Kathryn J. Steadman

    2012-09-01

    Full Text Available The 40 million hectare southern Australian winter cropping region suffers from widespread infestation by Lolium rigidum (commonly known as annual or rigid ryegrass, a Mediterranean species initially introduced as a pasture plant. Along with its high competitiveness within crops, rapid adaptability and widespread resistance to herbicides, the dormancy of its seeds means that L. rigidum is the primary weed in southern Australian agriculture. With the individuals within a L. rigidum population exhibiting varying levels of seed dormancy, germination can be staggered across the crop-growing season, making complete weed removal virtually impossible, and ensuring that the weed seed bank is constantly replenished. By understanding the processes involved in induction and release of dormancy in L. rigidum seeds, it may be possible to develop strategies to more effectively manage this pest without further stretching herbicide resources. This review examines L. rigidum seed dormancy and germination from a weed-management perspective and explains how the seed bank can be depleted by control strategies encompassing all stages in the lifecycle of a seed, from development to germination.

  18. Health and productivity management: establishing key performance measures, benchmarks, and best practices.

    Science.gov (United States)

    Goetzel, R Z; Guindon, A M; Turshen, I J; Ozminkowski, R J

    2001-01-01

    Major areas considered under the rubric of health and productivity management (HPM) in American business include absenteeism, employee turnover, and the use of medical, disability, and workers' compensation programs. Until recently, few normative data existed for most HPM areas. To meet the need for normative information in HPM, a series of Consortium Benchmarking Studies were conducted. In the most recent application of the study, 1998 HPM costs, incidence, duration, and other program data were collected from 43 employers on almost one million workers. The median HPM costs for these organizations were $9992 per employee, which were distributed among group health (47%), turnover (37%), unscheduled absence (8%), nonoccupational disability (5%), and workers' compensation programs (3%). Achieving "best-practice" levels of performance (operationally defined as the 25th percentile for program expenditures in each HPM area) would realize savings of $2562 per employee (a 26% reduction). The results indicate substantial opportunities for improvement through effective coordination and management of HPM programs. Examples of best-practice activities collated from on-site visits to "benchmark" organizations are also reviewed.

  19. IT service management - key to the quality of IT service delivering

    International Nuclear Information System (INIS)

    Recky, M.

    2004-01-01

    Objective of the contribution is to introduce IT service management (ITSM) as an approach to services quality improvement provided by IT departments of enterprises. As a result of massive application of information technologies in the past, the enterprises have become increasingly dependent on processes within IT of which many are critical for the business operations. Therefore it appears to be inevitable for IT organizations to become customer-oriented. ITSM's objective is to implement standardized and measurable IT services in every enterprise, to enable accurate service cost allocation and increase accuracy of planning of IT budget and investments. This method is based on processes definition, necessary technologies implementation and restructuralisation of human resources in IT organisations. It requires a change of attitude towards IT users who become IT department customers as well as cost-balanced utilization of in-sourcing and out-sourcing etc. Hewlett-Packard is a global leader offering its consulting and integration services in the area of IT service management together with an extensive portfolio of related technologies based on HP OpenView software platform. (author)

  20. Reputation management on facebook: awareness is key to protecting yourself, your practice, and the veterinary profession.

    Science.gov (United States)

    Weijs, Cynthia A; Coe, Jason B; Muise, Amy; Christofides, Emily; Desmarais, Serge

    2014-01-01

    From the Social media use by health professionals occurs in a digital environment where etiquette has yet to be solidly defined. The objectives of this study were to explore veterinarians' personal use of Facebook, knowledge of privacy settings, and factors related to sharing personal information online. All American Animal Hospital Association member veterinarians with a valid e-mail address (9469) were invited to complete an online survey about Facebook (e.g., time spent on Facebook, awareness of consequences, types of information posted). Questions assessing personality dimensions including trust, popularity, self-esteem and professional identity were included. The response rate was 17% (1594 of 9469); 72% of respondents (1148 of 1594) had a personal Facebook profile. Veterinarians were more likely to share information on Facebook than they would in general. Trust, need for popularity, and more time spent on Facebook predicted more disclosure of personal information on Facebook. Awareness of consequences and increased veterinary experience predicted lesser disclosure. As veterinary practices use Facebook to improve client services, they need also to manage risks associated with online disclosure by staff. Raising awareness of reputation management and consequences of posting certain types of information to Facebook is integral to protecting the individual, the practice, and the veterinary profession.

  1. The key to health services in Turkey: new perspectives on leadership and hospital management.

    Science.gov (United States)

    Sahin, Alper A

    2014-01-01

    Health services are one of the most important criteria for making a country function. Turkey has mobilized all of its resources to provide high-quality, easily accessible and patient-friendly services for its population. To achieve this aim, the Turkish health care system has been undergoing a significant transformation through its Health Transformation Programme begun in 2005. The reforms focus on the introduction of a general health insurance system, changing hospital health services, improvements in hospital management and transformational leadership skills. Firstly, all state-run hospitals in the country were merged under the same umbrella, giving millions of people covered by the national security agency access to all of these hospitals. Secondly, all drugs and medical equipment used by patients were made free of charge. Thanks to these developments, hospitals were modernized, and this modernization process in the health sector is still continuing swiftly. On the other hand, for Turkish hospitals to survive, they need to modernize further and become closer to European models, and produce new leaders with new paradigms. In this new and changing health system, hospital leaders and executive officers should be visionaries and strategists advising when to change direction. Following this doctrine, most Turkish hospitals are now run by two top executives: the hospital manager and the chief executive officer who is in charge of business functions. These executives should clearly be the leaders of high-quality, health care organizations.

  2. Producer responsibility for e-waste management: key issues for consideration - learning from the Swiss experience.

    Science.gov (United States)

    Khetriwal, Deepali Sinha; Kraeuchi, Philipp; Widmer, Rolf

    2009-01-01

    E-waste, a relatively recent addition to the waste stream in the form of discarded electronic and electric equipment, is getting increasing attention from policy makers as the quantity being generated is rising rapidly. One of the most promising policy options to address this issue is to extend the producers responsibility for their products beyond the point of sale, until end-of-product-life. This paper briefly introduces the concept of extended producer responsibility (EPR) and its applicability in the area of the end-of-life management of electronic and electrical equipment (EEE). It then examines the decade-long experience of Switzerland in using EPR to manage its e-waste, elaborating on the experience of the Swiss system in overcoming specific issues, and finally wrapping up with a synopsis of the lessons for policy makers. We consider each issue as an enquiry of questions confronting a policy maker and the choices that may present themselves. The five issues discussed are: (i) the challenges in getting an EPR based system started; (ii) securing financing to ensure a self-sustaining and smooth functioning system; (iii) organising a logistics network for the take back and collection of the e-waste; (iv) ensuring compliance of the various actors involved; and finally (v) reducing the threat of monopolistic practices.

  3. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Le Xuan Hung

    2008-12-01

    Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  4. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

    Directory of Open Access Journals (Sweden)

    Ahmad Samer Wazan

    2017-01-01

    Full Text Available A Public Key Infrastructure (PKI is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988 standard and is composed of three entities: the certification authority (CA, the certificate holder (or subject, and the Relying Party (RP. The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB. In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA’s policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.

  5. Strategic management and organizational behavior in dental education: reflections on key issues in an environment of change.

    Science.gov (United States)

    Dunning, David G; Durham, Timothy M; Lange, Brian M; Aksu, Mert N

    2009-06-01

    With issues such as shrinking revenue, access to care, faculty workloads, and graying faculty, dental schools are faced with difficult challenges that fall to dental school deans to manage. Do dental school deans have the organizational skill sets and ethical frameworks necessary to address the challenges now facing dental schools? The purpose of this article is to pose questions and suggestions regarding some of the key issues in dental colleges today and to stimulate discussion in the dental community about needed changes in dental education.

  6. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, R. K. [ORNL; Peters, Scott [Sypris Electronics, LLC

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  7. Online tutoring procedure for research project supervision: management, organization and key elements

    Directory of Open Access Journals (Sweden)

    Antònia Darder Mesquida

    2015-07-01

    Full Text Available Research project tutoring appears as a crucial element for teaching; it is a planned action based on the relationship between a tutor and a student. This paper presents the findings of a design and development research which has as its main aim to create an organization system for the tutoring of online research projects. That system seeks to facilitate the tutoring and supervision task with trainee researchers, providing guidance for its management and instruments for its implementation. The main conclusions arising from this research derive from considering the need to offer a solution to the problem of distance research project supervision and has materialized in organization and sequencing through a model about the variables that influence the research project tutoring problem.

  8. EMPLOYEE ADAPTATION AS KEY ACTIVITY IN HUMAN RESOURCE MANAGEMENT UPON IMPLEMENTING AND MAINTAINING DESIRED ORGANISATIONAL CULTURE

    Directory of Open Access Journals (Sweden)

    Zdenko Stacho

    2017-11-01

    Full Text Available In order to achieve the greatest possible equivalence between human resources in a company and desired organisational culture elements declared by a company, it is necessary to interconnect activities within individual functions of human resource management with desired values, attitudes and work behaviour. Such an interconnection is crucial for a positive response of employees to a suitable organisational culture, its embedding in their behaviour and subsequent sharing and spreading of organisational values. This paper will specifically define individual activities related to the adaptation of employees which need to be carried out in this regard. Based on a research conducted between 2011 and 2013, the paper will also define the present state and level of focus of organisations operating in Slovakia on both organisational culture as a whole and organisational culture in the context of employee adaptation.

  9. Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data.

    Science.gov (United States)

    De Moor, G J E; Claerhout, B; De Meyer, F

    2003-01-01

    To introduce some of the privacy protection problems related to genomics based medicine and to highlight the relevance of Trusted Third Parties (TTPs) and of Privacy Enhancing Techniques (PETs) in the restricted context of clinical research and statistics. Practical approaches based on two different pseudonymisation models, both for batch and interactive data collection and exchange, are described and analysed. The growing need of managing both clinical and genetic data raises important legal and ethical challenges. Protecting human rights in the realm of privacy, while optimising research potential and other statistical activities is a challenge that can easily be overcome with the assistance of a trust service provider offering advanced privacy enabling/enhancing solutions. As such, the use of pseudonymisation and other innovative Privacy Enhancing Techniques can unlock valuable data sources.

  10. National Low-Level Waste Management Program final summary report of key activities and accomplishments for fiscal year 1997

    International Nuclear Information System (INIS)

    Rittenberg, R.B.

    1998-03-01

    The US Department of Energy (DOE) has responsibilities under the Low-Level Radioactive Waste Policy Amendments Act of 1985 to assist states and compacts in their siting and licensing efforts for low-level radioactive waste disposal facilities. The National Low-Level Waste Management Program (NLLWMP) is the element of the DOE that performs the key support activities under the Act. The NLLWMP's activities are driven by the needs of the states and compacts as they prepare to manage their low-level waste under the Act. Other work is added during the fiscal year as necessary to accommodate new requests brought on by status changes in states' and compacts' siting and licensing efforts. This report summarizes the activities and accomplishments of the NLLWMP during FY 1997

  11. The ultracondenser. A key component for successful power management; Der Ultrakondensator. Eine Schluesselkomponente fuer erfolgreiches Energiemanagement

    Energy Technology Data Exchange (ETDEWEB)

    Soucaze-Guillous, Benoit; Wieser, Christoph; Auer, Juergen [Maxwell Technologies GmbH, Gilching (Germany)

    2010-07-01

    Today's power distribution systems are stressed by a variety of consumers in comfort or safety oriented systems. Ongoing electrification still increases the load so that new approaches for future power distribution system concepts and storage technologies will be required. The energy storage in future vehicles has to fulfill certain requirements which can be met with using ultracaps as electrostatic storage: high current capability, low self discharge rate, good performance at low temperatures and high cycle life. Ultracaps demonstrate their strengths where batteries show weaknesses: at low temperatures. Even in the range down to -40 C they work with highest efficiency and highest possible reliability. In order to support the battery for cold start or as back-up for safety critical systems, the energy stored in a cell is not allowed to be lost by self discharge effects. Therefore Maxwell ultracaps are characterized by low self discharge rates. They help creating an efficient power distribution system by providing the still increasing peak power. In contrast to peak power continuous energy demand is covered by the power distribution system with its integrated primary energy source. Automotive manufacturers develop micro hybrid systems including start-stop and recuperation functions in order to meet legal emission limits. Especially in those applications high currents occur as short pulses. For start-stop typically current is at more than 500A. The ultracap is able to handle those high currents even under cycle conditions during whole vehicle life without any negative effects on safety, lifetime or performance. Availability of ultracapacitors will be guaranteed also in future, since the electrode as key component is extracted from an environment-friendly and renewable raw material: coconut shells. (orig.)

  12. Analysis on Key Points of Construction and Management of Municipal Landscape Engineering

    Science.gov (United States)

    Liang, Mingxia; Fei, Cheng

    2018-02-01

    At present, China has made great efforts to promote the construction of ecological civilization and promote the development of ecological protection and environmental construction. It has important practical significance to maintain the ecological balance and environmental quality of our country. Especially with the gradual improvement in people’s awareness of environmental protection, so that the green of the city also put forward higher requirements at the same time with the rising of the level of urbanization. In the process of urban landscape construction, the rational planning of urban landscaping involves a lot of subject knowledge. In the green process, we should fully consider the system of urban development and construction in China, based on the design of urban development and long-term planning of the landscaping project. In addition, we must also consider the traditional layout of the city area and the physical and geographical situation and so on, to enhance the objective and scientific nature of urban landscape. Therefore, it is of great practical significance to ensure the quality of landscaping in the effective management of municipal landscape engineering.

  13. Key players and legislative framework relative to radioactive materials and waste management

    International Nuclear Information System (INIS)

    Birraux, C.

    2011-01-01

    While French industry as a whole appears to have bowed slightly under increasing pressure from the competition in an international economic arena that is becoming more and more open and diverse, France's nuclear industry has firmly held onto its position as world leader, secured during the seventies and eighties. This is the result of sustained national investment in research to constantly improve the performance and safety of the solutions deployed; it is also due to the dynamism of the companies involved, which have successfully developed their international base while maintaining a firm national foothold; it is also due to a consistent commitment on the part of the public authorities, which have provided sound guidelines, while placing greater emphasis on transparency and giving structure to crucial dialogue with the public. France is also one of the first countries that has developed a nuclear power programme, to have set up an organisation, a framework and a coherent strategy regarding the management of all its radioactive waste. (author)

  14. Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations.

    Directory of Open Access Journals (Sweden)

    Caio T C C Rachid

    Full Text Available Fungi are ubiquitous and important contributors to soil nutrient cycling, playing a vital role in C, N and P turnover, with many fungi having direct beneficial relationships with plants. However, the factors that modulate the soil fungal community are poorly understood. We studied the degree to which the composition of tree species affected the soil fungal community structure and diversity by pyrosequencing the 28S rRNA gene in soil DNA. We were also interested in whether intercropping (mixed plantation of two plant species could be used to select fungal species. More than 50,000 high quality sequences were analyzed from three treatments: monoculture of Eucalyptus; monoculture of Acacia mangium; and a mixed plantation with both species sampled 2 and 3 years after planting. We found that the plant type had a major effect on the soil fungal community structure, with 75% of the sequences from the Eucalyptus soil belonging to Basidiomycota and 19% to Ascomycota, and the Acacia soil having a sequence distribution of 28% and 62%, respectively. The intercropping of Acacia mangium in a Eucalyptus plantation significantly increased the number of fungal genera and the diversity indices and introduced or increased the frequency of several genera that were not found in the monoculture cultivation samples. Our results suggest that management of soil fungi is possible by manipulating the composition of the plant community, and intercropped systems can be a means to achieve that.

  15. APPROACH TO CUSTOMER RELATIONSHIP MANAGEMENT (CRM-THE NEW KEY SALES SUCCESS

    Directory of Open Access Journals (Sweden)

    Daniel Mihai VASILIU

    2012-06-01

    Full Text Available In this paper I investigate the new role of marketing specialists as customers supporters by understanding theirreal needs and concerns, ensuring that promises are, effectively and convince, a reality. In the past years there havebeen considerable changes in the arena battle to win customers and is currently recording a reconceptualization of thenotion of selling. In the current business environment, characterized by a competition from increasingly aggressive, thebattle to win customers is powerful every day. Companies that enter a new market to compete weakens the existing andsolid ones thanks to new ways of doing business and design. It will show that implementing a CRM strategy is not aluxury but a necessity in terms of the XXI century economy wich is "Customer Economy", whose rules are: the clienthas the power to decide, the relationship with the customer is its most value of the company, personal experience of theclient in the relationship with the company is decisive for its success, but will emerge and limitations of this approach.It will customize the application of modern competitive strategies focused on customer relationship management (CRMin a banking environment, being only able to provide a lasting competitive advantage in the competition.

  16. Key European guidelines for the diagnosis and management of patients with phenylketonuria

    DEFF Research Database (Denmark)

    van Spronsen, Francjan J; van Wegberg, Annemiek Mj; Ahring, Kirsten

    2017-01-01

    was available. From the 70 recommendations formulated, in this Review we describe ten that we deem as having the highest priority. Diet is the cornerstone of treatment, although some patients can benefit from tetrahydrobiopterin (BH4). Untreated blood phenylalanine concentrations determine management of people...... with PKU. No intervention is required if the blood phenylalanine concentration is less than 360 μmol/L. Treatment is recommended up to the age of 12 years if the phenylalanine blood concentration is between 360 μmol/L and 600 μmol/L, and lifelong treatment is recommended if the concentration is more than...... 600 μmol/L. For women trying to conceive and during pregnancy (maternal PKU), untreated phenylalanine blood concentrations of more than 360 μmol/L need to be reduced. Treatment target concentrations are as follows: 120-360 μmol/L for individuals aged 0-12 years and for maternal PKU, and 120-600 μmol...

  17. Intercropped Silviculture Systems, a Key to Achieving Soil Fungal Community Management in Eucalyptus Plantations

    Science.gov (United States)

    Rachid, Caio T. C. C.; Balieiro, Fabiano C.; Fonseca, Eduardo S.; Peixoto, Raquel Silva; Chaer, Guilherme M.; Tiedje, James M.; Rosado, Alexandre S.

    2015-01-01

    Fungi are ubiquitous and important contributors to soil nutrient cycling, playing a vital role in C, N and P turnover, with many fungi having direct beneficial relationships with plants. However, the factors that modulate the soil fungal community are poorly understood. We studied the degree to which the composition of tree species affected the soil fungal community structure and diversity by pyrosequencing the 28S rRNA gene in soil DNA. We were also interested in whether intercropping (mixed plantation of two plant species) could be used to select fungal species. More than 50,000 high quality sequences were analyzed from three treatments: monoculture of Eucalyptus; monoculture of Acacia mangium; and a mixed plantation with both species sampled 2 and 3 years after planting. We found that the plant type had a major effect on the soil fungal community structure, with 75% of the sequences from the Eucalyptus soil belonging to Basidiomycota and 19% to Ascomycota, and the Acacia soil having a sequence distribution of 28% and 62%, respectively. The intercropping of Acacia mangium in a Eucalyptus plantation significantly increased the number of fungal genera and the diversity indices and introduced or increased the frequency of several genera that were not found in the monoculture cultivation samples. Our results suggest that management of soil fungi is possible by manipulating the composition of the plant community, and intercropped systems can be a means to achieve that. PMID:25706388

  18. Culture, management and finances as key aspects for healthy workplace initiatives.

    Science.gov (United States)

    Waterworth, Pippa; Pescud, Melanie; Chappell, Stacie; Davies, Christina; Roche, Dee; Shilton, Trevor; Ledger, Melissa; Slevin, Terry; Rosenberg, Michael

    2018-02-01

    The aim of this study was to qualitatively explore the barriers and enablers to implementing healthy workplace initiatives in a sample of workplaces based in Perth, Western Australia. In-depth interviews were conducted with representatives from 31 organizations representing small, medium and large businesses in the Perth metropolitan area which reported having healthy workplace initiatives. In total, 43 factors were mentioned as influencing the implementation of healthy workplace initiatives. Factors appearing to exert the most influence on the implementation of health promoting initiatives in this sample were culture; support from managers and staff; collaboration with industry providers; financial resources circumstances and the physical environment. These factors appeared to be mutually reinforcing and interconnected. Findings suggest there may be merit in applying an organizational development lens to the implementation of workplace health promotion initiatives as this could assist in leveraging enablers and minimizing barriers. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations.

    Science.gov (United States)

    Rachid, Caio T C C; Balieiro, Fabiano C; Fonseca, Eduardo S; Peixoto, Raquel Silva; Chaer, Guilherme M; Tiedje, James M; Rosado, Alexandre S

    2015-01-01

    Fungi are ubiquitous and important contributors to soil nutrient cycling, playing a vital role in C, N and P turnover, with many fungi having direct beneficial relationships with plants. However, the factors that modulate the soil fungal community are poorly understood. We studied the degree to which the composition of tree species affected the soil fungal community structure and diversity by pyrosequencing the 28S rRNA gene in soil DNA. We were also interested in whether intercropping (mixed plantation of two plant species) could be used to select fungal species. More than 50,000 high quality sequences were analyzed from three treatments: monoculture of Eucalyptus; monoculture of Acacia mangium; and a mixed plantation with both species sampled 2 and 3 years after planting. We found that the plant type had a major effect on the soil fungal community structure, with 75% of the sequences from the Eucalyptus soil belonging to Basidiomycota and 19% to Ascomycota, and the Acacia soil having a sequence distribution of 28% and 62%, respectively. The intercropping of Acacia mangium in a Eucalyptus plantation significantly increased the number of fungal genera and the diversity indices and introduced or increased the frequency of several genera that were not found in the monoculture cultivation samples. Our results suggest that management of soil fungi is possible by manipulating the composition of the plant community, and intercropped systems can be a means to achieve that.

  20. SDAI: a key piece of software to manage the new wideband backend at Robledo

    Science.gov (United States)

    Rizzo, J. R.; Gutiérrez Bustos, M.; Kuiper, T. B. H.; Cernicharo, J.; Sotuela, I.; Pedreira, A.

    2012-09-01

    A joint collaborative project was recently developed to provide the Madrid Deep Space Communications Complex with a state-of-the-art wideband backend. This new backend provides from 100MHz to 6 GHz of instantaneous bandwidth, and spectral resolutions from 6 to 200 kHz. The backend includes a new intermediate-frequency processor, as well as a FPGA-based FFT spectrometer, which manage thousands of spectroscopic channels in real time. All these equipment need to be controlled and operated by a common software, which has to synchronize activities among affected devices, and also with the observing program. The final output should be a calibrated spectrum, readable by standard radio astronomical tools for further processing. The developed software at this end is named "Spectroscopic Data Acquisition Interface" (SDAI). SDAI is written in python 2.5, using PyQt4 for the User Interface. By an ethernet socket connection, SDAI receives astronomical information (source, frequencies, Doppler correction, etc.) and the antenna status from the observing program. Then it synchronizes the observations at the required frequency by tuning the synthesizers through their USB ports; finally SDAI controls the FFT spectrometers through UDP commands sent by sockets. Data are transmitted from the FFT spectrometers by TCP sockets, and written as standard FITS files. In this paper we describe the modules built, depict a typical observing session, and show some astronomical results using SDAI.

  1. A Survey of Managers' Access to Key Performance Indicators via HIS: The Case of Iranian Teaching Hospitals.

    Science.gov (United States)

    Ahmadi, Maryam; Khorrami, Farid; Dehnad, Afsaneh; Golchin, Mohammad H; Azad, Mohsen; Rahimi, Shafei

    2018-01-01

    The challenges of using health information systems in developing countries are different from developed countries for various reasons such as infrastructure and data culture of organizations. The aim of this study is to assess managers' access to key performance indicators (KPI) via Hospital Information System (HIS) in teaching hospitals of Iran. All managers (Census method) of the four teaching hospitals affiliated to Hormozgan University of Medical Sciences (HUMS) were included in this study. KPIs which are linked to the strategic objectives of organizations were adopted from the strategic plan of HUMS. The questionnaire used in this study included three categories: Financial, Human Resources and clinical. One-sample t-test was used and the significant difference score was calculated for the acceptable level. We found that HIS cannot facilitate access to KPIs for managers in the main categories, but it was effective in two subcategories of income (p = 0.314) and salary (P = 0.289)). A study of barriers to the use of managers of HIS in hospitals is suggested.

  2. Permanent right-to-left shunt is the key factor in managing patent foramen ovale.

    Science.gov (United States)

    Rigatelli, Gianluca; Dell'Avvocata, Fabio; Cardaioli, Paolo; Giordan, Massimo; Braggion, Gabriele; Aggio, Silvio; Chinaglia, Mauro; Mandapaka, Sangeeta; Kuruvilla, John; Chen, Jack P; Nanjundappa, Aravinda

    2011-11-15

    We sought to prospectively evaluate risk of stroke and impact of transcatheter patent foramen ovale (PFO) closure in patients with permanent right-to left shunt compared with those with Valsalva maneuver-induced right-to-left shunt. Pathophysiology and properly management of PFO still remain far from being fully clarified: in particular, the contribution of permanent right-to-left shunt remains unknown. Between March 2006 and October 2010, we enrolled 180 (mean age 44 ± 10.9 years, 98 women) of 320 consecutive patients referred to our center for transcatheter PFO closure, who had spontaneous permanent right-to-left shunt on transcranial Doppler and transthoracic/transesophageal echocardiography. All patients fulfilled the standard current indications for transcatheter closure and underwent preoperative transesophageal echocardiography and brain magnetic resonance imaging, with subsequent intracardiac echocardiographic-guided transcatheter PFO closure. We compared the clinical echocardiographic characteristics of these patients (Permanent Group) with the rest of 140 patients with right-to-left shunt only during Valsalva maneuver (Valsalva Group). Compared with the Valsalva Group patients, patients of the Permanent Group had increased frequency of multiple ischemic brain lesions on magnetic resonance imaging, previous recurrent stroke, previous peripheral arteries embolism, migraine with aura, and-more frequently-atrial septal aneurysm and prominent Eustachian valve. The presence of permanent shunt confers the highest risk of recurrent stroke (odds ratio: 5.9, 95% confidence interval: 2.0 to 12, p < 0.001). No differences were recorded between the 2 groups with regard to recurrence of ischemic events after the closure procedure. Despite its small-sample nature, our study suggests that patients with permanent right-to-left shunt have potentially a higher risk of paradoxical embolism compared with those without. Copyright © 2011 American College of Cardiology

  3. Management of Graves' disease during pregnancy: the key role of fetal thyroid gland monitoring.

    Science.gov (United States)

    Luton, Dominique; Le Gac, Isabelle; Vuillard, Edith; Castanet, Mireille; Guibourdenche, Jean; Noel, Michèle; Toubert, Marie-Elisabeth; Léger, Juliane; Boissinot, Christine; Schlageter, Marie-Hélène; Garel, Catherine; Tébeka, Brigitte; Oury, Jean-François; Czernichow, Paul; Polak, Michel

    2005-11-01

    Fetuses from mothers with Graves' disease may experience hypothyroidism or hyperthyroidism due to transplacental transfer of antithyroid drugs (ATD) or anti-TSH receptor antibodies, respectively. Little is known about the fetal consequences. Early diagnosis is essential to successful management. We investigated a new approach to the fetal diagnosis of thyroid dysfunction and validated the usefulness of fetal thyroid ultrasonograms. Seventy-two mothers with past or present Graves' disease and their fetuses were monitored monthly from 22 wk gestation. Fetal thyroid size and Doppler signals, and fetal bone maturation were determined on ultrasonograms, and thyroid function was evaluated at birth. Thyroid function and ATD dosage were monitored in the mothers. The 31 fetuses whose mothers were anti-TSH receptor antibody negative and took no ATDs during late pregnancy had normal test results. Of the 41 other fetuses, 30 had normal test results at 32 wk, 29 were euthyroid at birth, and one had moderate hypothyroidism on cord blood tests. In the remaining 11 fetuses, goiter was visualized by ultrasonography at 32 wk, and fetal thyroid dysfunction was diagnosed and treated; there was one death, in a late referral, and 10 good outcomes with normal or slightly altered thyroid function at birth. The sensitivity and specificity of fetal thyroid ultrasound at 32 wk for the diagnosis of clinically relevant fetal thyroid dysfunction were 92 and 100%, respectively. In pregnant women with past or current Graves' disease, ultrasonography of the fetal thyroid gland by an experienced ultrasonographer is an excellent diagnostic tool. This tool in conjunction with close teamwork among internists, endocrinologists, obstetricians, echographists, and pediatricians can ensure normal fetal thyroid function.

  4. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Science.gov (United States)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  5. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Directory of Open Access Journals (Sweden)

    Dimitrios Hatzinakos

    2008-03-01

    Full Text Available As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN, which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1 a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2 a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  6. Operational Details of the Five Domains Model and Its Key Applications to the Assessment and Management of Animal Welfare

    Science.gov (United States)

    Mellor, David J.

    2017-01-01

    Simple Summary The Five Domains Model is a focusing device to facilitate systematic, structured, comprehensive and coherent assessment of animal welfare; it is not a definition of animal welfare, nor is it intended to be an accurate representation of body structure and function. The purpose of each of the five domains is to draw attention to areas that are relevant to both animal welfare assessment and management. This paper begins by briefly describing the major features of the Model and the operational interactions between the five domains, and then it details seven interacting applications of the Model. These underlie its utility and increasing application to welfare assessment and management in diverse animal use sectors. Abstract In accord with contemporary animal welfare science understanding, the Five Domains Model has a significant focus on subjective experiences, known as affects, which collectively contribute to an animal’s overall welfare state. Operationally, the focus of the Model is on the presence or absence of various internal physical/functional states and external circumstances that give rise to welfare-relevant negative and/or positive mental experiences, i.e., affects. The internal states and external circumstances of animals are evaluated systematically by referring to each of the first four domains of the Model, designated “Nutrition”, “Environment”, “Health” and “Behaviour”. Then affects, considered carefully and cautiously to be generated by factors in these domains, are accumulated into the fifth domain, designated “Mental State”. The scientific foundations of this operational procedure, published in detail elsewhere, are described briefly here, and then seven key ways the Model may be applied to the assessment and management of animal welfare are considered. These applications have the following beneficial objectives—they (1) specify key general foci for animal welfare management; (2) highlight the foundations of

  7. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    Science.gov (United States)

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  8. Neutrosophic Hierarchical Clustering Algoritms

    Directory of Open Access Journals (Sweden)

    Rıdvan Şahin

    2014-03-01

    Full Text Available Interval neutrosophic set (INS is a generalization of interval valued intuitionistic fuzzy set (IVIFS, whose the membership and non-membership values of elements consist of fuzzy range, while single valued neutrosophic set (SVNS is regarded as extension of intuitionistic fuzzy set (IFS. In this paper, we extend the hierarchical clustering techniques proposed for IFSs and IVIFSs to SVNSs and INSs respectively. Based on the traditional hierarchical clustering procedure, the single valued neutrosophic aggregation operator, and the basic distance measures between SVNSs, we define a single valued neutrosophic hierarchical clustering algorithm for clustering SVNSs. Then we extend the algorithm to classify an interval neutrosophic data. Finally, we present some numerical examples in order to show the effectiveness and availability of the developed clustering algorithms.

  9. Assessing the Health-Care Risk: The Clinical-VaR, a Key Indicator for Sound Management.

    Science.gov (United States)

    Jiménez-Rodríguez, Enrique; Feria-Domínguez, José Manuel; Sebastián-Lacave, Alonso

    2018-03-30

    Clinical risk includes any undesirable situation or operational factor that may have negative consequences for patient safety or capable of causing an adverse event (AE). The AE, intentional or unintentionally, may be related to the human factor, that is, medical errors (MEs). Therefore, the importance of the health-care risk management is a current and relevant issue on the agenda of many public and private institutions. The objective of the management has been evolving from the identification of AE to the assessment of cost-effective and efficient measures that improve the quality control through monitoring. Consequently, the goal of this paper is to propose a Key Risk Indicator (KRI) that enhances the advancement of the health-care management system. Thus, the application of the Value at Risk (VaR) concept in combination to the Loss Distribution Approach (LDA) is proved to be a proactive tool, within the frame of balanced scorecard (BSC), in health organizations. For this purpose, the historical events recorded in the Algo-OpData ® database (Algorithmics Inc., Toronto, ON, Canada, IBM, Armonk, NY, USA) have been used. The analysis highlights the importance of risk in the financials outcomes of the sector. The results of paper show the usefulness of the Clinical-VaR to identify and monitor the risk and sustainability of the implemented controls.

  10. Assessing the Health-Care Risk: The Clinical-VaR, a Key Indicator for Sound Management

    Directory of Open Access Journals (Sweden)

    Enrique Jiménez-Rodríguez

    2018-03-01

    Full Text Available Clinical risk includes any undesirable situation or operational factor that may have negative consequences for patient safety or capable of causing an adverse event (AE. The AE, intentional or unintentionally, may be related to the human factor, that is, medical errors (MEs. Therefore, the importance of the health-care risk management is a current and relevant issue on the agenda of many public and private institutions. The objective of the management has been evolving from the identification of AE to the assessment of cost-effective and efficient measures that improve the quality control through monitoring. Consequently, the goal of this paper is to propose a Key Risk Indicator (KRI that enhances the advancement of the health-care management system. Thus, the application of the Value at Risk (VaR concept in combination to the Loss Distribution Approach (LDA is proved to be a proactive tool, within the frame of balanced scorecard (BSC, in health organizations. For this purpose, the historical events recorded in the Algo-OpData® database (Algorithmics Inc., Toronto, ON, Canada, IBM, Armonk, NY, USA have been used. The analysis highlights the importance of risk in the financials outcomes of the sector. The results of paper show the usefulness of the Clinical-VaR to identify and monitor the risk and sustainability of the implemented controls.

  11. Assessing the Health-Care Risk: The Clinical-VaR, a Key Indicator for Sound Management

    Science.gov (United States)

    Jiménez-Rodríguez, Enrique; Sebastián-Lacave, Alonso

    2018-01-01

    Clinical risk includes any undesirable situation or operational factor that may have negative consequences for patient safety or capable of causing an adverse event (AE). The AE, intentional or unintentionally, may be related to the human factor, that is, medical errors (MEs). Therefore, the importance of the health-care risk management is a current and relevant issue on the agenda of many public and private institutions. The objective of the management has been evolving from the identification of AE to the assessment of cost-effective and efficient measures that improve the quality control through monitoring. Consequently, the goal of this paper is to propose a Key Risk Indicator (KRI) that enhances the advancement of the health-care management system. Thus, the application of the Value at Risk (VaR) concept in combination to the Loss Distribution Approach (LDA) is proved to be a proactive tool, within the frame of balanced scorecard (BSC), in health organizations. For this purpose, the historical events recorded in the Algo-OpData® database (Algorithmics Inc., Toronto, ON, Canada, IBM, Armonk, NY, USA) have been used. The analysis highlights the importance of risk in the financials outcomes of the sector. The results of paper show the usefulness of the Clinical-VaR to identify and monitor the risk and sustainability of the implemented controls. PMID:29601529

  12. Notification: FY 2017 Update of Proposed Key Management Challenges and Internal Control Weaknesses Confronting the U.S. Chemical Safety and Hazard Investigation Board

    Science.gov (United States)

    Jan 5, 2017. The EPA OIG is beginning work to update for fiscal year 2017 its list of proposed key management challenges and internal control weaknesses confronting the U.S. Chemical Safety and Hazard Investigation Board (CSB).

  13. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  14. Using key performance indicators as knowledge-management tools at a regional health-care authority level.

    Science.gov (United States)

    Berler, Alexander; Pavlopoulos, Sotiris; Koutsouris, Dimitris

    2005-06-01

    The advantages of the introduction of information and communication technologies in the complex health-care sector are already well-known and well-stated in the past. It is, nevertheless, paradoxical that although the medical community has embraced with satisfaction most of the technological discoveries allowing the improvement in patient care, this has not happened when talking about health-care informatics. Taking the above issue of concern, our work proposes an information model for knowledge management (KM) based upon the use of key performance indicators (KPIs) in health-care systems. Based upon the use of the balanced scorecard (BSC) framework (Kaplan/Norton) and quality assurance techniques in health care (Donabedian), this paper is proposing a patient journey centered approach that drives information flow at all levels of the day-to-day process of delivering effective and managed care, toward information assessment and knowledge discovery. In order to persuade health-care decision-makers to assess the added value of KM tools, those should be used to propose new performance measurement and performance management techniques at all levels of a health-care system. The proposed KPIs are forming a complete set of metrics that enable the performance management of a regional health-care system. In addition, the performance framework established is technically applied by the use of state-of-the-art KM tools such as data warehouses and business intelligence information systems. In that sense, the proposed infrastructure is, technologically speaking, an important KM tool that enables knowledge sharing amongst various health-care stakeholders and between different health-care groups. The use of BSC is an enabling framework toward a KM strategy in health care.

  15. Exploring dementia management attitudes in primary care: a key informant survey to primary care physicians in 25 European countries.

    Science.gov (United States)

    Petrazzuoli, Ferdinando; Vinker, Shlomo; Koskela, Tuomas H; Frese, Thomas; Buono, Nicola; Soler, Jean Karl; Ahrensberg, Jette; Asenova, Radost; Foguet Boreu, Quintí; Ceyhun Peker, Gülsen; Collins, Claire; Hanževački, Miro; Hoffmann, Kathryn; Iftode, Claudia; Kurpas, Donata; Le Reste, Jean Yves; Lichtwarck, Bjørn; Petek, Davorina; Pinto, Daniel; Schrans, Diego; Streit, Sven; Tang, Eugene Yee Hing; Tatsioni, Athina; Torzsa, Péter; Unalan, Pemra C; van Marwijk, Harm; Thulesius, Hans

    2017-09-01

    Strategies for the involvement of primary care in the management of patients with presumed or diagnosed dementia are heterogeneous across Europe. We wanted to explore attitudes of primary care physicians (PCPs) when managing dementia: (i) the most popular cognitive tests, (ii) who had the right to initiate or continue cholinesterase inhibitor or memantine treatment, and (iii) the relationship between the permissiveness of these rules/guidelines and PCP's approach in the dementia investigations and assessment. Key informant survey. Primary care practices across 25 European countries. Four hundred forty-five PCPs responded to a self-administered questionnaire. Two-step cluster analysis was performed using characteristics of the informants and the responses to the survey. Two by two contingency tables with odds ratios and 95% confidence intervals were used to assess the association between categorical variables. A multinomial logistic regression model was used to assess the association of multiple variables (age class, gender, and perceived prescription rules) with the PCPs' attitude of "trying to establish a diagnosis of dementia on their own." Discrepancies between rules/guidelines and attitudes to dementia management was found in many countries. There was a strong association between the authorization to prescribe dementia drugs and pursuing dementia diagnostic work-up (odds ratio, 3.45; 95% CI 2.28-5.23). Differing regulations about who does what in dementia management seemed to affect PCP's engagement in dementia investigations and assessment. PCPs who were allowed to prescribe dementia drugs also claimed higher engagement in dementia work-up than PCPs who were not allowed to prescribe.

  16. Hierarchical wave functions revisited

    International Nuclear Information System (INIS)

    Li Dingping.

    1997-11-01

    We study the hierarchical wave functions on a sphere and on a torus. We simplify some wave functions on a sphere or a torus using the analytic properties of wave functions. The open question, the construction of the wave function for quasi electron excitation on a torus, is also solved in this paper. (author)

  17. Hierarchical Porous Structures

    Energy Technology Data Exchange (ETDEWEB)

    Grote, Christopher John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-06-07

    Materials Design is often at the forefront of technological innovation. While there has always been a push to generate increasingly low density materials, such as aero or hydrogels, more recently the idea of bicontinuous structures has gone more into play. This review will cover some of the methods and applications for generating both porous, and hierarchically porous structures.

  18. The Hierarchical Perspective

    Directory of Open Access Journals (Sweden)

    Daniel Sofron

    2015-05-01

    Full Text Available This paper is focused on the hierarchical perspective, one of the methods for representing space that was used before the discovery of the Renaissance linear perspective. The hierarchical perspective has a more or less pronounced scientific character and its study offers us a clear image of the way the representatives of the cultures that developed it used to perceive the sensitive reality. This type of perspective is an original method of representing three-dimensional space on a flat surface, which characterises the art of Ancient Egypt and much of the art of the Middle Ages, being identified in the Eastern European Byzantine art, as well as in the Western European Pre-Romanesque and Romanesque art. At the same time, the hierarchical perspective is also present in naive painting and infantile drawing. Reminiscences of this method can be recognised also in the works of some precursors of the Italian Renaissance. The hierarchical perspective can be viewed as a subjective ranking criterion, according to which the elements are visually represented by taking into account their relevance within the image while perception is ignored. This paper aims to show how the main objective of the artists of those times was not to faithfully represent the objective reality, but rather to emphasize the essence of the world and its perennial aspects. This may represent a possible explanation for the refusal of perspective in the Egyptian, Romanesque and Byzantine painting, characterised by a marked two-dimensionality.

  19. [Development of key indicators for nurses performance evaluation and estimation of their weights for management by objectives].

    Science.gov (United States)

    Lee, Eun Hwa; Ahn, Sung Hee

    2010-02-01

    This methodological research was designed to develop performance evaluation key indicators (PEKIs) for management by objectives (MBO) and to estimate their weights for hospital nurses. The PEKIs were developed by selecting preliminary indicators from a literature review, examining content validity and identifying their level of importance. Data were collected from November 14, 2007 to February 18, 2008. Data set for importance of indicators was obtained from 464 nurses and weights of PEKIs domain was from 453 nurses, who worked for at least 2 yr in one of three hospitals. Data were analyzed using X(2)-test, factor analysis, and the Analytical Hierarchy Process. Based upon Content Validity Index of .8 or above, 61 indicators were selected from the 100 preliminary indicators. Finally, 40 PEKIs were developed from the 61 indicators, and categorized into 10 domains. The highest weight of the 10 domains was customer satisfaction, which was followed by patient education, direct nursing care, profit increase, safety management, improvement of nursing quality, completeness of nursing records, enhancing competence of nurses, indirect nursing care, and cost reduction, in that order. PEKIs and their weights can be utilized for impartial evaluation and MBO for hospital nurses. Further research to verify PEKIs would lead to successful implementation of MBO.

  20. Procedural Issues regarding the Audit of the Management and Control of EU Funds, in Terms of Specific Key Requirements of the New Funding Period 2014 - 2020

    Directory of Open Access Journals (Sweden)

    Stelian Selișteanu

    2016-11-01

    Full Text Available In practice, planning the audit of management and control for each operational program and for the whole programming period, will perform during substantiation audit strategy, based on analysis and risk assessment, made at the entities involved in implementing the operational program. In what follows, we propose an assessment guidelines for the 2014- 2020 programming period, especially in terms of explanation addressed key requirements that must be used, explaining the evaluation criteria for each key requirement, providing guidance for drawing conclusions for each key requirement by each authority and finally making recommendations for establishing general conclusions regarding the management and control.

  1. Learning and adapting to societal requirements for radioactive waste management. Key findings and experience of the forum on stakeholder confidence

    International Nuclear Information System (INIS)

    2004-01-01

    The Forum on Stakeholder Confidence (FSC) is an ongoing initiative of the Nea Radioactive Waste Management Committee (RWMC). The FSC is composed of nominees from Nea member countries and consists mostly of representatives of national organisations (implementers, regulators, policy makers, research and development personnel) with responsibility for, and experience of, interacting with stakeholders. The FSC mandate includes the following: to define, oversee and carry out work programme activities in the strategic area of public perception and stakeholder confidence, as assigned by the RWMC; to advise the RWMC on major and emerging issues in the area of public perception and stakeholder confidence related to waste management; to act as a forum to share experience in achieving stakeholder confidence and, in particular, in how to obtain the confidence of local communities and their representatives and intermediaries with the technical decision makers; to analyse today processes for embedding waste management programmes into a socio-political, decision-making context; to identify opportunities for harmonized views of member countries regarding successful and unsuccessful experiences in interacting with stakeholders, technical concerns of stakeholders, effective means of communicating with technical and nontechnical audiences. This report presents the key FSC findings based on the substantial documentation and experience developed by the Forum during its first four years of activity (2000-2004). The historical context within which the FSC was established is also described and provides a perspective to those findings. An appendix recounts the collective experience of the FSC members, including their views of the impact of FSC activities on participating organisations. The FSC will build upon the present findings during its next phase of work. (author)

  2. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  3. Improved Adhesion and Compliancy of Hierarchical Fibrillar Adhesives.

    Science.gov (United States)

    Li, Yasong; Gates, Byron D; Menon, Carlo

    2015-08-05

    The gecko relies on van der Waals forces to cling onto surfaces with a variety of topography and composition. The hierarchical fibrillar structures on their climbing feet, ranging from mesoscale to nanoscale, are hypothesized to be key elements for the animal to conquer both smooth and rough surfaces. An epoxy-based artificial hierarchical fibrillar adhesive was prepared to study the influence of the hierarchical structures on the properties of a dry adhesive. The presented experiments highlight the advantages of a hierarchical structure despite a reduction of overall density and aspect ratio of nanofibrils. In contrast to an adhesive containing only nanometer-size fibrils, the hierarchical fibrillar adhesives exhibited a higher adhesion force and better compliancy when tested on an identical substrate.

  4. Bayesian nonparametric hierarchical modeling.

    Science.gov (United States)

    Dunson, David B

    2009-04-01

    In biomedical research, hierarchical models are very widely used to accommodate dependence in multivariate and longitudinal data and for borrowing of information across data from different sources. A primary concern in hierarchical modeling is sensitivity to parametric assumptions, such as linearity and normality of the random effects. Parametric assumptions on latent variable distributions can be challenging to check and are typically unwarranted, given available prior knowledge. This article reviews some recent developments in Bayesian nonparametric methods motivated by complex, multivariate and functional data collected in biomedical studies. The author provides a brief review of flexible parametric approaches relying on finite mixtures and latent class modeling. Dirichlet process mixture models are motivated by the need to generalize these approaches to avoid assuming a fixed finite number of classes. Focusing on an epidemiology application, the author illustrates the practical utility and potential of nonparametric Bayes methods.

  5. Hierarchically Structured Electrospun Fibers

    Science.gov (United States)

    2013-01-07

    in the natural lotus and silver ragwort leaves. Figure 4. Examples of electrospun bio-mimics of natural hierarchical structures. (A) Lotus leaf...B) pillared poly(methyl methacrylate) (PMMA) electrospun fiber mimic; (C) silver ragwort leaf; (D) electrospun fiber mimic made from nylon 6 and...domains containing the protein in the surrounding EVA fibers [115]. A wide variety of core-shell fibers have been generated, including PCL/ gelatin

  6. Nuclear power plant life management. An overview of identification of key components in relation with degradation mechanism - IAEA guidelines presentation

    International Nuclear Information System (INIS)

    Bezdikian, Georges

    2005-01-01

    Nuclear Power Plant (NPP) lifetime has a direct bearing on the cost of the electricity generated from it. The annual unit cost of electricity is dependent upon the operational time, and also annual costs and the capital cost assumptions function of Euros/kw. If the actual NPP lifetime has been underestimated then an economic penalty could be incurred. But the ageing degradation, of nuclear power plants is an important aspect that requires to be addressed to ensure: - that necessary safety margins are maintained throughout service life; - the adequate reliability and therefore the economic viability of older plants is maintained; - that unforeseen an uncontrolled degradation of critical plant components does not foreshorten the plant lifetime. Accommodating the inevitable obsolescence of some components has also to be addressed during plant life. Plant lifetime management requires the identification and life assessment of those components which not only limit the lifetime of the plant but also those which cannot be reasonably replaced. The planned replacement of major or 'key' components needs to be considered - where economic considerations will largely dictate replacement or the alternative strategy of power plant decommissioning. The necessary but timely planning for maintenance and replacements is a necessary consideration so that functions and reliability are maintained. The reasons for the current increasing attention in the area of plant life management are diverse and range from the fact that many of the older plants are approaching for the oldest plants more than 30 years in operation, and for important number of NPPs between 20 and 30 years. The impact of plant life management on the economics of generating electricity is the subject of ongoing studies and it can readily be seen that there can be both savings and additional costs associated with these activities. Not all degradation processes will be of significance in eroding safety margins and there is a

  7. Hierarchically Structured Electrospun Fibers

    Directory of Open Access Journals (Sweden)

    Nicole E. Zander

    2013-01-01

    Full Text Available Traditional electrospun nanofibers have a myriad of applications ranging from scaffolds for tissue engineering to components of biosensors and energy harvesting devices. The generally smooth one-dimensional structure of the fibers has stood as a limitation to several interesting novel applications. Control of fiber diameter, porosity and collector geometry will be briefly discussed, as will more traditional methods for controlling fiber morphology and fiber mat architecture. The remainder of the review will focus on new techniques to prepare hierarchically structured fibers. Fibers with hierarchical primary structures—including helical, buckled, and beads-on-a-string fibers, as well as fibers with secondary structures, such as nanopores, nanopillars, nanorods, and internally structured fibers and their applications—will be discussed. These new materials with helical/buckled morphology are expected to possess unique optical and mechanical properties with possible applications for negative refractive index materials, highly stretchable/high-tensile-strength materials, and components in microelectromechanical devices. Core-shell type fibers enable a much wider variety of materials to be electrospun and are expected to be widely applied in the sensing, drug delivery/controlled release fields, and in the encapsulation of live cells for biological applications. Materials with a hierarchical secondary structure are expected to provide new superhydrophobic and self-cleaning materials.

  8. GIS environmental information analysis of the Darro River basin as the key for the management and hydrological forest restoration.

    Science.gov (United States)

    Fernandez, Paz; Delgado, Expectación; Lopez-Alonso, Mónica; Poyatos, José Manuel

    2018-02-01

    This article presents analyses of soil and environmental information for the Darro River basin (Granada-Spain) preliminary to its hydrological and forestry restoration. These analyses were carried out using a geographical information system (GIS) and employing a new procedure that adapts hydrological forest-restoration methods. The complete analysis encompasses morphological conditions, soil and climate characteristics as well as vegetation and land use. The study investigates soil erosion in the basin by using Universal Soil Loss Equation (USLE) and by mapping erosion fragility units. The results are presented in a set of maps and their analysis, providing the starting point for river basin management and the hydrological and forestry-restoration project that was approved at the end of 2015. The presence of soft substrates (e.g. gravel and sand) indicates that the area is susceptible to erosion, particularly the areas that are dominated by human activity and have little soil protection. Finally, land use and vegetation cover were identified as key factors in the soil erosion in the basin. According to the results, river authorities have included several measures in the restoration project aimed at reducing the erosion and helping to recover the environmental value of this river basin and to include it in recreation possibilities for the community of Granada. The presented analytical approach, designed by the authors, would be useful as a tool for environmental restoration in other small Mediterranean river basins. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. THE IDENTIFICATION OF KEY SUCCESS FACTORS IN SUSTAINABLE COLD CHAIN MANAGEMENT: INSIGHTS FROM THE INDIAN FOOD INDUSTRY

    Directory of Open Access Journals (Sweden)

    Shashi

    2016-12-01

    Full Text Available Supply chain sustainability has emerged as an indispensable research agenda for the government, industry as well as non-profit orientation bodies. As a developing country, cold supply chain management in India is still in infancy. The demand pattern of food products has been dramatically changing since last few years. Nowadays, the customers are more conscious to use products for better health and highly expecting for food safety, toxic free and eco-friendly delivery of food products. However, sustainable cold supply chain has not yet received good heed throughout the world. Hence, in this paper an attempt has been made to address these important issues. A conceptual model was proposed in the consultation of practitioners and literature support to address the important issues in cold supply chain management for food companies. Therefore, in order to identify the key success factors for sustainable cold chain management, in this study a conceptual model developed. The proposed framework is then validated by an empirical research in the Indian food industry. This research has several alarming findings. Explicitly, in India i environmental issues and social responsibility are not as important as other ‎economical supplier selection criteria, ii among 19 food supplier selection criteria, the rank of social responsibility is 18‎, iii low carbon emission is less important value addition trait as compare to ‎other sustainable cold chain value addition (which means in India the buyers focus more on their individual and prompt received ‎benefits rather than long ‎lasting advantages, iv the use of life cycle analysis, renewable energy sources and passive cold chain are the least important ‎implemented sustainable cold chain practices (although this might be because of utilization complexities, v the joint development of product is implemented at the lowest extent judging against other dynamic capacity ‎factors, vii government usually backed

  10. Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks

    Science.gov (United States)

    da Silva, Eduardo; Dos Santos, Aldri Luiz; Lima, Michele N.; Albini, Luiz Carlos Pessoa

    Among the key management schemes for MANETs, the Self-Organized Public-Key Management System (PGP-Like) is the main chaining-based key management scheme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that PGP-Like was able to maintain its effectiveness when submitted to the lack of cooperation attack, contradicting previously theoretical results. It correctly works even in the presence of more than 60% of misbehaving nodes, although the convergence time is affected with only 20% of misbehaving nodes. On the other hand, PGP-Like is completely vulnerable to the impersonation attack. Its functionality is affected with just 5% of misbehaving nodes, confirming previously theoretical results.

  11. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  12. Context updates are hierarchical

    Directory of Open Access Journals (Sweden)

    Anton Karl Ingason

    2016-10-01

    Full Text Available This squib studies the order in which elements are added to the shared context of interlocutors in a conversation. It focuses on context updates within one hierarchical structure and argues that structurally higher elements are entered into the context before lower elements, even if the structurally higher elements are pronounced after the lower elements. The crucial data are drawn from a comparison of relative clauses in two head-initial languages, English and Icelandic, and two head-final languages, Korean and Japanese. The findings have consequences for any theory of a dynamic semantics.

  13. Detecting Hierarchical Structure in Networks

    DEFF Research Database (Denmark)

    Herlau, Tue; Mørup, Morten; Schmidt, Mikkel Nørgaard

    2012-01-01

    Many real-world networks exhibit hierarchical organization. Previous models of hierarchies within relational data has focused on binary trees; however, for many networks it is unknown whether there is hierarchical structure, and if there is, a binary tree might not account well for it. We propose...... a generative Bayesian model that is able to infer whether hierarchies are present or not from a hypothesis space encompassing all types of hierarchical tree structures. For efficient inference we propose a collapsed Gibbs sampling procedure that jointly infers a partition and its hierarchical structure....... On synthetic and real data we demonstrate that our model can detect hierarchical structure leading to better link-prediction than competing models. Our model can be used to detect if a network exhibits hierarchical structure, thereby leading to a better comprehension and statistical account the network....

  14. Hierarchical modularity in human brain functional networks

    Directory of Open Access Journals (Sweden)

    David Meunier

    2009-10-01

    Full Text Available The idea that complex systems have a hierarchical modular organization originates in the early 1960s and has recently attracted fresh support from quantitative studies of large scale, real-life networks. Here we investigate the hierarchical modular (or “modules-within-modules” decomposition of human brain functional networks, measured using functional magnetic resonance imaging (fMRI in 18 healthy volunteers under no-task or resting conditions. We used a customized template to extract networks with more than 1800 regional nodes, and we applied a fast algorithm to identify nested modular structure at several hierarchical levels. We used mutual information, 0 < I < 1, to estimate the similarity of community structure of networks in different subjects, and to identify the individual network that is most representative of the group. Results show that human brain functional networks have a hierarchical modular organization with a fair degree of similarity between subjects, I=0.63. The largest 5 modules at the highest level of the hierarchy were medial occipital, lateral occipital, central, parieto-frontal and fronto-temporal systems; occipital modules demonstrated less sub-modular organization than modules comprising regions of multimodal association cortex. Connector nodes and hubs, with a key role in inter-modular connectivity, were also concentrated in association cortical areas. We conclude that methods are available for hierarchical modular decomposition of large numbers of high resolution brain functional networks using computationally expedient algorithms. This could enable future investigations of Simon's original hypothesis that hierarchy or near-decomposability of physical symbol systems is a critical design feature for their fast adaptivity to changing environmental conditions.

  15. BEYOND THE BRAND, SOCIAL INTERACTION AS KEY DETERMINANT OF IMPRESSION MANAGEMENT FOR CUSTOMERS‟ SATISFACTION AND BETTER BUSINESS PROSPECT : A STUDY ON STREET TRADERS

    OpenAIRE

    HARASANKAR ADHIKARI

    2012-01-01

    ABSTRACT: The present study examines how the street traders were operating their trade with their own style of impression management. The social interaction and hospitality had been the key tool of their impression management by which they had become their own brand. In present day marketing system with tremendous competition they were in their own prospect while they were in total uncertain position. Although they had no profession education they had learnt from their self strategies of thei...

  16. Hierarchical quark mass matrices

    International Nuclear Information System (INIS)

    Rasin, A.

    1998-02-01

    I define a set of conditions that the most general hierarchical Yukawa mass matrices have to satisfy so that the leading rotations in the diagonalization matrix are a pair of (2,3) and (1,2) rotations. In addition to Fritzsch structures, examples of such hierarchical structures include also matrices with (1,3) elements of the same order or even much larger than the (1,2) elements. Such matrices can be obtained in the framework of a flavor theory. To leading order, the values of the angle in the (2,3) plane (s 23 ) and the angle in the (1,2) plane (s 12 ) do not depend on the order in which they are taken when diagonalizing. We find that any of the Cabbibo-Kobayashi-Maskawa matrix parametrizations that consist of at least one (1,2) and one (2,3) rotation may be suitable. In the particular case when the s 13 diagonalization angles are sufficiently small compared to the product s 12 s 23 , two special CKM parametrizations emerge: the R 12 R 23 R 12 parametrization follows with s 23 taken before the s 12 rotation, and vice versa for the R 23 R 12 R 23 parametrization. (author)

  17. Hierarchical partial order ranking

    International Nuclear Information System (INIS)

    Carlsen, Lars

    2008-01-01

    Assessing the potential impact on environmental and human health from the production and use of chemicals or from polluted sites involves a multi-criteria evaluation scheme. A priori several parameters are to address, e.g., production tonnage, specific release scenarios, geographical and site-specific factors in addition to various substance dependent parameters. Further socio-economic factors may be taken into consideration. The number of parameters to be included may well appear to be prohibitive for developing a sensible model. The study introduces hierarchical partial order ranking (HPOR) that remedies this problem. By HPOR the original parameters are initially grouped based on their mutual connection and a set of meta-descriptors is derived representing the ranking corresponding to the single groups of descriptors, respectively. A second partial order ranking is carried out based on the meta-descriptors, the final ranking being disclosed though average ranks. An illustrative example on the prioritisation of polluted sites is given. - Hierarchical partial order ranking of polluted sites has been developed for prioritization based on a large number of parameters

  18. Nested and Hierarchical Archimax copulas

    KAUST Repository

    Hofert, Marius; Huser, Raphaë l; Prasad, Avinash

    2017-01-01

    The class of Archimax copulas is generalized to nested and hierarchical Archimax copulas in several ways. First, nested extreme-value copulas or nested stable tail dependence functions are introduced to construct nested Archimax copulas based on a single frailty variable. Second, a hierarchical construction of d-norm generators is presented to construct hierarchical stable tail dependence functions and thus hierarchical extreme-value copulas. Moreover, one can, by itself or additionally, introduce nested frailties to extend Archimax copulas to nested Archimax copulas in a similar way as nested Archimedean copulas extend Archimedean copulas. Further results include a general formula for the density of Archimax copulas.

  19. Nested and Hierarchical Archimax copulas

    KAUST Repository

    Hofert, Marius

    2017-07-03

    The class of Archimax copulas is generalized to nested and hierarchical Archimax copulas in several ways. First, nested extreme-value copulas or nested stable tail dependence functions are introduced to construct nested Archimax copulas based on a single frailty variable. Second, a hierarchical construction of d-norm generators is presented to construct hierarchical stable tail dependence functions and thus hierarchical extreme-value copulas. Moreover, one can, by itself or additionally, introduce nested frailties to extend Archimax copulas to nested Archimax copulas in a similar way as nested Archimedean copulas extend Archimedean copulas. Further results include a general formula for the density of Archimax copulas.

  20. Community turnover of wood-inhabiting fungi across hierarchical spatial scales.

    Directory of Open Access Journals (Sweden)

    Nerea Abrego

    Full Text Available For efficient use of conservation resources it is important to determine how species diversity changes across spatial scales. In many poorly known species groups little is known about at which spatial scales the conservation efforts should be focused. Here we examined how the community turnover of wood-inhabiting fungi is realised at three hierarchical levels, and how much of community variation is explained by variation in resource composition and spatial proximity. The hierarchical study design consisted of management type (fixed factor, forest site (random factor, nested within management type and study plots (randomly placed plots within each study site. To examine how species richness varied across the three hierarchical scales, randomized species accumulation curves and additive partitioning of species richness were applied. To analyse variation in wood-inhabiting species and dead wood composition at each scale, linear and Permanova modelling approaches were used. Wood-inhabiting fungal communities were dominated by rare and infrequent species. The similarity of fungal communities was higher within sites and within management categories than among sites or between the two management categories, and it decreased with increasing distance among the sampling plots and with decreasing similarity of dead wood resources. However, only a small part of community variation could be explained by these factors. The species present in managed forests were in a large extent a subset of those species present in natural forests. Our results suggest that in particular the protection of rare species requires a large total area. As managed forests have only little additional value complementing the diversity of natural forests, the conservation of natural forests is the key to ecologically effective conservation. As the dissimilarity of fungal communities increases with distance, the conserved natural forest sites should be broadly distributed in space, yet

  1. Systemwide Power Management with Argo

    Energy Technology Data Exchange (ETDEWEB)

    Ellsworth, Daniel; Patki, Tapasya; Perarnau, Swann; Seo, Sangmin; Yoshii, Kazutomo; Hoffmann, Henry; Schulz, Martin; Beckman, Pete

    2016-05-23

    The Argo project is a DOE initiative for designing a modular operating system/runtime for the next generation of supercomputers. A key focus area in this project is power management, which is one of the main challenges on the path to exascale. In this paper, we discuss ideas for systemwide power management in the Argo project. We present a hierarchical and scalable approach to maintain a power bound at scale, and we highlight some early results.

  2. Scientific information and the Tongass land management plan: key findings derived from the scientific literature, species assessments, resource analyses, workshops, and risk assessment panels.

    Science.gov (United States)

    Douglas N. Swanston; Charles G. Shaw; Winston P. Smith; Kent R. Julin; Guy A. Cellier; Fred H. Everest

    1996-01-01

    This document highlights key items of information obtained from the published literature and from specific assessments, workshops, resource analyses, and various risk assessment panels conducted as part of the Tongass land management planning process. None of this information dictates any particular decision; however, it is important to consider during decisionmaking...

  3. Towards Business Process Management in networked ecosystems

    NARCIS (Netherlands)

    Johan Versendaal; dr. Martijn Zoet; Jeroen Grondelle

    2014-01-01

    Managing and supporting the collaboration between different actors is key in any organizational context, whether of a hierarchical or a networked nature. In the networked context of ecosystems of service providers and other stakeholders, BPM is faced with different challenges than in a conventional

  4. Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, Md. Golam; Kabir, M. Hasnat; Rahim, Muhammad Sajjadur; Ullah, Shaikh Enayet

    2012-01-01

    The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. The head-set members are responsible for control and management of the network. Results show that t...

  5. Transmutations across hierarchical levels

    International Nuclear Information System (INIS)

    O'Neill, R.V.

    1977-01-01

    The development of large-scale ecological models depends implicitly on a concept known as hierarchy theory which views biological systems in a series of hierarchical levels (i.e., organism, population, trophic level, ecosystem). The theory states that an explanation of a biological phenomenon is provided when it is shown to be the consequence of the activities of the system's components, which are themselves systems in the next lower level of the hierarchy. Thus, the behavior of a population is explained by the behavior of the organisms in the population. The initial step in any modeling project is, therefore, to identify the system components and the interactions between them. A series of examples of transmutations in aquatic and terrestrial ecosystems are presented to show how and why changes occur. The types of changes are summarized and possible implications of transmutation for hierarchy theory, for the modeler, and for the ecological theoretician are discussed

  6. Trees and Hierarchical Structures

    CERN Document Server

    Haeseler, Arndt

    1990-01-01

    The "raison d'etre" of hierarchical dustering theory stems from one basic phe­ nomenon: This is the notorious non-transitivity of similarity relations. In spite of the fact that very often two objects may be quite similar to a third without being that similar to each other, one still wants to dassify objects according to their similarity. This should be achieved by grouping them into a hierarchy of non-overlapping dusters such that any two objects in ~ne duster appear to be more related to each other than they are to objects outside this duster. In everyday life, as well as in essentially every field of scientific investigation, there is an urge to reduce complexity by recognizing and establishing reasonable das­ sification schemes. Unfortunately, this is counterbalanced by the experience of seemingly unavoidable deadlocks caused by the existence of sequences of objects, each comparatively similar to the next, but the last rather different from the first.

  7. Optimisation by hierarchical search

    Science.gov (United States)

    Zintchenko, Ilia; Hastings, Matthew; Troyer, Matthias

    2015-03-01

    Finding optimal values for a set of variables relative to a cost function gives rise to some of the hardest problems in physics, computer science and applied mathematics. Although often very simple in their formulation, these problems have a complex cost function landscape which prevents currently known algorithms from efficiently finding the global optimum. Countless techniques have been proposed to partially circumvent this problem, but an efficient method is yet to be found. We present a heuristic, general purpose approach to potentially improve the performance of conventional algorithms or special purpose hardware devices by optimising groups of variables in a hierarchical way. We apply this approach to problems in combinatorial optimisation, machine learning and other fields.

  8. Using a Hierarchical Approach to Model Regional Source Sink Dynamics for Neotropical Nearctic Songbirds to Inform Management Practices on Department of Defense Installations

    Science.gov (United States)

    2017-03-20

    spatial scale of inference for MAPS measures of productivity and how they should be applied to management decisions. Chapter three reports on the...detection process with combined methods : an example with northern bobwhite. Journal of Wildlife Management , 74, 1319–1325. Ridgeway, G. with...R. Geupel, P. Pyle, T. E. Martin, and D. F. DeSante. (1993) Handbook of Field Methods for Monitoring Landbirds. USDA Forest Service General

  9. World Health organization guidelines for management of acute stress, PTSD, and bereavement: key challenges on the road ahead.

    Science.gov (United States)

    Tol, Wietse A; Barbui, Corrado; Bisson, Jonathan; Cohen, Judith; Hijazi, Zeinab; Jones, Lynne; de Jong, Joop T V M; Magrini, Nicola; Omigbodun, Olayinka; Seedat, Soraya; Silove, Derrick; Souza, Renato; Sumathipala, Athula; Vijayakumar, Lakshmi; Weissbecker, Inka; Zatzick, Douglas; van Ommeren, Mark

    2014-12-01

    Wietse Tol and colleagues discuss some of the key challenges for implementation of new WHO guidelines for stress-related mental health disorders in low- and middle-income countries. Please see later in the article for the Editors' Summary.

  10. Implementation of hierarchical control in DC microgrids

    DEFF Research Database (Denmark)

    Jin, Chi; Wang, Peng; Xiao, Jianfang

    2014-01-01

    of Technology, Singapore. The coordination control among multiple dc sources and energy storages is implemented using a novel hierarchical control technique. The bus voltage essentially acts as an indicator of supply-demand balance. A wireless control is implemented for the reliable operation of the grid....... A reasonable compromise between the maximum power harvest and effective battery management is further enhanced using the coordination control based on a central energy management system. The feasibility and effectiveness of the proposed control strategies have been tested by a dc microgrid in WERL....

  11. How hierarchical is language use?

    Science.gov (United States)

    Frank, Stefan L.; Bod, Rens; Christiansen, Morten H.

    2012-01-01

    It is generally assumed that hierarchical phrase structure plays a central role in human language. However, considerations of simplicity and evolutionary continuity suggest that hierarchical structure should not be invoked too hastily. Indeed, recent neurophysiological, behavioural and computational studies show that sequential sentence structure has considerable explanatory power and that hierarchical processing is often not involved. In this paper, we review evidence from the recent literature supporting the hypothesis that sequential structure may be fundamental to the comprehension, production and acquisition of human language. Moreover, we provide a preliminary sketch outlining a non-hierarchical model of language use and discuss its implications and testable predictions. If linguistic phenomena can be explained by sequential rather than hierarchical structure, this will have considerable impact in a wide range of fields, such as linguistics, ethology, cognitive neuroscience, psychology and computer science. PMID:22977157

  12. Very low level waste disposal in France. A key tool for the management for decommissioning wastes in France

    Energy Technology Data Exchange (ETDEWEB)

    Duetzer, Michel [Andra - Agence Nationale pour la Gestion des Dechets Radioactives, Chatenay-Malabry (France). Direction Industrielle

    2015-07-01

    At the end of the 90{sup th}, France had to deal with the emerging issue of the management of wastes resulting from decommissioning operations of nuclear facilities. A specific regulation was issued and Andra, the French National Radioactive Waste Management Agency, developed a dedicated near surface disposal facility to accommodate very low level radioactive wastes. After more than 10 years of operation, this facility demonstrated it can provide efficient and flexible solutions for the management of decomissioning wastes.

  13. Keys to success for data-driven decision making: Lessons from participatory monitoring and collaborative adaptive management

    Science.gov (United States)

    Recent years have witnessed a call for evidence-based decisions in conservation and natural resource management, including data-driven decision-making. Adaptive management (AM) is one prevalent model for integrating scientific data into decision-making, yet AM has faced numerous challenges and limit...

  14. Constructing storyboards based on hierarchical clustering analysis

    Science.gov (United States)

    Hasebe, Satoshi; Sami, Mustafa M.; Muramatsu, Shogo; Kikuchi, Hisakazu

    2005-07-01

    There are growing needs for quick preview of video contents for the purpose of improving accessibility of video archives as well as reducing network traffics. In this paper, a storyboard that contains a user-specified number of keyframes is produced from a given video sequence. It is based on hierarchical cluster analysis of feature vectors that are derived from wavelet coefficients of video frames. Consistent use of extracted feature vectors is the key to avoid a repetition of computationally-intensive parsing of the same video sequence. Experimental results suggest that a significant reduction in computational time is gained by this strategy.

  15. Hierarchical Agent-Based Integrated Modelling Approach for Microgrids with Adoption of EVs and HRES

    Directory of Open Access Journals (Sweden)

    Peng Han

    2014-01-01

    Full Text Available The large adoption of electric vehicles (EVs, hybrid renewable energy systems (HRESs, and the increasing of the loads shall bring significant challenges to the microgrid. The methodology to model microgrid with high EVs and HRESs penetrations is the key to EVs adoption assessment and optimized HRESs deployment. However, considering the complex interactions of the microgrid containing massive EVs and HRESs, any previous single modelling approaches are insufficient. Therefore in this paper, the methodology named Hierarchical Agent-based Integrated Modelling Approach (HAIMA is proposed. With the effective integration of the agent-based modelling with other advanced modelling approaches, the proposed approach theoretically contributes to a new microgrid model hierarchically constituted by microgrid management layer, component layer, and event layer. Then the HAIMA further links the key parameters and interconnects them to achieve the interactions of the whole model. Furthermore, HAIMA practically contributes to a comprehensive microgrid operation system, through which the assessment of the proposed model and the impact of the EVs adoption are achieved. Simulations show that the proposed HAIMA methodology will be beneficial for the microgrid study and EV’s operation assessment and shall be further utilized for the energy management, electricity consumption prediction, the EV scheduling control, and HRES deployment optimization.

  16. Application of Activity-Based Costing Management System by Key Success Paths to Promote the Competitive Advantages and Operation Performance

    OpenAIRE

    Mei-Fang Wu; Shu-Li Wang; Feng-Tsung Cheng

    2015-01-01

    Highly developed technology and highly competitive global market highlight the important role of competitive advantages and operation performances in sustainable company operation. Activity-Based Costing (ABC) provides accurate operation cost and operation performance information. Rich literatures provide relevant research with cases study on Activity-Based Costing application, but the research on cause relationship between key success factors and its specific outcome, su...

  17. Hierarchical Discriminant Analysis

    Directory of Open Access Journals (Sweden)

    Di Lu

    2018-01-01

    Full Text Available The Internet of Things (IoT generates lots of high-dimensional sensor intelligent data. The processing of high-dimensional data (e.g., data visualization and data classification is very difficult, so it requires excellent subspace learning algorithms to learn a latent subspace to preserve the intrinsic structure of the high-dimensional data, and abandon the least useful information in the subsequent processing. In this context, many subspace learning algorithms have been presented. However, in the process of transforming the high-dimensional data into the low-dimensional space, the huge difference between the sum of inter-class distance and the sum of intra-class distance for distinct data may cause a bias problem. That means that the impact of intra-class distance is overwhelmed. To address this problem, we propose a novel algorithm called Hierarchical Discriminant Analysis (HDA. It minimizes the sum of intra-class distance first, and then maximizes the sum of inter-class distance. This proposed method balances the bias from the inter-class and that from the intra-class to achieve better performance. Extensive experiments are conducted on several benchmark face datasets. The results reveal that HDA obtains better performance than other dimensionality reduction algorithms.

  18. Hierarchical Linked Views

    Energy Technology Data Exchange (ETDEWEB)

    Erbacher, Robert; Frincke, Deb

    2007-07-02

    Coordinated views have proven critical to the development of effective visualization environments. This results from the fact that a single view or representation of the data cannot show all of the intricacies of a given data set. Additionally, users will often need to correlate more data parameters than can effectively be integrated into a single visual display. Typically, development of multiple-linked views results in an adhoc configuration of views and associated interactions. The hierarchical model we are proposing is geared towards more effective organization of such environments and the views they encompass. At the same time, this model can effectively integrate much of the prior work on interactive and visual frameworks. Additionally, we expand the concept of views to incorporate perceptual views. This is related to the fact that visual displays can have information encoded at various levels of focus. Thus, a global view of the display provides overall trends of the data while focusing in on individual elements provides detailed specifics. By integrating interaction and perception into a single model, we show how one impacts the other. Typically, interaction and perception are considered separately, however, when interaction is being considered at a fundamental level and allowed to direct/modify the visualization directly we must consider them simultaneously and how they impact one another.

  19. Extending stakeholder theory to promote resource management initiatives to key stakeholders: a case study of water transfers in Alberta, Canada.

    Science.gov (United States)

    Lafreniere, Katherine C; Deshpande, Sameer; Bjornlund, Henning; Hunter, M Gordon

    2013-11-15

    Many attempts to implement resource management initiatives in Canadian and international communities have been resisted by stakeholders despite inclusion of their representatives in the decision-making process. Managers' failure to understand stakeholders' perspectives when proposing initiatives is a potential cause of this resistance. Our study uses marketing thought to enhance stakeholder theory by bringing in an audience-centric perspective. We attempt to understand how stakeholders perceive their interests in an organization and consequently decide how to influence that organization. By doing so, we investigate whether a disconnect exists between the perceptions of managers and those of stakeholders. Natural resource managers can utilize this knowledge to garner stakeholder support for the organization and its activities. We support this claim with findings from a water transfer plebiscite held in the Canadian province of Alberta. Sixteen personal interviews employing narrative inquiry were conducted to document voters' (i.e., irrigators') interpretations. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. 46th Annual meeting on nuclear technology (AMNT 2015). Key topic / Enhanced safety and operation excellence / Sustainable reactor operation management - safe, efficient, valuable

    International Nuclear Information System (INIS)

    Fischer, Erwin

    2015-01-01

    Summary report on the following Topical Session of the 46 th Annual Conference on Nuclear Technology (AMNT 2015) held in Berlin, 5 to 7 May 2015: - Sustainable Reactor Operation Management - Safe, Efficient, Valuable (Erwin Fischer) The other Sessions of the Key Topics - ''Outstanding Know-How and Sustainable Innovations'', - ''Enhanced Safety and Operation Excellence'' and - ''Decommissioning Experience and Waste Management Solutions'' have been covered in atw 7 (2015) and will be covered in further issues of atw.

  1. Microsoft Access Small Business Solutions State-of-the-Art Database Models for Sales, Marketing, Customer Management, and More Key Business Activities

    CERN Document Server

    Hennig, Teresa; Linson, Larry; Purvis, Leigh; Spaulding, Brent

    2010-01-01

    Database models developed by a team of leading Microsoft Access MVPs that provide ready-to-use solutions for sales, marketing, customer management and other key business activities for most small businesses. As the most popular relational database in the world, Microsoft Access is widely used by small business owners. This book responds to the growing need for resources that help business managers and end users design and build effective Access database solutions for specific business functions. Coverage includes::; Elements of a Microsoft Access Database; Relational Data Model; Dealing with C

  2. 46{sup th} Annual meeting on nuclear technology (AMNT 2015). Key topic / Enhanced safety and operation excellence / Sustainable reactor operation management - safe, efficient, valuable

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, Erwin [E.ON Kernkraft GmbH, Global Unit Next Generation, Hannover (Germany)

    2015-08-15

    Summary report on the following Topical Session of the 46{sup th} Annual Conference on Nuclear Technology (AMNT 2015) held in Berlin, 5 to 7 May 2015: - Sustainable Reactor Operation Management - Safe, Efficient, Valuable (Erwin Fischer) The other Sessions of the Key Topics - ''Outstanding Know-How and Sustainable Innovations'', - ''Enhanced Safety and Operation Excellence'' and - ''Decommissioning Experience and Waste Management Solutions'' have been covered in atw 7 (2015) and will be covered in further issues of atw.

  3. Assessing the Health-Care Risk: The Clinical-VaR, a Key Indicator for Sound Management

    OpenAIRE

    Enrique Jiménez-Rodríguez; José Manuel Feria-Domínguez; Alonso Sebastián-Lacave

    2018-01-01

    Clinical risk includes any undesirable situation or operational factor that may have negative consequences for patient safety or capable of causing an adverse event (AE). The AE, intentional or unintentionally, may be related to the human factor, that is, medical errors (MEs). Therefore, the importance of the health-care risk management is a current and relevant issue on the agenda of many public and private institutions. The objective of the management has been evolving from the identificati...

  4. Success under duress: policies and practices managers view as keys to profitability in five California hospitals with challenging payer mix.

    Science.gov (United States)

    Rundall, Thomas; Oberlin, Shelley; Thygesen, Brian; Janus, Katharina

    2012-01-01

    Hospitals with a challenging payer mix (CPM)-high proportions of uninsured and Medicaid patients and a low proportion of commercially insured patients-are an important source of care for low-income, uninsured people. Achieving profitability is difficult for CPM hospitals. From 2005 through 2008, only one-third of 67 CPM hospitals in California reported positive total margins. In-depth group interviews were completed with the management leadership teams of a diverse group of five profitable CPM hospitals to identify the management strategies and practices that the hospitals' leadership teams credited for their financial success. Twelve management policy and practice topics were identified. Four of the policies and practices that managers identified involve organizational actions to increase hospital revenue or operational efficiency. These factors are consistent with those identified in previous research. However, managers also identified eight factors not previously revealed in research on hospital profitability, including management policies and practices that establish the organizational culture, workforce, relationships, monitoring systems, and governance necessary to ensure that hospital employees and affiliated physicians support and successfully implement organizational actions necessary to achieve profitability.

  5. 47{sup th} Annual meeting on nuclear technology (AMNT 2016). Key Topics / Enhanced safety and operation excellence and decommissioning experience and Waste management solutions

    Energy Technology Data Exchange (ETDEWEB)

    Salnikova, Tatiana [AREVA GmbH, Erlangen (Germany); Schaffrath, Andreas [Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) gGmbH, Garching (Germany)

    2016-10-15

    Summary report on the Key Topics ''Enhanced Safety and Operation Excellence'' and ''Decommissioning Experience and Waste Management Solutions'' of the 47{sup th} Annual Conference on Nuclear Technology (AMNT 2016) held in Hamburg, 10 to 12 May 2016. Other Sessions of AMNT 2016 have been and will be covered in further issues of atw.

  6. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  7. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  8. Direct hierarchical assembly of nanoparticles

    Science.gov (United States)

    Xu, Ting; Zhao, Yue; Thorkelsson, Kari

    2014-07-22

    The present invention provides hierarchical assemblies of a block copolymer, a bifunctional linking compound and a nanoparticle. The block copolymers form one micro-domain and the nanoparticles another micro-domain.

  9. Hierarchical materials: Background and perspectives

    DEFF Research Database (Denmark)

    2016-01-01

    Hierarchical design draws inspiration from analysis of biological materials and has opened new possibilities for enhancing performance and enabling new functionalities and extraordinary properties. With the development of nanotechnology, the necessary technological requirements for the manufactur...

  10. Hierarchical demographic approaches for assessing invasion dynamics of non-indigenous species: An example using northern snakehead (Channa argus)

    Science.gov (United States)

    Jiao, Y.; Lapointe, N.W.R.; Angermeier, P.L.; Murphy, B.R.

    2009-01-01

    Models of species' demographic features are commonly used to understand population dynamics and inform management tactics. Hierarchical demographic models are ideal for the assessment of non-indigenous species because our knowledge of non-indigenous populations is usually limited, data on demographic traits often come from a species' native range, these traits vary among populations, and traits are likely to vary considerably over time as species adapt to new environments. Hierarchical models readily incorporate this spatiotemporal variation in species' demographic traits by representing demographic parameters as multi-level hierarchies. As is done for traditional non-hierarchical matrix models, sensitivity and elasticity analyses are used to evaluate the contributions of different life stages and parameters to estimates of population growth rate. We applied a hierarchical model to northern snakehead (Channa argus), a fish currently invading the eastern United States. We used a Monte Carlo approach to simulate uncertainties in the sensitivity and elasticity analyses and to project future population persistence under selected management tactics. We gathered key biological information on northern snakehead natural mortality, maturity and recruitment in its native Asian environment. We compared the model performance with and without hierarchy of parameters. Our results suggest that ignoring the hierarchy of parameters in demographic models may result in poor estimates of population size and growth and may lead to erroneous management advice. In our case, the hierarchy used multi-level distributions to simulate the heterogeneity of demographic parameters across different locations or situations. The probability that the northern snakehead population will increase and harm the native fauna is considerable. Our elasticity and prognostic analyses showed that intensive control efforts immediately prior to spawning and/or juvenile-dispersal periods would be more effective

  11. Functional annotation of hierarchical modularity.

    Directory of Open Access Journals (Sweden)

    Kanchana Padmanabhan

    Full Text Available In biological networks of molecular interactions in a cell, network motifs that are biologically relevant are also functionally coherent, or form functional modules. These functionally coherent modules combine in a hierarchical manner into larger, less cohesive subsystems, thus revealing one of the essential design principles of system-level cellular organization and function-hierarchical modularity. Arguably, hierarchical modularity has not been explicitly taken into consideration by most, if not all, functional annotation systems. As a result, the existing methods would often fail to assign a statistically significant functional coherence score to biologically relevant molecular machines. We developed a methodology for hierarchical functional annotation. Given the hierarchical taxonomy of functional concepts (e.g., Gene Ontology and the association of individual genes or proteins with these concepts (e.g., GO terms, our method will assign a Hierarchical Modularity Score (HMS to each node in the hierarchy of functional modules; the HMS score and its p-value measure functional coherence of each module in the hierarchy. While existing methods annotate each module with a set of "enriched" functional terms in a bag of genes, our complementary method provides the hierarchical functional annotation of the modules and their hierarchically organized components. A hierarchical organization of functional modules often comes as a bi-product of cluster analysis of gene expression data or protein interaction data. Otherwise, our method will automatically build such a hierarchy by directly incorporating the functional taxonomy information into the hierarchy search process and by allowing multi-functional genes to be part of more than one component in the hierarchy. In addition, its underlying HMS scoring metric ensures that functional specificity of the terms across different levels of the hierarchical taxonomy is properly treated. We have evaluated our

  12. Understanding the cognitive basis for human-wildlife relationships as a key to successful protected-area management

    DEFF Research Database (Denmark)

    Teel, Tara L.; Manfredo, Michael J.; Jensen, Frank Søndergaard

    2010-01-01

    Wildlife is a critical component of protected areas worldwide. It can serve not only as a primary attraction or an enjoyable part of the visitor experience but also as source of conflict. Managing wildlife in this context requires a broadbased approach that can account for the myriad factors...... this micro-macro approach and explore its implications for protected-area management. First, data from nineteen-state study conducted in 2004 via mail survey in the united States show how two contrasting orientations - dominations and mutualism - produce different attitudes and behaviors toward wildlife...... to wildlife issues. Together, these studies highlight the importance of multilevel models for exploring the social aspects of wildlife and protected-area management....

  13. Dynamic Non-Hierarchical File Systems for Exascale Storage

    Energy Technology Data Exchange (ETDEWEB)

    Long, Darrell E. [Univ. of California, Santa Cruz, CA (United States); Miller, Ethan L [Univ. of California, Santa Cruz, CA (United States)

    2015-02-24

    This constitutes the final report for “Dynamic Non-Hierarchical File Systems for Exascale Storage”. The ultimate goal of this project was to improve data management in scientific computing and high-end computing (HEC) applications, and to achieve this goal we proposed: to develop the first, HEC-targeted, file system featuring rich metadata and provenance collection, extreme scalability, and future storage hardware integration as core design goals, and to evaluate and develop a flexible non-hierarchical file system interface suitable for providing more powerful and intuitive data management interfaces to HEC and scientific computing users. Data management is swiftly becoming a serious problem in the scientific community – while copious amounts of data are good for obtaining results, finding the right data is often daunting and sometimes impossible. Scientists participating in a Department of Energy workshop noted that most of their time was spent “...finding, processing, organizing, and moving data and it’s going to get much worse”. Scientists should not be forced to become data mining experts in order to retrieve the data they want, nor should they be expected to remember the naming convention they used several years ago for a set of experiments they now wish to revisit. Ideally, locating the data you need would be as easy as browsing the web. Unfortunately, existing data management approaches are usually based on hierarchical naming, a 40 year-old technology designed to manage thousands of files, not exabytes of data. Today’s systems do not take advantage of the rich array of metadata that current high-end computing (HEC) file systems can gather, including content-based metadata and provenance1 information. As a result, current metadata search approaches are typically ad hoc and often work by providing a parallel management system to the “main” file system, as is done in Linux (the locate utility), personal computers, and enterprise search

  14. A hierarchical network modeling method for railway tunnels safety assessment

    Science.gov (United States)

    Zhou, Jin; Xu, Weixiang; Guo, Xin; Liu, Xumin

    2017-02-01

    Using network theory to model risk-related knowledge on accidents is regarded as potential very helpful in risk management. A large amount of defects detection data for railway tunnels is collected in autumn every year in China. It is extremely important to discover the regularities knowledge in database. In this paper, based on network theories and by using data mining techniques, a new method is proposed for mining risk-related regularities to support risk management in railway tunnel projects. A hierarchical network (HN) model which takes into account the tunnel structures, tunnel defects, potential failures and accidents is established. An improved Apriori algorithm is designed to rapidly and effectively mine correlations between tunnel structures and tunnel defects. Then an algorithm is presented in order to mine the risk-related regularities table (RRT) from the frequent patterns. At last, a safety assessment method is proposed by consideration of actual defects and possible risks of defects gained from the RRT. This method cannot only generate the quantitative risk results but also reveal the key defects and critical risks of defects. This paper is further development on accident causation network modeling methods which can provide guidance for specific maintenance measure.

  15. Hierarchical architecture of active knits

    International Nuclear Information System (INIS)

    Abel, Julianna; Luntz, Jonathan; Brei, Diann

    2013-01-01

    Nature eloquently utilizes hierarchical structures to form the world around us. Applying the hierarchical architecture paradigm to smart materials can provide a basis for a new genre of actuators which produce complex actuation motions. One promising example of cellular architecture—active knits—provides complex three-dimensional distributed actuation motions with expanded operational performance through a hierarchically organized structure. The hierarchical structure arranges a single fiber of active material, such as shape memory alloys (SMAs), into a cellular network of interlacing adjacent loops according to a knitting grid. This paper defines a four-level hierarchical classification of knit structures: the basic knit loop, knit patterns, grid patterns, and restructured grids. Each level of the hierarchy provides increased architectural complexity, resulting in expanded kinematic actuation motions of active knits. The range of kinematic actuation motions are displayed through experimental examples of different SMA active knits. The results from this paper illustrate and classify the ways in which each level of the hierarchical knit architecture leverages the performance of the base smart material to generate unique actuation motions, providing necessary insight to best exploit this new actuation paradigm. (paper)

  16. Topology-based hierarchical scheduling using deficit round robin

    DEFF Research Database (Denmark)

    Yu, Hao; Yan, Ying; Berger, Michael Stubert

    2009-01-01

    according to the topology. The mapping process could be completed through the network management plane or by manual configuration. Based on the knowledge of the network, the scheduler can manage the traffic on behalf of other less advanced nodes, avoid potential traffic congestion, and provide flow...... protection and isolation. Comparisons between hierarchical scheduling, flow-based scheduling, and class-based scheduling schemes have been carried out under a symmetric tree topology. Results have shown that the hierarchical scheduling scheme provides better flow protection and isolation from attack...

  17. Understanding the cognitive basis for human-wildlife relationships as a key to successful protected-area management

    NARCIS (Netherlands)

    Teel, T.L.; Manfredo, M.J.; Jensen, F.S.; Buijs, A.E.; Fischer, A.; Riepe, C.; Arlinghaus, R.; Jacobs, M.H.

    2010-01-01

    Wildlife is a critical component of protected areas worldwide. It can serve not only as a primary attraction or an enjoyable part of the visitor experience but also as a source of conflict. Managing wildlife in this context requires a broadbased approach that can account for the myriad factors

  18. Strategic Niche Management (SNM) beyond sustainability : an exploration of key findings of SNM through the lens of ICT and privacy

    NARCIS (Netherlands)

    Schilpzand, W.F.; Raven, R.P.J.M.; Est, van Q.C.

    2011-01-01

    The governance of transitions to sustainability is gaining attention. This paper discusses the approach of strategic niche management (SNM) and contributes by asking whether this approach is also useful for other types of socially desirable change. This question is addressed through a review of six

  19. Waste Oriented Innovation Culture-Transparency-Public Trust Cycle : Success Key for Nuclear Facility Management in Indonesia

    International Nuclear Information System (INIS)

    Susetyo Hario Putero; Haryono B Santosa

    2007-01-01

    Radioactive matter that is a primary material in a nuclear facility, including nuclear power generation, is a part of hazardous materials. Its existence will lead a controversy, although the precise management system for handling it is available. Public sometimes reject the nuclear technology due to the lack of understanding and wrong perception on that technology, especially the radioactive waste treatment. So, strategies should be designed for correcting public perception, until public acceptance on utilization of nuclear technology in Indonesia increase. The innovation development on radioactive waste management was studied by observing and interviewing managements and operators of Japan Atomic Energy Agency (JAEA), Japan. The constructing of concept was based on study result. Based on assumption that the current state of the radioactive waste treatment is suitable and there is serious improvement of technology, therefore systematic and precise oriented corrective efforts of public perception could be done. Transparency, intensive communication, and public participation that show responsible action for emerging mutual trust are basic of strategy that should be developed. High level public acceptance on utilization of nuclear technology is expected to be able for stimulating and supporting sustainable technology innovation culture. (author)

  20. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  1. Diabetes Self-Management: A Key for Better Health-related Quality of Life in Patients with Diabetes.

    Science.gov (United States)

    Badr, Hanan E; Al-Khaledi, Maha; Al-Dousari, Hussah; Al-Dhufairi, Shaikhah; Al-Mousawi, Taiba; Al-Azemi, Rehab; Al-Azimi, Farah

    2018-04-17

    This study was aimed at assessing health-related quality of life (HRQOL) among adult patients with diabetes attending primary health care diabetes clinics in Kuwait and to examine the factors associated with patients with the HRQOL of patients with diabetes. This cross-sectional study was conducted among 503 patients with diabetes attending 26 primary healthcare diabetes clinics in Kuwait. A self-administered questionnaire on participants' socio-demographic and clinical characteristics, in addition to the Diabetes Self-Management Questionnaire (DSMQ) to assess patients' DSM was used. SF12 was employed to assess the HRQOL, producing two outcomes: Physical health composite and Mental health composite. The mean age of participants was 52. ± 0.8 years, 53.1% were males, and 49.0% were Kuwaitis. The median DSM sum score was 6.5. Male patients with diabetes showed significantly better median DSM sum score than female patients with diabetes. The overall median score of HRQOL was 61.7/100 with a better median score of PHC than MHC of quality of life (66.7/100 and 56.7/100, respectively). Multivariate analysis revealed a significant direct association between DSM and better primary health composite and mental health composite. It also showed that female gender, and reporting two or more diabetic complications were significantly associated with poor PHC. Kuwaiti patients with diabetes showed a modest level of HRQOL. Patients' DSM, gender, and diabetes complications were significant independent correlates to HRQOL. Appraisal of patients with diabetes' HRQOL as an essential component of diabetes management in clinical settings is suggested. Further studies to examine the impact of good diabetes self-management on HRQOL improvement are needed. . ©2018The Author(s). Published by S. Karger AG, Basel.

  2. Integrated pest management and entomopathogenic fungal biotechnology in the Latin Americas: II key research and development prerequisites

    International Nuclear Information System (INIS)

    Khachatourians, George G; Valencia, Edison

    1999-01-01

    In the first part of this review article (Valencia and Khachatourians, 1998) we presented the special opportunity that entomopathogenic fungi (EPF) offer for integrated pest management (IPM) in the Latin Americas. As expected, along with the opportunities, there are challenges for the use of EPF. First that there are only two fungi, Beauveria bassiana and Metarhizium anisopliae, for which some prerequisite knowledge of basic and applied mycology for industrial research and development (R and D) are in place. Because of precedent setting leadership in the development of certain EPF, e.g., B. bassiana in IPM, Latin America stands to contribute to and gain from future

  3. Key points of the new KrWG (German Waste Management and Recycling Act); Eckpunkte des neuen Kreislaufwirtschaftsgesetzes

    Energy Technology Data Exchange (ETDEWEB)

    Petersen, Frank [Bundesministerium fuer Umwelt, Naturschutz und Reaktorsicherheit, Bonn (Germany)

    2012-11-01

    With the new KrWG, the EU Waste Framework Directive (2008/98/EG, AbfRRL) is implemented in German law, and the existing German waste management law is modified quite extensively. The new law focuses on sustainable improvement of environmental protection, climate protection and resources efficiency in waste management by stressing prevention of wasting and recycling of waste materials. At the same time, practicable application with legal compliance is to be facilitated by implementing concepts and definitions from EU law and by defining central regulations more precisely. This will also help to do away with excessive bureaucracy and to make regulations easier to implement. (orig.) [German] Mit dem neuen Kreislaufwirtschaftsgesetz (KrWG) wird die EU-Abfallrahmenrichtlinie (Richtlinie 2008/98/EG, AbfRRL) in deutsches Recht umgesetzt und das bestehende deutsche Abfallrecht umfassend modernisiert. Ziel des neuen Gesetzes ist eine nachhaltige Verbesserung des Umwelt- und Klimaschutzes sowie der Ressourceneffizienz in der Abfallwirschaft durch Staerkung der Abfallvermeidung und des Recyclings von Abfaellen. Gleichzeitig soll durch die Uebernahme EU-rechtlicher Begriffe und Definitionen sowie die Praezisierung zentraler Regelungen die praktikable und rechtssichere Anwendung des Gesetzes erleichtert werden. Zudem werden unnoetige Buerokratielasten abgebaut und verschiedene Regelungen vollzugstauglicher ausgestaltet. (orig.)

  4. Risk management and contingency planning for year 2000 - key business decisions for the success of an organization

    International Nuclear Information System (INIS)

    McNeil, J.L.

    1998-01-01

    Factors that transformed Y2K, initially considered as primarily a computer problem, into a business problem are outlined. For example, many organizations have prioritized their inventory of information technology (IT) systems, but few have prioritized their suppliers or customers, or have even thought of what will happen if they cannot get products, or cannot get paid by their customers. Estimates at this time reveal that approximately 30 per cent of businesses will not be operational. This presents a significant risk to any organisation's bottom line. Add to this the status of the world as a whole, where other than about 12 major countries, the majority has not even began to remediate their Y2K problems, and we begin to get a true picture of the potential of major communications problems with subsidiaries, partners or suppliers. Consideration of these factors make it easy to see how Y2K is potentially a major business problem. Because of these risks, it is strongly urged that organizations perform risk management and contingency planning. An example of a risk management approach is presented

  5. Discerning a key characteristic of a European style of management: Managing the tension between integration opportunities and the constraining diversity in Europe

    OpenAIRE

    Boone, Peter; Bosch, Frans

    1996-01-01

    textabstractIn 1991, Thurley and Wirdenius claimed that international companies operating in European countries could, and should, make a strategic choice whether or not to develop a "European" approach or style of management. After the acceptance of the Treaty of Maastricht, and with the new European Union preparing to absorb applicants from the European Free Trade Association, their claim is becoming even more important. Not surprisingly, a European style of management, or "European managem...

  6. Online continuing medical education as a key link for successful noncommunicable disease self-management: the CASALUD™ Model

    Directory of Open Access Journals (Sweden)

    Gallardo-Rincón H

    2017-10-01

    Full Text Available Héctor Gallardo-Rincón,1 Rodrigo Saucedo-Martínez,1 Ricardo Mujica-Rosales,1 Evan M Lee,2 Amy Israel,2 Braulio Torres-Beltran,3 Úrsula Quijano-González,3 Elena Rose Atkinson,3 Pablo Kuri-Morales,4 Roberto Tapia-Conyer1 1Fundación Carlos Slim, Mexico City, Mexico; 2Lilly Global Health, Eli Lilly and Company, Vernier, Switzerland; 3C230 Consultores, Mexico City, Mexico; 4Mexican Ministry of Health, Mexico City, Mexico Purpose: The purpose of this study is to evaluate how the benefits of online continuing medical education (CME provided to health care professionals traveled along a patient “educational chain”. In this study, the educational chain begins with the influence that CME can have on the quality of health care, with subsequent influence on patient knowledge, disease self-management, and disease biomarkers. Methods: A total of 422 patients with at least one noncommunicable disease (NCD treated in eight different Mexican public health clinics were followed over 3 years. All clinics were participants in the CASALUD Model, an NCD care model for primary care, where all clinic staff were offered CME. Data were collected through a questionnaire on health care, patient disease knowledge, and self-management behaviors; blood samples and anthropometric measurements were collected to measure patient disease biomarkers. Results: Between 2013 and 2015, the indexes measuring quality of health care, patient health knowledge, and diabetes self-management activities rose moderately but significantly (from 0.54 to 0.64, 0.80 to 0.84, and 0.62 to 0.67, respectively. Performing self-care activities – including owning and using a glucometer and belonging to a disease support group – saw the highest increase (from 0.65 to 0.75. A1C levels increased between 2013 and 2015 from 7.95 to 8.41% (63–68 mmol/mol (P<0.001, and blood pressure decreased between 2014 and 2015 from 143.7/76.8 to 137.5/74.4 (systolic/diastolic reported in mmHg (P<0

  7. A Hierarchal Risk Assessment Model Using the Evidential Reasoning Rule

    Directory of Open Access Journals (Sweden)

    Xiaoxiao Ji

    2017-02-01

    Full Text Available This paper aims to develop a hierarchical risk assessment model using the newly-developed evidential reasoning (ER rule, which constitutes a generic conjunctive probabilistic reasoning process. In this paper, we first provide a brief introduction to the basics of the ER rule and emphasize the strengths for representing and aggregating uncertain information from multiple experts and sources. Further, we discuss the key steps of developing the hierarchical risk assessment framework systematically, including (1 formulation of risk assessment hierarchy; (2 representation of both qualitative and quantitative information; (3 elicitation of attribute weights and information reliabilities; (4 aggregation of assessment information using the ER rule and (5 quantification and ranking of risks using utility-based transformation. The proposed hierarchical risk assessment framework can potentially be implemented to various complex and uncertain systems. A case study on the fire/explosion risk assessment of marine vessels demonstrates the applicability of the proposed risk assessment model.

  8. New insight in magnetic saturation behavior of nickel hierarchical structures

    Science.gov (United States)

    Ma, Ji; Zhang, Jianxing; Liu, Chunting; Chen, Kezheng

    2017-09-01

    It is unanimously accepted that non-ferromagnetic inclusions in a ferromagnetic system will lower down total saturation magnetization in unit of emu/g. In this study, ;lattice strain; was found to be another key factor to have critical impact on magnetic saturation behavior of the system. The lattice strain determined assembling patterns of primary nanoparticles in hierarchical structures and was intimately related with the formation process of these architectures. Therefore, flower-necklace-like and cauliflower-like nickel hierarchical structures were used as prototype systems to evidence the relationship between assembling patterns of primary nanoparticles and magnetic saturation behaviors of these architectures. It was found that the influence of lattice strain on saturation magnetization outperformed that of non-ferromagnetic inclusions in these hierarchical structures. This will enable new insights into fundamental understanding of related magnetic effects.

  9. Two books on dementia care: Risk Assessment and management for living well with dementia, and Key issues in evolving dementia care

    Directory of Open Access Journals (Sweden)

    Gillian Manthorpe

    2013-05-01

    Full Text Available Risk Assessment and Management for Living Well with Dementia. Charlotte L. Clarke, Heather Wilkinson, John Keady and Catherine E. Gibb. Foreword by Murna Downs. Part of the Bradford Dementia Group Good Practice Guides series. London: Jessica Kingsley Publishers, 2011, pp. 128, ISBN: 978-1-84905-005-0Key Issues in Evolving Dementia Care. International Theory-based Policy and Practice. Edited by Anthea Innes, Fiona Kelly and Louise McCabe. Foreword by Professor June Andrews. London: Jessica Kingsley Publishers, 2012, pp. 264, ISBN: 978-1-84905-242-9

  10. Multidisciplinary Team Approach Is Key for Managing Pregnancy and Delivery in Patient with Rare, Complex MPS I.

    Science.gov (United States)

    Troko, J; Poonawala, Y; Geberhiwot, T; Martin, B

    2016-01-01

    A 23-year-old primiparous lady (Ms S) was referred to preconception clinic with known Hurler-Scheie syndrome (mucopolysaccharidosis 1). Ms S had been under the care of the adult inherited metabolic disorder physicians prior to becoming pregnant. She and her partner received prenatal counselling and following spontaneous conception was closely managed by a multidisciplinary team involving foetomaternal obstetricians, anaesthetists, cardiologists, geneticists and endocrinologists in two tertiary referral hospitals throughout her pregnancy. She went on to deliver a live male child at 37/40 by elective caesarean section. As far as we are aware, this is the first case report of a term pregnancy in a woman with moderate to severe mucopolysaccharidosis 1 (MPS 1).

  11. Key Challenges and Opportunities for Conjunctive Management of Surface and Groundwater in Mega-Irrigation Systems: Lower Indus, Pakistan

    Directory of Open Access Journals (Sweden)

    Frank van Steenbergen

    2015-11-01

    Full Text Available This paper focuses on the scope of conjunctive management in the Lower Indus part of the Indus Basin Irrigation System (IBIS, and the contribution this could make towards food security and socio-economic development. The total Gross Command Area (GCA of the Lower Indus is 5.92 Mha, with a cultivable command area (CCA of 5.43 Mha, most of which is in Sindh Province. There is a limited use of groundwater in Sindh (about 4.3 Billion Cubic Meter (BCM for two reasons: first, there is a large area where groundwater is saline; and second, there is a high surface irrigation supply to most of the canal commands, e.g., average annual supply to rice command is 1723 mm, close to the annual reference crop evapotranspiration for the area, while there is an additional annual rainfall of about 200 mm. These high irrigation allocations, even in areas where groundwater is fresh, create strong disincentives for farmers to use groundwater. Consequently, areas are waterlogged to the extent of 50% and 70% before and after the monsoon, respectively, which contributes to surface salinity through capillary rise. In Sindh, about 74%–80% of the available groundwater recharge is lost in the form of non-beneficial evaporation. This gives rise to low cropping intensities and yields compared to fresh groundwater areas elsewhere in the IBIS. The drought of 1999–2002 has demonstrated a reduction in waterlogging without any corresponding reduction in crop yields. Therefore, in order to efficiently meet current water requirements of all the sectors, i.e., agriculture, domestic and industrial, an ab initio level of water reallocation and efficient water management, with consideration to groundwater quality and its safe yield, in various areas are recommended. This might systematically reduce the waterlogged areas, support greater cropping intensity than is currently being practiced, and free up water for horizontal expansion, such as in the Thar Desert.

  12. Return of the pulmonary nodule: the radiologist's key role in implementing the 2015 BTS guidelines on the investigation and management of pulmonary nodules.

    Science.gov (United States)

    Graham, Richard N J; Baldwin, David R; Callister, Matthew E J; Gleeson, Fergus V

    2016-01-01

    The British Thoracic Society has published new comprehensive guidelines for the management of pulmonary nodules. These guidelines are significantly different from those previously published, as they use two malignancy prediction calculators to better characterize the risk of malignancy. There are recommendations for a higher nodule size threshold for follow-up (≥5 mm or ≥80 mm(3)) and a reduction of the follow-up period to 1 year for solid pulmonary nodules; both of these will reduce the number of follow-up CT scans. PET-CT plays a crucial role in characterization also, with an ordinal scale being recommended for reporting. Radiologists will be the key in implementing these guidelines, and routine use of volumetric image-analysis software will be required to manage patients with pulmonary nodules correctly.

  13. Fuel Behaviour in Transport after Dry Storage: a Key Issue for the Management of used Nuclear Fuel

    International Nuclear Information System (INIS)

    Issard, Herve

    2014-01-01

    Interim used fuel dry storage has been developed in many countries providing an intermediate solution while waiting for evaluation and decisions concerning future use (such as recycling) or disposal sites. There is an important industrial experience feedback and excellent safety records. It appears that the duration of interim storage may become longer than initially expected. At the start of storage operations 40 years was considered sufficiently long to make a decision on either recycling or direct disposal of used nuclear fuel. Now it is said that storage time may have to be extended. Whatever the choice for the management of used fuel, it will finally have to be transported from the storage facility to another location, for recycling or final disposal. Bearing in mind the important principle that radioactive waste shall be managed in such a way that undue burdens will not be imposed on future generations, there is no guarantee that the fuel characteristics can be maintained in perpetuity. On the other hand, transport accident conditions from applicable regulation (IAEA SSR-6) are very severe for irradiated materials. Therefore, in compliance with transport regulations, the safety analysis of the fuel in transport after storage is mandatory. This paper will give an overview of the current situation related to the used fuel behaviour in transport after dry storage. On this matter there are some elements of information already available as well as some gaps of knowledge. Several national R and D programs and international teams are presently addressing these gaps. A lot of R and D work has already been done. An objective of these R and D projects is to aid decision makers. It is important to fix a limit and not to multiply intermediate operations because it means higher costs and more uncertainties. The identified gaps concern the following issues especially for high burn-up (HBU) fuels: thermal model for casks, degradation process of fuel material, cladding creep

  14. Content Consumption and Hierarchical Structures of Web-Supported Courses

    Science.gov (United States)

    Hershkovitz, Arnon; Hardof-Jaffe, Sharon; Nachmias, Rafi

    2014-01-01

    This study presents an empirical investigation of the relationship between the hierarchical structure of content delivered to students within a Learning Management System (LMS) and its actual consumption. To this end, campus-wide data relating to 1,203 courses were collected from the LMS' servers and were subsequently analyzed using data mining…

  15. Recommendations concerning Tennessee's hazardous waste management policies by a task force representing generators, environmentalists, and other key constituencies

    International Nuclear Information System (INIS)

    Colglazier, E.W.; English, M.R.

    1987-01-01

    Four recommendations are proposed. 1) A Governor's Roundtable on Hazardous and Solid Wastes should be established to ensure that Tennessee have sound policies and plans for waste management, adequate waste treatment and disposal capacity, and the means to meet the October, 1989 deadline for certification of hazardous waste capacity. 2) Opportunities for early public information and participation in Tennessee's RCRA permitting process should be improved. 3) A Superfund Public Involvement Task Force should be appointed by the Commissioner of Health and Environment to find ways to ensure that a community affected by a Tennessee Superfund site has early and adequate opportunities for information and involvement. 4) Communications about hazardous waste issues should be improved by the appointment of a hazardous waste information officer, the establishment of a Speakers Bureau, the funding of the UT Center for Industrial Services' Hazardous Waste Extension Program, establishment of a crisis situation network of consultants for communities, and exploration of the possibility of Amnesty Days for household hazardous waste and for small-quantity generators waste

  16. Social Support: a Key Variable for Health Promotion and Chronic Disease Management in Hispanic Patients with Rheumatic Diseases

    Directory of Open Access Journals (Sweden)

    Alyssa T. Brooks

    2014-01-01

    Full Text Available Chronic diseases, including rheumatic diseases, can cause immense physical and psychosocial burden for patients. Many Hispanics suffering with arthritis face activity limitations. Social support, or the functional content of relationships, may be important to consider when examining treatment and outcomes for Hispanic individuals. Participants were recruited from an urban community health center (CHC as part of a larger health behavior study. A cross-sectional, descriptive, mixed methods analysis was conducted to explore the role of social support in the sample. Only Hispanic/Latino patients (n = 46 were included in this analysis. Interviews were conducted in both English and Spanish. The majority of the sample (87% perceived some presence of social support in their lives. The two most commonly cited types of social support were emotional and instrumental. The two most common sources of social support were family members other than spouses (52.2% and spouses (32.6%. Body mass index (BMI was significantly correlated with the number of perceived sources of support. The presence or absence and the role of social support in supporting optimal health outcomes should be considered for Hispanics with chronic rheumatic diseases. Involving family members and spouses in the plan of care for this population could facilitate health promotion and chronic disease management.

  17. Projections of change in key ecosystem indicators for planning and management of marine protected areas: An example study for European seas

    Science.gov (United States)

    Kay, Susan; Butenschön, Momme

    2018-02-01

    Marine Protected Areas (MPAs) are widely used as tools to maintain biodiversity, protect habitats and ensure that development is sustainable. If MPAs are to maintain their role into the future it is important for managers to understand how conditions at these sites may change as a result of climate change and other drivers, and this understanding needs to extend beyond temperature to a range of key ecosystem indicators. This case study demonstrates how spatially-aggregated model results for multiple variables can provide useful projections for MPA planners and managers. Conditions in European MPAs have been projected for the 2040s using unmitigated and globally managed scenarios of climate change and river management, and hence high and low emissions of greenhouse gases and riverborne nutrients. The results highlight the vulnerability of potential refuge sites in the north-west Mediterranean and the need for careful monitoring at MPAs to the north and west of the British Isles, which may be affected by changes in Atlantic circulation patterns. The projections also support the need for more MPAs in the eastern Mediterranean and Adriatic Sea, and can inform the selection of sites.

  18. Ten Ways To Gain Management Support for Key Projects (Or, All I Need To Know To Manipulate Management I Learned as a Teenager).

    Science.gov (United States)

    Stear, Edward B.

    1997-01-01

    Presents methods to gain management support for information resource center projects. Topics include: expressing expected results; and understanding the project in terms of business and organizational objectives, competitors' actions, internal needs, external conditions, customer needs, vendor support, and colleagues' experiences. (LRW)

  19. Discerning a key characteristic of a European style of management : Managing the tension between integration opportunities and the constraining diversity in Europe

    NARCIS (Netherlands)

    P.F. Boone (Peter); F.A.J. van den Bosch (Frans)

    1996-01-01

    textabstractIn 1991, Thurley and Wirdenius claimed that international companies operating in European countries could, and should, make a strategic choice whether or not to develop a "European" approach or style of management. After the acceptance of the Treaty of Maastricht, and with the new

  20. Solution scanning as a key policy tool: identifying management interventions to help maintain and enhance regulating ecosystem services

    Directory of Open Access Journals (Sweden)

    William J. Sutherland

    2014-06-01

    Full Text Available The major task of policy makers and practitioners when confronted with a resource management problem is to decide on the potential solution(s to adopt from a range of available options. However, this process is unlikely to be successful and cost effective without access to an independently verified and comprehensive available list of options. There is currently burgeoning interest in ecosystem services and quantitative assessments of their importance and value. Recognition of the value of ecosystem services to human well-being represents an increasingly important argument for protecting and restoring the natural environment, alongside the moral and ethical justifications for conservation. As well as understanding the benefits of ecosystem services, it is also important to synthesize the practical interventions that are capable of maintaining and/or enhancing these services. Apart from pest regulation, pollination, and global climate regulation, this type of exercise has attracted relatively little attention. Through a systematic consultation exercise, we identify a candidate list of 296 possible interventions across the main regulating services of air quality regulation, climate regulation, water flow regulation, erosion regulation, water purification and waste treatment, disease regulation, pest regulation, pollination and natural hazard regulation. The range of interventions differs greatly between habitats and services depending upon the ease of manipulation and the level of research intensity. Some interventions have the potential to deliver benefits across a range of regulating services, especially those that reduce soil loss and maintain forest cover. Synthesis and applications: Solution scanning is important for questioning existing knowledge and identifying the range of options available to researchers and practitioners, as well as serving as the necessary basis for assessing cost effectiveness and guiding implementation strategies. We

  1. Soil quality is key for planning and managing urban allotments intended for the sustainable production of home-consumption vegetables.

    Science.gov (United States)

    Bretzel, F; Calderisi, M; Scatena, M; Pini, R

    2016-09-01

    The growing importance of urban allotments in planning and managing urban areas is due to the combined positive effects on ecosystem services, the economy and human well-being, especially of groups of the urban population that can be vulnerable (e.g. the elderly, immigrants, low-income families). Some studies have highlighted the potential risk of contamination by metals of vegetables grown in urban areas and the lack of appropriate site-specific risk assessments. However, surveys are still lacking on the possibilities of using urban soil as a good substrate to produce vegetables for home consumption. We assessed the soil quality in two areas in Pisa (Italy), one intended for urban horticulture and the other already cultivated for that purpose. We analysed the soils for the main chemical and physical characteristics (texture, bulk density, water stability index, pH, cation exchange capacity, organic carbon, total nitrogen, phosphorous) and elements (Pb, Cu, Ni, Cr, Zn, Cd, As, K, Al and Mn). Our results showed that both areas had physical and chemical heterogeneity due to the effects of urbanization and to the different cultivation techniques employed. The metal content was lower than the guidelines limits, and the soil conditions (pH = 8) greatly reduced the metal mobility. Copper concentration in some of the cultivated area samples was higher than the limits, representing a possible stress factor for the microbial biodiversity and fauna. Our findings demonstrate that site-specific surveys are necessary before planning urban cultivation areas, and educating urban gardeners regarding sustainable cultivation techniques is a priority for a safe environment.

  2. Topography and crop management are key factors for the development of american leaf spot epidemics on coffee in costa rica.

    Science.gov (United States)

    Avelino, Jacques; Cabut, Sandrine; Barboza, Bernardo; Barquero, Miguel; Alfaro, Ronny; Esquivel, César; Durand, Jean-François; Cilas, Christian

    2007-12-01

    ABSTRACT We monitored the development of American leaf spot of coffee, a disease caused by the gemmiferous fungus Mycena citricolor, in 57 plots in Costa Rica for 1 or 2 years in order to gain a clearer understanding of conditions conducive to the disease and improve its control. During the investigation, characteristics of the coffee trees, crop management, and the environment were recorded. For the analyses, we used partial least-squares regression via the spline functions (PLSS), which is a nonlinear extension to partial least-squares regression (PLS). The fungus developed well in areas located between approximately 1,100 and 1,550 m above sea level. Slopes were conducive to its development, but eastern-facing slopes were less affected than the others, probably because they were more exposed to sunlight, especially in the rainy season. The distance between planting rows, the shade percentage, coffee tree height, the type of shade, and the pruning system explained disease intensity due to their effects on coffee tree shading and, possibly, on the humidity conditions in the plot. Forest trees and fruit trees intercropped with coffee provided particularly propitious conditions. Apparently, fertilization was unfavorable for the disease, probably due to dilution phenomena associated with faster coffee tree growth. Finally, series of wet spells interspersed with dry spells, which were frequent in the middle of the rainy season, were critical for the disease, probably because they affected the production and release of gemmae and their viability. These results could be used to draw up a map of epidemic risks taking topographical factors into account. To reduce those risks and improve chemical control, our results suggested that farmers should space planting rows further apart, maintain light shading in the plantation, and prune their coffee trees.

  3. Hierarchical Discrete Event Supervisory Control of Aircraft Propulsion Systems

    Science.gov (United States)

    Yasar, Murat; Tolani, Devendra; Ray, Asok; Shah, Neerav; Litt, Jonathan S.

    2004-01-01

    This paper presents a hierarchical application of Discrete Event Supervisory (DES) control theory for intelligent decision and control of a twin-engine aircraft propulsion system. A dual layer hierarchical DES controller is designed to supervise and coordinate the operation of two engines of the propulsion system. The two engines are individually controlled to achieve enhanced performance and reliability, necessary for fulfilling the mission objectives. Each engine is operated under a continuously varying control system that maintains the specified performance and a local discrete-event supervisor for condition monitoring and life extending control. A global upper level DES controller is designed for load balancing and overall health management of the propulsion system.

  4. MR-AFS: a global hierarchical file-system

    International Nuclear Information System (INIS)

    Reuter, H.

    2000-01-01

    The next generation of fusion experiments will use object-oriented technology creating the need for world wide sharing of an underlying hierarchical file-system. The Andrew file system (AFS) is a well known and widely spread global distributed file-system. Multiple-resident-AFS (MR-AFS) combines the features of AFS with hierarchical storage management systems. Files in MR-AFS therefore may be migrated on secondary storage, such as roboted tape libraries. MR-AFS is in use at IPP for the current experiments and data originating from super-computer applications. Experiences and scalability issues are discussed

  5. Modular networks with hierarchical organization

    Indian Academy of Sciences (India)

    Several networks occurring in real life have modular structures that are arranged in a hierarchical fashion. In this paper, we have proposed a model for such networks, using a stochastic generation method. Using this model we show that, the scaling relation between the clustering and degree of the nodes is not a necessary ...

  6. Hierarchical Microaggressions in Higher Education

    Science.gov (United States)

    Young, Kathryn; Anderson, Myron; Stewart, Saran

    2015-01-01

    Although there has been substantial research examining the effects of microaggressions in the public sphere, there has been little research that examines microaggressions in the workplace. This study explores the types of microaggressions that affect employees at universities. We coin the term "hierarchical microaggression" to represent…

  7. Inferring hierarchical clustering structures by deterministic annealing

    International Nuclear Information System (INIS)

    Hofmann, T.; Buhmann, J.M.

    1996-01-01

    The unsupervised detection of hierarchical structures is a major topic in unsupervised learning and one of the key questions in data analysis and representation. We propose a novel algorithm for the problem of learning decision trees for data clustering and related problems. In contrast to many other methods based on successive tree growing and pruning, we propose an objective function for tree evaluation and we derive a non-greedy technique for tree growing. Applying the principles of maximum entropy and minimum cross entropy, a deterministic annealing algorithm is derived in a meanfield approximation. This technique allows us to canonically superimpose tree structures and to fit parameters to averaged or open-quote fuzzified close-quote trees

  8. Science advancements key to increasing management value of life stage monitoring networks for endangered Sacramento River winter-run Chinook salmon in California

    Science.gov (United States)

    Johnson, Rachel C.; Windell, Sean; Brandes, Patricia L.; Conrad, J. Louise; Ferguson, John; Goertler, Pascale A. L.; Harvey, Brett N.; Heublein, Joseph; Isreal, Joshua A.; Kratville, Daniel W.; Kirsch, Joseph E.; Perry, Russell W.; Pisciotto, Joseph; Poytress, William R.; Reece, Kevin; Swart, Brycen G.

    2017-01-01

    A robust monitoring network that provides quantitative information about the status of imperiled species at key life stages and geographic locations over time is fundamental for sustainable management of fisheries resources. For anadromous species, management actions in one geographic domain can substantially affect abundance of subsequent life stages that span broad geographic regions. Quantitative metrics (e.g., abundance, movement, survival, life history diversity, and condition) at multiple life stages are needed to inform how management actions (e.g., hatcheries, harvest, hydrology, and habitat restoration) influence salmon population dynamics. The existing monitoring network for endangered Sacramento River winterrun Chinook Salmon (SRWRC, Oncorhynchus tshawytscha) in California’s Central Valley was compared to conceptual models developed for each life stage and geographic region of the life cycle to identify relevant SRWRC metrics. We concluded that the current monitoring network was insufficient to diagnose when (life stage) and where (geographic domain) chronic or episodic reductions in SRWRC cohorts occur, precluding within- and among-year comparisons. The strongest quantitative data exist in the Upper Sacramento River, where abundance estimates are generated for adult spawners and emigrating juveniles. However, once SRWRC leave the upper river, our knowledge of their identity, abundance, and condition diminishes, despite the juvenile monitoring enterprise. We identified six system-wide recommended actions to strengthen the value of data generated from the existing monitoring network to assess resource management actions: (1) incorporate genetic run identification; (2) develop juvenile abundance estimates; (3) collect data for life history diversity metrics at multiple life stages; (4) expand and enhance real-time fish survival and movement monitoring; (5) collect fish condition data; and (6) provide timely public access to monitoring data in open data

  9. A hierarchical framework for air traffic control

    Science.gov (United States)

    Roy, Kaushik

    Air travel in recent years has been plagued by record delays, with over $8 billion in direct operating costs being attributed to 100 million flight delay minutes in 2007. Major contributing factors to delay include weather, congestion, and aging infrastructure; the Next Generation Air Transportation System (NextGen) aims to alleviate these delays through an upgrade of the air traffic control system. Changes to large-scale networked systems such as air traffic control are complicated by the need for coordinated solutions over disparate temporal and spatial scales. Individual air traffic controllers must ensure aircraft maintain safe separation locally with a time horizon of seconds to minutes, whereas regional plans are formulated to efficiently route flows of aircraft around weather and congestion on the order of every hour. More efficient control algorithms that provide a coordinated solution are required to safely handle a larger number of aircraft in a fixed amount of airspace. Improved estimation algorithms are also needed to provide accurate aircraft state information and situational awareness for human controllers. A hierarchical framework is developed to simultaneously solve the sometimes conflicting goals of regional efficiency and local safety. Careful attention is given in defining the interactions between the layers of this hierarchy. In this way, solutions to individual air traffic problems can be targeted and implemented as needed. First, the regional traffic flow management problem is posed as an optimization problem and shown to be NP-Hard. Approximation methods based on aggregate flow models are developed to enable real-time implementation of algorithms that reduce the impact of congestion and adverse weather. Second, the local trajectory design problem is solved using a novel slot-based sector model. This model is used to analyze sector capacity under varying traffic patterns, providing a more comprehensive understanding of how increased automation

  10. Hierarchically structured, nitrogen-doped carbon membranes

    KAUST Repository

    Wang, Hong; Wu, Tao

    2017-01-01

    The present invention is a structure, method of making and method of use for a novel macroscopic hierarchically structured, nitrogen-doped, nano-porous carbon membrane (HNDCMs) with asymmetric and hierarchical pore architecture that can be produced

  11. Hanford Analytical Services Management: One of the keys to effectively managing the Hanford Site in an environment of competing resources and priorities

    International Nuclear Information System (INIS)

    Wanek, D.M.; Mooers, G.C.; Schubert, S.A.

    1994-02-01

    The Quality Improvement Team recognized that a true partnership between RL and the Hanford Site contractors had to be established to (1) identify what the analytical needs were for the site, both short and long term, (2) determine how to meet those needs, whether by using onsite capability or contracting offsite services, and (3) ensure that all analytical services meet the high level of quality demanded by the end users of the data. The Hanford Analytical Services Management (HASM) organization was established from this concept. What makes HASM unique and virtually guarantees success is that all the participants within HASM, site contractors and RL, have parity. This ensures that the best interests of the Hanford Site are implemented and minimizes the normal parochialism when multiple contractors are competing for the same work. The HASM concept provides for consistent management to balance the analytical needs with the limited resources identified for analytical services at the Hanford Site. By contracting for analytical services, HASM provides a mechanism to meet site goals of increased commercialization

  12. A self-defining hierarchical data system

    Science.gov (United States)

    Bailey, J.

    1992-01-01

    The Self-Defining Data System (SDS) is a system which allows the creation of self-defining hierarchical data structures in a form which allows the data to be moved between different machine architectures. Because the structures are self-defining they can be used for communication between independent modules in a distributed system. Unlike disk-based hierarchical data systems such as Starlink's HDS, SDS works entirely in memory and is very fast. Data structures are created and manipulated as internal dynamic structures in memory managed by SDS itself. A structure may then be exported into a caller supplied memory buffer in a defined external format. This structure can be written as a file or sent as a message to another machine. It remains static in structure until it is reimported into SDS. SDS is written in portable C and has been run on a number of different machine architectures. Structures are portable between machines with SDS looking after conversion of byte order, floating point format, and alignment. A Fortran callable version is also available for some machines.

  13. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  14. Key Drivers for Cooperation toward Sustainable Development and the Management of CO2 Emissions: Comparative Analysis of Six Northeast Asian Countries

    Directory of Open Access Journals (Sweden)

    Andrew Chapman

    2018-01-01

    Full Text Available This study analyzes the key drivers of the relationship between economic growth and carbon emissions in six Northeast Asian countries (China, Japan, Republic of Korea, Democratic People’s Republic of Korea, Mongolia, and Russia from 1991 to 2015. We apply a decomposition analysis approach using Logarithmic Mean Divisia Index to identify the main contributing factors toward CO2 emission changes. To discuss the decomposition results in more in detail, we explain the energy portfolio change in each country to understand the energy and resource utilization strategy. From the results, we find that the key driving factors of CO2 emissions change and energy portfolio trends are different among Northeast Asian countries, driven by economic growth in China and Korea, reduced by energy efficiency improvements in Russia and the DPRK, while being relatively benign in Japan and Mongolia due to a combination of these factors. This result implies that we can better understand the regional cooperation policy for improving each driving factor to achieve sustainable development and management of CO2 emissions considering the characteristics of each country.

  15. Automatic Hierarchical Color Image Classification

    Directory of Open Access Journals (Sweden)

    Jing Huang

    2003-02-01

    Full Text Available Organizing images into semantic categories can be extremely useful for content-based image retrieval and image annotation. Grouping images into semantic classes is a difficult problem, however. Image classification attempts to solve this hard problem by using low-level image features. In this paper, we propose a method for hierarchical classification of images via supervised learning. This scheme relies on using a good low-level feature and subsequently performing feature-space reconfiguration using singular value decomposition to reduce noise and dimensionality. We use the training data to obtain a hierarchical classification tree that can be used to categorize new images. Our experimental results suggest that this scheme not only performs better than standard nearest-neighbor techniques, but also has both storage and computational advantages.

  16. Hierarchical matrices algorithms and analysis

    CERN Document Server

    Hackbusch, Wolfgang

    2015-01-01

    This self-contained monograph presents matrix algorithms and their analysis. The new technique enables not only the solution of linear systems but also the approximation of matrix functions, e.g., the matrix exponential. Other applications include the solution of matrix equations, e.g., the Lyapunov or Riccati equation. The required mathematical background can be found in the appendix. The numerical treatment of fully populated large-scale matrices is usually rather costly. However, the technique of hierarchical matrices makes it possible to store matrices and to perform matrix operations approximately with almost linear cost and a controllable degree of approximation error. For important classes of matrices, the computational cost increases only logarithmically with the approximation error. The operations provided include the matrix inversion and LU decomposition. Since large-scale linear algebra problems are standard in scientific computing, the subject of hierarchical matrices is of interest to scientists ...

  17. Hierarchical Semantic Model of Geovideo

    Directory of Open Access Journals (Sweden)

    XIE Xiao

    2015-05-01

    Full Text Available The public security incidents were getting increasingly challenging with regard to their new features, including multi-scale mobility, multistage dynamic evolution, as well as spatiotemporal concurrency and uncertainty in the complex urban environment. However, the existing video models, which were used/designed for independent archive or local analysis of surveillance video, have seriously inhibited emergency response to the urgent requirements.Aiming at the explicit representation of change mechanism in video, the paper proposed a novel hierarchical geovideo semantic model using UML. This model was characterized by the hierarchical representation of both data structure and semantics based on the change-oriented three domains (feature domain, process domain and event domain instead of overall semantic description of video streaming; combining both geographical semantics and video content semantics, in support of global semantic association between multiple geovideo data. The public security incidents by video surveillance are inspected as an example to illustrate the validity of this model.

  18. Hierarchical Modelling of Flood Risk for Engineering Decision Analysis

    DEFF Research Database (Denmark)

    Custer, Rocco

    protection structures in the hierarchical flood protection system - is identified. To optimise the design of protection structures, fragility and vulnerability models must allow for consideration of decision alternatives. While such vulnerability models are available for large protection structures (e...... systems, as well as the implementation of the flood risk analysis methodology and the vulnerability modelling approach are illustrated with an example application. In summary, the present thesis provides a characterisation of hierarchical flood protection systems as well as several methodologies to model...... and robust. Traditional risk management solutions, e.g. dike construction, are not particularly flexible, as they are difficult to adapt to changing risk. Conversely, the recent concept of integrated flood risk management, entailing a combination of several structural and non-structural risk management...

  19. Hybrid and hierarchical composite materials

    CERN Document Server

    Kim, Chang-Soo; Sano, Tomoko

    2015-01-01

    This book addresses a broad spectrum of areas in both hybrid materials and hierarchical composites, including recent development of processing technologies, structural designs, modern computer simulation techniques, and the relationships between the processing-structure-property-performance. Each topic is introduced at length with numerous  and detailed examples and over 150 illustrations.   In addition, the authors present a method of categorizing these materials, so that representative examples of all material classes are discussed.

  20. Hierarchical analysis of urban space

    OpenAIRE

    Kataeva, Y.

    2014-01-01

    Multi-level structure of urban space, multitude of subjects of its transformation, which follow asymmetric interests, multilevel system of institutions which regulate interaction in the "population business government -public organizations" system, determine the use of hierarchic approach to the analysis of urban space. The article observes theoretical justification of using this approach to study correlations and peculiarities of interaction in urban space as in an intricately organized syst...

  1. Statistical Significance for Hierarchical Clustering

    Science.gov (United States)

    Kimes, Patrick K.; Liu, Yufeng; Hayes, D. Neil; Marron, J. S.

    2017-01-01

    Summary Cluster analysis has proved to be an invaluable tool for the exploratory and unsupervised analysis of high dimensional datasets. Among methods for clustering, hierarchical approaches have enjoyed substantial popularity in genomics and other fields for their ability to simultaneously uncover multiple layers of clustering structure. A critical and challenging question in cluster analysis is whether the identified clusters represent important underlying structure or are artifacts of natural sampling variation. Few approaches have been proposed for addressing this problem in the context of hierarchical clustering, for which the problem is further complicated by the natural tree structure of the partition, and the multiplicity of tests required to parse the layers of nested clusters. In this paper, we propose a Monte Carlo based approach for testing statistical significance in hierarchical clustering which addresses these issues. The approach is implemented as a sequential testing procedure guaranteeing control of the family-wise error rate. Theoretical justification is provided for our approach, and its power to detect true clustering structure is illustrated through several simulation studies and applications to two cancer gene expression datasets. PMID:28099990

  2. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  3. Spatial patterns of breeding success of grizzly bears derived from hierarchical multistate models.

    Science.gov (United States)

    Fisher, Jason T; Wheatley, Matthew; Mackenzie, Darryl

    2014-10-01

    Conservation programs often manage populations indirectly through the landscapes in which they live. Empirically, linking reproductive success with landscape structure and anthropogenic change is a first step in understanding and managing the spatial mechanisms that affect reproduction, but this link is not sufficiently informed by data. Hierarchical multistate occupancy models can forge these links by estimating spatial patterns of reproductive success across landscapes. To illustrate, we surveyed the occurrence of grizzly bears (Ursus arctos) in the Canadian Rocky Mountains Alberta, Canada. We deployed camera traps for 6 weeks at 54 surveys sites in different types of land cover. We used hierarchical multistate occupancy models to estimate probability of detection, grizzly bear occupancy, and probability of reproductive success at each site. Grizzly bear occupancy varied among cover types and was greater in herbaceous alpine ecotones than in low-elevation wetlands or mid-elevation conifer forests. The conditional probability of reproductive success given grizzly bear occupancy was 30% (SE = 0.14). Grizzly bears with cubs had a higher probability of detection than grizzly bears without cubs, but sites were correctly classified as being occupied by breeding females 49% of the time based on raw data and thus would have been underestimated by half. Repeated surveys and multistate modeling reduced the probability of misclassifying sites occupied by breeders as unoccupied to <2%. The probability of breeding grizzly bear occupancy varied across the landscape. Those patches with highest probabilities of breeding occupancy-herbaceous alpine ecotones-were small and highly dispersed and are projected to shrink as treelines advance due to climate warming. Understanding spatial correlates in breeding distribution is a key requirement for species conservation in the face of climate change and can help identify priorities for landscape management and protection. © 2014 Society

  4. Hierarchal scalar and vector tetrahedra

    International Nuclear Information System (INIS)

    Webb, J.P.; Forghani, B.

    1993-01-01

    A new set of scalar and vector tetrahedral finite elements are presented. The elements are hierarchal, allowing mixing of polynomial orders; scalar orders up to 3 and vector orders up to 2 are defined. The vector elements impose tangential continuity on the field but not normal continuity, making them suitable for representing the vector electric or magnetic field. Further, the scalar and vector elements are such that they can easily be used in the same mesh, a requirement of many quasi-static formulations. Results are presented for two 50 Hz problems: the Bath Cube, and TEAM Problem 7

  5. Agent-based distributed hierarchical control of dc microgrid systems

    DEFF Research Database (Denmark)

    Meng, Lexuan; Vasquez, Juan Carlos; Guerrero, Josep M.

    2014-01-01

    In order to enable distributed control and management for microgrids, this paper explores the application of information consensus and local decisionmaking methods formulating an agent based distributed hierarchical control system. A droop controlled paralleled DC/DC converter system is taken as ....... Standard genetic algorithm is applied in each local control system in order to search for a global optimum. Hardware-in-Loop simulation results are shown to demonstrate the effectiveness of the method.......In order to enable distributed control and management for microgrids, this paper explores the application of information consensus and local decisionmaking methods formulating an agent based distributed hierarchical control system. A droop controlled paralleled DC/DC converter system is taken...... as a case study. The objective is to enhance the system efficiency by finding the optimal sharing ratio of load current. Virtual resistances in local control systems are taken as decision variables. Consensus algorithms are applied for global information discovery and local control systems coordination...

  6. Conceptual hierarchical modeling to describe wetland plant community organization

    Science.gov (United States)

    Little, A.M.; Guntenspergen, G.R.; Allen, T.F.H.

    2010-01-01

    Using multivariate analysis, we created a hierarchical modeling process that describes how differently-scaled environmental factors interact to affect wetland-scale plant community organization in a system of small, isolated wetlands on Mount Desert Island, Maine. We followed the procedure: 1) delineate wetland groups using cluster analysis, 2) identify differently scaled environmental gradients using non-metric multidimensional scaling, 3) order gradient hierarchical levels according to spatiotem-poral scale of fluctuation, and 4) assemble hierarchical model using group relationships with ordination axes and post-hoc tests of environmental differences. Using this process, we determined 1) large wetland size and poor surface water chemistry led to the development of shrub fen wetland vegetation, 2) Sphagnum and water chemistry differences affected fen vs. marsh / sedge meadows status within small wetlands, and 3) small-scale hydrologic differences explained transitions between forested vs. non-forested and marsh vs. sedge meadow vegetation. This hierarchical modeling process can help explain how upper level contextual processes constrain biotic community response to lower-level environmental changes. It creates models with more nuanced spatiotemporal complexity than classification and regression tree procedures. Using this process, wetland scientists will be able to generate more generalizable theories of plant community organization, and useful management models. ?? Society of Wetland Scientists 2009.

  7. Expert hierarchical selection of oil and gas distribution systems

    International Nuclear Information System (INIS)

    Frankel, E.G.

    1991-01-01

    Selection and design of oil and gas distribution systems involves a large number of decision makers and interest groups, as well as many alternative technical, financial, network, operating, management and regulatory options. Their objectives and measures of performance are different. Decision models can be effectively represented by hierarchical structures. A simple deterministic analytic hierarchy process is presented with application to oil and gas distribution systems

  8. Five key pillars of an analytics center of excellence, which are required to manage populations and transform organizations into the next era of health care.

    Science.gov (United States)

    Reichert, Jim; Furlong, Gerry

    2014-01-01

    Acute care facilities are experiencing fiscal challenges as noted by decreasing admissions and lower reimbursement creating an unsustainable fiscal environment as we move into the next era of health care. This situation necessitates a strategy to move away from acting solely on hunches and instinct to using analytics to become a truly data-driven organization that identifies opportunities within patient populations to improve the quality and efficiency of care across the continuum. A brief overview of knowledge management philosophies will be provided and how it is used to enable organizations to leverage data, information, and knowledge for operational transformation leading to improved outcomes. This article outlines the 5 key pillars of an Analytics Center of Excellence; governance, organizational structure, people, process, and technology, that are foundational to the development of this strategy. While culture is the most important factor to achieve organizational transformation and improved care delivery, it is the 5 pillars of the ACoE that will enable the culture shift necessary to become a truly data-driven organization and thus achieve transformation into the next era of health care.

  9. Loops in hierarchical channel networks

    Science.gov (United States)

    Katifori, Eleni; Magnasco, Marcelo

    2012-02-01

    Nature provides us with many examples of planar distribution and structural networks having dense sets of closed loops. An archetype of this form of network organization is the vasculature of dicotyledonous leaves, which showcases a hierarchically-nested architecture. Although a number of methods have been proposed to measure aspects of the structure of such networks, a robust metric to quantify their hierarchical organization is still lacking. We present an algorithmic framework that allows mapping loopy networks to binary trees, preserving in the connectivity of the trees the architecture of the original graph. We apply this framework to investigate computer generated and natural graphs extracted from digitized images of dicotyledonous leaves and animal vasculature. We calculate various metrics on the corresponding trees and discuss the relationship of these quantities to the architectural organization of the original graphs. This algorithmic framework decouples the geometric information from the metric topology (connectivity and edge weight) and it ultimately allows us to perform a quantitative statistical comparison between predictions of theoretical models and naturally occurring loopy graphs.

  10. Hierarchically nested river landform sequences

    Science.gov (United States)

    Pasternack, G. B.; Weber, M. D.; Brown, R. A.; Baig, D.

    2017-12-01

    River corridors exhibit landforms nested within landforms repeatedly down spatial scales. In this study we developed, tested, and implemented a new way to create river classifications by mapping domains of fluvial processes with respect to the hierarchical organization of topographic complexity that drives fluvial dynamism. We tested this approach on flow convergence routing, a morphodynamic mechanism with different states depending on the structure of nondimensional topographic variability. Five nondimensional landform types with unique functionality (nozzle, wide bar, normal channel, constricted pool, and oversized) represent this process at any flow. When this typology is nested at base flow, bankfull, and floodprone scales it creates a system with up to 125 functional types. This shows how a single mechanism produces complex dynamism via nesting. Given the classification, we answered nine specific scientific questions to investigate the abundance, sequencing, and hierarchical nesting of these new landform types using a 35-km gravel/cobble river segment of the Yuba River in California. The nested structure of flow convergence routing landforms found in this study revealed that bankfull landforms are nested within specific floodprone valley landform types, and these types control bankfull morphodynamics during moderate to large floods. As a result, this study calls into question the prevailing theory that the bankfull channel of a gravel/cobble river is controlled by in-channel, bankfull, and/or small flood flows. Such flows are too small to initiate widespread sediment transport in a gravel/cobble river with topographic complexity.

  11. Stability of glassy hierarchical networks

    Science.gov (United States)

    Zamani, M.; Camargo-Forero, L.; Vicsek, T.

    2018-02-01

    The structure of interactions in most animal and human societies can be best represented by complex hierarchical networks. In order to maintain close-to-optimal function both stability and adaptability are necessary. Here we investigate the stability of hierarchical networks that emerge from the simulations of an organization type with an efficiency function reminiscent of the Hamiltonian of spin glasses. Using this quantitative approach we find a number of expected (from everyday observations) and highly non-trivial results for the obtained locally optimal networks, including, for example: (i) stability increases with growing efficiency and level of hierarchy; (ii) the same perturbation results in a larger change for more efficient states; (iii) networks with a lower level of hierarchy become more efficient after perturbation; (iv) due to the huge number of possible optimal states only a small fraction of them exhibit resilience and, finally, (v) ‘attacks’ targeting the nodes selectively (regarding their position in the hierarchy) can result in paradoxical outcomes.

  12. Hierarchical organisation of causal graphs

    International Nuclear Information System (INIS)

    Dziopa, P.

    1993-01-01

    This paper deals with the design of a supervision system using a hierarchy of models formed by graphs, in which the variables are the nodes and the causal relations between the variables of the arcs. To obtain a representation of the variables evolutions which contains only the relevant features of their real evolutions, the causal relations are completed with qualitative transfer functions (QTFs) which produce roughly the behaviour of the classical transfer functions. Major improvements have been made in the building of the hierarchical organization. First, the basic variables of the uppermost level and the causal relations between them are chosen. The next graph is built by adding intermediary variables to the upper graph. When the undermost graph has been built, the transfer functions parameters corresponding to its causal relations are identified. The second task consists in the upwelling of the information from the undermost graph to the uppermost one. A fusion procedure of the causal relations has been designed to compute the QFTs relevant for each level. This procedure aims to reduce the number of parameters needed to represent an evolution at a high level of abstraction. These techniques have been applied to the hierarchical modelling of nuclear process. (authors). 8 refs., 12 figs

  13. Implementasi Manajemen Bandwidth Dengan Disiplin Antrian Hierarchical Token Bucket (HTB Pada Sistem Operasi Linux

    Directory of Open Access Journals (Sweden)

    Muhammad Nugraha

    2016-09-01

    Full Text Available Important Problem on Internet networking is exhausted resource and bandwidth by some user while other user did not get service properly. To overcome that problem we need to implement traffic control and bandwidth management system in router. In this research author want to implement Hierarchical Token Bucket algorithm as queue discipline (qdisc to get bandwidth management accurately in order the user can get bandwidth properly. The result of this research is form the management bandwidth cheaply and efficiently by using Hierarchical Token Bucket qdisc on Linux operating system were able to manage the user as we want.

  14. IMPLEMENTASI MANAJEMEN BANDWIDTH DENGAN DISIPLIN ANTRIAN HIERARCHICAL TOKEN BUCKET (HTB PADA SISTEM OPERASI LINUX

    Directory of Open Access Journals (Sweden)

    Muhammad Nugraha

    2017-01-01

    Full Text Available Important Problem on Internet networking is exhausted resource and bandwidth by some user while other user did not get service properly. To overcome that problem we need to implement traffic control and bandwidth management system in router. In this research author want to implement Hierarchical Token Bucket algorithm as queue discipline (qdisc to get bandwidth management accurately in order the user can get bandwidth properly. The result of this research is form the management bandwidth cheaply and efficiently by using Hierarchical Token Bucket qdisc on Linux operating system were able to manage the user as we want.

  15. Fuzzy hierarchical model for risk assessment principles, concepts, and practical applications

    CERN Document Server

    Chan, Hing Kai

    2013-01-01

    Risk management is often complicated by situational uncertainties and the subjective preferences of decision makers. Fuzzy Hierarchical Model for Risk Assessment introduces a fuzzy-based hierarchical approach to solve risk management problems considering both qualitative and quantitative criteria to tackle imprecise information.   This approach is illustrated through number of case studies using examples from the food, fashion and electronics sectors to cover a range of applications including supply chain management, green product design and green initiatives. These practical examples explore how this method can be adapted and fine tuned to fit other industries as well.   Supported by an extensive literature review, Fuzzy Hierarchical Model for Risk Assessment  comprehensively introduces a new method for project managers across all industries as well as researchers in risk management.

  16. Management of Adult Syphilis: Key Questions to Inform the 2015 Centers for Disease Control and Prevention Sexually Transmitted Diseases Treatment Guidelines.

    Science.gov (United States)

    Ghanem, Khalil G

    2015-12-15

    A panel of experts generated 8 "key questions" in the management of adult syphilis. A systematic literature review was conducted and tables of evidence were constructed to answer these important questions. Penicillin is the drug of choice to treat syphilis. Doxycycline to treat early and late latent syphilis is an acceptable alternate option if penicillin cannot be used. There is no added benefit to enhanced antimicrobial therapy when treating human immunodeficiency virus-infected persons with syphilis. If a patient misses a dose of penicillin in a course of weekly therapy for late syphilis, clinical experience suggests that an interval of 10-14 days between doses might be acceptable before restarting the sequence of injections. Pharmacologic considerations suggest that an interval of 7-9 days between doses, if feasible, may be more optimal. Missed doses are not acceptable for pregnant women. A cerebrospinal fluid examination to diagnose neurosyphilis is recommended in persons diagnosed with tertiary syphilis (eg, cardiovascular syphilis or late benign syphilis), persons with neurological signs or symptoms consistent with neurosyphilis, and asymptomatic persons whose serological titers do not decline appropriately following recommended therapy and in whom reinfection is ruled out. Infection and reinfection rates, particularly among men who have sex with men, are high. Frequent serological screening of this population appears to be the most cost-efficient intervention. The Centers for Disease Control and Prevention continues to recommend the use of the traditional rapid plasma reagin-based screening algorithm. The positive predictive value for syphilis associated with an isolated unconfirmed reactive treponemal chemiluminescence assay or enzyme immunoassay is low if the epidemiological risk and clinical probability for syphilis are low. Among pregnant women with serodiscordant serologies (positive treponemal tests and a negative nontreponemal test), the risk of

  17. Multicollinearity in hierarchical linear models.

    Science.gov (United States)

    Yu, Han; Jiang, Shanhe; Land, Kenneth C

    2015-09-01

    This study investigates an ill-posed problem (multicollinearity) in Hierarchical Linear Models from both the data and the model perspectives. We propose an intuitive, effective approach to diagnosing the presence of multicollinearity and its remedies in this class of models. A simulation study demonstrates the impacts of multicollinearity on coefficient estimates, associated standard errors, and variance components at various levels of multicollinearity for finite sample sizes typical in social science studies. We further investigate the role multicollinearity plays at each level for estimation of coefficient parameters in terms of shrinkage. Based on these analyses, we recommend a top-down method for assessing multicollinearity in HLMs that first examines the contextual predictors (Level-2 in a two-level model) and then the individual predictors (Level-1) and uses the results for data collection, research problem redefinition, model re-specification, variable selection and estimation of a final model. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. Distributed hierarchical radiation monitoring system

    International Nuclear Information System (INIS)

    Barak, D.

    1985-01-01

    A solution to the problem of monitoring the radiation levels in and around a nuclear facility is presented in this paper. This is a private case of a large scale general purpose data acqisition system with high reliability, availability and short maintenance time. The physical layout of the detectors in the plant, and the strict control demands dictated a distributed and hierarchical system. The system is comprised of three levels, each level contains modules. Level one contains the Control modules which collects data from groups of detectors and executes emergency local control tasks. In level two are the Group controllers which concentrate data from the Control modules, and enable local display and communication. The system computer is in level three, enabling the plant operator to receive information from the detectors and execute control tasks. The described system was built and is operating successfully for about two years. (author)

  19. Hierarchical Control for Smart Grids

    DEFF Research Database (Denmark)

    Trangbæk, K; Bendtsen, Jan Dimon; Stoustrup, Jakob

    2011-01-01

    of autonomous consumers. The control system is tasked with balancing electric power production and consumption within the smart grid, and makes active use of the flexibility of a large number of power producing and/or power consuming units. The objective is to accommodate the load variation on the grid, arising......This paper deals with hierarchical model predictive control (MPC) of smart grid systems. The design consists of a high level MPC controller, a second level of so-called aggregators, which reduces the computational and communication-related load on the high-level control, and a lower level...... on one hand from varying consumption, and on the other hand by natural variations in power production e.g. from wind turbines. The high-level MPC problem is solved using quadratic optimisation, while the aggregator level can either involve quadratic optimisation or simple sorting-based min-max solutions...

  20. Silver Films with Hierarchical Chirality.

    Science.gov (United States)

    Ma, Liguo; Cao, Yuanyuan; Duan, Yingying; Han, Lu; Che, Shunai

    2017-07-17

    Physical fabrication of chiral metallic films usually results in singular or large-sized chirality, restricting the optical asymmetric responses to long electromagnetic wavelengths. The chiral molecule-induced formation of silver films prepared chemically on a copper substrate through a redox reaction is presented. Three levels of chirality were identified: primary twisted nanoflakes with atomic crystal lattices, secondary helical stacking of these nanoflakes to form nanoplates, and tertiary micrometer-sized circinates consisting of chiral arranged nanoplates. The chiral Ag films exhibited multiple plasmonic absorption- and scattering-based optical activities at UV/Vis wavelengths based on their hierarchical chirality. The Ag films showed chiral selectivity for amino acids in catalytic electrochemical reactions, which originated from their primary atomic crystal lattices. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.