WorldWideScience

Sample records for identify key operating

  1. Partitioned key-value store with atomic memory operations

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2017-02-07

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from the local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.

  2. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  3. The building blocks of a 'Liveable Neighbourhood': Identifying the key performance indicators for walking of an operational planning policy in Perth, Western Australia.

    Science.gov (United States)

    Hooper, Paula; Knuiman, Matthew; Foster, Sarah; Giles-Corti, Billie

    2015-11-01

    Planning policy makers are requesting clearer guidance on the key design features required to build neighbourhoods that promote active living. Using a backwards stepwise elimination procedure (logistic regression with generalised estimating equations adjusting for demographic characteristics, self-selection factors, stage of construction and scale of development) this study identified specific design features (n=16) from an operational planning policy ("Liveable Neighbourhoods") that showed the strongest associations with walking behaviours (measured using the Neighbourhood Physical Activity Questionnaire). The interacting effects of design features on walking behaviours were also investigated. The urban design features identified were grouped into the "building blocks of a Liveable Neighbourhood", reflecting the scale, importance and sequencing of the design and implementation phases required to create walkable, pedestrian friendly developments. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. [Key vessels assessment and operation highlights in laparoscopic extended right hemicolectomy].

    Science.gov (United States)

    Wang, Hao; Zhao, Quanquan

    2018-03-25

    Laparoscopic radical colectomies have been more widely used gradually, among which laparoscopic extended right hemicolectomy is considered as the most difficult procedure. The difficulty of extended right hemicolectomy lies in the need to dissect lymph nodes along the superior mesenteric vein (SMV) and disconnect numerous and possible aberrant vessels. To address this problem, we emphasize two points in key vessel assessment: getting familiar with the anatomy along the medial-to-lateral approach and having a good understanding about the preoperative imaging presentations. An accurately preoperative imaging assessment by abdominal enhanced CT can help the surgeon understand the relative position of the key vessels to be dealt with during operation and the situation of the possible aberrant vessels so as to guide the procedure more effectively and facilitate the prevention and management of the intraoperative complications. During operation, the operator should pay special attention to the management of the vessels in the ileocolic vessel region, Henle's trunk and middle colon vessels. The operation highlights of the key vessels are as follows: (1) The ileocolic vessels: identifying the Toldt's gap correctly and opening the vascular sheath of the SMV securely; making sure that the duodenum is well protected. (2) Henle's trunk: dissecting along the surface of the Henle's trunk; preserving the anterior superior pancreaticoduodenal vein (ASPDV) and main trunk of the Henle's trunk; disconnecting the roots of the right colic vein (RCV) and right gastroepiploic vein (RGEV), and then dissecting lymph nodes along the surface of the pancreas. (3) The middle colon vessels: identifying the root of the middle colon vessel along the lower edge of the pancreas; avoiding entering behind the pancreas; mobilizing the transverse mesocolon sufficiently along the surface of the pancreas. Finally, we discuss and analyze the disputes currently existing in laparoscopic extended right

  5. Identifying Key Issues and Potential Solutions for Integrated Arrival, Departure, Surface Operations by Surveying Stakeholder Preferences

    Science.gov (United States)

    Aponso, Bimal; Coppenbarger, Richard A.; Jung, Yoon; Quon, Leighton; Lohr, Gary; O’Connor, Neil; Engelland, Shawn

    2015-01-01

    NASA's Aeronautics Research Mission Directorate (ARMD) collaborates with the FAA and industry to provide concepts and technologies that enhance the transition to the next-generation air-traffic management system (NextGen). To facilitate this collaboration, ARMD has a series of Airspace Technology Demonstration (ATD) sub-projects that develop, demonstrate, and transitions NASA technologies and concepts for implementation in the National Airspace System (NAS). The second of these sub-projects, ATD-2, is focused on the potential benefits to NAS stakeholders of integrated arrival, departure, surface (IADS) operations. To determine the project objectives and assess the benefits of a potential solution, NASA surveyed NAS stakeholders to understand the existing issues in arrival, departure, and surface operations, and the perceived benefits of better integrating these operations. NASA surveyed a broad cross-section of stakeholders representing the airlines, airports, air-navigation service providers, and industry providers of NAS tools. The survey indicated that improving the predictability of flight times (schedules) could improve efficiency in arrival, departure, and surface operations. Stakeholders also mentioned the need for better strategic and tactical information on traffic constraints as well as better information sharing and a coupled collaborative planning process that allows stakeholders to coordinate IADS operations. To assess the impact of a potential solution, NASA sketched an initial departure scheduling concept and assessed its viability by surveying a select group of stakeholders for a second time. The objective of the departure scheduler was to enable flights to move continuously from gate to cruise with minimal interruption in a busy metroplex airspace environment using strategic and tactical scheduling enhanced by collaborative planning between airlines and service providers. The stakeholders agreed that this departure concept could improve schedule

  6. Space Weather Impacts on Spacecraft Operations: Identifying and Establishing High-Priority Operational Services

    Science.gov (United States)

    Lawrence, G.; Reid, S.; Tranquille, C.; Evans, H.

    2013-12-01

    Space Weather is a multi-disciplinary and cross-domain system defined as, 'The physical and phenomenological state of natural space environments. The associated discipline aims, through observation, monitoring, analysis and modelling, at understanding and predicting the state of the Sun, the interplanetary and planetary environments, and the solar and non-solar driven perturbations that affect them, and also at forecasting and nowcasting the potential impacts on biological and technological systems'. National and Agency-level efforts to provide services addressing the myriad problems, such as ESA's SSA programme are therefore typically complex and ambitious undertakings to introduce a comprehensive suite of services aimed at a large number and broad range of end users. We focus on some of the particular threats and risks that Space Weather events pose to the Spacecraft Operations community, and the resulting implications in terms of User Requirements. We describe some of the highest-priority service elements identified as being needed by the Operations community, and outline some service components that are presently available, or under development. The particular threats and risks often vary according to orbit, so the particular User Needs for Operators at LEO, MEO and GEO are elaborated. The inter-relationship between these needed service elements and existing service components within the broader Space Weather domain is explored. Some high-priority service elements and potential correlation with Space Weather drivers include: solar array degradation and energetic proton storms; single event upsets at GEO and solar proton events and galactic cosmic rays; surface charging and deep dielectric charging at MEO and radiation belt dynamics; SEUs at LEO and the South Atlantic Anomaly and its variability. We examine the current capability to provide operational services addressing such threats and identify some advances that the Operations community can expect to benefit

  7. Argo workstation: a key component of operational oceanography

    Science.gov (United States)

    Dong, Mingmei; Xu, Shanshan; Miao, Qingsheng; Yue, Xinyang; Lu, Jiawei; Yang, Yang

    2018-02-01

    Operational oceanography requires the quantity, quality, and availability of data set and the timeliness and effectiveness of data products. Without steady and strong operational system supporting, operational oceanography will never be proceeded far. In this paper we describe an integrated platform named Argo Workstation. It operates as a data processing and management system, capable of data collection, automatic data quality control, visualized data check, statistical data search and data service. After it is set up, Argo workstation provides global high quality Argo data to users every day timely and effectively. It has not only played a key role in operational oceanography but also set up an example for operational system.

  8. Research Note Identifying key grazing indicators to monitor trends in ...

    African Journals Online (AJOL)

    Research Note Identifying key grazing indicators to monitor trends in the veld condition of Lambert's Bay Strandveld, South Africa. ... from which a minimum number of species necessary to monitor trends in the condition of the veld were determined, making it user-friendly for land-users, extension officers and others. The key ...

  9. Key Parameters for Operator Diagnosis of BWR Plant Condition during a Severe Accident

    Energy Technology Data Exchange (ETDEWEB)

    Clayton, Dwight A [ORNL; Poore III, Willis P [ORNL

    2015-01-01

    The objective of this research is to examine the key information needed from nuclear power plant instrumentation to guide severe accident management and mitigation for boiling water reactor (BWR) designs (specifically, a BWR/4-Mark I), estimate environmental conditions that the instrumentation will experience during a severe accident, and identify potential gaps in existing instrumentation that may require further research and development. This report notes the key parameters that instrumentation needs to measure to help operators respond to severe accidents. A follow-up report will assess severe accident environmental conditions as estimated by severe accident simulation model analysis for a specific US BWR/4-Mark I plant for those instrumentation systems considered most important for accident management purposes.

  10. Human-automation collaboration in manufacturing: identifying key implementation factors

    OpenAIRE

    Charalambous, George; Fletcher, Sarah; Webb, Philip

    2013-01-01

    Human-automation collaboration refers to the concept of human operators and intelligent automation working together interactively within the same workspace without conventional physical separation. This concept has commanded significant attention in manufacturing because of the potential applications, such as the installation of large sub-assemblies. However, the key human factors relevant to human-automation collaboration have not yet been fully investigated. To maximise effective implement...

  11. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  12. Methods of Developing User-Friendly Keys to Identify Green Sea Turtles (Chelonia mydas L. from Photographs

    Directory of Open Access Journals (Sweden)

    Jane R. Lloyd

    2012-01-01

    Full Text Available Identifying individual animals is important in understanding their ecology and behaviour, as well as providing estimates of population sizes for conservation efforts. We produce identification keys from photographs of green sea turtles to identify them while foraging in Akumal Bay, Mexico. We create three keys, which (a minimise the length of the key, (b present the most obvious differential characteristics first, and (c remove the strict dichotomy from key b. Keys were capable of identifying >99% of turtles in >2500 photographs during the six-month study period. The keys differed significantly in success rate for students to identify individual turtles, with key (c being the best with >70% success and correctly being followed further than other keys before making a mistake. User-friendly keys are, therefore, a suitable method for the photographic identification of turtles and could be used for other large marine vertebrates in conservation or behavioural studies.

  13. International co-operation. Key issue paper no. 6

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-06-01

    In accordance with guidance provided by the Steering Group, this report assesses the adequacy and effectiveness of international co-operation relating to the nuclear fuel cycle, with a view toward identifying any needed new forms or arrangements for co-operation. In more specific terms, the Steering Committee`s guidance identified the following questions: Is the existing international framework sufficient for: the safe and secure operation of the fuel cycle; the economic and orderly development of the world`s nuclear energy systems (or their phase-out should this take place); international co-operation in R and D; international co-operation in industrial activities? Are there places where these requirements overlap or interact so as to impede activities which are desirable? Can new forms of co-operation be foreseen which would make it easier to implement any of the fuel cycle options in a safe, secure and responsible way? Are there other new forms of international co-operation which would affect the fuel cycle, e.g. regional institutions; international plutonium management regime and/or storage? Finally: What is the appropriate role of IAEA in any of these?.

  14. BENCHMARKING - PRACTICAL TOOLS IDENTIFY KEY SUCCESS FACTORS

    Directory of Open Access Journals (Sweden)

    Olga Ju. Malinina

    2016-01-01

    Full Text Available The article gives a practical example of the application of benchmarking techniques. The object of study selected fashion store Company «HLB & M Hennes & Mauritz», located in the shopping center «Gallery», Krasnodar. Hennes & Mauritz. The purpose of this article is to identify the best ways to develop a fashionable brand clothing store Hennes & Mauritz on the basis of benchmarking techniques. On the basis of conducted market research is a comparative analysis of the data from different perspectives. The result of the author’s study is a generalization of the ndings, the development of the key success factors that will allow to plan a successful trading activities in the future, based on the best experience of competitors.

  15. Identifying Key Attributes for Protein Beverages.

    Science.gov (United States)

    Oltman, A E; Lopetcharat, K; Bastian, E; Drake, M A

    2015-06-01

    This study identified key attributes of protein beverages and evaluated effects of priming on liking of protein beverages. An adaptive choice-based conjoint study was conducted along with Kano analysis to gain insight on protein beverage consumers (n = 432). Attributes evaluated included label claim, protein type, amount of protein, carbohydrates, sweeteners, and metabolic benefits. Utility scores for levels and importance scores for attributes were determined. Subsequently, two pairs of clear acidic whey protein beverages were manufactured that differed by age of protein source or the amount of whey protein per serving. Beverages were evaluated by 151 consumers on two occasions with or without priming statements. One priming statement declared "great flavor," the other priming statement declared 20 g protein per serving. A two way analysis of variance was applied to discern the role of each priming statement. The most important attribute for protein beverages was sweetener type, followed by amount of protein, followed by type of protein followed by label claim. Beverages with whey protein, naturally sweetened, reduced sugar and ≥15 g protein per serving were most desired. Three consumer clusters were identified, differentiated by their preferences for protein type, sweetener and amount of protein. Priming statements positively impacted concept liking (P 0.05). Consistent with trained panel profiles of increased cardboard flavor with higher protein content, consumers liked beverages with 10 g protein more than beverages with 20 g protein (6.8 compared with 5.7, P appeal. © 2015 Institute of Food Technologists®

  16. Risk and Performance Technologies: Identifying the Keys to Successful Implementation

    International Nuclear Information System (INIS)

    McClain, Lynn; Smith, Art; O'Regan, Patrick

    2002-01-01

    The nuclear power industry has been utilizing risk and performance based technologies for over thirty years. Applications of these technologies have included risk assessment (e.g. Individual Plant Examinations), burden reduction (e.g. Risk-Informed Inservice Inspection, RI-ISI) and risk management (Maintenance Rule, 10CFR50.65). Over the last five to ten years the number of risk-informed (RI) burden reduction initiatives has increased. Unfortunately, the efficiencies of some of these applications have been questionable. This paper investigates those attributes necessary to support successful, cost-effective RI-applications. The premise to this paper is that by understanding the key attributes that support one successful application, insights can be gleaned that will streamline/coordinate future RI-applications. This paper is an extension to a paper presented at the Pressure Vessel and Piping (PVP-2001) Conference. In that paper, a number issues and opportunities were identified that needed to be assessed in order to support future (and efficient) RI-applications. It was noted in the paper that a proper understanding and resolution of these issues will facilitate implementation of risk and performance technology in the operation, maintenance and design disciplines. In addition, it will provide the foundation necessary to support regulatory review and approval. (authors)

  17. A User Centered Innovation Approach Identifying Key User Values for the E-Newspaper

    OpenAIRE

    Carina Ihlström Eriksson; Jesper Svensson

    2009-01-01

    We have studied the pre-adoption phase of the e-newspaper, i.e. a newspaper published with e-paper technology. The research question of this article is: In what way can a user centered innovation process contribute to identifying key values in mobile innovations? The aim of this article is threefold: firstly, to identify key values for the e-newspaper, secondly, to examine the intention to adopt a new possible innovation and thirdly, to explore user centered design processes ability to captur...

  18. Prediction of chronic post-operative pain: pre-operative DNIC testing identifies patients at risk.

    Science.gov (United States)

    Yarnitsky, David; Crispel, Yonathan; Eisenberg, Elon; Granovsky, Yelena; Ben-Nun, Alon; Sprecher, Elliot; Best, Lael-Anson; Granot, Michal

    2008-08-15

    Surgical and medical procedures, mainly those associated with nerve injuries, may lead to chronic persistent pain. Currently, one cannot predict which patients undergoing such procedures are 'at risk' to develop chronic pain. We hypothesized that the endogenous analgesia system is key to determining the pattern of handling noxious events, and therefore testing diffuse noxious inhibitory control (DNIC) will predict susceptibility to develop chronic post-thoracotomy pain (CPTP). Pre-operative psychophysical tests, including DNIC assessment (pain reduction during exposure to another noxious stimulus at remote body area), were conducted in 62 patients, who were followed 29.0+/-16.9 weeks after thoracotomy. Logistic regression revealed that pre-operatively assessed DNIC efficiency and acute post-operative pain intensity were two independent predictors for CPTP. Efficient DNIC predicted lower risk of CPTP, with OR 0.52 (0.33-0.77 95% CI, p=0.0024), i.e., a 10-point numerical pain scale (NPS) reduction halves the chance to develop chronic pain. Higher acute pain intensity indicated OR of 1.80 (1.28-2.77, p=0.0024) predicting nearly a double chance to develop chronic pain for each 10-point increase. The other psychophysical measures, pain thresholds and supra-threshold pain magnitudes, did not predict CPTP. For prediction of acute post-operative pain intensity, DNIC efficiency was not found significant. Effectiveness of the endogenous analgesia system obtained at a pain-free state, therefore, seems to reflect the individual's ability to tackle noxious events, identifying patients 'at risk' to develop post-intervention chronic pain. Applying this diagnostic approach before procedures that might generate pain may allow individually tailored pain prevention and management, which may substantially reduce suffering.

  19. Daylight operation of a free space, entanglement-based quantum key distribution system

    Energy Technology Data Exchange (ETDEWEB)

    Peloso, Matthew P; Gerhardt, Ilja; Ho, Caleb; Lamas-Linares, AntIa; Kurtsiefer, Christian [Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543 (Singapore)], E-mail: christian.kurtsiefer@gmail.com

    2009-04-15

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from the background light. Here, we present a lean entanglement-based QKD system overcoming that limitation. By implementing spectral, spatial and temporal filtering techniques, we establish a secure key continuously over several days under varying light and weather conditions.

  20. Social Network Analysis Identifies Key Participants in Conservation Development.

    Science.gov (United States)

    Farr, Cooper M; Reed, Sarah E; Pejchar, Liba

    2018-05-01

    Understanding patterns of participation in private lands conservation, which is often implemented voluntarily by individual citizens and private organizations, could improve its effectiveness at combating biodiversity loss. We used social network analysis (SNA) to examine participation in conservation development (CD), a private land conservation strategy that clusters houses in a small portion of a property while preserving the remaining land as protected open space. Using data from public records for six counties in Colorado, USA, we compared CD participation patterns among counties and identified actors that most often work with others to implement CDs. We found that social network characteristics differed among counties. The network density, or proportion of connections in the network, varied from fewer than 2 to nearly 15%, and was higher in counties with smaller populations and fewer CDs. Centralization, or the degree to which connections are held disproportionately by a few key actors, was not correlated strongly with any county characteristics. Network characteristics were not correlated with the prevalence of wildlife-friendly design features in CDs. The most highly connected actors were biological and geological consultants, surveyors, and engineers. Our work demonstrates a new application of SNA to land-use planning, in which CD network patterns are examined and key actors are identified. For better conservation outcomes of CD, we recommend using network patterns to guide strategies for outreach and information dissemination, and engaging with highly connected actor types to encourage widespread adoption of best practices for CD design and stewardship.

  1. Identifying key radiogenomic associations between DCE-MRI and micro-RNA expressions for breast cancer

    Science.gov (United States)

    Samala, Ravi K.; Chan, Heang-Ping; Hadjiiski, Lubomir; Helvie, Mark A.; Kim, Renaid

    2017-03-01

    Understanding the key radiogenomic associations for breast cancer between DCE-MRI and micro-RNA expressions is the foundation for the discovery of radiomic features as biomarkers for assessing tumor progression and prognosis. We conducted a study to analyze the radiogenomic associations for breast cancer using the TCGA-TCIA data set. The core idea that tumor etiology is a function of the behavior of miRNAs is used to build the regression models. The associations based on regression are analyzed for three study outcomes: diagnosis, prognosis, and treatment. The diagnosis group consists of miRNAs associated with clinicopathologic features of breast cancer and significant aberration of expression in breast cancer patients. The prognosis group consists of miRNAs which are closely associated with tumor suppression and regulation of cell proliferation and differentiation. The treatment group consists of miRNAs that contribute significantly to the regulation of metastasis thereby having the potential to be part of therapeutic mechanisms. As a first step, important miRNA expressions were identified and their ability to classify the clinical phenotypes based on the study outcomes was evaluated using the area under the ROC curve (AUC) as a figure-of-merit. The key mapping between the selected miRNAs and radiomic features were determined using least absolute shrinkage and selection operator (LASSO) regression analysis within a two-loop leave-one-out cross-validation strategy. These key associations indicated a number of radiomic features from DCE-MRI to be potential biomarkers for the three study outcomes.

  2. Key Issues in Empirically Identifying Chronically Low-Performing and Turnaround Schools

    Science.gov (United States)

    Hansen, Michael

    2012-01-01

    One of the US Department of Education's key priorities is turning around the nation's persistently low-achieving schools, yet exactly how to identify low-performing schools is a task left to state policy makers, and a myriad of definitions have been utilized. In addition, exactly how to recognize when a school begins to turn around is not well…

  3. AMNT 2014. Key topic: Reactor operation, safety - report. Pt. 3

    Energy Technology Data Exchange (ETDEWEB)

    Bohnstedt, Angelika [Karlsruher Institut fuer Technologie (KIT), Eggenstein-Leopoldshafen (Germany). Programm Nukleare Sicherheitsforschung (NUKLEAR); Mull, Thomas [AREVA GmbH, Erlangen (Germany). Nuclear Fusion, HTR and Transverse Issues (PTDH-G); Starflinger, Joerg [Stuttgart Univ. (Germany). Inst. fuer Kernenergetik und Energiesysteme (IKE)

    2015-01-15

    Summary report on the following sessions of the Annual Conference on Nuclear Technology held in Frankfurt, 6 to 8 May 2014: - Reactor Operation, Safety: Radiation Protection (Angelika Bohnstedt); - Competence, Innovation, Regulation: Fusion Technology - Optimisation Steps in the ITER Design (Thomas Mull); - Competence, Innovation, Regulation: Education, Expert Knowledge, Knowledge Transfer (Joerg Starflinger). The other Sessions of the Key Topics 'Reactor Operation, Safety', 'Competence, Innovation, Regulation' and 'Fuel, Decommissioning and Disposal' have been covered in atw 10 and 12 (2015) and will be covered in further issues of atw.

  4. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach.

    Science.gov (United States)

    Si, Sheng-Li; You, Xiao-Yue; Liu, Hu-Chen; Huang, Jia

    2017-08-19

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that "accidents/adverse events", "nosocomial infection", ''incidents/errors", "number of operations/procedures" are significant influential indicators. Also, the indicators of "length of stay", "bed occupancy" and "financial measures" play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions.

  5. Summary of Key Operating Statistics: Data Collected from the 2009 Annual Institutional Report

    Science.gov (United States)

    Accrediting Council for Independent Colleges and Schools, 2010

    2010-01-01

    The Accrediting Council for Independent Colleges and Schools (ACICS) provides the Summary of Key Operating Statistics (KOS) as an annual review of the performance and key measurements of the more than 800 private post-secondary institutions we accredit. This edition of the KOS contains information based on the 2009 Annual Institutional Reports…

  6. Integrated systems approach identifies risk regulatory pathways and key regulators in coronary artery disease.

    Science.gov (United States)

    Zhang, Yan; Liu, Dianming; Wang, Lihong; Wang, Shuyuan; Yu, Xuexin; Dai, Enyu; Liu, Xinyi; Luo, Shanshun; Jiang, Wei

    2015-12-01

    Coronary artery disease (CAD) is the most common type of heart disease. However, the molecular mechanisms of CAD remain elusive. Regulatory pathways are known to play crucial roles in many pathogenic processes. Thus, inferring risk regulatory pathways is an important step toward elucidating the mechanisms underlying CAD. With advances in high-throughput data, we developed an integrated systems approach to identify CAD risk regulatory pathways and key regulators. Firstly, a CAD-related core subnetwork was identified from a curated transcription factor (TF) and microRNA (miRNA) regulatory network based on a random walk algorithm. Secondly, candidate risk regulatory pathways were extracted from the subnetwork by applying a breadth-first search (BFS) algorithm. Then, risk regulatory pathways were prioritized based on multiple CAD-associated data sources. Finally, we also proposed a new measure to prioritize upstream regulators. We inferred that phosphatase and tensin homolog (PTEN) may be a key regulator in the dysregulation of risk regulatory pathways. This study takes a closer step than the identification of disease subnetworks or modules. From the risk regulatory pathways, we could understand the flow of regulatory information in the initiation and progression of the disease. Our approach helps to uncover its potential etiology. We developed an integrated systems approach to identify risk regulatory pathways. We proposed a new measure to prioritize the key regulators in CAD. PTEN may be a key regulator in dysregulation of the risk regulatory pathways.

  7. Benchmarking in Identifying Priority Directions of Development of Telecommunication Operators

    Directory of Open Access Journals (Sweden)

    Zaharchenko Lolita A.

    2013-12-01

    Full Text Available The article analyses evolution of development and possibilities of application of benchmarking in the telecommunication sphere. It studies essence of benchmarking on the basis of generalisation of approaches of different scientists to definition of this notion. In order to improve activity of telecommunication operators, the article identifies the benchmarking technology and main factors, that determine success of the operator in the modern market economy, and the mechanism of benchmarking and component stages of carrying out benchmarking by a telecommunication operator. It analyses the telecommunication market and identifies dynamics of its development and tendencies of change of the composition of telecommunication operators and providers. Having generalised the existing experience of benchmarking application, the article identifies main types of benchmarking of telecommunication operators by the following features: by the level of conduct of (branch, inter-branch and international benchmarking; by relation to participation in the conduct (competitive and joint; and with respect to the enterprise environment (internal and external.

  8. AMNT 2014. Key Topic: Reactor operation, safety - report. Pt. 1

    International Nuclear Information System (INIS)

    Schaffrath, Andreas

    2014-01-01

    Summary report on one session of the Annual Conference on Nuclear Technology held in Frankfurt, 6 to 8 May 2014: - Safety of Nuclear Installations - Methods, Analysis, Results: Backfittings for the Improvement of Safety and Efficiency. The other Sessions of the Key Topics 'Reactor Operation, Safety', 'Competence, Innovation, Regulation' and 'Fuel, Decommissioning and Disposal' will be covered in further issues of atw.

  9. Identifying key genes associated with acute myocardial infarction.

    Science.gov (United States)

    Cheng, Ming; An, Shoukuan; Li, Junquan

    2017-10-01

    This study aimed to identify key genes associated with acute myocardial infarction (AMI) by reanalyzing microarray data. Three gene expression profile datasets GSE66360, GSE34198, and GSE48060 were downloaded from GEO database. After data preprocessing, genes without heterogeneity across different platforms were subjected to differential expression analysis between the AMI group and the control group using metaDE package. P FI) network. Then, DEGs in each module were subjected to pathway enrichment analysis using DAVID. MiRNAs and transcription factors predicted to regulate target DEGs were identified. Quantitative real-time polymerase chain reaction (RT-PCR) was applied to verify the expression of genes. A total of 913 upregulated genes and 1060 downregulated genes were identified in the AMI group. A FI network consists of 21 modules and DEGs in 12 modules were significantly enriched in pathways. The transcription factor-miRNA-gene network contains 2 transcription factors FOXO3 and MYBL2, and 2 miRNAs hsa-miR-21-5p and hsa-miR-30c-5p. RT-PCR validations showed that expression levels of FOXO3 and MYBL2 were significantly increased in AMI, and expression levels of hsa-miR-21-5p and hsa-miR-30c-5p were obviously decreased in AMI. A total of 41 DEGs, such as SOCS3, VAPA, and COL5A2, are speculated to have roles in the pathogenesis of AMI; 2 transcription factors FOXO3 and MYBL2, and 2 miRNAs hsa-miR-21-5p and hsa-miR-30c-5p may be involved in the regulation of the expression of these DEGs.

  10. AMNT 2014. Key Topic: Reactor operation, safety - report. Pt. 1

    Energy Technology Data Exchange (ETDEWEB)

    Schaffrath, Andreas [Gesellschaft fuer Anlagen- und Reaktorsicherheit mbH (GRS), Garching (Germany). Forschungszentrum

    2014-10-15

    Summary report on one session of the Annual Conference on Nuclear Technology held in Frankfurt, 6 to 8 May 2014: - Safety of Nuclear Installations - Methods, Analysis, Results: Backfittings for the Improvement of Safety and Efficiency. The other Sessions of the Key Topics 'Reactor Operation, Safety', 'Competence, Innovation, Regulation' and 'Fuel, Decommissioning and Disposal' will be covered in further issues of atw.

  11. Identifying key performance indicators for nursing and midwifery care using a consensus approach.

    Science.gov (United States)

    McCance, Tanya; Telford, Lorna; Wilson, Julie; Macleod, Olive; Dowd, Audrey

    2012-04-01

    The aim of this study was to gain consensus on key performance indicators that are appropriate and relevant for nursing and midwifery practice in the current policy context. There is continuing demand to demonstrate effectiveness and efficiency in health and social care and to communicate this at boardroom level. Whilst there is substantial literature on the use of clinical indicators and nursing metrics, there is less evidence relating to indicators that reflect the patient experience. A consensus approach was used to identify relevant key performance indicators. A nominal group technique was used comprising two stages: a workshop involving all grades of nursing and midwifery staff in two HSC trusts in Northern Ireland (n = 50); followed by a regional Consensus Conference (n = 80). During the workshop, potential key performance indicators were identified. This was used as the basis for the Consensus Conference, which involved two rounds of consensus. Analysis was based on aggregated scores that were then ranked. Stage one identified 38 potential indicators and stage two prioritised the eight top-ranked indicators as a core set for nursing and midwifery. The relevance and appropriateness of these indicators were confirmed with nurses and midwives working in a range of settings and from the perspective of service users. The eight indicators identified do not conform to the majority of other nursing metrics generally reported in the literature. Furthermore, they are strategically aligned to work on the patient experience and are reflective of the fundamentals of nursing and midwifery practice, with the focus on person-centred care. Nurses and midwives have a significant contribution to make in determining the extent to which these indicators are achieved in practice. Furthermore, measurement of such indicators provides an opportunity to evidence of the unique impact of nursing/midwifery care on the patient experience. © 2011 Blackwell Publishing Ltd.

  12. Identifying Key Drivers of Return Reversal with Dynamical Bayesian Factor Graph.

    Directory of Open Access Journals (Sweden)

    Shuai Zhao

    Full Text Available In the stock market, return reversal occurs when investors sell overbought stocks and buy oversold stocks, reversing the stocks' price trends. In this paper, we develop a new method to identify key drivers of return reversal by incorporating a comprehensive set of factors derived from different economic theories into one unified dynamical Bayesian factor graph. We then use the model to depict factor relationships and their dynamics, from which we make some interesting discoveries about the mechanism behind return reversals. Through extensive experiments on the US stock market, we conclude that among the various factors, the liquidity factors consistently emerge as key drivers of return reversal, which is in support of the theory of liquidity effect. Specifically, we find that stocks with high turnover rates or high Amihud illiquidity measures have a greater probability of experiencing return reversals. Apart from the consistent drivers, we find other drivers of return reversal that generally change from year to year, and they serve as important characteristics for evaluating the trends of stock returns. Besides, we also identify some seldom discussed yet enlightening inter-factor relationships, one of which shows that stocks in Finance and Insurance industry are more likely to have high Amihud illiquidity measures in comparison with those in other industries. These conclusions are robust for return reversals under different thresholds.

  13. Identifying key hospital service quality factors in online health communities.

    Science.gov (United States)

    Jung, Yuchul; Hur, Cinyoung; Jung, Dain; Kim, Minki

    2015-04-07

    The volume of health-related user-created content, especially hospital-related questions and answers in online health communities, has rapidly increased. Patients and caregivers participate in online community activities to share their experiences, exchange information, and ask about recommended or discredited hospitals. However, there is little research on how to identify hospital service quality automatically from the online communities. In the past, in-depth analysis of hospitals has used random sampling surveys. However, such surveys are becoming impractical owing to the rapidly increasing volume of online data and the diverse analysis requirements of related stakeholders. As a solution for utilizing large-scale health-related information, we propose a novel approach to identify hospital service quality factors and overtime trends automatically from online health communities, especially hospital-related questions and answers. We defined social media-based key quality factors for hospitals. In addition, we developed text mining techniques to detect such factors that frequently occur in online health communities. After detecting these factors that represent qualitative aspects of hospitals, we applied a sentiment analysis to recognize the types of recommendations in messages posted within online health communities. Korea's two biggest online portals were used to test the effectiveness of detection of social media-based key quality factors for hospitals. To evaluate the proposed text mining techniques, we performed manual evaluations on the extraction and classification results, such as hospital name, service quality factors, and recommendation types using a random sample of messages (ie, 5.44% (9450/173,748) of the total messages). Service quality factor detection and hospital name extraction achieved average F1 scores of 91% and 78%, respectively. In terms of recommendation classification, performance (ie, precision) is 78% on average. Extraction and

  14. LS1 to LHC Report: LHC key handed back to Operations

    CERN Multimedia

    CERN Bulletin

    2015-01-01

    This week, after 23 months of hard work involving about 1000 people every day, the key to the LHC was symbolically handed back to the Operations team. The first long shutdown is over and the machine is getting ready for a restart that will bring its beam to full energy in early spring.   Katy Foraz, LS1 activities coordinator, symbolically hands the LHC key to the operations team, represented, left to right, by Jorg Wenninger, Mike Lamont and Mirko Pojer. All the departments, all the machines and all the experimental areas were involved in the first long shutdown of the LHC that began in February 2013. Over the last two years, the Bulletin has closely followed  all the work and achievements that had been carefully included in the complex general schedule drawn up and managed by the team led by Katy Foraz from the Engineering Department. “The work on the schedule began two years before the start of LS1 and one of the first things we realised was that there was no commercial...

  15. A matter of definition--key elements identified in a discourse analysis of definitions of palliative care.

    Science.gov (United States)

    Pastrana, T; Jünger, S; Ostgathe, C; Elsner, F; Radbruch, L

    2008-04-01

    For more than 30 years, the term "palliative care" has been used. From the outset, the term has undergone a series of transformations in its definitions and consequently in its tasks and goals. There remains a lack of consensus on a definition. The aim of this article is to analyse the definitions of palliative care in the specialist literature and to identify the key elements of palliative care using discourse analysis: a qualitative methodology. The literature search focused on definitions of the term 'palliative medicine' and 'palliative care' in the World Wide Web and medical reference books in English and German. A total of 37 English and 26 German definitions were identified and analysed. Our study confirmed the lack of a consistent meaning concerning the investigated terms, reflecting on-going discussion about the nature of the field among palliative care practitioners. Several common key elements were identified. Four main categories emerged from the discourse analysis of the definition of palliative care: target groups, structure, tasks and expertise. In addition, the theoretical principles and goals of palliative care were discussed and found to be key elements, with relief and prevention of suffering and improvement of quality of life as main goals. The identified key elements can contribute to the definition of the concept 'palliative care'. Our study confirms the importance of semantic and ethical influences on palliative care that should be considered in future research on semantics in different languages.

  16. Complex of Key Instruments of Management of Operation Activity of a Small Business Trade Enterprise

    Directory of Open Access Journals (Sweden)

    Serdyuk Vira M.

    2013-11-01

    Full Text Available The article offers a complex of key instruments of management of operation activity of a small business trade enterprise, including: 1 budgeting of operation activity; 2 its accounting by norms and deviations from them; 3 monitoring of operational activity of an enterprise, which envisages analysis of revealed deviations. The article shows the most efficient way of realisation and practical use of the presented concept – application of the “standard-cost” scheme within the framework of which the following tasks are solved: 1 budgeting of income from operational activity; 2 establishment of standards of costs; 3 accumulation of data on factual income and expenditures; 4 analysis of deviations and reporting; and 5 introduction of necessary amendments. The article also offers an imitation model of analysis of dynamics of trade processes, which allows detection of key spheres of management of operation activity of a small trade enterprise and principles of carrying out an efficient and well thought over financial policy.

  17. 48{sup th} Annual meeting on nuclear technology (AMNT 2017). Key topic / Enhanced safety and operation excellence. Focus session: International operational experience

    Energy Technology Data Exchange (ETDEWEB)

    Mohrbach, Ludger [VGB PowerTech e.V., Essen (Germany). Abteilung ' ' N' ' ; Gottschling, Helge

    2017-11-15

    Summary report on the Key Topic Enhanced Safety and Operation Excellence: Focus Session: International Operational Experience and the Nuclear Energy Campus of the 48{sup th} Annual Meeting on Nuclear Technology (AMNT 2017) held in Berlin, 16 to 17 May 2017.

  18. Key clinical features to identify girls with CDKL5 mutations.

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydeé; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothée; Afenjar, Alexandra; Rio, Marlène; Héron, Delphine; N'guyen Morel, Marie Ange; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-10-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 (CDKL5) gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of CDKL5-associated encephalopathy. We screened the entire coding region of CDKL5 for mutations in 183 females with encephalopathy with early seizures by denaturing high liquid performance chromatography and direct sequencing, and we identified in 20 unrelated girls, 18 different mutations including 7 novel mutations. These mutations were identified in eight patients with encephalopathy with RTT-like features, five with infantile spasms and seven with encephalopathy with refractory epilepsy. Early epilepsy with normal interictal EEG and severe hypotonia are the key clinical features in identifying patients likely to have CDKL5 mutations. Our study also indicates that these patients clearly exhibit some RTT features such as deceleration of head growth, stereotypies and hand apraxia and that these RTT features become more evident in older and ambulatory patients. However, some RTT signs are clearly absent such as the so called RTT disease profile (period of nearly normal development followed by regression with loss of acquired fine finger skill in early childhood and characteristic intensive eye communication) and the characteristic evolution of the RTT electroencephalogram. Interestingly, in addition to the overall stereotypical symptomatology (age of onset and evolution of the disease) resulting from CDKL5 mutations, atypical forms of CDKL5-related conditions have also been observed. Our data suggest that phenotypic heterogeneity does not correlate with the nature or the position of the mutations or with the pattern of X-chromosome inactivation, but most probably with the functional transcriptional and/or translational consequences of CDKL5

  19. Predictive model identifies key network regulators of cardiomyocyte mechano-signaling.

    Directory of Open Access Journals (Sweden)

    Philip M Tan

    2017-11-01

    Full Text Available Mechanical strain is a potent stimulus for growth and remodeling in cells. Although many pathways have been implicated in stretch-induced remodeling, the control structures by which signals from distinct mechano-sensors are integrated to modulate hypertrophy and gene expression in cardiomyocytes remain unclear. Here, we constructed and validated a predictive computational model of the cardiac mechano-signaling network in order to elucidate the mechanisms underlying signal integration. The model identifies calcium, actin, Ras, Raf1, PI3K, and JAK as key regulators of cardiac mechano-signaling and characterizes crosstalk logic imparting differential control of transcription by AT1R, integrins, and calcium channels. We find that while these regulators maintain mostly independent control over distinct groups of transcription factors, synergy between multiple pathways is necessary to activate all the transcription factors necessary for gene transcription and hypertrophy. We also identify a PKG-dependent mechanism by which valsartan/sacubitril, a combination drug recently approved for treating heart failure, inhibits stretch-induced hypertrophy, and predict further efficacious pairs of drug targets in the network through a network-wide combinatorial search.

  20. Anesthesiologists' and surgeons' perceptions about routine pre-operative testing in low-risk patients: application of the Theoretical Domains Framework (TDF) to identify factors that influence physicians' decisions to order pre-operative tests.

    Science.gov (United States)

    Patey, Andrea M; Islam, Rafat; Francis, Jill J; Bryson, Gregory L; Grimshaw, Jeremy M

    2012-06-09

    Routine pre-operative tests for anesthesia management are often ordered by both anesthesiologists and surgeons for healthy patients undergoing low-risk surgery. The Theoretical Domains Framework (TDF) was developed to investigate determinants of behaviour and identify potential behaviour change interventions. In this study, the TDF is used to explore anaesthesiologists' and surgeons' perceptions of ordering routine tests for healthy patients undergoing low-risk surgery. Sixteen clinicians (eleven anesthesiologists and five surgeons) throughout Ontario were recruited. An interview guide based on the TDF was developed to identify beliefs about pre-operative testing practices. Content analysis of physicians' statements into the relevant theoretical domains was performed. Specific beliefs were identified by grouping similar utterances of the interview participants. Relevant domains were identified by noting the frequencies of the beliefs reported, presence of conflicting beliefs, and perceived influence on the performance of the behaviour under investigation. Seven of the twelve domains were identified as likely relevant to changing clinicians' behaviour about pre-operative test ordering for anesthesia management. Key beliefs were identified within these domains including: conflicting comments about who was responsible for the test-ordering (Social/professional role and identity); inability to cancel tests ordered by fellow physicians (Beliefs about capabilities and social influences); and the problem with tests being completed before the anesthesiologists see the patient (Beliefs about capabilities and Environmental context and resources). Often, tests were ordered by an anesthesiologist based on who may be the attending anesthesiologist on the day of surgery while surgeons ordered tests they thought anesthesiologists may need (Social influences). There were also conflicting comments about the potential consequences associated with reducing testing, from negative

  1. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    , and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character......Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case...... also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication. The objective is addressed in a literature review and a case study. The literature...

  2. Iterative key-residues interrogation of a phytase with thermostability increasing substitutions identified in directed evolution.

    Science.gov (United States)

    Shivange, Amol V; Roccatano, Danilo; Schwaneberg, Ulrich

    2016-01-01

    Bacterial phytases have attracted industrial interest as animal feed supplement due to their high activity and sufficient thermostability (required for feed pelleting). We devised an approach named KeySIDE,  an iterative Key-residues interrogation of the wild type with Substitutions Identified in Directed Evolution for improving Yersinia mollaretii phytase (Ymphytase) thermostability by combining key beneficial substitutions and elucidating their individual roles. Directed evolution yielded in a discovery of nine positions in Ymphytase and combined iteratively to identify key positions. The "best" combination (M6: T77K, Q154H, G187S, and K289Q) resulted in significantly improved thermal resistance; the residual activity improved from 35 % (wild type) to 89 % (M6) at 58 °C and 20-min incubation. Melting temperature increased by 3 °C in M6 without a loss of specific activity. Molecular dynamics simulation studies revealed reduced flexibility in the loops located next to helices (B, F, and K) which possess substitutions (Helix-B: T77K, Helix-F: G187S, and Helix-K: K289E/Q). Reduced flexibility in the loops might be caused by strengthened hydrogen bonding network (e.g., G187S and K289E/K289Q) and a salt bridge (T77K). Our results demonstrate a promising approach to design phytases in food research, and we hope that the KeySIDE might become an attractive approach for understanding of structure-function relationships of enzymes.

  3. Integrated vehicle-based safety systems light-vehicle field operational test key findings report.

    Science.gov (United States)

    2011-01-01

    "This document presents key findings from the light-vehicle field operational test conducted as part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of analyses performed by the University of Michigan Transportat...

  4. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  5. Random multiple key streams for encryption with added CBC mode of operation

    Directory of Open Access Journals (Sweden)

    P. Penchalaiah

    2016-09-01

    For the first time, in this paper, we present a construction method to generate multiple random keys from a core-key with highest possible immunity to crack. We are with a particular emphasis on novel technique to secure user data, we have designed a secure and cost effective new cryptosystem called Rbits (Random bits cypher. In different directions we identify that Rbits having highest immunity to crack and presenting various analysis tests in support from this viewpoint and the analyzed results are reported.

  6. Identifying Key Stakeholder Groups for Implementing a Place Branding Policy in Saint Petersburg

    Directory of Open Access Journals (Sweden)

    Kulibanova V. V.

    2017-10-01

    Full Text Available Regional brands have become a valuable intangible asset and a crucial competitive resource for forging partnerships. An effective place branding policy is impossible without a precise understanding of the interests of stakeholder groups. It is essential to realize that each region is unique in its own way. Territories differ in the structure of stakeholders, their influence on regional development, and the range of leverages over regional decision-makers. This study aims to give a more precise definition of key groups of stakeholders in Saint Petersburg place branding, and to identify them. The authors employ the method of theoretical and empirical typology of a territory’s stakeholders within a theoretical framework proposed by E. Freeman, P. Kotler, S. Zenker, and E. Brown. The article defines the concept of key regional stakeholders and identifies them. The proposed target audience (stakeholder group model for a place branding policy is tested on the case of Saint Petersburg. The authors show that each target audience of place marketing requires an individual policy. This is explained by the fact that each group enjoys its unique features that should be taken into account when creating and transmitting messages.

  7. AMNT 2014. Key topic: Reactor operation, safety - report. Pt. 2

    International Nuclear Information System (INIS)

    Fischer, Klaus-Christian; Willschuetz, Hans-Georg; Wortmann, Birgit

    2014-01-01

    Summary report on the following sessions of the Annual Conference on Nuclear Technology held in Frankfurt, 6 to 8 May 2014: - Thermo Dynamics and Fluid Dynamics: Experiments and Backfittings for the Improvement of Safety and Efficiency; - Safety of Nuclear Installations - Methods, Analyses, Results: In-Vessel Phenomena; Ex-Vessel Phenomena; - Standards and Regulations; Hazard and Safety Analysis; and Validation and Uncertainty Analysis. The other Sessions of the Key Topics 'Reactor Operation, Safety', 'Competence, Innovation, Regulation' and 'Fuel, Decommissioning and Disposal' have been covered in atw 10 (2014) and will be covered in further issues of atw.

  8. The Promise of Virtual Teams: Identifying Key Factors in Effectiveness and Failure

    Science.gov (United States)

    Horwitz, Frank M.; Bravington, Desmond; Silvis, Ulrik

    2006-01-01

    Purpose: The aim of the investigation is to identify enabling and disenabling factors in the development and operation of virtual teams; to evaluate the importance of factors such as team development, cross-cultural variables, leadership, communication and social cohesion as contributors to virtual team effectiveness. Design/methodology/approach:…

  9. Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Kramer, Sharon; Previsic, Mirko; Nelson, Peter; Woo, Sheri

    2010-06-17

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: 4 wave energy generation technologies 3 tidal energy generation technologies 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal

  10. Key figures for the regional- and distribution grid

    International Nuclear Information System (INIS)

    Vikingstad, S.

    1996-02-01

    In Norway, improving the efficiency of the hydroelectric grid operation is a stated goal of the Energy Act. Several studies have identified potential profits of such improvement. This publication focuses on costs and improvement potentials. Publication of key figures may stimulate grid owners, boards and administrations to improve the operating efficiency of their grids. The publication shows key figures for the regional- and distribution grid and is based on accounting data for 1994. The key figures are divided into: (1) Cost structure: The key figures express the relative contributions of each cost component to the total income of the grid, (2) Costs and physical quantities: The key figures show the cost of delivering the transport services, (3) Physical quantities: The key figures describe the working conditions of the energy utility. It appears that the cost structure of the sector varies considerably. The same is true of the cost related to the delivery of grid services. 30 figs., 6 tabs

  11. Anesthesiologists’ and surgeons’ perceptions about routine pre-operative testing in low-risk patients: application of the Theoretical Domains Framework (TDF to identify factors that influence physicians’ decisions to order pre-operative tests

    Directory of Open Access Journals (Sweden)

    Patey Andrea M

    2012-06-01

    Full Text Available Abstract Background Routine pre-operative tests for anesthesia management are often ordered by both anesthesiologists and surgeons for healthy patients undergoing low-risk surgery. The Theoretical Domains Framework (TDF was developed to investigate determinants of behaviour and identify potential behaviour change interventions. In this study, the TDF is used to explore anaesthesiologists’ and surgeons’ perceptions of ordering routine tests for healthy patients undergoing low-risk surgery. Methods Sixteen clinicians (eleven anesthesiologists and five surgeons throughout Ontario were recruited. An interview guide based on the TDF was developed to identify beliefs about pre-operative testing practices. Content analysis of physicians’ statements into the relevant theoretical domains was performed. Specific beliefs were identified by grouping similar utterances of the interview participants. Relevant domains were identified by noting the frequencies of the beliefs reported, presence of conflicting beliefs, and perceived influence on the performance of the behaviour under investigation. Results Seven of the twelve domains were identified as likely relevant to changing clinicians’ behaviour about pre-operative test ordering for anesthesia management. Key beliefs were identified within these domains including: conflicting comments about who was responsible for the test-ordering (Social/professional role and identity; inability to cancel tests ordered by fellow physicians (Beliefs about capabilities and social influences; and the problem with tests being completed before the anesthesiologists see the patient (Beliefs about capabilities and Environmental context and resources. Often, tests were ordered by an anesthesiologist based on who may be the attending anesthesiologist on the day of surgery while surgeons ordered tests they thought anesthesiologists may need (Social influences. There were also conflicting comments about the potential

  12. Identifying and weighting of key performance indicators of knowledge management2.0 in organizations

    Directory of Open Access Journals (Sweden)

    Saeed Khalilazar

    2016-03-01

    Full Text Available Main purpose of this research is identifying and weighting of key performance indicators of knowledge management2.0 in organizations. According to widespread permeation of technology, especially social media in different organizational dimensions and functional view to this phenomenon in knowledge management, performance measurement of this kind of media in order to meet organizational goals seems necessary. KM2.0 key performance indicators in this article has been identified and weighted through Delphi methodology, via questionnaire in three rounds. KM2.0 KPIs which are identified and weighted in this article are applicable in organizations that are eager to implement KM2.0 initiative and they can measure the performance of KM2.0 activities therefore this research is applicable in goal oriented approach. According to the results, KM2.0 participation process consists of 3 stages and 8 steps as mentioned below: First stage which is presence, consists of 3 steps which are registration, visit and download. Second stage which is feedback consists of 3 steps which are conversation, applause and amplification. Finally, third stage which is creation consists of 2 steps which are codification and personalization. Ultimate contribution of this research is identifying and weighting KPIs of KM2.0 in conceptual framework of KM2.0. Based on developing a conceptual framework and participation process in KM2.0 and listing related KPIs as an applicable solution in order to measure and improve the performance of organizational social media, this research has unique innovation among related and other articles.

  13. Identifying and characterizing key nodes among communities based on electrical-circuit networks.

    Science.gov (United States)

    Zhu, Fenghui; Wang, Wenxu; Di, Zengru; Fan, Ying

    2014-01-01

    Complex networks with community structures are ubiquitous in the real world. Despite many approaches developed for detecting communities, we continue to lack tools for identifying overlapping and bridging nodes that play crucial roles in the interactions and communications among communities in complex networks. Here we develop an algorithm based on the local flow conservation to effectively and efficiently identify and distinguish the two types of nodes. Our method is applicable in both undirected and directed networks without a priori knowledge of the community structure. Our method bypasses the extremely challenging problem of partitioning communities in the presence of overlapping nodes that may belong to multiple communities. Due to the fact that overlapping and bridging nodes are of paramount importance in maintaining the function of many social and biological networks, our tools open new avenues towards understanding and controlling real complex networks with communities accompanied with the key nodes.

  14. Key Technologies in the Context of Future Networks: Operational and Management Requirements

    Directory of Open Access Journals (Sweden)

    Lorena Isabel Barona López

    2016-12-01

    Full Text Available The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, three main fields must be improved: radio, network, and operation and management. In particular, operation and management capabilities are intended to enable business agility and operational sustainability, where the addition of new services does not imply an excessive increase in capital or operational expenditures. In this context, a set of key-enabled technologies have emerged in order to aid in this field. Concepts such as Software Defined Network (SDN, Network Function Virtualization (NFV and Self-Organized Networks (SON are pushing traditional systems towards the next 5G network generation.This paper presents an overview of the current status of these promising technologies and ongoing works to fulfill the operational and management requirements of mobile infrastructures. This work also details the use cases and the challenges, taking into account not only SDN, NFV, cloud computing and SON but also other paradigms.

  15. Modelling Creativity: Identifying Key Components through a Corpus-Based Approach.

    Science.gov (United States)

    Jordanous, Anna; Keller, Bill

    2016-01-01

    Creativity is a complex, multi-faceted concept encompassing a variety of related aspects, abilities, properties and behaviours. If we wish to study creativity scientifically, then a tractable and well-articulated model of creativity is required. Such a model would be of great value to researchers investigating the nature of creativity and in particular, those concerned with the evaluation of creative practice. This paper describes a unique approach to developing a suitable model of how creative behaviour emerges that is based on the words people use to describe the concept. Using techniques from the field of statistical natural language processing, we identify a collection of fourteen key components of creativity through an analysis of a corpus of academic papers on the topic. Words are identified which appear significantly often in connection with discussions of the concept. Using a measure of lexical similarity to help cluster these words, a number of distinct themes emerge, which collectively contribute to a comprehensive and multi-perspective model of creativity. The components provide an ontology of creativity: a set of building blocks which can be used to model creative practice in a variety of domains. The components have been employed in two case studies to evaluate the creativity of computational systems and have proven useful in articulating achievements of this work and directions for further research.

  16. Identifying key areas for active interprofessional learning partnerships: A facilitated dialogue.

    Science.gov (United States)

    Steven, Kathryn; Angus, Allyson; Breckenridge, Jenna; Davey, Peter; Tully, Vicki; Muir, Fiona

    2016-11-01

    Student and service user involvement is recognised as an important factor in creating interprofessional education (IPE) opportunities. We used a team-based learning approach to bring together undergraduate health professional students, early career professionals (ECPs), public partners, volunteers, and carers to explore learning partnerships. Influenced by evaluative inquiry, this qualitative study used a free text response to allow participants to give their own opinion. A total of 153 participants (50 public partners and 103 students and professionals representing 11 healthcare professions) took part. Participants were divided into mixed groups of six (n = 25) and asked to identify areas where students, professionals, and public could work together to improve health professional education. Each group documented their discussions by summarising agreed areas and next steps. Responses were collected and transcribed for inductive content analysis. Seven key themes (areas for joint working) were identified: communication, public as partners, standards of conduct, IPE, quality improvement, education, and learning environments. The team-based learning format enabled undergraduate and postgraduate health professionals to achieve consensus with public partners on areas for IPE and collaboration. Some of our results may be context-specific but the approach is generalisable to other areas.

  17. Identification of Key Indicators for Sustainable Construction Materials

    Directory of Open Access Journals (Sweden)

    Humphrey Danso

    2018-01-01

    Full Text Available Studies on sustainable construction materials are on the rise with their environmental, social, and economic benefits. This study identifies the key indicators for measuring sustainable construction materials. The design used for the study was that of a survey which relied on a questionnaire with five-point Likert scale to generate data for the analysis. For this purpose, 25 indicators from the three dimensions (environmental, social, and economic identified from the literature were presented to the respondents in a structured questionnaire, and responses were collected and analysed using SPSS. The study identified three key environmental indicators for measuring sustainable construction materials, and these indicators are human toxicity, climate change, and solid waste. Furthermore, adaptability, thermal comfort, local resources, and housing for all were identified as the four key social indicators for sustainable construction materials. In addition, maintenance cost, operational cost, initial cost, long-term savings, and life span were found to be the five key economic indicators for measuring sustainable construction materials. The study therefore suggests that these twelve indicators should be considered in future studies that seek to measure sustainable construction materials.

  18. Operational tools for moment characterization, entanglement verification and quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias

    2009-01-01

    In this thesis we address several different topics within the field of quantum information theory. These results can be classified to either enhance the applicability of certain conceptual ideas to be more suited for an actual experimental situation or to ease the analysis for further investigation of central problems. In detail, the present thesis contains the following achievements: We start our discussion with the question under which conditions a given set of expectation values is compatible with the first and second moments of the spin operators of a generic spin j state. We link this characterization of physical moments to the Bosesymmetric extension problem for a particular two qubit state that is completely determined by the given moments. Via this reformulation we can provide operational sub- and superset approximations in order to identify moments which are assured to be physical and others which are clearly incompatible with quantum mechanics. We show that this operational approximate solution becomes more accurate for increasing total spin numbers j and converges to the exact solution in the limiting case. Another part deals with the theoretical concept of entanglement witnesses. In particular, we concentrate how to improve the detection strength of a linear entanglement witness by nonlinear terms. We analyze two distinguished cases: Either we optimize the iteration method for a given target state or we try to improve the entanglement witness with respect to all entangled states equally. In the remaining parts we discuss different options in order to make already existing ideas more applicable for actual experiments, since most of the famous applications in quantum information theory have only been introduced on a very idealized level and hence are not directly valid for the real experiment. We investigate the theoretical concept of a squash model, that represents an elegant ''evaluation trick'' to directly apply for instance the security analysis of an

  19. Operational tools for moment characterization, entanglement verification and quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Moroder, Tobias

    2009-07-31

    In this thesis we address several different topics within the field of quantum information theory. These results can be classified to either enhance the applicability of certain conceptual ideas to be more suited for an actual experimental situation or to ease the analysis for further investigation of central problems. In detail, the present thesis contains the following achievements: We start our discussion with the question under which conditions a given set of expectation values is compatible with the first and second moments of the spin operators of a generic spin j state. We link this characterization of physical moments to the Bosesymmetric extension problem for a particular two qubit state that is completely determined by the given moments. Via this reformulation we can provide operational sub- and superset approximations in order to identify moments which are assured to be physical and others which are clearly incompatible with quantum mechanics. We show that this operational approximate solution becomes more accurate for increasing total spin numbers j and converges to the exact solution in the limiting case. Another part deals with the theoretical concept of entanglement witnesses. In particular, we concentrate how to improve the detection strength of a linear entanglement witness by nonlinear terms. We analyze two distinguished cases: Either we optimize the iteration method for a given target state or we try to improve the entanglement witness with respect to all entangled states equally. In the remaining parts we discuss different options in order to make already existing ideas more applicable for actual experiments, since most of the famous applications in quantum information theory have only been introduced on a very idealized level and hence are not directly valid for the real experiment. We investigate the theoretical concept of a squash model, that represents an elegant ''evaluation trick'' to directly apply for instance the

  20. Survey of operating experience from LERs to identify aging trends

    International Nuclear Information System (INIS)

    Murphy, G.A.

    1985-01-01

    The results of a study using the Oak Ridge National Laboratory's Nuclear Operations Analysis Center computer files of operating experience reports [licensee event reports (LERs), abnormal occurrences, etc.] are summarized in this study, specific time-related degradation mechanisms are identified as possible causes of a reportable occurrence. Data collected on domestic commercial nuclear power plants covering 1969 to 1982 yielded over 5800 events attributable to possible age related failures. Of these events, 2795 were attributable to instrument drift and are addressed separately in the report. The remaining events (3098) were reviewed, and data were collected for each event, which identified the specific system, component, and subpart: the information included the age-related mechanism, severity of the failure, and method of detection of the failure. About two-thirds of the failures were judged to be degraded, with one-third listed as catastrophic

  1. Towards ecosystem-based management: Identifying operational food-web indicators for marine ecosystems

    DEFF Research Database (Denmark)

    Tam, Jamie C.; Link, Jason S.; Rossberg, Axel G.

    2017-01-01

    ) are an important aspect of all marine ecosystems and biodiversity. Here we describe and discuss a process to evaluate the selection of operational food-web indicators for use in evaluating marine ecosystem status. This process brought together experts in food-web ecology, marine ecology, and resource management......, to identify available indicators that can be used to inform marine management. Standard evaluation criteria (availability and quality of data, conceptual basis, communicability, relevancy to management) were implemented to identify practical food-web indicators ready for operational use and indicators...... that hold promise for future use in policy and management. The major attributes of the final suite of operational food-web indicators were structure and functioning. Indicators that represent resilience of the marine ecosystem were less developed. Over 60 potential food-web indicators were evaluated...

  2. Application of Activity-Based Costing Management System by Key Success Paths to Promote the Competitive Advantages and Operation Performance

    OpenAIRE

    Mei-Fang Wu; Shu-Li Wang; Feng-Tsung Cheng

    2015-01-01

    Highly developed technology and highly competitive global market highlight the important role of competitive advantages and operation performances in sustainable company operation. Activity-Based Costing (ABC) provides accurate operation cost and operation performance information. Rich literatures provide relevant research with cases study on Activity-Based Costing application, but the research on cause relationship between key success factors and its specific outcome, su...

  3. Identifying the key personnel in a nurse-initiated hospital waste reduction program.

    Science.gov (United States)

    McDermott-Levy, Ruth; Fazzini, Carol

    2010-01-01

    Hospitals in the United States generate more than 6600 tons of trash a day and approximately 85% of the waste is nonhazardous solid waste such as food, cardboard, and plastic. Treatment and management of hospital waste can lead to environmental problems for the communities that receive the waste. One health system's shared governance model provided the foundation to develop a nurse-led hospital waste reduction program that focused on point-of-care waste management. Waste reduction program development required working with a variety of departments within and external to the health system. The interdisciplinary approach informed the development of the waste reduction program. This article identifies the key departments that were necessary to include when developing a hospital waste reduction program.

  4. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    Science.gov (United States)

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  5. Identifying Human Factors Issues in Aircraft Maintenance Operations

    Science.gov (United States)

    Veinott, Elizabeth S.; Kanki, Barbara G.; Shafto, Michael G. (Technical Monitor)

    1995-01-01

    Maintenance operations incidents submitted to the Aviation Safety Reporting System (ASRS) between 1986-1992 were systematically analyzed in order to identify issues relevant to human factors and crew coordination. This exploratory analysis involved 95 ASRS reports which represented a wide range of maintenance incidents. The reports were coded and analyzed according to the type of error (e.g, wrong part, procedural error, non-procedural error), contributing factors (e.g., individual, within-team, cross-team, procedure, tools), result of the error (e.g., aircraft damage or not) as well as the operational impact (e.g., aircraft flown to destination, air return, delay at gate). The main findings indicate that procedural errors were most common (48.4%) and that individual and team actions contributed to the errors in more than 50% of the cases. As for operational results, most errors were either corrected after landing at the destination (51.6%) or required the flight crew to stop enroute (29.5%). Interactions among these variables are also discussed. This analysis is a first step toward developing a taxonomy of crew coordination problems in maintenance. By understanding what variables are important and how they are interrelated, we may develop intervention strategies that are better tailored to the human factor issues involved.

  6. A Sensitivity Analysis Approach to Identify Key Environmental Performance Factors

    Directory of Open Access Journals (Sweden)

    Xi Yu

    2014-01-01

    Full Text Available Life cycle assessment (LCA is widely used in design phase to reduce the product’s environmental impacts through the whole product life cycle (PLC during the last two decades. The traditional LCA is restricted to assessing the environmental impacts of a product and the results cannot reflect the effects of changes within the life cycle. In order to improve the quality of ecodesign, it is a growing need to develop an approach which can reflect the changes between the design parameters and product’s environmental impacts. A sensitivity analysis approach based on LCA and ecodesign is proposed in this paper. The key environmental performance factors which have significant influence on the products’ environmental impacts can be identified by analyzing the relationship between environmental impacts and the design parameters. Users without much environmental knowledge can use this approach to determine which design parameter should be first considered when (redesigning a product. A printed circuit board (PCB case study is conducted; eight design parameters are chosen to be analyzed by our approach. The result shows that the carbon dioxide emission during the PCB manufacture is highly sensitive to the area of PCB panel.

  7. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  8. Modified Principal Component Analysis for Identifying Key Environmental Indicators and Application to a Large-Scale Tidal Flat Reclamation

    Directory of Open Access Journals (Sweden)

    Kejian Chu

    2018-01-01

    Full Text Available Identification of the key environmental indicators (KEIs from a large number of environmental variables is important for environmental management in tidal flat reclamation areas. In this study, a modified principal component analysis approach (MPCA has been developed for determining the KEIs. The MPCA accounts for the two important attributes of the environmental variables: pollution status and temporal variation, in addition to the commonly considered numerical divergence attribute. It also incorporates the distance correlation (dCor to replace the Pearson’s correlation to measure the nonlinear interrelationship between the variables. The proposed method was applied to the Tiaozini sand shoal, a large-scale tidal flat reclamation region in China. Five KEIs were identified as dissolved inorganic nitrogen, Cd, petroleum in the water column, Hg, and total organic carbon in the sediment. The identified KEIs were shown to respond well to the biodiversity of phytoplankton. This demonstrated that the identified KEIs adequately represent the environmental condition in the coastal marine system. Therefore, the MPCA is a practicable method for extracting effective indicators that have key roles in the coastal and marine environment.

  9. Computational modeling identifies key gene regulatory interactions underlying phenobarbital-mediated tumor promotion

    Science.gov (United States)

    Luisier, Raphaëlle; Unterberger, Elif B.; Goodman, Jay I.; Schwarz, Michael; Moggs, Jonathan; Terranova, Rémi; van Nimwegen, Erik

    2014-01-01

    Gene regulatory interactions underlying the early stages of non-genotoxic carcinogenesis are poorly understood. Here, we have identified key candidate regulators of phenobarbital (PB)-mediated mouse liver tumorigenesis, a well-characterized model of non-genotoxic carcinogenesis, by applying a new computational modeling approach to a comprehensive collection of in vivo gene expression studies. We have combined our previously developed motif activity response analysis (MARA), which models gene expression patterns in terms of computationally predicted transcription factor binding sites with singular value decomposition (SVD) of the inferred motif activities, to disentangle the roles that different transcriptional regulators play in specific biological pathways of tumor promotion. Furthermore, transgenic mouse models enabled us to identify which of these regulatory activities was downstream of constitutive androstane receptor and β-catenin signaling, both crucial components of PB-mediated liver tumorigenesis. We propose novel roles for E2F and ZFP161 in PB-mediated hepatocyte proliferation and suggest that PB-mediated suppression of ESR1 activity contributes to the development of a tumor-prone environment. Our study shows that combining MARA with SVD allows for automated identification of independent transcription regulatory programs within a complex in vivo tissue environment and provides novel mechanistic insights into PB-mediated hepatocarcinogenesis. PMID:24464994

  10. Protocol for a thematic synthesis to identify key themes and messages from a palliative care research network.

    LENUS (Irish Health Repository)

    Nicholson, Emma

    2016-10-21

    Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users.

  11. Active Learning with Rationales for Identifying Operationally Significant Anomalies in Aviation

    Science.gov (United States)

    Sharma, Manali; Das, Kamalika; Bilgic, Mustafa; Matthews, Bryan; Nielsen, David Lynn; Oza, Nikunj C.

    2016-01-01

    A major focus of the commercial aviation community is discovery of unknown safety events in flight operations data. Data-driven unsupervised anomaly detection methods are better at capturing unknown safety events compared to rule-based methods which only look for known violations. However, not all statistical anomalies that are discovered by these unsupervised anomaly detection methods are operationally significant (e.g., represent a safety concern). Subject Matter Experts (SMEs) have to spend significant time reviewing these statistical anomalies individually to identify a few operationally significant ones. In this paper we propose an active learning algorithm that incorporates SME feedback in the form of rationales to build a classifier that can distinguish between uninteresting and operationally significant anomalies. Experimental evaluation on real aviation data shows that our approach improves detection of operationally significant events by as much as 75% compared to the state-of-the-art. The learnt classifier also generalizes well to additional validation data sets.

  12. 46th Annual meeting on nuclear technology (AMNT 2015). Key topic / Enhanced safety and operation excellence / Sustainable reactor operation management - safe, efficient, valuable

    International Nuclear Information System (INIS)

    Fischer, Erwin

    2015-01-01

    Summary report on the following Topical Session of the 46 th Annual Conference on Nuclear Technology (AMNT 2015) held in Berlin, 5 to 7 May 2015: - Sustainable Reactor Operation Management - Safe, Efficient, Valuable (Erwin Fischer) The other Sessions of the Key Topics - ''Outstanding Know-How and Sustainable Innovations'', - ''Enhanced Safety and Operation Excellence'' and - ''Decommissioning Experience and Waste Management Solutions'' have been covered in atw 7 (2015) and will be covered in further issues of atw.

  13. A genetic screen identifies BRCA2 and PALB2 as key regulators of G2 checkpoint maintenance

    DEFF Research Database (Denmark)

    Menzel, Tobias; Nähse-Kumpf, Viola; Kousholt, Arne Nedergaard

    2011-01-01

    To identify key connections between DNA-damage repair and checkpoint pathways, we performed RNA interference screens for regulators of the ionizing radiation-induced G2 checkpoint, and we identified the breast cancer gene BRCA2. The checkpoint was also abrogated following depletion of PALB2......, an interaction partner of BRCA2. BRCA2 and PALB2 depletion led to premature checkpoint abrogation and earlier activation of the AURORA A-PLK1 checkpoint-recovery pathway. These results indicate that the breast cancer tumour suppressors and homologous recombination repair proteins BRCA2 and PALB2 are main...

  14. Postsecondary Students With Psychiatric Disabilities Identify Core Services and Key Ingredients to Supporting Education Goals.

    Science.gov (United States)

    Biebel, Kathleen; Mizrahi, Raphael; Ringeisen, Heather

    2017-10-26

    Accessing and successfully completing postsecondary educational opportunities may be challenging for those living with psychiatric disabilities. This exploratory study highlights the experiences of individuals with psychiatric disabilities participating in postsecondary educational support initiatives. Investigators conducted case studies with 3 education support initiatives across the United States. Focus groups revealed what concrete supported education services were helpful and key ingredients in delivering education supports. Access to specialists, mindfulness techniques, help with time management and procrastination, and facilitating classroom accommodations were identified as critical. Developing authentic relationships with supported education staff, flexibility in service delivery and access to student peers living with psychiatric disabilities were noted as key ingredients in service delivery. Incorporating the voice of students with psychiatric disabilities into supported education services can increase access, involvement, and retention, therein providing more supports to students with psychiatric disabilities achieving their postsecondary education goals. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  15. Setting Organizational Key Performance Indicators in the Precision Machine Industry

    Directory of Open Access Journals (Sweden)

    Mei-Hsiu Hong

    2015-11-01

    Full Text Available The aim of this research is to define (or set organizational key performance indicators (KPIs in the precision machine industry using the concept of core competence and the supply chain operations reference (SCOR model. The research is conducted in three steps. In the first step, a benchmarking study is conducted to collect major items of core competence and to group them into main categories in order to form a foundation for the research. In the second step, a case company questionnaire and interviews are conducted to identify the key factors of core competence in the precision machine industry. The analysis is conducted based on four dimensions and hence several analysis rounds are completed. Questionnaire data is analyzed with grey relational analysis (GRA and resulted in 5–6 key factors in each dimension or sub-dimension. Based on the conducted interviews, 13 of these identified key factors are separated into one organization objective, five key factors of core competence and seven key factors of core ability. In the final step, organizational KPIs are defined (or set for the five identified key factors of core competence. The most competitive core abilities for each of the five key factors are established. After that, organizational KPIs are set based on the core abilities within 3 main categories of KPIs (departmental, office grade and hierarchal for each key factor. The developed KPI system based on organizational objectives, core competences, and core abilities allow enterprises to handle dynamic market demand and business environments, as well as changes in overall corporate objectives.

  16. Identifying the key concerns of Irish persons with intellectual disability.

    Science.gov (United States)

    García Iriarte, Edurne; O'Brien, Patricia; McConkey, Roy; Wolfe, Marie; O'Doherty, Siobhain

    2014-11-01

    Internationally, people with intellectual disability are socially marginalized, and their rights under the United Nations Convention for the Rights of Persons with Disabilities (CRPD) are often ignored. This paper aims to define the key concerns of adults with an intellectual disability in relation to their participation in society using an inclusive research strategy for both data gathering and data analysis. A national study involving 23 focus groups and 168 persons was conducted on the island of Ireland with people with intellectual disability as co-facilitators. A thematic content analysis was undertaken of the verbatim transcripts initially by university co-researchers, and 19 themes were identified. Co-researchers with intellectual disability joined in identifying the eight core themes. These were as follows: living options, employment, relationships, citizenship, leisure time, money management, self-advocacy, and communication. The concerns are discussed within the framework of the CRPD, and implications for transforming service policy are drawn. Why we did the research In many countries, people with intellectual disability have difficulties doing things other people without disabilities do, for example to study, to get a job or to live independently. They also find that their rights are not respected under the Convention on the Rights of Persons with Disabilities (the Convention). We did this study to Learn what are the main issues for adults with intellectual disability in Ireland. Do research with people with intellectual disability. How we did the research People with intellectual disability and their supporters worked with university researchers to plan and do the research. We met with people in groups and 168 people told us about things important to them. What we found out We found that there were very important things that people talked about in the groups. We chose the most important: living options, employment, relationships, rights, leisure, money

  17. 46{sup th} Annual meeting on nuclear technology (AMNT 2015). Key topic / Enhanced safety and operation excellence / Sustainable reactor operation management - safe, efficient, valuable

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, Erwin [E.ON Kernkraft GmbH, Global Unit Next Generation, Hannover (Germany)

    2015-08-15

    Summary report on the following Topical Session of the 46{sup th} Annual Conference on Nuclear Technology (AMNT 2015) held in Berlin, 5 to 7 May 2015: - Sustainable Reactor Operation Management - Safe, Efficient, Valuable (Erwin Fischer) The other Sessions of the Key Topics - ''Outstanding Know-How and Sustainable Innovations'', - ''Enhanced Safety and Operation Excellence'' and - ''Decommissioning Experience and Waste Management Solutions'' have been covered in atw 7 (2015) and will be covered in further issues of atw.

  18. 47{sup th} Annual meeting on nuclear technology (AMNT 2016). Key topic / Enhanced safety and operation excellence

    Energy Technology Data Exchange (ETDEWEB)

    Traichel, Anke [NUKEM Technologies Engineering Services GmbH, Alzenau (Germany). Dept. of Safety Engineering and Assessment / Proposals Engineering

    2017-04-15

    Summary report on the Key Topic ''Enhanced Safety and Operation Excellence'' Technical Session ''Safety, IT, Hazards and PSA'' of the 47th Annual Meeting on Nuclear Technology (AMNT 2016) held in Hamburg, 10 to 12 May 2016.

  19. Conduct of operations: establishing operational focus and setting operational standards

    International Nuclear Information System (INIS)

    Lane, L.; McGuigan, K.

    1998-01-01

    Due to the nature of our business, we have often tended to focus on the technological aspects of the nuclear industry. The focus of this paper is directed towards the importance of addressing the people skills, attitudes, and 'culture' within, and surrounding, our facilities as key areas of improvement. Within Ontario Hydro Nuclear (OLIN) we have developed the terminology 'event free' operation and 'event free' culture. 'Event Free' recognizes errors as a part of human performance. 'Event Free' takes into account human weaknesses, and provides tools (such as standards) to manage, control, and mitigate errors. In essence, 'Event Free' encompasses two concepts: 1. Prevent errors from occurring; 2. If an error is made, catch it before it can affect safe operation of the facility, learn from the error, and ensure that it does not happen again. In addressing these business realities, Ontario Hydro has identified a number of key support mechanisms and corresponding performance standards that are essential for achieving operating excellence and an 'event free' business culture. This paper will discuss two operational aspects of an 'event free' culture, the first being a set of expectations to enhance the culture, and the second an example of cultural change: 1. Operating Standards - establishing clear expectations for human performance in operating staff; 2. Operational Focus - the understanding that, as a nuclear worker, you should consider every task, activity, in fact everything you do in this business, for the potential to affect safe and reliable operation of a nuclear facility. Note that although the term 'Operational' appears in the title, this concept applies to every individual in the nuclear business, from the cleaner, to the Board of Directors, to the external supplier. (author)

  20. Best practices in identifying, reporting and screening operating experience at nuclear power plants

    International Nuclear Information System (INIS)

    2008-03-01

    IAEA Safety Standards Series No. SF-1 entitled Fundamental Safety Principles: Safety Fundamentals states the need for operating organizations to establish a programme for the collection and analysis of operating experience in nuclear power plants. Such a programme ensures that operating experience is analysed, events important to safety are reviewed in depth, lessons learned are disseminated to the staff of the organization and to relevant national and international organizations, and corrective actions are effectively implemented. This publication has been developed to provide advice and assistance to nuclear installations, and related institutions including contractors and support organizations to strengthen and enhance their own feedback process through the implementation of best practices in identifying, reporting and screening processes and to assess the effectiveness of the above areas. To support a proactive safety management approach the nuclear installations are enhancing the operating experience feedback (OEF) processes. For this purpose, the nuclear industry is striving to collect more information on occurrences that are useful to address the early signs of declining performance and improve operational safety performance. In this environment a strong reporting culture that motivates people to identify and report issues is an important attribute. As a consequence, the number and diversity of issues identified increases, and there is a need to set thresholds of screening for further treatment. Thus, the establishment of an effective identification, reporting and screening process is very beneficial to streamline the efforts, and ensure that major incidents and latent weaknesses are being addressed and that operating experience is treated according to its significance. This leads to improved safety and production. This publication was written to complement the publication IAEA Services Series No. 10 - PROSPER Guidelines - Guidelines for Peer Review and for

  1. 48{sup th} Annual meeting on nuclear technology (AMNT 2017). Key topic / Enhanced safety and operation excellence. Technical session: Operation and safety of nuclear installations, fuel

    Energy Technology Data Exchange (ETDEWEB)

    Hollands, Thorsten [Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) gGmbH, Garching (Germany). Bereich Reaktorsicherheitsforschung

    2017-12-15

    The sessions Fuel and Materials and Containment and SFP, as part of the Technical Sessions Operation and Safety of Nuclear Installations, Fuel implemented in the Key Topic Enhanced Safety and Operation Excellence were chaired by Dr. Thorsten Hollands (Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) gGmbH) and Dr. Erwin Fischer (PreussenElektra GmbH) who was the keynote coordinator for the Technical Sessions. Both sessions consist of a keynote lecture followed by technical presentations.

  2. Exploring the effects of spatial autocorrelation when identifying key drivers of wildlife crop-raiding.

    Science.gov (United States)

    Songhurst, Anna; Coulson, Tim

    2014-03-01

    Few universal trends in spatial patterns of wildlife crop-raiding have been found. Variations in wildlife ecology and movements, and human spatial use have been identified as causes of this apparent unpredictability. However, varying spatial patterns of spatial autocorrelation (SA) in human-wildlife conflict (HWC) data could also contribute. We explicitly explore the effects of SA on wildlife crop-raiding data in order to facilitate the design of future HWC studies. We conducted a comparative survey of raided and nonraided fields to determine key drivers of crop-raiding. Data were subsampled at different spatial scales to select independent raiding data points. The model derived from all data was fitted to subsample data sets. Model parameters from these models were compared to determine the effect of SA. Most methods used to account for SA in data attempt to correct for the change in P-values; yet, by subsampling data at broader spatial scales, we identified changes in regression estimates. We consequently advocate reporting both model parameters across a range of spatial scales to help biological interpretation. Patterns of SA vary spatially in our crop-raiding data. Spatial distribution of fields should therefore be considered when choosing the spatial scale for analyses of HWC studies. Robust key drivers of elephant crop-raiding included raiding history of a field and distance of field to a main elephant pathway. Understanding spatial patterns and determining reliable socio-ecological drivers of wildlife crop-raiding is paramount for designing mitigation and land-use planning strategies to reduce HWC. Spatial patterns of HWC are complex, determined by multiple factors acting at more than one scale; therefore, studies need to be designed with an understanding of the effects of SA. Our methods are accessible to a variety of practitioners to assess the effects of SA, thereby improving the reliability of conservation management actions.

  3. Buyer-focused operations as a supply chain strategy : Identifying the influence of business characteristics

    NARCIS (Netherlands)

    van der Vaart, T; van Donk, DP

    2006-01-01

    Purpose - Buyer-focused operations aim at a high level of supply chain alignment by singling out resources for one buyer in order to serve this buyer optimally. The purpose of this paper is to identify what business characteristics make suppliers choose buyer-focused operations as a supply chain

  4. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    Science.gov (United States)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  5. Water chemistry - one of the key technologies for safe and reliable nuclear power plant operation

    International Nuclear Information System (INIS)

    Uchida, S.; Otoha, K.; Ishigure, K.

    2006-01-01

    Full text: Full text: Water chemistry control is one of the key technologies to establish safe and reliable operation of nuclear power plants. Continuous and collaborative efforts of plant manufacturers and plant operator utilities have been focused on optimal water chemistry control, for which, a trio of requirements for water chemistry, a) better reliability of reactor structures and fuels, b) lower occupational exposure, and c) fewer radwaste sources, should be simultaneously satisfied. The research committee related to water chemistry of the Atomic Energy Society of Japan has played important roles to enhance improvement in water chemistry control, to share knowledge and experience with water chemistry among plant operators and manufacturers, to establish common technological bases for plant water chemistry and then to transfer them to the next generation related to water chemistry. Furthermore, the committee has tried to contribute to arranging R and D proposals for further improvement in water chemistry control through road map planning

  6. Identification and Characterization of Key Human Performance Issues and Research in the Next Generation Air Transportation System (NextGen)

    Science.gov (United States)

    Lee, Paul U.; Sheridan, Tom; Poage, james L.; Martin, Lynne Hazel; Jobe, Kimberly K.

    2010-01-01

    This report identifies key human-performance-related issues associated with Next Generation Air Transportation System (NextGen) research in the NASA NextGen-Airspace Project. Four Research Focus Areas (RFAs) in the NextGen-Airspace Project - namely Separation Assurance (SA), Airspace Super Density Operations (ASDO), Traffic Flow Management (TFM), and Dynamic Airspace Configuration (DAC) - were examined closely. In the course of the research, it was determined that the identified human performance issues needed to be analyzed in the context of NextGen operations rather than through basic human factors research. The main gaps in human factors research in NextGen were found in the need for accurate identification of key human-systems related issues within the context of specific NextGen concepts and better design of the operational requirements for those concepts. By focusing on human-system related issues for individual concepts, key human performance issues for the four RFAs were identified and described in this report. In addition, mixed equipage airspace with components of two RFAs were characterized to illustrate potential human performance issues that arise from the integration of multiple concepts.

  7. Transient simulation of coolant peak temperature due to prolonged fan and/or water pump operation after the vehicle is keyed-off

    Science.gov (United States)

    Pang, Suh Chyn; Masjuki, Haji Hassan; Kalam, Md. Abul; Hazrat, Md. Ali

    2014-01-01

    Automotive designers should design a robust engine cooling system which works well in both normal and severe driving conditions. When vehicles are keyed-off suddenly after some distance of hill-climbing driving, the coolant temperature tends to increase drastically. This is because heat soak in the engine could not be transferred away in a timely manner, as both the water pump and cooling fan stop working after the vehicle is keyed-off. In this research, we aimed to visualize the coolant temperature trend over time before and after the vehicles were keyed-off. In order to prevent coolant temperature from exceeding its boiling point and jeopardizing engine life, a numerical model was further tested with prolonged fan and/or water pump operation after keying-off. One dimensional thermal-fluid simulation was exploited to model the vehicle's cooling system. The behaviour of engine heat, air flow, and coolant flow over time were varied to observe the corresponding transient coolant temperatures. The robustness of this model was proven by validation with industry field test data. The numerical results provided sensible insights into the proposed solution. In short, prolonging fan operation for 500 s and prolonging both fan and water pump operation for 300 s could reduce coolant peak temperature efficiently. The physical implementation plan and benefits yielded from implementation of the electrical fan and electrical water pump are discussed.

  8. The Use of Key Informant Method for Identifying Children with Blindness and Severe Visual Impairment in Developing Countries.

    Science.gov (United States)

    du Toit, Rènée; Courtright, Paul; Lewallen, Susan

    2017-06-01

    An estimated 19 million children are visually impaired; of these, 1.4 million are irreversibly blind. A key challenge is to identify them early in life to benefit maximally from visual rehabilitation, and/or treatment. This aggregative review and structured literature analysis summarizes evidence of what it is about the key informant (KI) approach that works to identify children with blindness or severe visual impairment (B/SVI) in the community (for whom, to what extent, in what circumstances, in what respect, how and why). Peer-reviewed (PubMed, hand search) and grey literature (Google, World Health Organization website, academic theses, direct requests) were included, and methods and criteria used for identification, productivity (number of children referred per KI), accuracy of referrals (positive predictive value, PPV), age of children with B/SVI, KI definition, sex, information about cost and comparisons aggregated. We included 31 documents describing 22 unique KI programs. Mostly KIs identified children with B/SVI in 1-3 weeks, i.e. "campaign mode." In 60%, KIs were community volunteers, others formal health sector workers (FHSW). Around 0.02-1.56 children per KI (median = 0.25) were successfully recruited. PPV ranged from 12 to 66%. In two studies comparing FHSWs and community KIs, the latter were 8 and 10 times more productive. KIs working in campaign mode may provide an effective approach to identifying children with B/SVI in communities. Including identification of ocular problems and/or other impairments has been recommended. Research on factors that influence effectiveness and on whether KIs continue to contribute could inform programs.

  9. 47{sup th} Annual meeting on nuclear technology (AMNT 2016). Key Topics / Enhanced safety and operation excellence

    Energy Technology Data Exchange (ETDEWEB)

    Bohnstedt, Angelika [Karlsruher Institut fuer Technologie (KIT), Eggenstein-Leopoldshafen (Germany). Programm Nukleare Entsorgung, Sicherheit und Strahlenforschung (NUSAFE); Baumann, Erik [AREVA GmbH, Erlangen (Germany). Radiation Protection

    2016-12-15

    Summary report on the Key Topic 'Enhanced Safety and Operation Excellence' Focus Session 'Radiation Protection' of the 47{sup th} Annual Meeting on Nuclear Technology (AMNT 2016) held in Hamburg, 10 to 12 May 2016. Other Sessions of AMNT 2016 have been and will be covered in further issues of atw.

  10. A State Cyber Hub Operations Framework

    Science.gov (United States)

    2016-06-01

    current and future decision support. Finally, the Hub operations team must track and report key performance indictors ( KPIs ) (established by the state...Region); then mutually agreed-upon core KPIs should be identified and reported at this time. The goal of the Act Element is to implement the decision...Force Headquarters Page 58 JIE Joint Information Environment JMC JIE Management Construct KPI Key Performance Indicator LEA Law Enforcement

  11. Identifying Determinants of Organizational Development as the Key Developers of Employee Soft Skill

    Directory of Open Access Journals (Sweden)

    Shahjahan Laghari

    2016-10-01

    Full Text Available The purpose of this article is to identify the determinants of organizational development as the key developers of employee soft skills. Various studies have been taken where determinants of organizational development defining soft skills in employees are discussed. However, the current study is different in Pakistani industry context as the link was missing about the determinants of organizational development which in synchronized way help in developing soft skills in employees of firm. This research uses explanatory approach; incorporating secondary data extracted under the light of existing school of thoughts paired with quantification through data collected from respondents in Pakistani corporate sector. Hypotheses are tested using structural equation model (SEM technique. Results This research showed an affirmative link between determinants of organizational development and development of soft skills in employees. Finally, the study proposes enriching insights on few missing links that can be researched and triggered achieving maximized outcomes.

  12. A mouse model of alcoholic liver fibrosis-associated acute kidney injury identifies key molecular pathways

    International Nuclear Information System (INIS)

    Furuya, Shinji; Chappell, Grace A.; Iwata, Yasuhiro; Uehara, Takeki; Kato, Yuki; Kono, Hiroshi; Bataller, Ramon; Rusyn, Ivan

    2016-01-01

    Clinical data strongly indicate that acute kidney injury (AKI) is a critical complication in alcoholic hepatitis, an acute-on-chronic form of liver failure in patients with advanced alcoholic fibrosis. Development of targeted therapies for AKI in this setting is hampered by the lack of an animal model. To enable research into molecular drivers and novel therapies for fibrosis- and alcohol-associated AKI, we aimed to combine carbon tetrachloride (CCl 4 )-induced fibrosis with chronic intra-gastric alcohol feeding. Male C57BL/6J mice were administered a low dose of CCl 4 (0.2 ml/kg 2 × week/6 weeks) followed by alcohol intragastrically (up to 25 g/kg/day for 3 weeks) and with continued CCl 4 . We observed that combined treatment with CCl 4 and alcohol resulted in severe liver injury, more pronounced than using each treatment alone. Importantly, severe kidney injury was evident only in the combined treatment group. This mouse model reproduced distinct pathological features consistent with AKI in human alcoholic hepatitis. Transcriptomic analysis of kidneys revealed profound effects in the combined treatment group, with enrichment for damage-associated pathways, such as apoptosis, inflammation, immune-response and hypoxia. Interestingly, Havcr1 and Lcn2, biomarkers of AKI, were markedly up-regulated. Overall, this study established a novel mouse model of fibrosis- and alcohol-associated AKI and identified key mechanistic pathways. - Highlights: • Acute kidney injury (AKI) is a critical complication in alcoholic hepatitis • We developed a novel mouse model of fibrosis- and alcohol-associated AKI • This model reproduces key molecular and pathological features of human AKI • This animal model can help identify new targeted therapies for alcoholic hepatitis

  13. Identifying key drivers of greenhouse gas emissions from biomass feedstocks for energy production

    International Nuclear Information System (INIS)

    Johnson, David R.; Curtright, Aimee E.; Willis, Henry H.

    2013-01-01

    Highlights: • Production emissions dominate transportation and processing emissions. • Choice of feedstock, geographic location and prior land use drive emissions profile. • Within scenarios, emissions variability is driven by uncertainty in yields. • Favorable scenarios maximize carbon storage from direct land-use change. • Similarly, biomass production should attempt to minimize indirect land-use change. -- Abstract: Many policies in the United States, at both the federal and state levels, encourage the adoption of renewable energy from biomass. Though largely motivated by a desire to reduce greenhouse gas emissions, these policies do not explicitly identify scenarios in which the use of biomass will produce the greatest benefits. We have modeled “farm-to-hopper” emissions associated with seven biomass feedstocks, under a wide variety of scenarios and production choices, to characterize the uncertainty in emissions. We demonstrate that only a handful of factors have a significant impact on life cycle emissions: choice of feedstock, geographic location, prior land use, and time dynamics. Within a given production scenario, the remaining variability in emissions is driven by uncertainty in feedstock yields and the release rate of N 2 O into the atmosphere from nitrogen fertilizers. With few exceptions, transport and processing choices have relatively little impact on total emissions. These results illustrate the key decisions that will determine the success of biomass programs in reducing the emissions profile of energy production, and our publicly available model provides a useful tool for identifying the most beneficial production scenarios. While model data and results are restricted to biomass production in the contiguous United States, we provide qualitative guidance for identifying favorable production scenarios that should be applicable in other regions

  14. IDENTIFYING OPERATIONAL REQUIREMENTS TO SELECT SUITABLE DECISION MODELS FOR A PUBLIC SECTOR EPROCUREMENT DECISION SUPPORT SYSTEM

    Directory of Open Access Journals (Sweden)

    Mohamed Adil

    2014-10-01

    Full Text Available Public sector procurement should be a transparent and fair process. Strict legal requirements are enforced on public sector procurement to make it a standardised process. To make fair decisions on selecting suppliers, a practical method which adheres to legal requirements is important. The research that is the base for this paper aimed at identifying a suitable Multi-Criteria Decision Analysis (MCDA method for the specific legal and functional needs of the Maldivian Public Sector. To identify such operational requirements, a set of focus group interviews were conducted in the Maldives with public officials responsible for procurement decision making. Based on the operational requirements identified through focus groups, criteria-based evaluation is done on published MCDA methods to identify the suitable methods for e-procurement decision making. This paper describes the identification of the operational requirements and the results of the evaluation to select suitable decision models for the Maldivian context.

  15. Operating System Concepts for Reconfigurable Computing: Review and Survey

    Directory of Open Access Journals (Sweden)

    Marcel Eckert

    2016-01-01

    Full Text Available One of the key future challenges for reconfigurable computing is to enable higher design productivity and a more easy way to use reconfigurable computing systems for users that are unfamiliar with the underlying concepts. One way of doing this is to provide standardization and abstraction, usually supported and enforced by an operating system. This article gives historical review and a summary on ideas and key concepts to include reconfigurable computing aspects in operating systems. The article also presents an overview on published and available operating systems targeting the area of reconfigurable computing. The purpose of this article is to identify and summarize common patterns among those systems that can be seen as de facto standard. Furthermore, open problems, not covered by these already available systems, are identified.

  16. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana

    OpenAIRE

    Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original mult...

  17. A mouse model of alcoholic liver fibrosis-associated acute kidney injury identifies key molecular pathways

    Energy Technology Data Exchange (ETDEWEB)

    Furuya, Shinji; Chappell, Grace A.; Iwata, Yasuhiro [Department of Veterinary Integrative Biosciences, Texas A& M University, College Station, TX (United States); Uehara, Takeki; Kato, Yuki [Laboratory of Veterinary Pathology, Osaka Prefecture University, Osaka (Japan); Kono, Hiroshi [First Department of Surgery, University of Yamanashi, Yamanashi (Japan); Bataller, Ramon [Division of Gastroenterology & Hepatology, Department of Medicine, University of North Carolina, Chapel Hill, NC (United States); Rusyn, Ivan, E-mail: irusyn@tamu.edu [Department of Veterinary Integrative Biosciences, Texas A& M University, College Station, TX (United States)

    2016-11-01

    Clinical data strongly indicate that acute kidney injury (AKI) is a critical complication in alcoholic hepatitis, an acute-on-chronic form of liver failure in patients with advanced alcoholic fibrosis. Development of targeted therapies for AKI in this setting is hampered by the lack of an animal model. To enable research into molecular drivers and novel therapies for fibrosis- and alcohol-associated AKI, we aimed to combine carbon tetrachloride (CCl{sub 4})-induced fibrosis with chronic intra-gastric alcohol feeding. Male C57BL/6J mice were administered a low dose of CCl{sub 4} (0.2 ml/kg 2 × week/6 weeks) followed by alcohol intragastrically (up to 25 g/kg/day for 3 weeks) and with continued CCl{sub 4}. We observed that combined treatment with CCl{sub 4} and alcohol resulted in severe liver injury, more pronounced than using each treatment alone. Importantly, severe kidney injury was evident only in the combined treatment group. This mouse model reproduced distinct pathological features consistent with AKI in human alcoholic hepatitis. Transcriptomic analysis of kidneys revealed profound effects in the combined treatment group, with enrichment for damage-associated pathways, such as apoptosis, inflammation, immune-response and hypoxia. Interestingly, Havcr1 and Lcn2, biomarkers of AKI, were markedly up-regulated. Overall, this study established a novel mouse model of fibrosis- and alcohol-associated AKI and identified key mechanistic pathways. - Highlights: • Acute kidney injury (AKI) is a critical complication in alcoholic hepatitis • We developed a novel mouse model of fibrosis- and alcohol-associated AKI • This model reproduces key molecular and pathological features of human AKI • This animal model can help identify new targeted therapies for alcoholic hepatitis.

  18. Does the operations of the National Health Insurance Scheme (NHIS) in Ghana align with the goals of Primary Health Care? Perspectives of key stakeholders in northern Ghana.

    Science.gov (United States)

    Awoonor-Williams, John Koku; Tindana, Paulina; Dalinjong, Philip Ayizem; Nartey, Harry; Akazili, James

    2016-09-05

    In 2005, the World Health Assembly (WHA) of the World Health Organization (WHO) urged member states to aim at achieving affordable universal coverage and access to key promotive, preventive, curative, rehabilitative and palliative health interventions for all their citizens on the basis of equity and solidarity. Since then, some African countries, including Ghana, have taken steps to introduce national health insurance reforms as one of the key strategies towards achieving universal health coverage (UHC). The aim of this study was to get a better understanding of how Ghana's health insurance institutions interact with stakeholders and other health sector programmes in promoting primary health care (PHC). Specifically, the study identified the key areas of misalignment between the operations of the NHIS and that of PHC. Using qualitative and survey methods, this study involved interviews with various stakeholders in six selected districts in the Upper East region of Ghana. The key stakeholders included the National Health Insurance Authority (NHIA), district coordinators of the National Health Insurance Schemes (NHIS), the Ghana Health Service (GHS) and District Health Management Teams (DHMTs) who supervise the district hospitals, health centers/clinics and the Community-based Health and Planning Services (CHPS) compounds as well as other public and private PHC providers. A stakeholders' workshop was organized to validate the preliminary results which provided a platform for stakeholders to deliberate on the key areas of misalignment especially, and to elicit additional information, ideas and responses, comments and recommendations from respondents for the achievement of the goals of UHC and PHC. The key areas of misalignments identified during this pilot study included: delays in reimbursements of claims for services provided by health care providers, which serves as a disincentive for service providers to support the NHIS; inadequate coordination among

  19. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  20. Identifying Key Stakeholders in Blended Tertiary Environments: Experts' Perspectives

    Science.gov (United States)

    Tuapawa, Kimberley

    2017-01-01

    Although key stakeholders in blended tertiary environments (BTEs) fulfil an extraordinary role in higher education, significant gaps in knowledge about their identities may be impeding the provision of stakeholder support, limiting their ability to promote effective learning and teaching. As online growth intensifies, it is critical that tertiary…

  1. Educating America's Workforce: Summary of Key Operating Statistics. Data collected from the 2007 and 2008 Annual Institutional Reports

    Science.gov (United States)

    Accrediting Council for Independent Colleges and Schools, 2009

    2009-01-01

    This special edition of the Key Operating Statistics (KOS) contains information based on the 2007 and 2008 Annual Institutional Reports (AIR) submitted by ACICS-accredited institutions. The AIR is submitted on September 15 each year by ACICS-accredited institutions. It reflects activity during a reporting year that begins on July 1 and concludes…

  2. A Simple Key for Identifying the Sibling Species of the Malaria Vector Anopheles gambiae (Giles Complex by Polytene Chromosome Cytogenetics

    Directory of Open Access Journals (Sweden)

    Music Temitope OBEMBE

    2018-03-01

    Full Text Available It has been established that Anopheles gambiae complex sibling species are the major Plasmodium malaria vectors in Africa; however, not all the sibling species transmit the infection. Easier molecular methods, PCR-based assays, have been developed to distinguish the several members of the A. gambiae complex. However, malaria vector research in less developed countries, particularly sub-Saharan Africa, is being hampered by the lack of PCR facilities in laboratories and the cost of carrying out the assay within lack of funding. Hence, the present study was designed to develop a simple identification key, based on an affordable method of polytene chromosome cytotaxonomy, for identifying the major P. falciparum vectors. The Identification Key was successfully used to identify two members of the A. gambiae complex, A. gambiae sensu stricto and A. arabiensis, which are the most potent malaria vectors in Africa; even so, it could not be used to establish the infective and the refractory strains.

  3. 49 CFR 192.905 - How does an operator identify a high consequence area?

    Science.gov (United States)

    2010-10-01

    ...) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192.905 How does an operator identify a high consequence area? (a...

  4. 41 CFR 102-85.175 - Are the standard level services for cleaning, mechanical operation, and maintenance identified in...

    Science.gov (United States)

    2010-07-01

    ... services for cleaning, mechanical operation, and maintenance identified in an OA? 102-85.175 Section 102-85... of Service § 102-85.175 Are the standard level services for cleaning, mechanical operation, and maintenance identified in an OA? Unless specified otherwise in the OA, standard level services for cleaning...

  5. Identifying key research objectives to make European forests greener for bats

    Directory of Open Access Journals (Sweden)

    Danilo Russo

    2016-07-01

    Full Text Available Bats are a biodiverse mammal order providing key ecosystem services such as pest suppression, pollination and seed dispersal. Bats are also very sensitive to human actions, and significant declines in many bat populations have been recorded consequently. Many bat species find crucial roosting and foraging opportunities in European forests. Such forests have historically been exploited by humans and are still influenced by harvesting. One of the consequences of this pressure is the loss of key habitat resources, often making forests inhospitable to bats. Despite the legal protection granted to bats across Europe, the impacts of forestry on bats are still often neglected. Because forest exploitation influences forest structure at several spatial scales, economically viable forestry could become more sustainable and even favour bats. We highlight that a positive future for bat conservation that simultaneously benefits forestry is foreseeable, although more applied research is needed to develop sound management. Key future research topics include the detection of factors influencing the carrying capacity of forests, and determining the impacts of forest management and the economic importance of bats in forests. Predictive tools to inform forest managers are much needed, together with greater synergies between forest managers and bat conservationists.

  6. Key Clinical Features to Identify Girls with "CDKL5" Mutations

    Science.gov (United States)

    Bahi-Buisson, Nadia; Nectoux, Juliette; Rosas-Vargas, Haydee; Milh, Mathieu; Boddaert, Nathalie; Girard, Benoit; Cances, Claude; Ville, Dorothee; Afenjar, Alexandra; Rio, Marlene; Heron, Delphine; Morel, Marie Ange N'Guyen; Arzimanoglou, Alexis; Philippe, Christophe; Jonveaux, Philippe; Chelly, Jamel; Bienvenu, Thierry

    2008-01-01

    Mutations in the human X-linked cyclin-dependent kinase-like 5 ("CDKL5") gene have been shown to cause infantile spasms as well as Rett syndrome (RTT)-like phenotype. To date, less than 25 different mutations have been reported. So far, there are still little data on the key clinical diagnosis criteria and on the natural history of…

  7. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  8. Examining the Key Factors Affecting e-Service Quality of Small Online Apparel Businesses in Malaysia

    OpenAIRE

    Che Nawi Noorshella; Al Mamun Abdullah; Ahmad Raston Nursalihah

    2015-01-01

    e-Service quality (eSQ) is increasingly recognized as an important aspect, as well as the key to determining the competitive advantage and factor in the long-term retention of firms operating online. This study, therefore, is aimed at identifying the key determinants of eSQ among the small online apparel businesses in Malaysia. This study used a cross-sectional design, and data were collected from 765 customers who pur...

  9. Ergonomics as aid tool to identify and to analyze factors that can affect the operational performance of nuclear power plants

    International Nuclear Information System (INIS)

    Luquetti Santos, I.J.A.; Carvalho, P.V.R.

    2005-01-01

    The study of ergonomics has evolved around the world as one of the keys to understand human behavior in interaction with complex systems as nuclear power plant and to achieve the best match between the system and its users in the context of task to be performed. Increasing research efforts have yielded a considerable body of knowledge concerning the design of workstations, workplace, control rooms, human-system interfaces, user-interface interaction and organizational design to prevent worker discomfort, illness and also to improve productivity, product quality, ease of use and safety. The work ergonomics analysis consists of gathering a series of observation in order to better understand the work done and to propose changes and improvements in the working conditions. The work ergonomics analysis implies both the correction of existing situations (safety, reliability and production problems) and the development of new work system. Operator activity analysis provides a useful tool for the ergonomics approach, based on work ergonomics analysis. The operators will be systematically observed in their real work environment (control room) or in simulators. The focus is on description of the distributed regulated mechanisms (in the sense that operators work in crew), both in nominal and degraded situations, observing how operators regulate collectively their work during an increase in workload or when confronted with situations where incidents or accidents occur. Audio, video recorders and field notes can be used to collect empirical data, conversations and interactions that occur naturally within the work environment. Our research develops an applied ergonomics methodology, based on field studies, that permits to identify and analyze situations, factors that may affect the operational performance of nuclear power plants. Our contribution is related to the following technical topic: How best to learn from and share operational safety experience and manage changes during

  10. A decision support system for identifying abnormal operating procedures in a nuclear power plant

    International Nuclear Information System (INIS)

    Hsieh, Min-Han; Hwang, Sheue-Ling; Liu, Kang-Hong; Liang, Sheau-Farn Max; Chuang, Chang-Fu

    2012-01-01

    Highlights: ► A decision support system has been constructed and verified. ► The operator's decision-making time was decreased by about 25%. ► The accuracy was increased by about 18%. ► The system prevents overlooking important information. ► Fewer erroneous solutions were implemented, and the mental workload was reduced. - Abstract: In order to prevent safety hazards that can result from inappropriate decisions made by the operators of a nuclear power plant (NPP), this study was undertaken to develop a decision support system to reduce the complexity of the decision-making process by aiding operators’ cognitive activities, integrating unusual symptoms, and identifying the most suitable abnormal operating procedure (AOP) for operators. The study was conducted from the perspective of human factors engineering in order to compare the process that operators originally used to select an AOP with a process that included a support system for AOP identification. The results of the study indicated that the existence of a support system reduces errors by quickly suggesting likely AOPs. With such a support system in place, there were clear improvements in human performance, i.e., decision-making time decreased by about 25%, and the accuracy of the operators’ decisions, judged by the successful resolution of specific problems, increased by about 18%. In addition, there were fewer erroneous solutions implemented, and the mental workload was reduced. Hence, the decision support system is proposed as a training tool in identifying AOPs in the main control room (MCR).

  11. Computerized operator decision aids

    International Nuclear Information System (INIS)

    Long, A.B.

    1984-01-01

    This article explores the potential benefits associated with the use of computers in nuclear plants by the operating crew as an aid in making decisions. Pertinent findings are presented from recently completed projects to establish the context in which operating decisions have to be made. Key factors influencing the decision-making process itself are also identified. Safety parameter display systems, which are being implemented in various forms by the nuclear industry, are described within the context of decision making. In addition, relevant worldwide research and development activities are examined as potential enhancements to computerized operator decision aids to further improve plant safety and availability

  12. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  13. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  14. [Key effect genes responding to nerve injury identified by gene ontology and computer pattern recognition].

    Science.gov (United States)

    Pan, Qian; Peng, Jin; Zhou, Xue; Yang, Hao; Zhang, Wei

    2012-07-01

    In order to screen out important genes from large gene data of gene microarray after nerve injury, we combine gene ontology (GO) method and computer pattern recognition technology to find key genes responding to nerve injury, and then verify one of these screened-out genes. Data mining and gene ontology analysis of gene chip data GSE26350 was carried out through MATLAB software. Cd44 was selected from screened-out key gene molecular spectrum by comparing genes' different GO terms and positions on score map of principal component. Function interferences were employed to influence the normal binding of Cd44 and one of its ligands, chondroitin sulfate C (CSC), to observe neurite extension. Gene ontology analysis showed that the first genes on score map (marked by red *) mainly distributed in molecular transducer activity, receptor activity, protein binding et al molecular function GO terms. Cd44 is one of six effector protein genes, and attracted us with its function diversity. After adding different reagents into the medium to interfere the normal binding of CSC and Cd44, varying-degree remissions of CSC's inhibition on neurite extension were observed. CSC can inhibit neurite extension through binding Cd44 on the neuron membrane. This verifies that important genes in given physiological processes can be identified by gene ontology analysis of gene chip data.

  15. Operational Details of the Five Domains Model and Its Key Applications to the Assessment and Management of Animal Welfare

    Science.gov (United States)

    Mellor, David J.

    2017-01-01

    Simple Summary The Five Domains Model is a focusing device to facilitate systematic, structured, comprehensive and coherent assessment of animal welfare; it is not a definition of animal welfare, nor is it intended to be an accurate representation of body structure and function. The purpose of each of the five domains is to draw attention to areas that are relevant to both animal welfare assessment and management. This paper begins by briefly describing the major features of the Model and the operational interactions between the five domains, and then it details seven interacting applications of the Model. These underlie its utility and increasing application to welfare assessment and management in diverse animal use sectors. Abstract In accord with contemporary animal welfare science understanding, the Five Domains Model has a significant focus on subjective experiences, known as affects, which collectively contribute to an animal’s overall welfare state. Operationally, the focus of the Model is on the presence or absence of various internal physical/functional states and external circumstances that give rise to welfare-relevant negative and/or positive mental experiences, i.e., affects. The internal states and external circumstances of animals are evaluated systematically by referring to each of the first four domains of the Model, designated “Nutrition”, “Environment”, “Health” and “Behaviour”. Then affects, considered carefully and cautiously to be generated by factors in these domains, are accumulated into the fifth domain, designated “Mental State”. The scientific foundations of this operational procedure, published in detail elsewhere, are described briefly here, and then seven key ways the Model may be applied to the assessment and management of animal welfare are considered. These applications have the following beneficial objectives—they (1) specify key general foci for animal welfare management; (2) highlight the foundations of

  16. A Hierarchical structure of key performance indicators for operation management and continuous improvement in production systems.

    Science.gov (United States)

    Kang, Ningxuan; Zhao, Cong; Li, Jingshan; Horst, John A

    2016-01-01

    Key performance indicators (KPIs) are critical for manufacturing operation management and continuous improvement (CI). In modern manufacturing systems, KPIs are defined as a set of metrics to reflect operation performance, such as efficiency, throughput, availability, from productivity, quality and maintenance perspectives. Through continuous monitoring and measurement of KPIs, meaningful quantification and identification of different aspects of operation activities can be obtained, which enable and direct CI efforts. A set of 34 KPIs has been introduced in ISO 22400. However, the KPIs in a manufacturing system are not independent, and they may have intrinsic mutual relationships. The goal of this paper is to introduce a multi-level structure for identification and analysis of KPIs and their intrinsic relationships in production systems. Specifically, through such a hierarchical structure, we define and layer KPIs into levels of basic KPIs, comprehensive KPIs and their supporting metrics, and use it to investigate the relationships and dependencies between KPIs. Such a study can provide a useful tool for manufacturing engineers and managers to measure and utilize KPIs for CI.

  17. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  18. An investigation in purchasing practices of small F&B operators ...

    African Journals Online (AJOL)

    The food and beverage (F&B) purchasing function is operating in a rapidly changing environment, whereby professionalisation and efficiency become key. This paper aims to identify generic skills that are most important for small F&B operators when it comes down to purchasing and supply management. Factors facilitating ...

  19. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  20. Rein: Taming Tail Latency in Key-Value Stores via Multiget Scheduling

    KAUST Repository

    Reda, Waleed

    2017-04-17

    We tackle the problem of reducing tail latencies in distributed key-value stores, such as the popular Cassandra database.We focus on workloads of multiget requests, which batch together access to several data elements and parallelize read operations across the data store machines. We first analyze a production trace of a real system and quantify the skew due to multiget sizes, key popularity, and other factors. We then proceed to identify opportunities for reduction of tail latencies by recognizing the composition of aggregate requests and by carefully scheduling bottleneck operations that can otherwise create excessive queues. We design and implement a system called Rein, which reduces latency via inter-multiget scheduling using low overhead techniques. We extensively evaluate Rein via experiments in Amazon Web Services (AWS) and simulations. Our scheduling algorithms reduce the median, 95, and 99 percentile latencies by factors of 1.5, 1.5, and 1.9, respectively.

  1. Why advanced computing? The key to space-based operations

    Science.gov (United States)

    Phister, Paul W., Jr.; Plonisch, Igor; Mineo, Jack

    2000-11-01

    The 'what is the requirement?' aspect of advanced computing and how it relates to and supports Air Force space-based operations is a key issue. In support of the Air Force Space Command's five major mission areas (space control, force enhancement, force applications, space support and mission support), two-fifths of the requirements have associated stringent computing/size implications. The Air Force Research Laboratory's 'migration to space' concept will eventually shift Science and Technology (S&T) dollars from predominantly airborne systems to airborne-and-space related S&T areas. One challenging 'space' area is in the development of sophisticated on-board computing processes for the next generation smaller, cheaper satellite systems. These new space systems (called microsats or nanosats) could be as small as a softball, yet perform functions that are currently being done by large, vulnerable ground-based assets. The Joint Battlespace Infosphere (JBI) concept will be used to manage the overall process of space applications coupled with advancements in computing. The JBI can be defined as a globally interoperable information 'space' which aggregates, integrates, fuses, and intelligently disseminates all relevant battlespace knowledge to support effective decision-making at all echelons of a Joint Task Force (JTF). This paper explores a single theme -- on-board processing is the best avenue to take advantage of advancements in high-performance computing, high-density memories, communications, and re-programmable architecture technologies. The goal is to break away from 'no changes after launch' design to a more flexible design environment that can take advantage of changing space requirements and needs while the space vehicle is 'on orbit.'

  2. Code for plant identification (KKS) key in PC version

    International Nuclear Information System (INIS)

    Pannenbaecker, K.

    1991-01-01

    The plant identification system (KKS) as a common development of german plant operators, erection firms and also power plant oriented organisations have decisively influenced the technical-organizing activities of planning and erections as operations and maintenance of all kind of power plants. Fundamentals are three key parts, operation, armatures and function keys. Their management and application is executed by a plantidentification-key code in a PC version, which is briefly described in this report. (orig.) [de

  3. Key identifiers and spelling conventions in MXit-lingo as found in conversations with Dr Math

    Directory of Open Access Journals (Sweden)

    Laurie Butgereit

    2012-07-01

    Full Text Available Different human languages look different from other human languages. To use a term from the computer industry, each human language has its own “look and feel”. European English speakers can easily recognise a phrase such as “Comment allez-vous?” as being written in French while the phrase “¿Habla usted español?” is written in Spanish. Each language has its own letter frequencies, word frequencies and other identifiers. This paper describes key identifiers in MXit lingo as found in Dr Math conversations. MXit is a mobile instant messaging system which originated in South Africa and is expanding to other countries. Dr Math is a mobile tutoring system which uses MXit as a communication protocol. Primary and secondary school pupils can receive help with the mathematics homework using the Dr Math tutoring system. The pupils use MXit on their cell phones and the tutors use traditional Internet workstations. After exploring how MXit lingo is written, this paper will briefly explore why MXit lingo is written the way it is. By identifying and describing the orthographic conventions visible in the spelling of MXit lingo, although with some theoretical support, insight into the purposeful and functional nature of written, mobile communication will be revealed. In highlighting spelling that is influenced by Black South African English, an attempt will be made to contribute to the empirical development of a field of study that explores the construction of words used in South African mobile communication. Keywords: MXit, Math, letters, writing, orthography Disciplines: Linguistics, mathematics, information technology

  4. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  5. Decommissioning: Regulatory activities and identification of key organizational and human factors safety issues

    International Nuclear Information System (INIS)

    Durbin, N.E.; Melber, B.D.; Lekberg, A.

    2001-12-01

    In the late 1990's the Swedish government decided to shut down Unit 1 of the Barsebaeck nuclear power plant. This report documents some of the efforts made by the Swedish Nuclear Power Inspectorate (SKI) to address human factors and organizational issues in nuclear safety during decommissioning of a nuclear facility. This report gives a brief review of the background to the decommissioning of Barsebaeck 1 and points out key safety issues that can arise during decommissioning. The main regulatory activities that were undertaken were requirements that the plant provide special safety reports on decommissioning focusing on first, the operation of both units until closure of Unit 1 and second, the operation of Unit 2 when Unit 1 was closed. In addition, SKI identified areas that might be affected by decommissioning and called these areas out for special attention. With regard to these areas of special attention, SKI required that the plant provide monthly reports on changing and emerging issues as well as self-assessments of the areas to be addressed in the special safety reports. Ten key safety issues were identified and evaluated with regard to different stages of decommissioning and with regard to the actions taken by Barsebaeck. Some key conclusions from SKI's experience in regulating a decommissioning nuclear power plant conclude the report

  6. Operator/contractor teamwork is the key to performance improvement

    International Nuclear Information System (INIS)

    Robins, K.B.; Roberts, J.D.M.

    1996-01-01

    The contract strategies developed by the two major E and P companies operating in the North Sea emphasize teamwork between operator and contractors to achieve the common goal of maximizing project value. These strategies have had significant repercussions across the whole industry. This paper compares these strategies and concludes that although they are structurally different, they have the same fundamental objectives. It describes the evolution of what these operators consider to be their core business, with the resultant changing roles for both operator and contractor staff. Several examples of results achieved through implementing these changes are described, highlighting the need for a structured performance measurement system to quantify the success of these initiatives. Finally, the potential for even greater efficiency improvements through further industry-wide cooperation is emphasized

  7. Formal Analysis of Key Integrity in PKCS#11

    Science.gov (United States)

    Falcone, Andrea; Focardi, Riccardo

    PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.

  8. Identifying organizational deficiencies through root-cause analysis

    International Nuclear Information System (INIS)

    Tuli, R.W.; Apostolakis, G.E.

    1996-01-01

    All nuclear power plants incorporate root-cause analysis as an instrument to help identify and isolate key factors judged to be of significance following an incident or accident. Identifying the principal deficiencies can become very difficult when the event involves not only human and machine interaction, but possibly the underlying safety and quality culture of the organization. The current state of root-cause analysis is to conclude the investigation after identifying human and/or hardware failures. In this work, root-cause analysis is taken one step further by examining plant work processes and organizational factors. This extension is considered significant to the success of the analysis, especially when management deficiency is believed to contribute to the incident. The results of root-cause analysis can be most effectively implemented if the organization, as a whole, wishes to improve the overall operation of the plant by preventing similar incidents from occurring again. The study adds to the existing root-cause analysis the ability to localize the causes of undesirable events and to focus on those problems hidden deeply within the work processes that are routinely followed in the operation and maintenance of the facility

  9. Strategy to maximize maintenance operation

    OpenAIRE

    Espinoza, Michael

    2005-01-01

    This project presents a strategic analysis to maximize maintenance operations in Alcan Kitimat Works in British Columbia. The project studies the role of maintenance in improving its overall maintenance performance. It provides strategic alternatives and specific recommendations addressing Kitimat Works key strategic issues and problems. A comprehensive industry and competitive analysis identifies the industry structure and its competitive forces. In the mature aluminium industry, the bargain...

  10. Emergency management in health: key issues and challenges in the UK.

    Science.gov (United States)

    Lee, Andrew C K; Phillips, Wendy; Challen, Kirsty; Goodacre, Steve

    2012-10-19

    Emergency planning in the UK has grown considerably in recent years, galvanised by the threat of terrorism. However, deficiencies in NHS emergency planning were identified and the evidence-base that underpins it is questionable. Inconsistencies in terminologies and concepts also exist. Different models of emergency management exist internationally but the optimal system is unknown. This study examines the evidence-base and evidence requirements for emergency planning in the UK health context. The study involved semi-structured interviews with key stakeholders and opinion leaders. Purposive sampling was used to obtain a breadth of views from various agencies involved in emergency planning and response. Interviews were then analysed using a grounded approach using standard framework analysis techniques. We conducted 17 key informant interviews. Interviewees identified greater gaps in operational than technical aspects of emergency planning. Social and behavioural knowledge gaps were highlighted with regards to how individuals and organisations deal with risk and behave in emergencies. Evidence-based approaches to public engagement and for developing community resilience to disasters are lacking. Other gaps included how knowledge was developed and used. Conflicting views with regards to the optimal configuration and operation of the emergency management system were voiced. Four thematic categories for future research emerged:(i) Knowledge-base for emergency management: Further exploration is needed of how knowledge is acquired, valued, disseminated, adopted and retained.(ii) Social and behavioural issues: Greater understanding of how individuals approach risk and behave in emergencies is required.(iii) Organisational issues in emergencies: Several conflicting organisational issues were identified; value of planning versus plans, flexible versus standardized procedures, top-down versus bottom-up engagement, generic versus specific planning, and reactive versus

  11. Operation planning device

    International Nuclear Information System (INIS)

    Watanabe, Takashi; Odakawa, Naoto; Erikuchi, Makoto; Okada, Masayuki; Koizumi, Atsuhiko.

    1996-01-01

    The device of the present invention provides a device suitable for monitoring a reactor core state and operation replanning in terms of reactor operation. Namely, (1) an operation result difference judging means judges that replanning is necessary when the operation results deviates from the operation planning, (2) an operation replanning rule data base storing means stores a deviation key which shows various kinds of states where the results deviate from the planning and a rule for replanning for returning to the operation planning on every deviating key, (3) an operation replanning means forms a new operation planning in accordance with the rule which is retrieved based on the deviation key, (4) an operation planning optimizing rule data base storing means evaluates the reformed planning and stores it on every evaluation item, (5) an operation planning optimization means correct the operation planning data so as to be optimized when the evaluation of the means (4) is less than a reference value, and (6) an operation planning display means edits adaptable operation planning data and the result of the evaluation and displays them. (I.S.)

  12. Experimental infections with Mycoplasma agalactiae identify key factors involved in host-colonization.

    Directory of Open Access Journals (Sweden)

    Eric Baranowski

    Full Text Available Mechanisms underlying pathogenic processes in mycoplasma infections are poorly understood, mainly because of limited sequence similarities with classical, bacterial virulence factors. Recently, large-scale transposon mutagenesis in the ruminant pathogen Mycoplasma agalactiae identified the NIF locus, including nifS and nifU, as essential for mycoplasma growth in cell culture, while dispensable in axenic media. To evaluate the importance of this locus in vivo, the infectivity of two knock-out mutants was tested upon experimental infection in the natural host. In this model, the parental PG2 strain was able to establish a systemic infection in lactating ewes, colonizing various body sites such as lymph nodes and the mammary gland, even when inoculated at low doses. In these PG2-infected ewes, we observed over the course of infection (i the development of a specific antibody response and (ii dynamic changes in expression of M. agalactiae surface variable proteins (Vpma, with multiple Vpma profiles co-existing in the same animal. In contrast and despite a sensitive model, none of the knock-out mutants were able to survive and colonize the host. The extreme avirulent phenotype of the two mutants was further supported by the absence of an IgG response in inoculated animals. The exact role of the NIF locus remains to be elucidated but these data demonstrate that it plays a key role in the infectious process of M. agalactiae and most likely of other pathogenic mycoplasma species as many carry closely related homologs.

  13. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  14. Using Range-Wide Abundance Modeling to Identify Key Conservation Areas for the Micro-Endemic Bolson Tortoise (Gopherus flavomarginatus.

    Directory of Open Access Journals (Sweden)

    Cinthya A Ureña-Aranda

    Full Text Available A widespread biogeographic pattern in nature is that population abundance is not uniform across the geographic range of species: most occurrence sites have relatively low numbers, whereas a few places contain orders of magnitude more individuals. The Bolson tortoise Gopherus flavomarginatus is endemic to a small region of the Chihuahuan Desert in Mexico, where habitat deterioration threatens this species with extinction. In this study we combined field burrows counts and the approach for modeling species abundance based on calculating the distance to the niche centroid to obtain range-wide abundance estimates. For the Bolson tortoise, we found a robust, negative relationship between observed burrows abundance and distance to the niche centroid, with a predictive capacity of 71%. Based on these results we identified four priority areas for the conservation of this microendemic and threatened tortoise. We conclude that this approach may be a useful approximation for identifying key areas for sampling and conservation efforts in elusive and rare species.

  15. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  16. Transverse beam splitting made operational: Key features of the multiturn extraction at the CERN Proton Synchrotron

    Directory of Open Access Journals (Sweden)

    A. Huschauer

    2017-06-01

    Full Text Available Following a successful commissioning period, the multiturn extraction (MTE at the CERN Proton Synchrotron (PS has been applied for the fixed-target physics programme at the Super Proton Synchrotron (SPS since September 2015. This exceptional extraction technique was proposed to replace the long-serving continuous transfer (CT extraction, which has the drawback of inducing high activation in the ring. MTE exploits the principles of nonlinear beam dynamics to perform loss-free beam splitting in the horizontal phase space. Over multiple turns, the resulting beamlets are then transferred to the downstream accelerator. The operational deployment of MTE was rendered possible by the full understanding and mitigation of different hardware limitations and by redesigning the extraction trajectories and nonlinear optics, which was required due to the installation of a dummy septum to reduce the activation of the magnetic extraction septum. This paper focuses on these key features including the use of the transverse damper and the septum shadowing, which allowed a transition from the MTE study to a mature operational extraction scheme.

  17. Screening and prioritisation of chemical risks from metal mining operations, identifying exposure media of concern.

    Science.gov (United States)

    Pan, Jilang; Oates, Christopher J; Ihlenfeld, Christian; Plant, Jane A; Voulvoulis, Nikolaos

    2010-04-01

    Metals have been central to the development of human civilisation from the Bronze Age to modern times, although in the past, metal mining and smelting have been the cause of serious environmental pollution with the potential to harm human health. Despite problems from artisanal mining in some developing countries, modern mining to Western standards now uses the best available mining technology combined with environmental monitoring, mitigation and remediation measures to limit emissions to the environment. This paper develops risk screening and prioritisation methods previously used for contaminated land on military and civilian sites and engineering systems for the analysis and prioritisation of chemical risks from modern metal mining operations. It uses hierarchical holographic modelling and multi-criteria decision making to analyse and prioritise the risks from potentially hazardous inorganic chemical substances released by mining operations. A case study of an active platinum group metals mine in South Africa is used to demonstrate the potential of the method. This risk-based methodology for identifying, filtering and ranking mining-related environmental and human health risks can be used to identify exposure media of greatest concern to inform risk management. It also provides a practical decision-making tool for mine acquisition and helps to communicate risk to all members of mining operation teams.

  18. Identifying the limitations of conventional biofiltration of diffuse methane emissions at long-term operation.

    Science.gov (United States)

    Gómez-Cuervo, S; Hernández, J; Omil, F

    2016-08-01

    There is growing international concern about the increasing levels of greenhouse gases in the atmosphere, particularly CO2 and methane. The emissions of methane derived from human activities are associated with large flows and very low concentrations, such as those emitted from landfills and wastewater treatment plants, among others. The present work was focused on the biological methane degradation at diffuse concentrations (0.2% vv(-1)) in a conventional biofilter using a mixture of compost, perlite and bark chips as carrier. An extensive characterization of the process was carried out at long-term operation (250 days) in a fully monitored pilot plant, achieving stable conditions during the entire period. Operational parameters such as waterings, nitrogen addition and inlet loads and contact time influences were evaluated. Obtained results indicate that empty bed residence times within 4-8 min are crucial to maximize elimination rates. Waterings and the type of nitrogen supplied in the nutrient solution (ammonia or nitrate) have a strong impact on the biofilter performance. The better results compatible with a stable operation were achieved using nitrate, with elimination capacities up to 7.6 ± 1.1 g CH4 m(-3 )h(-1). The operation at low inlet concentrations (IC) implied that removal rates obtained were quite limited (ranging 3-8 g CH4 m(-3 )h(-1)); however, these results could be significantly increased (up to 20.6 g CH4 m(-3) h(-1)) at higher IC, which indicates that the mass transfer from the gas to the liquid layer surrounding the biofilm is a key limitation of the process.

  19. Simulation-based Assessment to Reliably Identify Key Resident Performance Attributes.

    Science.gov (United States)

    Blum, Richard H; Muret-Wagstaff, Sharon L; Boulet, John R; Cooper, Jeffrey B; Petrusa, Emil R; Baker, Keith H; Davidyuk, Galina; Dearden, Jennifer L; Feinstein, David M; Jones, Stephanie B; Kimball, William R; Mitchell, John D; Nadelberg, Robert L; Wiser, Sarah H; Albrecht, Meredith A; Anastasi, Amanda K; Bose, Ruma R; Chang, Laura Y; Culley, Deborah J; Fisher, Lauren J; Grover, Meera; Klainer, Suzanne B; Kveraga, Rikante; Martel, Jeffrey P; McKenna, Shannon S; Minehart, Rebecca D; Mitchell, John D; Mountjoy, Jeremi R; Pawlowski, John B; Pilon, Robert N; Shook, Douglas C; Silver, David A; Warfield, Carol A; Zaleski, Katherine L

    2018-04-01

    Obtaining reliable and valid information on resident performance is critical to patient safety and training program improvement. The goals were to characterize important anesthesia resident performance gaps that are not typically evaluated, and to further validate scores from a multiscenario simulation-based assessment. Seven high-fidelity scenarios reflecting core anesthesiology skills were administered to 51 first-year residents (CA-1s) and 16 third-year residents (CA-3s) from three residency programs. Twenty trained attending anesthesiologists rated resident performances using a seven-point behaviorally anchored rating scale for five domains: (1) formulate a clear plan, (2) modify the plan under changing conditions, (3) communicate effectively, (4) identify performance improvement opportunities, and (5) recognize limits. A second rater assessed 10% of encounters. Scores and variances for each domain, each scenario, and the total were compared. Low domain ratings (1, 2) were examined in detail. Interrater agreement was 0.76; reliability of the seven-scenario assessment was r = 0.70. CA-3s had a significantly higher average total score (4.9 ± 1.1 vs. 4.6 ± 1.1, P = 0.01, effect size = 0.33). CA-3s significantly outscored CA-1s for five of seven scenarios and domains 1, 2, and 3. CA-1s had a significantly higher proportion of worrisome ratings than CA-3s (chi-square = 24.1, P < 0.01, effect size = 1.50). Ninety-eight percent of residents rated the simulations more educational than an average day in the operating room. Sensitivity of the assessment to CA-1 versus CA-3 performance differences for most scenarios and domains supports validity. No differences, by experience level, were detected for two domains associated with reflective practice. Smaller score variances for CA-3s likely reflect a training effect; however, worrisome performance scores for both CA-1s and CA-3s suggest room for improvement.

  20. Identifying the Key Weaknesses in Network Security at Colleges.

    Science.gov (United States)

    Olsen, Florence

    2000-01-01

    A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)

  1. An examination of automation and robotics in the context of Space Station operations

    Science.gov (United States)

    Criswell, David R.; Lee, Douglas S.; Ragusa, James; Starks, Scott A.; Woodruff, John; Paules, Granville

    1988-01-01

    A NASA-sponsored review of Space Station automation and robotics (A&R) applications from an operations and utilization perspective is presented. The goals of the A&R panel and this report are to identify major suggestions for advanced A&R operations application in Space Station as well as key technologies that have emerged or gained prominence since the completion of previous reports; to review and incorporate the range of possible Space Station A&R applications into a framework for evaluation of A&R opportunities; and to propose incentives for the government, work packages, and subcontractors to more aggressively identify, evaluate, and incorporate advanced A&R in Space Station Operations. The suggestions for A&R focused on narrow objectives using a conservative approach tuned to Space Station at IOC and limiting the Station's growth capabilities. A more aggressive stance is to identify functional needs over the Program's life, exploit and leverage available technology, and develop the key advanced technologies permitting effective use of A&R. The challenge is to systematically identify candidate functions to be automated, provide ways to create solutions resulting in savings or increased capabilities, and offer incentives that will promote the automation.

  2. Bottlenecks, concerns and needs in malaria operational research: the perspectives of key stakeholders in Nigeria.

    Science.gov (United States)

    Onyiah, Pamela; Adamu, Al-Mukhtar Y; Afolabi, Rotimi F; Ajumobi, Olufemi; Ughasoro, Maduka D; Odeyinka, Oluwaseun; Nguku, Patrick; Ajayi, IkeOluwapo O

    2018-05-04

    We conducted a study to determine stakeholders' perspective of the bottlenecks, concerns and needs to malaria operational research (MOR) agenda setting in Nigeria. Eighty-five (37.9%) stakeholders identified lack of positive behavioural change as the major bottleneck to MOR across the malaria thematic areas comprising of malaria prevention 58.8% (50), case management 34.8% (39), advocacy communication and social mobilisation 4.7% (4) while procurement and supply chain management (PSM) and programme management experts had the least response of 1.2% (1) each. Other bottlenecks were inadequate capacity to implement (13.8%, n = 31), inadequate funds (11.6%, n = 26), poor supply management (9.4%, n = 21), administrative bureaucracy (5.8%, n = 13), inadequacy of experts (1.3%, n = 3) and poor policy implementation (4.9%, n = 11). Of the 31 stakeholders who opined lack of capacity to execute malaria operational research; 17 (54.8%), 10 (32.3%), 3 (9.7%) and 1 (3.2%) were experts in case management, malaria prevention, surveillance, monitoring and evaluation and PSM respectively. Improvement in community enlightenment and awareness strategies; and active involvement of health care workers public and private sectors were identified solutions to lack of positive behavioural change.

  3. Role of computerized operator support system in nuclear industry

    International Nuclear Information System (INIS)

    Kossilov, A.

    1994-01-01

    Many existing and all new nuclear stations have a high degree of automation leading to substantial safety and operational benefits. Various operator support systems (OSSs) for nuclear power plants are already operational or under development in the Member States. OSSs are based on intelligent data processing and in addition to plant operation, they are becoming more important for safety also. A key feature of OSSs is their availability to structure data to increase its relevance to a given situation. This can improve the user's ability to identify plant function, systems and component state and to identify faults and diagnose them. OSSs can also assist the user to plan and implement corrective actions to improve NPP availability and safety. The paper describes several such systems or functions either in operation or under development phase as well as a way in which new artificial intelligence-based software techniques will enhance the support possible for providing to the operator. (author). 4 refs

  4. A Medical Logistics Officer Training Needs Assessment Utilizing Feedback from Operation Iraqi Freedom

    National Research Council Canada - National Science Library

    Waddick, James L

    2004-01-01

    ... their missions during the initial Operation Iraqi Freedom deployment (OIF 1). Additionally, the study sought to identify the potential benefit of additional training on key medical logistics tasks and training events...

  5. Identification of key oil refining technologies for China National Petroleum Co. (CNPC)

    International Nuclear Information System (INIS)

    Liu Haiyan; Yu Jianning; Xu Jian; Fan Yu; Bao Xiaojun

    2007-01-01

    This paper summarizes the results from the project 'Vision of the Key Petroleum Refining Technologies for China National Petroleum Co. (CNPC) in the Early 21st Century' undertaken by the Department of R and D Administration, CNPC, and its affiliate key laboratory, The Key Laboratory of Catalysis operated by China University of Petroleum, Beijing. The objective of the project was to identify the challenges and opportunities of CNPC's petroleum refining business given increasing economy globalization and stricter environmental regulations. Using the modified Delphi method, four key technologies for CNPC's oil refining industry were identified. They are: integrated fluid catalytic cracking (FCC), hydroprocessing, residue hydrocracking, and high-grade lubricant production. The most significant technology will be the integrated FCC technology that can economically increase the yield of light fractions as well as upgrade transportation fuels. In China, FCC units produce about 80% and 30% commercial gasoline and diesel, respectively. To ensure compliance with future environmental legislation, hydroprocessing technologies, including those related to petroleum product hydrorefining and distillate hydrocracking, should be developed. By combining residue hydrocracking and FCC technologies, poorer quality residua can be processed. Supplying high-grade lube oils is one of the main tasks for CNPC's oil refining industry. Development of hydrodewaxing technologies to manufacture API group II/III base oil is the main direction for CNPC's lubricant production business

  6. Using sensitivity analysis to identify key factors for the propagation of a plant epidemic.

    Science.gov (United States)

    Rimbaud, Loup; Bruchou, Claude; Dallot, Sylvie; Pleydell, David R J; Jacquot, Emmanuel; Soubeyrand, Samuel; Thébaud, Gaël

    2018-01-01

    Identifying the key factors underlying the spread of a disease is an essential but challenging prerequisite to design management strategies. To tackle this issue, we propose an approach based on sensitivity analyses of a spatiotemporal stochastic model simulating the spread of a plant epidemic. This work is motivated by the spread of sharka, caused by plum pox virus , in a real landscape. We first carried out a broad-range sensitivity analysis, ignoring any prior information on six epidemiological parameters, to assess their intrinsic influence on model behaviour. A second analysis benefited from the available knowledge on sharka epidemiology and was thus restricted to more realistic values. The broad-range analysis revealed that the mean duration of the latent period is the most influential parameter of the model, whereas the sharka-specific analysis uncovered the strong impact of the connectivity of the first infected orchard. In addition to demonstrating the interest of sensitivity analyses for a stochastic model, this study highlights the impact of variation ranges of target parameters on the outcome of a sensitivity analysis. With regard to sharka management, our results suggest that sharka surveillance may benefit from paying closer attention to highly connected patches whose infection could trigger serious epidemics.

  7. Cooperative testing of a positive personnel identifier

    International Nuclear Information System (INIS)

    O'Callaghan, P.B.; Grambihler, A.J.; Graham, D.K.; Bradley, R.G.

    1980-06-01

    HEDL has a requirement to ensure the identification of remote computer terminal operators on a real-time nuclear inventory data base. The integrity of this data base depends on input from authorized individuals. Thus, a key to developing such a system is the ability to positively identify people attempting access to the system. Small scale tests of the Identimat 2000T hand geometry unit with an adjusting alogrithm have suggested a promising solution. To prove operational suitability, HEDL, in cooperation with Sandia Laboratories, has designed a large scale test of the Identimat 2000T. Data gathering on error rates, reliability, maintainability, and user acceptance will determine if the Identimat 2000T is suitable for the HEDL application. If proven acceptable, use of the Identimat 2000T can be broadened to many general applications where security information, locations and systems are required

  8. Implementation of Canny and Isotropic Operator with Power Law Transformation to Identify Cervical Cancer

    Science.gov (United States)

    Amalia, A.; Rachmawati, D.; Lestari, I. A.; Mourisa, C.

    2018-03-01

    Colposcopy has been used primarily to diagnose pre-cancer and cancerous lesions because this procedure gives an exaggerated view of the tissues of the vagina and the cervix. But, the poor quality of colposcopy image sometimes makes physician challenging to recognize and analyze it. Generally, Implementation of image processing to identify cervical cancer have to implement a complex classification or clustering method. In this study, we wanted to prove that by only applying the identification of edge detection in the colposcopy image, identification of cervical cancer can be determined. In this study, we implement and comparing two edge detection operator which are isotropic and canny operator. Research methodology in this paper composed by image processing, training, and testing stages. In the image processing step, colposcopy image transformed by nth root power transformation to get better detection result and continued with edge detection process. Training is a process of labelling all dataset image with cervical cancer stage. This process involved pathology doctor as an expert in diagnosing the colposcopy image as a reference. Testing is a process of deciding cancer stage classification by comparing the similarity image of colposcopy results in the testing stage with the image of the results of the training process. We used 30 images as a dataset. The result gets same accuracy which is 80% for both Canny or Isotropic operator. Average running time for Canny operator implementation is 0.3619206 ms while Isotropic get 1.49136262 ms. The result showed that Canny operator is better than isotropic operator because Canny operator generates a more precise edge with a fast time instead.

  9. Entangled quantum key distribution with a biased basis choice

    International Nuclear Information System (INIS)

    Erven, Chris; Ma Xiongfeng; Laflamme, Raymond; Weihs, Gregor

    2009-01-01

    We investigate a quantum key distribution (QKD) scheme that utilizes a biased basis choice in order to increase the efficiency of the scheme. The optimal bias between the two measurement bases, a more refined error analysis and finite key size effects are all studied in order to assure the security of the final key generated with the system. We then implement the scheme in a local entangled QKD system that uses polarization entangled photon pairs to securely distribute the key. A 50/50 non-polarizing beamsplitter (BS) with different optical attenuators is used to simulate a variable BS in order to allow us to study the operation of the system for different biases. Over 6 h of continuous operation with a total bias of 0.9837/0.0163 (Z/X), we were able to generate 0.4567 secure key bits per raw key bit as compared to 0.2550 secure key bits per raw key bit for the unbiased case. This represents an increase in the efficiency of the key generation rate by 79%.

  10. Optimal operating conditions for external cavity semiconductor laser optical chaos communication system

    International Nuclear Information System (INIS)

    Priyadarshi, S; Pierce, I; Hong, Y; Shore, K A

    2012-01-01

    In optical chaos communications a message is masked in the noise-like broadband output of a chaotic transmitter laser, and message recovery is enabled through the synchronization of the transmitter and the (chaotic) receiver laser. Key issues are to identify the laser operating conditions which provide the highest quality synchronization conditions and those which provide optimized message extraction. In general such operating conditions are not coincident. In this paper numerical simulations are performed with the aim of identifying a regime of operation where the highest quality synchronization and optimizing message extraction efficiency are achieved simultaneously. Use of such an operating regime will facilitate practical deployment of optical chaos communications systems without the need for re-adjustment of laser operating conditions in the field. (paper)

  11. Global Operations Coevolution

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Gubi, Ebbe

    2013-01-01

    Companies are actively seeking competitive advantage through their choice of location and ownership of operations. The purpose of this chapter is to uncover hidden effects of this development and propose how companies can respond to them. The chapter draws on a case study of a Danish industrial e...... of analysis and involving temporal adaptations. In terms of managerial implications, the study provides managers with lessons for designing a robust system of globally dispersed operations.......Companies are actively seeking competitive advantage through their choice of location and ownership of operations. The purpose of this chapter is to uncover hidden effects of this development and propose how companies can respond to them. The chapter draws on a case study of a Danish industrial...... equipment firm and describes how its operations configuration has been changing over time. The chapter identifies the key determinants of this change and uncovers some of its hidden effects. The chapter closes with propositions for how to respond to these effects through the development of a distinct...

  12. The key to successful management of STS operations: An integrated production planning system

    Science.gov (United States)

    Johnson, W. A.; Thomasen, C. T.

    1985-01-01

    Space Transportation System operations managers are being confronted with a unique set of challenges as a result of increasing flight rates, the demand for flight manifest/production schedule flexibility and an emphasis on continued cost reduction. These challenges have created the need for an integrated production planning system that provides managers with the capability to plan, schedule, status and account for an orderly flow of products and services across a large, multi-discipline organization. With increased visibility into the end-to-end production flow for individual and parallel missions in process, managers can assess the integrated impact of changes, identify and measure the interrelationships of resource, schedule, and technical performance requirements and prioritize productivity enhancements.

  13. Key Lake human resources and northern business initiative

    International Nuclear Information System (INIS)

    Dudar, R.; McIntyre, J.; McInnes, B.P.

    1994-01-01

    The Key Lake Operation is committed to a policy of maximizing Saskatchewan, and particularly northern Saskatchewan, employment and business opportunities. The participation rate of northern people in the Key Lake operation's workforce has risen from 23.8% in 1983, to 42% today. Cameco's objective is to achieve 50% representation of residents of Saskatchewan's north in the Key Lake workforce by 1995. The company also extends this strategic objective to contractors. All contractors are required to maximize employment opportunities for residents of Saskatchewan's north, and report employment levels to the company as a condition of the contract. Today, contractors at the Key Lake site have achieved a northern participation rate of 47%. This paper highlights strategies for increasing northern/aboriginal participation and provides several examples of successes from these initiatives. (author)

  14. Water chemistry technology. One of the key technologies for safe and reliable nuclear power plant operation

    International Nuclear Information System (INIS)

    Uchida, Shunsuke; Katsumura, Yosuke

    2013-01-01

    Water chemistry control is one of the key technologies to establish safe and reliable operation of nuclear power plants. Continuous and collaborative efforts of plant manufacturers and plant operator utilities have been focused on optimal water chemistry control, for which, a trio of requirements for water chemistry should be simultaneously satisfied: (1) better reliability of reactor structures and fuel rods; (2) lower occupational exposure and (3) fewer radwaste sources. Various groups in academia have carried out basic research to support the technical bases of water chemistry in plants. The Research Committee on Water Chemistry of the Atomic Energy Society of Japan (AESJ), which has now been reorganized as the Division of Water Chemistry (DWC) of AESJ, has played important roles to promote improvements in water chemistry control, to share knowledge about and experiences with water chemistry control among plant operators and manufacturers and to establish common technological bases for plant water chemistry and then to transfer them to the next generation of plant workers engaged in water chemistry. Furthermore, the DWC has tried and succeeded arranging R and D proposals for further improvement in water chemistry control through roadmap planning. In the paper, major achievements in plant technologies and in basic research studies of water chemistry in Japan are reviewed. The contributions of the DWC to the long-term safe management of the damaged reactors at the Fukushima Daiichi Nuclear Power Plant until their decommissioning are introduced. (author)

  15. Key Update Assistant for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    developed a push-button solution - powered by stochastic model checking - that network designers can easily benefit from, and it paves the way for consumers to set up key update related security parameters. Key Update Assistant, as we named it, runs necessary model checking operations and determines...

  16. Identifying Special Operations as a Distinct Foreign Policy Instrument

    DEFF Research Database (Denmark)

    Johnsen, Anton Asklund

    2017-01-01

    to clarify and explain what special operations strategic qualities exactly are. The author then elaborates on specific elements of special operations with a point of departure in the “cognitive maps of SOF” as formulated in the research question. The author recommends that in order to influence policy...... on special operations, it is essential to have insight into the instrument’s capabilities and limitations, as this provides the prerequisites for sound contextual strategic analysis....

  17. Detector dead-time effects and paralyzability in high-speed quantum key distribution

    International Nuclear Information System (INIS)

    Rogers, Daniel J; Bienfang, Joshua C; Nakassis, Anastase; Xu Hai; Clark, Charles W

    2007-01-01

    Recent advances in quantum key distribution (QKD) have given rise to systems that operate at transmission periods significantly shorter than the dead times of their component single-photon detectors. As systems continue to increase in transmission rate, security concerns associated with detector dead times can limit the production rate of sifted bits. We present a model of high-speed QKD in this limit that identifies an optimum transmission rate for a system with given link loss and detector response characteristics

  18. Exploring the Key Challenges: Adaptability, Sustainability, Interoperability and Security to M-payment

    OpenAIRE

    Rashmi Mantri; Junkang Feng

    2011-01-01

    Abstract: Any payment which uses mobile device as payment method is called M-payment whether it is proximity or remote and online or point of sale. Since it has been identified that mobile phone is everywhere and ever-present essential consumer device, and could be used for payment offline or online, Mobile payment has been hyped significantly. However early market adoption is facing some challenges and in need of the unanimous effort of all key players (manufacturers, mobile operators, merch...

  19. Identifying key factors and strategies for reducing industrial CO2 emissions from a non-Kyoto protocol member's (Taiwan) perspective

    International Nuclear Information System (INIS)

    Lin, Sue J.; Lu, I.J.; Lewis, Charles

    2006-01-01

    In this study we use Divisia index approach to identify key factors affecting CO 2 emission changes of industrial sectors in Taiwan. The changes of CO 2 emission are decomposed into emission coefficient, energy intensity, industrial structure and economic growth. Furthermore, comparisons with USA, Japan, Germany, the Netherlands and South Korea are made to have a better understanding of emission tendency in these countries and to help formulate our CO 2 reduction strategies for responding to the international calls for CO 2 cuts. The results show that economic growth and high energy intensity were two key factors for the rapid increase of industrial CO 2 emission in Taiwan, while adjustment of industrial structure was the main component for the decrease. Although economic development is important, Taiwan must keep pace with the international trends for CO 2 reduction. Among the most important strategies are continuous efforts to improve energy intensity, fuel mix toward lower carbon, setting targets for industrial CO 2 cuts, and advancing green technology through technology transfer. Also, the clean development mechanism (CDM) is expected to play an important role in the future

  20. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  1. Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment

    Science.gov (United States)

    Montminy, David P.

    Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information.

  2. Demonstration of statistical approaches to identify component's ageing by operational data analysis-A case study for the ageing PSA network

    International Nuclear Information System (INIS)

    Rodionov, Andrei; Atwood, Corwin L.; Kirchsteiger, Christian; Patrik, Milan

    2008-01-01

    The paper presents some results of a case study on 'Demonstration of statistical approaches to identify the component's ageing by operational data analysis', which was done in the frame of the EC JRC Ageing PSA Network. Several techniques: visual evaluation, nonparametric and parametric hypothesis tests, were proposed and applied in order to demonstrate the capacity, advantages and limitations of statistical approaches to identify the component's ageing by operational data analysis. Engineering considerations are out of the scope of the present study

  3. Moderated mediation to identify the knowledge stocks, learning flows and barriers at a Dutch telecom operator

    NARCIS (Netherlands)

    de Schryver, Tom; Rosendaal, Bas

    2013-01-01

    Drawing on the 4I-model of Crossan et al. (1999), we have identified the knowledge stocks, learning flows and barriers at a Dutch telecom operator by means of moderated mediation. In this company, the strategic relevant knowledge stocks move in the same direction and many processes support their

  4. Selecting of key safety parameters in reactor nuclear safety supervision

    International Nuclear Information System (INIS)

    He Fan; Yu Hong

    2014-01-01

    The safety parameters indicate the operational states and safety of research reactor are the basis of nuclear safety supervision institution to carry out effective supervision to nuclear facilities. In this paper, the selecting of key safety parameters presented by the research reactor operating unit to National Nuclear Safety Administration that can express the research reactor operational states and safety when operational occurrence or nuclear accident happens, and the interrelationship between them are discussed. Analysis shows that, the key parameters to nuclear safety supervision of research reactor including design limits, operational limits and conditions, safety system settings, safety limits, acceptable limits and emergency action level etc. (authors)

  5. Operational Test Director Guide. Change 4.

    Science.gov (United States)

    1982-09-20

    necessity for special procedures or "Privacy Act" statements. d. Social Security Numbers are considered " personal information" and should not normaily be...projects with an OTD assigned from within the Headquarters, the OTD and OTC may be the same person , or the OTC may act in a normal section head...time OPTEV- FOR can influence major system charateristics . e. Identify key development risk areas (technical and operational). Insure that the proposed

  6. Identifying key nodes in multilayer networks based on tensor decomposition.

    Science.gov (United States)

    Wang, Dingjie; Wang, Haitao; Zou, Xiufen

    2017-06-01

    The identification of essential agents in multilayer networks characterized by different types of interactions is a crucial and challenging topic, one that is essential for understanding the topological structure and dynamic processes of multilayer networks. In this paper, we use the fourth-order tensor to represent multilayer networks and propose a novel method to identify essential nodes based on CANDECOMP/PARAFAC (CP) tensor decomposition, referred to as the EDCPTD centrality. This method is based on the perspective of multilayer networked structures, which integrate the information of edges among nodes and links between different layers to quantify the importance of nodes in multilayer networks. Three real-world multilayer biological networks are used to evaluate the performance of the EDCPTD centrality. The bar chart and ROC curves of these multilayer networks indicate that the proposed approach is a good alternative index to identify real important nodes. Meanwhile, by comparing the behavior of both the proposed method and the aggregated single-layer methods, we demonstrate that neglecting the multiple relationships between nodes may lead to incorrect identification of the most versatile nodes. Furthermore, the Gene Ontology functional annotation demonstrates that the identified top nodes based on the proposed approach play a significant role in many vital biological processes. Finally, we have implemented many centrality methods of multilayer networks (including our method and the published methods) and created a visual software based on the MATLAB GUI, called ENMNFinder, which can be used by other researchers.

  7. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  8. Effects of operational shocks on key microbial populations for biogas production in UASB (Upflow Anaerobic Sludge Blanket) reactors

    International Nuclear Information System (INIS)

    Couras, C.S.; Louros, V.L.; Grilo, A.M.; Leitão, J.H.; Capela, M.I.; Arroja, L.M.; Nadais, M.H.

    2014-01-01

    This work compares the overall performance and biogas production of continuous and intermittent UASB (Upflow Anaerobic Sludge Blanket) reactors treating dairy wastewater and subjected to fat, hydraulic and temperature shocks. The systems were monitored for methane production, effluent concentration, volatile fatty acids, and microbial populations of the Eubacteria, Archaea and Syntrophomonadaceae groups. This last microbial group has been reported in literature as being determinant for the degradation of fatty substrates present in the wastewater and subsequent biogas production. Results show that both continuous and intermittent systems supported the applied shocks. However, the intermittent systems exhibited better performance than the continuous systems in biogas production and physical-chemical parameters. Syntrophomonadaceae microbial group was present in the intermittent systems, but was not detected in the biomass from the continuous systems. Hydraulic and temperature shocks, but not the fat shock, caused severe losses in the relative abundance of the Syntrophomonadaceae group in intermittent systems, leading to undetectable levels during the temperature shock. The severity of the effects of the applied shocks on the key microbial group Syntrophomonadaceae, were classified as: fats < hydraulic < temperature. Results from a full-scale anaerobic reactor confirm the effect of intermittent operation on the presence of Syntrophomonadaceae and the effect on reactor performance. - Highlights: • We compared intermittent and continuous UASB reactors upon operational shocks. • Syntrophomonadaceae key microbial group for maximizing biogas was quantified by FISH. • Syntrophomonadaceae is present in intermittent but not in continuous UASB reactors. • Syntrophomonadaceae abundance increases with fat shock in intermittent UASB reactor. • Syntrophomonadaceae abundance decreases with hydraulic or temperature shock

  9. Identifying key performance indicators in food technology contract R&D

    NARCIS (Netherlands)

    Flipse, S.M.; Sanden, van der M.C.A.; Velden, van der T.; Fortuin, F.T.J.M.; Omta, S.W.F.; Osseweijer, P.

    2013-01-01

    Innovating companies increasingly rely on outsourcing to Contract Research Organisations (CROs) for their Research and Development (R&D), which are largely understudied. This paper presents the outcome of a case study in the field of food technology contract research, identifying context

  10. Analysis of selected methods for the recovery of encrypted WEP key

    Science.gov (United States)

    Wójtowicz, Sebastian; Belka, Radosław

    2014-11-01

    This paper deals with some of the WEP (Wired Equivalent Privacy) key decryption methods based on aircrack-ng software, which was embedded in Backtrack operating system (Linux distribution). The 64-bit (40-bit) and 128-bit (104- bit) key encrypted with RC4 cipher weakness was shown. Research methods were made in different network environments. In this work we compared different types of keys to check how strong the RC4 stream cipher can be. The 40-bit and 104-bit WEP key has been tested on IEEE 802.11 based wireless LAN using laptop with live-CD Linux operating system. A short analysis of key creation methods was performed to compare the amount of time necessary to decrypt random and nonrandom WEP keys.

  11. Community Advisory Boards Guiding Engaged Research Efforts within a Clinical Translational Sciences Award: Key Contextual Factors Explored.

    Science.gov (United States)

    Halladay, Jacqueline R; Donahue, Katrina E; Sleath, Betsy; Reuland, Dan; Black, Adina; Mitchell, C Madeline; Breland, Carol E; Coyne-Beasley, Tamera; Mottus, Kathleen; Watson, Sable Noelle; Lewis, Virginia; Wynn, Mysha; Corbie-Smith, Giselle

    2017-01-01

    Engaging stakeholders in research carries the promise of enhancing the research relevance, transparency, and speed of getting findings into practice. By describing the context and functional aspects of stakeholder groups, like those working as community advisory boards (CABs), others can learn from these experiences and operationalize their own CABs. Our objective is to describe our experiences with diverse CABs affiliated with our community engagement group within our institution's Clinical Translational Sciences Award (CTSA). We identify key contextual elements that are important to administering CABs. A group of investigators, staff, and community members engaged in a 6-month collaboration to describe their experiences of working with six research CABs. We identified the key contextual domains that illustrate how CABS are developed and sustained. Two lead authors, with experience with CABs and identifying contextual domains in other work, led a team of 13 through the process. Additionally, we devised a list of key tips to consider when devising CABs. The final domains include (1) aligned missions among stakeholders (2) resources/support, (3) defined operational processes/shared power, (4) well-described member roles, and (5) understanding and mitigating challenges. The tips are a set of actions that support the domains. Identifying key contextual domains was relatively easy, despite differences in the respective CAB's condition of focus, overall mission, or patient demographics represented. By contextualizing these five domains, other research and community partners can take an informed approach to move forward with CAB planning and engaged research.

  12. Multi-party quantum key agreement with five-qubit brown states

    Science.gov (United States)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  13. Community engagement as conflict prevention: Understanding the social license to operate

    Science.gov (United States)

    Knih, Dejana

    This thesis examines community engagement as a form of conflict prevention in order to obtain the social license to operate (SLO) in Alberta's oil and gas industry. It does this by answering the question: what are the key elements of the Social License to Operate and how can these elements be applied to community engagement/consultation in a way that prevents conflicts in Alberta's oil and gas industry? The underlying assumption of this thesis is that building good relationships and working collaboratively functions as a form of conflict prevention and that this in turn leads to the SLO. This thesis outlines the key features of both successful community engagement and of the SLO, to provide a guideline for what is needed to obtain the SLO. Data was collected from semi-structured interviews and through a literature review. The data analysis concluded that there are direct parallels between the key elements of effective community engagement and the key elements of the SLO as identified in the interviews. These parallels are: knowing the community, addressing community needs, corporate social responsibility, relationship building, follow through and evidence for what has been done, executive buy-in, excellent communication, and open dialogue, all within a process which is principled (there is trust, understanding, transparency and respect), inclusive, dynamic, flexible, ongoing, and long-term. Moreover, the key elements of effective community engagement and of the SLO identified in the interviews also overlapped with those found in the literature review, with only one exception. The literature review explicitly named early involvement as a key element of both effective community engagement and the SLO, whereas the interview participants only explicitly indicated it as a key factor of community engagement and implied it to be a key element of the SLO.

  14. Exact solution of a key equation in a finite stellar atmosphere by the method of Laplace transform and linear singular operators

    International Nuclear Information System (INIS)

    Das, R.N.

    1980-01-01

    The key equation which commonly appears for radiative transfer in a finite stellar atmosphere having ground reflection according to Lambert's law is considered in this paper. The exact solution of this equation is obtained for surface quantities in terms of the X-Y equations of Chandrasekhar by the method of Laplace transform and linear singular operators. This exact method is widely applicable for obtaining the solution for surface quantities in a finite atmosphere. (orig.)

  15. Development of an operator`s mental model acquisition system. 1. Estimation of a physical mental model acquisition system

    Energy Technology Data Exchange (ETDEWEB)

    Ikeda, Mitsuru; Mizoguchi, Riichirou [Inst. of Scientific and Industrial Research, Osaka Univ., Ibaraki (Japan); Yoshikawa, Shinji; Ozawa, Kenji

    1997-03-01

    This report describes a technical survey of acquisition method of an operator`s understanding for functions and structures of his target nuclear plant. This method is to play a key role in the information processing framework to support on-training operators in forming their knowledge of the nuclear plants. This kind of technical framework is aiming at enhancing human operator`s ability to cope with anomaly plant situations which are difficult to expect from preceding experiences or engineering surveillance. In these cases, cause identifications and responding operation selections are desired to made not only empirically but also based on thoughts about possible phenomena to take place within the nuclear plant. This report focuses on a particular element technique, defined as `explanation-based knowledge acquisition`, as the candidate technique to potentially be extended to meet the requirement written above, and discusses about applicability to the learning support system and about necessary improvements, to identify future technical developments. (author)

  16. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  17. 47{sup th} Annual conference on nuclear technology (AMNT 2016). Key topics / Outstanding know-how and sustainable innovations - enhanced safety and operation excellence

    Energy Technology Data Exchange (ETDEWEB)

    Raetzke, Christian [CONLAR - Consulting on Nuclear Law, Licensing and Regulation, Leipzig (Germany); Fischer, Erwin [PreussenElektra GmbH, Hannover (Germany). Management Board; Mohrbach, Ludger [VGB PowerTech e.V., Essen (Germany). Competence Center ' ' Nuclear Power Plants' '

    2016-08-15

    Summary report on the Key Topics ''Outstanding Know-How and Sustainable Innovations'' and ''Enhanced Safety and Operation Excellence'' of the 47{sup th} Annual Conference on Nuclear Technology (AMNT 2016) held in Hamburg, 10 to 12 May 2016. Other Sessions of AMNT 2016 will be covered in further issues of atw.

  18. Key principles to improve programmes and interventions in complementary feeding.

    Science.gov (United States)

    Lutter, Chessa K; Iannotti, Lora; Creed-Kanashiro, Hilary; Guyon, Agnes; Daelmans, Bernadette; Robert, Rebecca; Haider, Rukhsana

    2013-09-01

    Although there are some examples of successful complementary feeding programmes to promote healthy growth and prevent stunting at the community level, to date there are few, if any, examples of successful programmes at scale. A lack of systematic process and impact evaluations on pilot projects to generate lessons learned has precluded scaling up of effective programmes. Programmes to effect positive change in nutrition rarely follow systematic planning, implementation, and evaluation (PIE) processes to enhance effectiveness over the long term. As a result a set of programme-oriented key principles to promote healthy growth remains elusive. The purpose of this paper is to fill this gap by proposing a set of principles to improve programmes and interventions to promote healthy growth and development. Identifying such principles for programme success has three requirements: rethinking traditional paradigms used to promote improved infant and young child feeding; ensuring better linkages to delivery platforms; and, improving programming. Following the PIE model for programmes and learning from experiences from four relatively large-scale programmes described in this paper, 10 key principles are identified in the areas of programme planning, programme implementation, programme evaluation, and dissemination, replication, and scaling up. Nonetheless, numerous operational research questions remain, some of which are highlighted in this paper. © 2013 John Wiley & Sons Ltd.

  19. Examining the Key Factors Affecting e-Service Quality of Small Online Apparel Businesses in Malaysia

    Directory of Open Access Journals (Sweden)

    Che Nawi Noorshella

    2015-04-01

    Full Text Available e-Service quality (eSQ is increasingly recognized as an important aspect, as well as the key to determining the competitive advantage and factor in the long-term retention of firms operating online. This study, therefore, is aimed at identifying the key determinants of eSQ among the small online apparel businesses in Malaysia. This study used a cross-sectional design, and data were collected from 765 customers who purchased apparel online at the point-of-purchase. Findings of this study indicate that “product information quality,” “website design,” “security and privacy,” and “expected consumer service” are the key determinants of eSQ among small online apparel businesses in Malaysia. The implication for the owner-managers of the apparel businesses in Malaysia is that they must be aware of the significance of the key eSQ indicators while designing their businesses, to attract and retain customers.

  20. Operations management system

    Science.gov (United States)

    Brandli, A. E.; Eckelkamp, R. E.; Kelly, C. M.; Mccandless, W.; Rue, D. L.

    1990-01-01

    The objective of an operations management system is to provide an orderly and efficient method to operate and maintain aerospace vehicles. Concepts are described for an operations management system and the key technologies are highlighted which will be required if this capability is brought to fruition. Without this automation and decision aiding capability, the growing complexity of avionics will result in an unmanageable workload for the operator, ultimately threatening mission success or survivability of the aircraft or space system. The key technologies include expert system application to operational tasks such as replanning, equipment diagnostics and checkout, global system management, and advanced man machine interfaces. The economical development of operations management systems, which are largely software, will require advancements in other technological areas such as software engineering and computer hardware.

  1. IAEA activity on operator support systems in nuclear power plants

    International Nuclear Information System (INIS)

    Dounaev, V.; Fujita, Y.; Juslin, K.; Haugset, K.; Lux, I.; Naser, J.

    1994-01-01

    Various operator support systems for nuclear power plants are already operational or under development in the IAEA Member States. Operator support systems are based on intelligent data processing and, in addition to plant operation, they are also becoming more important for safety. A key feature of operator support systems is their availability to restructure data to increase its relevance for a given situation. This can improve the user's ability to identify plant mode, system state, and component state and to identify and diagnose faults. Operator support systems can also assist the user in planning and implementing corrective actions to improve the nuclear power plant's availability and safety. In September 1991, the IAEA Committee for Contractual Scientific Services approved the Co-ordinated Research Programme (CRP) on ''Operator Support Systems in Nuclear Power Plants'' in the framework of the Project ''Man-Machine Interface Studies''. The main objective of this programme is to provide guidance and technology transfer for the development and implementation of operator support systems. This includes the experience with human-machine interfaces and closely related issues such as instrumentation and control, the use of computers in nuclear power plants, and operator qualification. (author)

  2. In-Silico Integration Approach to Identify a Key miRNA Regulating a Gene Network in Aggressive Prostate Cancer

    Science.gov (United States)

    Colaprico, Antonio; Bontempi, Gianluca; Castiglioni, Isabella

    2018-01-01

    Like other cancer diseases, prostate cancer (PC) is caused by the accumulation of genetic alterations in the cells that drives malignant growth. These alterations are revealed by gene profiling and copy number alteration (CNA) analysis. Moreover, recent evidence suggests that also microRNAs have an important role in PC development. Despite efforts to profile PC, the alterations (gene, CNA, and miRNA) and biological processes that correlate with disease development and progression remain partially elusive. Many gene signatures proposed as diagnostic or prognostic tools in cancer poorly overlap. The identification of co-expressed genes, that are functionally related, can identify a core network of genes associated with PC with a better reproducibility. By combining different approaches, including the integration of mRNA expression profiles, CNAs, and miRNA expression levels, we identified a gene signature of four genes overlapping with other published gene signatures and able to distinguish, in silico, high Gleason-scored PC from normal human tissue, which was further enriched to 19 genes by gene co-expression analysis. From the analysis of miRNAs possibly regulating this network, we found that hsa-miR-153 was highly connected to the genes in the network. Our results identify a four-gene signature with diagnostic and prognostic value in PC and suggest an interesting gene network that could play a key regulatory role in PC development and progression. Furthermore, hsa-miR-153, controlling this network, could be a potential biomarker for theranostics in high Gleason-scored PC. PMID:29562723

  3. Quality Improvement in Hospitals: Identifying and Understanding Behaviors

    Directory of Open Access Journals (Sweden)

    Lukasz M. Mazur

    2012-01-01

    Full Text Available Improving operational performance in hospitals is complicated, particularly if process improvement requires complex behavioral changes. Using single-loop and double-loop learning theory as a foundation, the purpose of this research is to empirically uncover key improvement behaviors and the factors that may be associated with such behaviors in hospitals. A two-phased approach was taken to collect data regarding improvement behaviors and associated factors, and data analysis was conducted using methods proposed by grounded theorists. The contributions of this research are twofold. First, five key behaviors related to process improvement are identified, namely Quick Fixing, Initiating, Conforming, Expediting, and Enhancing. Second, based on these observed behaviors, a set of force field diagrams is developed to structure and organize possible factors that are important to consider when attempting to change improvement behaviors. This begins to fill the gap in the knowledge about what factors drive effective improvement efforts in hospital settings.

  4. Resilience Analysis of Key Update Strategies for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Severe resource limitations in certain types of networks lead to various open issues in security. Since such networks usually operate in unattended or hostile environments, revoking the cryptographic keys and establishing (also distributing) new keys – which we refer to as key update – is a criti...

  5. McArthur River project - the future of Key Lake

    International Nuclear Information System (INIS)

    Spross, J.

    1994-01-01

    The Key Lake mill has operated since the fall of 1983. The ore from both Key Lake open pits will be depleted by 1997. It is planned to use this mill, located about 60 km southwest of McArthur, to process the McArthur River ore. While the geological data collected so far on the McArthur deposit are encouraging, more information of the deposit is needed before any detailed mine planning can begin. The surface drilling program identified the orebody and provided information on the geomechanical and hydrological properties of the overlying sandstone. It was proposed to conduct an underground exploration program to further delineate the orebody. This was approved following a public hearing and review process. This program involves the sinking of a 630 metre deep shaft and the driving of one or two drifts along a portion of the orebody. From these drifts, exploration drilling every 10 m to 15 m through the orebody will provide the information required for the preparation of a feasibility study and an Environmental Impact Statement (EIS). (author). 4 refs., 8 figs

  6. The costs and benefits of embedded generation islanding operation

    Energy Technology Data Exchange (ETDEWEB)

    Castro-Sayas, F.; Clarke, G.D.

    2002-07-01

    This report describes the results of a study commissioned by the UK Department of Trade and Industry to identify the technical, legal and commercial issues of islanded embedded generation and to quantify the costs and benefits. Technical considerations affecting island mode operation include security of supply requirements, the licence duty of distribution network operators (DNOs) to comply with 'group demand' restoration times, 'guaranteed standards' licence requirements governing restoration of supplies to customers, and frequency and voltage control. The economics of islanded embedded generation are discussed and key factors noted.

  7. Ergonomics perspective for identifying and reducing internal operative flow disruption for laparoscopic urological surgery.

    Science.gov (United States)

    Al-Hakim, Latif; Xiao, Jiaquan; Sengupta, Shomik

    2017-12-01

    The aim of this study is to examine operative flow disruption that occurs inside the surgical field, (internal operative flow disruption (OFD)), during urological laparoscopies, and to relate those events to external ergonomics environment in terms of monitor location, level of instruments' handles, and location of surgical team members. According to the our best knowledge, this is the first study of its kind. A combination of real and video-aided observational study was conducted in the operating rooms at hospitals in Australia and China. Brain storming sessions were first conducted to identify the main internal OFD events, and the observable reasons, potential external, and latent ergonomic factors were listed. A prospective observational study was then conducted. The observer's records and the related video records of internal surgical fields were analysed. Procedures were categorised into groups based on similarity in ergonomics environment. The mapping process revealed 39 types of internal OFD events resulted from six reasons. A total of 24 procedures were selected and arranged into two groups, each with twelve procedures. Group A was carried out under satisfactory ergonomics environment, while Group B was conducted under unsatisfactory ergonomics environment. A total of 1178 OFD events were detected delaying the total observed operative times (2966 min) by 220 min (7.43%). Average OFD/h in group A was less than 15, while in group B about 29 OFD/h. There are two main latent ergonomics factors affecting the surgeon's performance; non-physiological posture and long-period static posture. The delays and number of internal OFD were nearly doubled where procedures were conducted under unsatisfactory external ergonomics environment. Some events such as stopping operation and irrelevant conversations during long procedures may have a positive influence on the surgeon's performance.

  8. The Key to Successful Operational Due Diligence: The right data, at the right time, analysed in the right way

    DEFF Research Database (Denmark)

    Haubjerg, Mathias; Porsgaard, Chris Berg; Herbert-Hansen, Zaza Nadja Lee

    Purpose: The purpose of this paper is to describe both qualitative and quantitative operational determinants influencing the acquisition decision in the due diligence phase of a Merger & acquisition (M&A). The operational due diligence (ODD) process is largely unexplored in extant literature....... ● Scalability & Risk – Capabilities, technologies and external environment. ● Improvement Potentials – Rationalization and Efficiency. ● Synergies - Facility consolidation, Overhead reduction, purchasing power, other redundancies.Each of these areas is supported by a range of underlying data points...... and researchers by (i) identifying operational determinants influencing the acquisition decision in the due diligence phase, and (ii) structuring a practical end-to-end framework which incorporates all supply chain elements, ensuring a comprehensive ODD. Practical implications: The research is focused around...

  9. Systemic Thinking and Requisite Holism in Mastering Logistics Risks: the Model for Identifying Risks in Organisations and Supply Chain

    OpenAIRE

    Borut Jereb; Teodora Ivanuša; Bojan Rosi

    2013-01-01

    Risks in logistic processes represent one of the major issues in supply chain management nowadays. Every organization strives for success, and uninterrupted operations are the key factors in achieving this goal, which cannot be achieved without efficient risk management. In the scope of supply chain risk research, we identified some key issues in the field, the major issue being the lack of standardization and models, which can make risk management in an organization easier and more efficient...

  10. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science [version 2; referees: 1 approved, 2 approved with reservations

    Directory of Open Access Journals (Sweden)

    Heidi Holst Madsen

    2016-09-01

    Full Text Available Unique identifiers (UID are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI, incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of

  11. Key strategies and criteria to redesigning the nuclear fuel cycle

    International Nuclear Information System (INIS)

    Iakimets, V.N.

    1999-01-01

    Design of the nuclear fuel cycle (NFC) impacts future development of the nuclear industry on the one hand and the scale of the technological and environmental risk for future generations on the other hand. Adequate protection for humans and the biosphere will depend upon careful and unbiased design of the NFC. This paper addresses the two following problems: 1. What are the key strategies in restructuring nuclear power production itself in terms of choosing the safest possible variant of the NFC and identifying reasonable approaches to redesigning decision-making procedures for design, siting and operation, and decommissioning of new facilities, which have to be based on a strong legally approved citizen involvement. 2. What criteria should be used to evaluate any strategic or mid-term decisions related to the NFC, how can these be made operational, and what procedures may we apply to evaluate alternatives and select the most preferable one mutually acceptable to both citizens and nuclear specialists?

  12. Genome-wide expression profiling analysis to identify key genes in the anti-HIV mechanism of CD4+ and CD8+ T cells.

    Science.gov (United States)

    Gao, Lijie; Wang, Yunqi; Li, Yi; Dong, Ya; Yang, Aimin; Zhang, Jie; Li, Fengying; Zhang, Rongqiang

    2018-07-01

    Comprehensive bioinformatics analyses were performed to explore the key biomarkers in response to HIV infection of CD4 + and CD8 + T cells. The numbers of CD4 + and CD8 + T cells of HIV infected individuals were analyzed and the GEO database (GSE6740) was screened for differentially expressed genes (DEGs) in HIV infected CD4 + and CD8 + T cells. Gene Ontology enrichment, KEGG pathway analyses, and protein-protein interaction (PPI) network were performed to identify the key pathway and core proteins in anti-HIV virus process of CD4 + and CD8 + T cells. Finally, we analyzed the expressions of key proteins in HIV-infected T cells (GSE6740 dataset) and peripheral blood mononuclear cells(PBMCs) (GSE511 dataset). 1) CD4 + T cells counts and ratio of CD4 + /CD8 + T cells decreased while CD8 + T cells counts increased in HIV positive individuals; 2) 517 DEGs were found in HIV infected CD4 + and CD8 + T cells at acute and chronic stage with the criterial of P-value T cells. The main biological processes of the DEGs were response to virus and defense response to virus. At chronic stage, ISG15 protein, in conjunction with IFN-1 pathway might play key roles in anti-HIV responses of CD4 + T cells; and 4) The expression of ISG15 increased in both T cells and PBMCs after HIV infection. Gene expression profile of CD4 + and CD8 + T cells changed significantly in HIV infection, in which ISG15 gene may play a central role in activating the natural antiviral process of immune cells. © 2018 Wiley Periodicals, Inc.

  13. The concept of key success factors: Theory and method

    DEFF Research Database (Denmark)

    Grunert, Klaus G.; Ellegaard, Charlotte

    1992-01-01

    Executive summary: 1. The term key success factors can be used in four different ways: a) as a necessary ingre-dient in a management information system, b) as a unique characteristic of a company, c) as a heuristic tool for managers to sharpen their thinking, d) as a description of the major skills...... and resources required to be successful in a given market. We adopt the last view. 2. The actual key success factors on a market, and those key success factors perceived by decision-makers in companies operating in the market, will be different. A number of psychological mechanisms result in misperceptions...... or resource that a business can i in, which, on the market the business is operating on, explains a major part of the observable differences in perceived value and/or relative costs. 4. Key success factors differ from core skills and resources, which are prerequisites for being on a market, but do not explain...

  14. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  15. Identifying the "Right Stuff": An Exploration-Focused Astronaut Job Analysis

    Science.gov (United States)

    Barrett, J. D.; Holland, A. W.; Vessey, W. B.

    2015-01-01

    Industrial and organizational (I/O) psychologists play a key role in NASA astronaut candidate selection through the identification of the competencies necessary to successfully engage in the astronaut job. A set of psychosocial competencies, developed by I/O psychologists during a prior job analysis conducted in 1996 and updated in 2003, were identified as necessary for individuals working and living in the space shuttle and on the International Space Station (ISS). This set of competencies applied to the space shuttle and applies to current ISS missions, but may not apply to longer-duration or long-distance exploration missions. With the 2015 launch of the first 12- month ISS mission and the shift in the 2020s to missions beyond low earth orbit, the type of missions that astronauts will conduct and the environment in which they do their work will change dramatically, leading to new challenges for these crews. To support future astronaut selection, training, and research, I/O psychologists in NASA's Behavioral Health and Performance (BHP) Operations and Research groups engaged in a joint effort to conduct an updated analysis of the astronaut job for current and future operations. This project will result in the identification of behavioral competencies critical to performing the astronaut job, along with relative weights for each of the identified competencies, through the application of job analysis techniques. While this job analysis is being conducted according to job analysis best practices, the project poses a number of novel challenges. These challenges include the need to identify competencies for multiple mission types simultaneously, to evaluate jobs that have no incumbents as they have never before been conducted, and working with a very limited population of subject matter experts. Given these challenges, under the guidance of job analysis experts, we used the following methods to conduct the job analysis and identify the key competencies for current and

  16. Demand side resource operation on the Irish power system with high wind power penetration

    DEFF Research Database (Denmark)

    Keane, A.; Tuohy, A.; Meibom, Peter

    2011-01-01

    part of the power system plant mix and contribute to the flexible operation of a power system. A model for demand side resources is proposed here that captures its key characteristics for commitment and dispatch calculations. The model is tested on the all island Irish power system, and the operation...... of the functions of conventional peaking plant. Demand side resources are also shown to be capable of improving the reliability of the system, with reserve capability identified as a key requirement in this respect....... of the model is simulated over one year in both a stochastic and deterministic mode, to illustrate the impact of wind and load uncertainty. The results illustrate that demand side resources can contribute to the efficient, flexible operation of systems with high penetrations of wind by replacing some...

  17. The unique process for the Key Lake project, Canada

    International Nuclear Information System (INIS)

    Floeter, W.

    1983-01-01

    The paper describes the Key Lake plant and its cost controls. The plant is unlike any other previously put into operation so a detailed accounting system has had to be developed to itemize all capital and operating costs. This cost system is described in detail and a distribution of capital and operating costs between major areas is given

  18. Operational Reconnaissance: Identifying the Right Problems in a Complex World

    Science.gov (United States)

    2015-05-23

    velocity of human interactions and the diverse demographics among populations as having critical impacts on land operations. Understanding these can have a...Achtung Panzer! Translated by Christopher Duffy. London, England: Arms and Armour Press, 1995. Echevarria II, Antonio J. “American Operational Art

  19. Code for plant identification (KKS) key in PC version. KKS-Schluessel-Programm in PC-Version

    Energy Technology Data Exchange (ETDEWEB)

    Pannenbaecker, K. (GABO Gesellschaft fuer Ablauforganisation und Informationsverarbeitung mbH, Erlangen (Germany) GABO Gesellschaft fuer Ablauforganisation und Informationsverarbeitung mbH, Muenchen (Germany))

    1991-11-01

    The plant identification system (KKS) as a common development of german plant operators, erection firms and also power plant oriented organisations have decisively influenced the technical-organizing activities of planning and erections as operations and maintenance of all kind of power plants. Fundamentals are three key parts, operation, armatures and function keys. Their management and application is executed by a plantidentification-key code in a PC version, which is briefly described in this report. (orig.).

  20. Continuous Variable Quantum Key Distribution Using Polarized Coherent States

    Science.gov (United States)

    Vidiella-Barranco, A.; Borelli, L. F. M.

    We discuss a continuous variables method of quantum key distribution employing strongly polarized coherent states of light. The key encoding is performed using the variables known as Stokes parameters, rather than the field quadratures. Their quantum counterpart, the Stokes operators Ŝi (i=1,2,3), constitute a set of non-commuting operators, being the precision of simultaneous measurements of a pair of them limited by an uncertainty-like relation. Alice transmits a conveniently modulated two-mode coherent state, and Bob randomly measures one of the Stokes parameters of the incoming beam. After performing reconciliation and privacy amplification procedures, it is possible to distill a secret common key. We also consider a non-ideal situation, in which coherent states with thermal noise, instead of pure coherent states, are used for encoding.

  1. 47{sup th} Annual meeting on nuclear technology (AMNT 2016). Key Topics / Enhanced safety and operation excellence and decommissioning experience and Waste management solutions

    Energy Technology Data Exchange (ETDEWEB)

    Salnikova, Tatiana [AREVA GmbH, Erlangen (Germany); Schaffrath, Andreas [Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) gGmbH, Garching (Germany)

    2016-10-15

    Summary report on the Key Topics ''Enhanced Safety and Operation Excellence'' and ''Decommissioning Experience and Waste Management Solutions'' of the 47{sup th} Annual Conference on Nuclear Technology (AMNT 2016) held in Hamburg, 10 to 12 May 2016. Other Sessions of AMNT 2016 have been and will be covered in further issues of atw.

  2. The University of Canberra quantum key distribution testbed

    International Nuclear Information System (INIS)

    Ganeshkumar, G.; Edwards, P.J.; Cheung, W.N.; Barbopoulos, L.O.; Pham, H.; Hazel, J.C.

    1999-01-01

    Full text: We describe the design, operation and preliminary results obtained from a quantum key distribution (QKD) testbed constructed at the University of Canberra. Quantum cryptographic systems use shared secret keys exchanged in the form of sequences of polarisation coded or phase encoded single photons transmitted over an optical communications channel. Secrecy of this quantum key rests upon fundamental laws of quantum physics: measurements of linear or circular photon polarisation states introduce noise into the conjugate variable and so reveal eavesdropping. In its initial realisation reported here, pulsed light from a 650nm laser diode is attenuated by a factor of 10 6 , plane-polarised and then transmitted through a birefringent liquid crystal modulator (LCM) to a polarisation sensitive single photon receiver. This transmitted key sequence consists of a 1 kHz train of weak coherent 100ns wide light pulses, polarisation coded according to the BB84 protocol. Each pulse is randomly assigned one of four polarisation states (two orthogonal linear and two orthogonal circular) by computer PCA operated by the sender ('Alice'). This quaternary polarisation shift keyed photon stream is detected by the receiver ('Bob') whose computer (PCB) randomly chooses either a linear or a circular polarisation basis. Computer PCB is also used for final key selection, authentication, privacy amplification and eavesdropping. We briefly discuss the realisation of a mesoscopic single photon QKD source and the use of the testbed to simulate a global quantum key distribution system using earth satellites. Copyright (1999) Australian Optical Society

  3. Use of a scenario-neutral approach to identify the key hydro-meteorological attributes that impact runoff from a natural catchment

    Science.gov (United States)

    Guo, Danlu; Westra, Seth; Maier, Holger R.

    2017-11-01

    Scenario-neutral approaches are being used increasingly for assessing the potential impact of climate change on water resource systems, as these approaches allow the performance of these systems to be evaluated independently of climate change projections. However, practical implementations of these approaches are still scarce, with a key limitation being the difficulty of generating a range of plausible future time series of hydro-meteorological data. In this study we apply a recently developed inverse stochastic generation approach to support the scenario-neutral analysis, and thus identify the key hydro-meteorological variables to which the system is most sensitive. The stochastic generator simulates synthetic hydro-meteorological time series that represent plausible future changes in (1) the average, extremes and seasonal patterns of rainfall; and (2) the average values of temperature (Ta), relative humidity (RH) and wind speed (uz) as variables that drive PET. These hydro-meteorological time series are then fed through a conceptual rainfall-runoff model to simulate the potential changes in runoff as a function of changes in the hydro-meteorological variables, and runoff sensitivity is assessed with both correlation and Sobol' sensitivity analyses. The method was applied to a case study catchment in South Australia, and the results showed that the most important hydro-meteorological attributes for runoff were winter rainfall followed by the annual average rainfall, while the PET-related meteorological variables had comparatively little impact. The high importance of winter rainfall can be related to the winter-dominated nature of both the rainfall and runoff regimes in this catchment. The approach illustrated in this study can greatly enhance our understanding of the key hydro-meteorological attributes and processes that are likely to drive catchment runoff under a changing climate, thus enabling the design of tailored climate impact assessments to specific

  4. Recent Enhancements in NOAA's JPSS Land Product Suite and Key Operational Applications

    Science.gov (United States)

    Csiszar, I. A.; Yu, Y.; Zhan, X.; Vargas, M.; Ek, M. B.; Zheng, W.; Wu, Y.; Smirnova, T. G.; Benjamin, S.; Ahmadov, R.; James, E.; Grell, G. A.

    2017-12-01

    A suite of operational land products has been produced as part of NOAA's Joint Polar Satellite System (JPSS) program to support a wide range of operational applications in environmental monitoring, prediction, disaster management and mitigation, and decision support. The Visible Infrared Imaging Radiometer Suite (VIIRS) on the Suomi National Polar-orbiting Partnership (NPP) and the operational JPSS satellite series forms the basis of six fundamental and multiple additional added-value environmental data records (EDRs). A major recent improvement in the land-based VIIRS EDRs has been the development of global gridded products, providing a format and science content suitable for ingest into NOAA's operational land surface and coupled numerical weather prediction models. VIIRS near-real-time Green Vegetation Fraction is now in the process of testing for full operational use, while land surface temperature and albedo are under testing and evaluation. The operational 750m VIIRS active fire product, including fire radiative power, is used to support emission modeling and air quality applications. Testing the evaluation for operational NOAA implementation of the improved 375m VIIRS active fire product is also underway. Added-value and emerging VIIRS land products include vegetation health, phenology, near-real-time surface type and surface condition change, and other biogeophysical variables. As part of the JPSS program, a global soil moisture data product has also been generated from the Advanced Microwave Scanning Radiometer 2 (AMSR2) sensor on the GCOM-W1 (Global Change Observation Mission - Water 1) satellite since July 2012. This product is included in the blended NESDIS Soil Moisture Operational Products System, providing soil moisture data as a critical input for land surface modeling.

  5. Hillslope characterization: Identifying key controls on local-scale plant communities' distribution using remote sensing and subsurface data fusion.

    Science.gov (United States)

    Falco, N.; Wainwright, H. M.; Dafflon, B.; Leger, E.; Peterson, J.; Steltzer, H.; Wilmer, C.; Williams, K. H.; Hubbard, S. S.

    2017-12-01

    Mountainous watershed systems are characterized by extreme heterogeneity in hydrological and pedological properties that influence biotic activities, plant communities and their dynamics. To gain predictive understanding of how ecosystem and watershed system evolve under climate change, it is critical to capture such heterogeneity and to quantify the effect of key environmental variables such as topography, and soil properties. In this study, we exploit advanced geophysical and remote sensing techniques - coupled with machine learning - to better characterize and quantify the interactions between plant communities' distribution and subsurface properties. First, we have developed a remote sensing data fusion framework based on the random forest (RF) classification algorithm to estimate the spatial distribution of plant communities. The framework allows the integration of both plant spectral and structural information, which are derived from multispectral satellite images and airborne LiDAR data. We then use the RF method to evaluate the estimated plant community map, exploiting the subsurface properties (such as bedrock depth, soil moisture and other properties) and geomorphological parameters (such as slope, curvature) as predictors. Datasets include high-resolution geophysical data (electrical resistivity tomography) and LiDAR digital elevation maps. We demonstrate our approach on a mountain hillslope and meadow within the East River watershed in Colorado, which is considered to be a representative headwater catchment in the Upper Colorado Basin. The obtained results show the existence of co-evolution between above and below-ground processes; in particular, dominant shrub communities in wet and flat areas. We show that successful integration of remote sensing data with geophysical measurements allows identifying and quantifying the key environmental controls on plant communities' distribution, and provides insights into their potential changes in the future

  6. Optimisation of key performance measures in air cargo demand management

    Directory of Open Access Journals (Sweden)

    Alexander May

    2014-04-01

    Full Text Available This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that for Air Cargo Revenue Management, ‘Network Optimisation’ represents a critical outcome-based performance indicator. This collaborative study contributes to existing logistics management literature, especially in the area of Revenue Management, and it seeks to enhance Revenue Management practice. It also provides a platform for Air Cargo operators seeking to improve reliability values for their key performance indicators as a means of enhancing operational monitoring power.

  7. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  8. Backward compatibility as a key measure for smooth upgrades to the LHC control system

    International Nuclear Information System (INIS)

    Baggiolini, V.; Csikos, D.; Tarasenko, P.; Zaharieva, Z.; Arruat, M.; Gorbosonov, R.

    2012-01-01

    It is a big challenge to smoothly upgrade the control system of a large operational accelerator such as the LHC without causing unnecessary downtime. We have identified backward compatibility as a key measure to achieve this, because a backward compatible component can be easily upgraded. This document describes the work the CERN Accelerator Controls group does to provide methods and tools supporting backward compatibility. We have identified four areas for which we want to provide tools: (1) dependency analysis to identify incoming dependencies, (2) backward compatibility validation to verify that API (Application Program Interface) changes are really backward compatible, (3) version upgrading with rules to clearly inform the dependent clients if a modification is backward compatible, and (4) API consolidation to clearly specify classes and methods belonging to the API and to enforce their appropriate usage

  9. Air toxic emissions from the combustion of coal: Identifying and quantifying hazardous air pollutants from US coals

    Energy Technology Data Exchange (ETDEWEB)

    Szpunar, C.B.

    1992-09-01

    This report addresses the key air toxic emissions likely to emanate from continued and expanded use of domestic coal. It identifies and quantifies those trace elements specified in the US 1990 Clean Air Act Amendments, by tabulating selected characterization data on various source coals by region, state, and rank. On the basis of measurements by various researchers, this report also identifies those organic compounds likely to be derived from the coal combustion process (although their formation is highly dependent on specific boiler configurations and operating conditions).

  10. Air toxic emissions from the combustion of coal: Identifying and quantifying hazardous air pollutants from US coals

    International Nuclear Information System (INIS)

    Szpunar, C.B.

    1992-09-01

    This report addresses the key air toxic emissions likely to emanate from continued and expanded use of domestic coal. It identifies and quantifies those trace elements specified in the US 1990 Clean Air Act Amendments, by tabulating selected characterization data on various source coals by region, state, and rank. On the basis of measurements by various researchers, this report also identifies those organic compounds likely to be derived from the coal combustion process (although their formation is highly dependent on specific boiler configurations and operating conditions)

  11. Labont? Identifies Key Issues for Health Promoters in the New World Order

    OpenAIRE

    Raphael, Dennis

    2016-01-01

    For over 35 years Ronald Labonté has been critically analyzing the state of health promotion in Canada and the world. In 1981, he identified the shortcomings of the groundbreaking Lalonde Report by warning of the seductive appeal of so-called lifestyle approaches to health. Since then, he has left a trail of critical work identifying the barriers to — and opportunities for —health promotion work. More recently, he has shown how the rise of economic globalization and acceptance of neo-liberal ...

  12. Key performance indicators for electric mining shovels and oil sands diggability

    Science.gov (United States)

    Patnayak, Sibabrata

    A shovel performance monitoring study was undertaken in two oil sands mines operated by Syncrude Canada Ltd. using performance data obtained from P&H 4100 TS and BOSS electric mining shovels. One year of shovel performance data along with geological, geotechnical, and climatic data were analyzed. The approach adopted was to use current and voltage data collected from hoist and crowd motors and to calculate the energy and/or power associated with digging. Analysis of performance data along with digital video records of operating shovels indicated that hoist and crowd motor voltages and currents can be used to identify the beginning and the end of individual dig cycles. A dig cycle identification algorithm was developed. Performance indicators such as dig cycle time, hoist motor energy and power, and crowd motor energy and power were determined. The shovel performance indicators provide important insight into how geology, equipment and operators affect the digging efficiency. The hoist motor power is a useful key performance indicator for assessing diggability. Hoist motor energy consumption per tonne of material excavated and the number of dig cycles required for loading a truck can be useful key performance indicators for assessing operator performance and productivity. Analysis of performance data along with operators team schedules showed that the performance of a shovel can be significantly influenced by the operator's digging technique while digging uniform material. Up to 25% variability in hoist motor power consumption and 50% variability in productivity was noted between different operators. Shovel type and dipper teeth configuration can also influence the power draw on electrical motors during digging. There is no common agreement existing on the influence of bitumen content on oil sands diggability. By comparing the hoist motor power consumption, it was found that the rich ore was more difficult to dig than the lean ore. Similarly, estuarine ore was more

  13. Boiler operator's handbook

    CERN Document Server

    Heselton, Ken

    2004-01-01

    Containing key information for operators and managers of large and small plants, this is an indispensable guide for those at advanced and early stages of their careers, as well as for managers interested in reducing operating expenses.

  14. on differential operators on w 1,2 space and fredholm operators

    African Journals Online (AJOL)

    A selfadjoint differential operator defined over a closed and bounded interval on Sobolev space which is a dense linear subspace of a Hilbert space over the same interval is considered and shown to be a Fredholm operator with index zero. KEY WORDS: Sobolev space, Hilbert space, dense subspace, Fredholm operator

  15. Operating experience review in development of SMART MMIS

    International Nuclear Information System (INIS)

    Suh, S. M.; Jang, G. S.; Lee, J. G.; Park, G. O.; Ko, J. H.

    2004-01-01

    We have developed HFE(Human Factors Engineering) program plan for the purpose of implementing man-machine interface system in SMART plant systematically. Elements of the plan are compatible to those of NUREG-0711, Rev.1, and OER(Operating Experience Review) is one of them. The main purpose of conducting an OER as part of HFE review is to identify HFE-related safety issues. If identified, design alternatives are carefully reviewed and selected as the way of resolution for those issues. The performing model of OER is described in this paper, showing a series of works must be done to identify and resolve HFE-related issues within the scope of SMART HFE works. Then two key issues and design alternatives resolving them are presented for examples

  16. Key Performance Parameter Driven Technology Goals for Electric Machines and Power Systems

    Science.gov (United States)

    Bowman, Cheryl; Jansen, Ralph; Brown, Gerald; Duffy, Kirsten; Trudell, Jeffrey

    2015-01-01

    Transitioning aviation to low carbon propulsion is one of the crucial strategic research thrust and is a driver in the search for alternative propulsion system for advanced aircraft configurations. This work requires multidisciplinary skills coming from multiple entities. The feasibility of scaling up various electric drive system technologies to meet the requirements of a large commercial transport is discussed in terms of key parameters. Functional requirements are identified that impact the power system design. A breakeven analysis is presented to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  17. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  18. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  19. Mining key elements for severe convection prediction based on CNN

    Science.gov (United States)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  20. The quality of operative notes at a general surgery unit.

    Science.gov (United States)

    Rogers, A; Bunting, M; Atherstone, A

    2008-09-01

    With the increasingly litigious nature of medical practice, accurate documentation is critical. This is particularly true for operative procedures, and medical councils have identified this and published guidelines to aid surgeons. However, these remain a frequently cited weakness in their defence in medico-legal cases. This study assessed the accuracy of operative notes in a general surgery unit in order to improve our practice. An audit of 100 consecutive operative notes was performed, and notes were assessed using the Royal College of Surgeons guidelines. The quality of note-taking of trainees was compared with that of consultant surgeons. A series of operation note pro formas was designed in response to the findings. Of the notes, 66% were completed by trainees. The vast majority of notes had no diagram to demonstrate the surgical findings or illustrate the actions. Specialist surgeons were more likely to describe the actions accurately, but less likely to describe wound closure methods or dressings used. They were also less likely to complete adequate postoperative orders. This study identifies key areas of weakness in our operative note-keeping. Pro formas should be introduced and made available for commonly performed procedures, and diagrams should be used wherever possible.

  1. Energy management in mobile devices with the cinder operating system

    KAUST Repository

    Roy, Arjun

    2011-01-01

    We argue that controlling energy allocation is an increasingly useful and important feature for operating systems, especially on mobile devices. We present two new low-level abstractions in the Cinder operating system, reserves and taps, which store and distribute energy for application use. We identify three key properties of control - isolation, delegation, and subdivision - and show how using these abstractions can achieve them. We also show how the architecture of the HiStar information-flow control kernel lends itself well to energy control. We prototype and evaluate Cinder on a popular smartphone, the Android G1. Copyright © 2011 ACM.

  2. Supporting human performance in operations - principles for new nuclear build

    International Nuclear Information System (INIS)

    Lane, L.; Davey, E.

    2006-01-01

    Operational experience worldwide continues to demonstrate that human performance is a key factor in the ongoing safety, production, and protection of investment in operation of nuclear plants for electricity generation. Human performance in support of plant operational objectives can be influenced by a range of factors, for example: organizational culture and expectations; role assignments, training, and individual and team behaviours; and the support offered by the workplace environment, tools, and task design. This paper outlines a perspective on some of the principles that should be considered for application in the design of new nuclear build to facilitate support for human performance in plant operations. The principles identified focus on but are not limited to the tasks of shift staff, and are derived from the observations and experience of the authors who are experienced with control room operations in current plants. (author)

  3. Supporting human performance in operations - principles for new nuclear build

    Energy Technology Data Exchange (ETDEWEB)

    Lane, L. [Ontario Power Generation, Darlington Nuclear Div., Bowmanville, Ontario (Canada); Davey, E. [Crew Systems Solutions, Deep River, Ontario (Canada)

    2006-07-01

    Operational experience worldwide continues to demonstrate that human performance is a key factor in the ongoing safety, production, and protection of investment in operation of nuclear plants for electricity generation. Human performance in support of plant operational objectives can be influenced by a range of factors, for example: organizational culture and expectations; role assignments, training, and individual and team behaviours; and the support offered by the workplace environment, tools, and task design. This paper outlines a perspective on some of the principles that should be considered for application in the design of new nuclear build to facilitate support for human performance in plant operations. The principles identified focus on but are not limited to the tasks of shift staff, and are derived from the observations and experience of the authors who are experienced with control room operations in current plants. (author)

  4. Key Performance Indicators in Radiology: You Can't Manage What You Can't Measure.

    Science.gov (United States)

    Harvey, H Benjamin; Hassanzadeh, Elmira; Aran, Shima; Rosenthal, Daniel I; Thrall, James H; Abujudeh, Hani H

    2016-01-01

    Quality assurance (QA) is a fundamental component of every successful radiology operation. A radiology QA program must be able to efficiently and effectively monitor and respond to quality problems. However, as radiology QA has expanded into the depths of radiology operations, the task of defining and measuring quality has become more difficult. Key performance indicators (KPIs) are highly valuable data points and measurement tools that can be used to monitor and evaluate the quality of services provided by a radiology operation. As such, KPIs empower a radiology QA program to bridge normative understandings of health care quality with on-the-ground quality management. This review introduces the importance of KPIs in health care QA, a framework for structuring KPIs, a method to identify and tailor KPIs, and strategies to analyze and communicate KPI data that would drive process improvement. Adopting a KPI-driven QA program is both good for patient care and allows a radiology operation to demonstrate measurable value to other health care stakeholders. Copyright © 2015 Mosby, Inc. All rights reserved.

  5. Pharmacy patronage: identifying key factors in the decision making process using the determinant attribute approach.

    Science.gov (United States)

    Franic, Duska M; Haddock, Sarah M; Tucker, Leslie Tootle; Wooten, Nathan

    2008-01-01

    To use the determinant attribute approach, a research method commonly used in marketing to identify the wants of various consumer groups, to evaluate consumer pharmacy choice when having a prescription order filled in different pharmacy settings. Cross sectional. Community independent, grocery store, community chain, and discount store pharmacies in Georgia between April 2005 and April 2006. Convenience sample of adult pharmacy consumers (n = 175). Survey measuring consumer preferences on 26 attributes encompassing general pharmacy site features (16 items), pharmacist characteristics (5 items), and pharmacy staff characteristics (5 items). 26 potential determinant attributes for pharmacy selection. 175 consumers were surveyed at community independent (n = 81), grocery store (n = 44), community chain (n = 27), or discount store (n = 23) pharmacy settings. The attributes of pharmacists and staff at all four pharmacy settings were shown to affect pharmacy patronage motives, although consumers frequenting non-community independent pharmacies were also motivated by secondary convenience factors, e.g., hours of operation, and prescription coverage. Most consumers do not perceive pharmacies as merely prescription-distribution centers that vary only by convenience. Prescriptions are not just another economic good. Pharmacy personnel influence pharmacy selection; therefore, optimal staff selection and training is likely the greatest asset and most important investment for ensuring pharmacy success.

  6. A Conceptual Model for School-Based Management Operation and Quality Assurance in Nigerian Secondary Schools

    Science.gov (United States)

    Ayeni, Adeolu Joshua; Ibukun, Williams Olusola

    2013-01-01

    This paper examined the School-Based Management Committee's (SBMC) involvement and effectiveness in school governance, curriculum implementation and students' learning outcomes in Nigerian secondary schools; the major challenges facing effective operation of SBMCs were identified as low capacity of key members of the SBMCs; poor attendance of…

  7. Space-based observatories providing key data for climate change applications

    Science.gov (United States)

    Lecomte, J.; Juillet, J. J.

    2016-12-01

    The Sentinel-1 & 3 mission are part of the Copernicus program, previously known as GMES (Global Monitoring for Environment and Security), whose overall objective is to support Europe's goals regarding sustainable development and global governance of the environment by providing timely and quality data, information, services and knowledge. This European Earth Observation program is led by the European Commission and the space infrastructure is developed under the European Space Agency leadership. Many services will be developed through the Copernicus program among different thematic areas. The climate change is one of this thematic area and the Sentinel-1 & 3 satellites will provide key space-based observations in this area. The Sentinel-1 mission is based on a constellation of 2 identical satellites each one embarking C-SAR Instrument and provides capability for continuous radar mapping of the Earth with enhanced revisit frequency, coverage, timeliness and reliability for operational services and applications requiring long time series. In particular, Sentinel 1 provides all-weather, day-and-night estimates of soil moisture, wind speed and direction, sea ice, continental ice sheets and glaciers. The Sentinel-3 mission will mainly be devoted to the provision of Ocean observation data in routine, long term (20 years of operations) and continuous fashion with a consistent quality and a very high level of availability. Among these data, very accurate surface temperatures and topography measurements will be provided and will constitute key indicators, once ingested in climate change models, for identifying climate drivers and expected climate impacts. The paper will briefly recall the satellite architectures, their main characteristics and performance. The inflight performance and key features of their images or data of the 3 satellites namely Sentinel 1A, 1B and 3A will be reviewed to demonstrate the quality and high scientific potential of the data as well as their

  8. Identifying Key Flavors in Strawberries Driving Liking via Internal and External Preference Mapping.

    Science.gov (United States)

    Oliver, Penelope; Cicerale, Sara; Pang, Edwin; Keast, Russell

    2018-04-01

    Australian consumers desire the development of a more flavorsome Australian strawberry cultivar. To aid in the development of well-liked strawberries, the attributes driving liking need to be identified. The objective of this research is to apply Preference Mapping (PM) techniques to the descriptive profile of commercial and newly bred strawberry cultivars, together with consumer preference data to determine the flavors contributing to liking. A trained sensory panel (n = 12) used Quantitative Descriptive Analysis (QDA®) methodology to evaluate two appearance, seven aroma, five texture, 10 flavor and 10 aftertaste attributes of three commercial strawberry cultivars and six elite breeding lines grown in Victoria, Australia. Strawberry consumers (n = 150) assessed their liking of the same strawberry cultivars. QDA® significantly discriminated strawberries on 28 of the 34 sensory attributes. There were significant differences in hedonic ratings of strawberries (F(8,714) = 11.5, P = 0.0001), with Hierarchical Cluster Analysis (HCA) identifying three consumer clusters each displaying differing patterns of preference. Internal and external PM techniques were applied to the data to identify the attributes driving consumer acceptability. Sweet, berry, caramel, fruity and floral attributes were identified as most contributing to liking. Sour, citrus, green, astringent, firm and gritty attributes were conversely associated with a reduction in consumer liking. Elite Lines 2 and 6 have been identified as having the broadest appeal, satisfying between 60% and 70% of consumers in the population assessed, thus the introduction of these cultivars should satisfy the largest group of consumers in the Australian market. The results of this research could be applied to breeding programs, to ensure newly bred cultivars express characteristics that were identified as well-liked amongst consumers. In addition, this research provides evidence for marketing strawberries by

  9. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  10. Key issues for the control of refueling outage duration and costs in PWR nuclear power plants

    International Nuclear Information System (INIS)

    Degrave, C.; Martin-Onraet, M.

    2000-01-01

    For several years, EDF, within the framework of the CIDEM project and in collaboration with some German Utilities, has undertaken a detailed review of the operating experience both of its own NPP and of foreign units, in order to improve the performances of future units under design, particularly the French-German European Pressurized Reactor (EPR) project. This review made it possible to identify the key issues allowing to decrease the duration of refueling and maintenance outages. These key issues can be classified in 3 categories: Design; Maintenance and Logistic Support; Outage Management. Most key issues in the design field and some in the logistic support field have been studied and could be integrated into the design of any future PWR unit, as for the EPR project. Some of them could also be adapted to current plants, provided they are feasible and profitable. The organization must be tailored to each country, utility or period: it widely depends on the power production environment, particularly in a deregulation context. (author)

  11. Verification and validation--The key to operating plant software reliability

    International Nuclear Information System (INIS)

    Daughtrey, H.T.; Daggett, P.W.; Schamp, C.A.

    1983-01-01

    This paper discusses the design and implementation of a verification and validation (V and V) plan for reviewing the microcomputer software developed for a Safety Parameter Display System (SPDS). Topics considered include a historical perspective on V and V, the function and significance of SPDS software, and testing. An SPDS provides information to nuclear power plant operators about the status of the plant under all operating conditions. It is determined that by implementing V and V activities throughout the development cycle, problems are less expensive to locate in the early phases of software development, problems are less expensive to fix in the early phases of software development, and a parallel V and V activity is more cost effective than a similar effort performed only at the end of software development. It is concluded that V and V is a proven tool for improving power plant software reliability

  12. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  13. Operational Characteristics of an Accelerator Driven Fissile Solution System

    International Nuclear Information System (INIS)

    Kimpland, Robert Herbert

    2016-01-01

    Operational characteristics represent the set of responses that a nuclear system exhibits during normal operation. Operators rely on this behavior to assess the status of the system and to predict the consequences of off-normal events. These characteristics largely refer to the relationship between power and system operating conditions. The static and dynamic behavior of a chain-reacting system, operating at sufficient power, is primarily governed by reactivity effects. The science of reactor physics has identified and evaluated a number of such effects, including Doppler broadening and shifts in the thermal neutron spectrum. Often these reactivity effects are quantified in the form of feedback coefficients that serve as coupling coefficients relating the neutron population and the physical mechanisms that drive reactivity effects, such as fissile material temperature and density changes. The operational characteristics of such nuclear systems usually manifest themselves when perturbations between system power (neutron population) and system operating conditions arise. Successful operation of such systems requires the establishment of steady equilibrium conditions. However, prior to obtaining the desired equilibrium (steady-state) conditions, an approach from zero-power (startup) must occur. This operational regime may possess certain limiting system conditions that must be maintained to achieve effective startup. Once steady-state is achieved, a key characteristic of this operational regime is the level of stability that the system possesses. Finally, a third operational regime, shutdown, may also possess limiting conditions of operation that must be maintained. This report documents the operational characteristics of a ''generic'' Accelerator Driven Fissile Solution (ADFS) system during the various operational regimes of startup, steady-state operation, and shutdown. Typical time-dependent behavior for each operational regime will be illustrated, and key system

  14. Improving CANDU plant operation and maintenance through retrofit information technology systems

    International Nuclear Information System (INIS)

    Lupton, L.R.; Judd, R.A.; MacBeth, M.J.

    1998-01-01

    CANDU plant owners are facing an increasingly competitive environment for the generation of electricity. To meet this challenge, all owners have identified that information technology offers opportunities for significant improvements in CANDU operation, maintenance and administration (OM and A) costs. Targeted information technology application areas include instrumentation and control, engineering, construction, operations and plant information management. These opportunities also pose challenges and issues that must be addressed if the full benefits of the advances in information technology are to be achieved. Key among these are system hardware and software maintenance, and obsolescence protection; AECL has been supporting CANDU stations with the initial development and evaluation of systems to improve plant performance and cost. Key initiatives that have been implemented or are in the process of being implemented in some CANDU plants to achieve operational benefits include: critical safety parameter monitor system; advanced computerized annunciation system; plant historical data system; and plant display system. Each system will be described in terms of its role in enhancing current CANDU plant performance and how they will contribute to future CANDU plant performance

  15. A pupal transcriptomic screen identifies Ral as a target of store-operated calcium entry in Drosophila neurons

    OpenAIRE

    Richhariya, Shlesha; Jayakumar, Siddharth; Abruzzi, Katharine; Rosbash, Michael; Hasan, Gaiti

    2017-01-01

    Transcriptional regulation by Store-operated Calcium Entry (SOCE) is well studied in non-excitable cells. However, the role of SOCE has been poorly documented in neuronal cells with more complicated calcium dynamics. Previous reports demonstrated a requirement for SOCE in neurons that regulate Drosophila flight bouts. We refine this requirement temporally to the early pupal stage and use RNA-sequencing to identify SOCE mediated gene expression changes in the developing Drosophila pupal nervou...

  16. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  17. Visualizing feasible operating ranges within tissue engineering systems using a "windows of operation" approach: a perfusion-scaffold bioreactor case study.

    Science.gov (United States)

    McCoy, Ryan J; O'Brien, Fergal J

    2012-12-01

    Tissue engineering approaches to developing functional substitutes are often highly complex, multivariate systems where many aspects of the biomaterials, bio-regulatory factors or cell sources may be controlled in an effort to enhance tissue formation. Furthermore, success is based on multiple performance criteria reflecting both the quantity and quality of the tissue produced. Managing the trade-offs between different performance criteria is a challenge. A "windows of operation" tool that graphically represents feasible operating spaces to achieve user-defined levels of performance has previously been described by researchers in the bio-processing industry. This paper demonstrates the value of "windows of operation" to the tissue engineering field using a perfusion-scaffold bioreactor system as a case study. In our laboratory, perfusion bioreactor systems are utilized in the context of bone tissue engineering to enhance the osteogenic differentiation of cell-seeded scaffolds. A key challenge of such perfusion bioreactor systems is to maximize the induction of osteogenesis but minimize cell detachment from the scaffold. Two key operating variables that influence these performance criteria are the mean scaffold pore size and flow-rate. Using cyclooxygenase-2 and osteopontin gene expression levels as surrogate indicators of osteogenesis, we employed the "windows of operation" methodology to rapidly identify feasible operating ranges for the mean scaffold pore size and flow-rate that achieved user-defined levels of performance for cell detachment and differentiation. Incorporation of such tools into the tissue engineer's armory will hopefully yield a greater understanding of the highly complex systems used and help aid decision making in future translation of products from the bench top to the market place. Copyright © 2012 Wiley Periodicals, Inc.

  18. An innovative approach to capability-based emergency operations planning.

    Science.gov (United States)

    Keim, Mark E

    2013-01-01

    This paper describes the innovative use information technology for assisting disaster planners with an easily-accessible method for writing and improving evidence-based emergency operations plans. This process is used to identify all key objectives of the emergency response according to capabilities of the institution, community or society. The approach then uses a standardized, objective-based format, along with a consensus-based method for drafting capability-based operational-level plans. This information is then integrated within a relational database to allow for ease of access and enhanced functionality to search, sort and filter and emergency operations plan according to user need and technological capacity. This integrated approach is offered as an effective option for integrating best practices of planning with the efficiency, scalability and flexibility of modern information and communication technology.

  19. Surgical team turnover and operative time: An evaluation of operating room efficiency during pulmonary resection.

    Science.gov (United States)

    Azzi, Alain Joe; Shah, Karan; Seely, Andrew; Villeneuve, James Patrick; Sundaresan, Sudhir R; Shamji, Farid M; Maziak, Donna E; Gilbert, Sebastien

    2016-05-01

    Health care resources are costly and should be used judiciously and efficiently. Predicting the duration of surgical procedures is key to optimizing operating room resources. Our objective was to identify factors influencing operative time, particularly surgical team turnover. We performed a single-institution, retrospective review of lobectomy operations. Univariate and multivariate analyses were performed to evaluate the impact of different factors on surgical time (skin-to-skin) and total procedure time. Staff turnover within the nursing component of the surgical team was defined as the number of instances any nurse had to leave the operating room over the total number of nurses involved in the operation. A total of 235 lobectomies were performed by 5 surgeons, most commonly for lung cancer (95%). On multivariate analysis, percent forced expiratory volume in 1 second, surgical approach, and lesion size had a significant effect on surgical time. Nursing turnover was associated with a significant increase in surgical time (53.7 minutes; 95% confidence interval, 6.4-101; P = .026) and total procedure time (83.2 minutes; 95% confidence interval, 30.1-136.2; P = .002). Active management of surgical team turnover may be an opportunity to improve operating room efficiency when the surgical team is engaged in a major pulmonary resection. Copyright © 2016 The American Association for Thoracic Surgery. Published by Elsevier Inc. All rights reserved.

  20. Practical quantum key distribution with polarization-entangled photons

    International Nuclear Information System (INIS)

    Poppe, A.; Fedrizzi, A.; Boehm, H.; Ursin, R.; Loruenser, T.; Peev, M.; Maurhardt, O.; Suda, M.; Kurtsiefer, C.; Weinfurter, H.; Jennewein, T.; Zeilinger, A.

    2005-01-01

    Full text: We present an entangled-state quantum cryptography system that operated for the first time in a real-world application scenario. The full key generation protocol was performed in real-time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. A source for polarization-entangled photons delivered about 8200 entangled photon pairs per second. After transmission to the distant receivers, a mean value of 468 pairs per second remained for the generation of a raw key, which showed an average qubit error rate of 6.4 %. The raw key was sifted and subsequently processed by a classical protocol which included error correction and privacy amplification. The final secure key bit rate was about 76 bits per second. The generated quantum key was then handed over and used by a secure communication application. (author)

  1. Secured Session-key Distribution using control Vector Encryption / Decryption Process

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim; Khaleqdad Khan, ANM; Lutfar Rahman, M.

    2006-01-01

    Frequent key changes are very much desirable for the secret communications and are thus in high demand. A session-key distribution technique has been designed and implemented using the programming language C on which the communication between the end-users is encrypted is used for the duration of a logical connection. Each session-key is obtained from the key distribution center (KDC) over the same networking facilities used for end-user communication. The control vector is cryptographically coupled with the session-key at the time of key generation in the KDC. For this, the generated hash function, master key and the session-key are used for producing the encrypted session-key, which has to be transferred. All the operations have been performed using the C programming language. This process can be widely applicable to all sorts of electronic transactions online or offline; commercially and academically.(authors)

  2. Key processes shaping the current role and operation of higher education institutions in society

    Directory of Open Access Journals (Sweden)

    Piróg Danuta

    2016-03-01

    Full Text Available The concurrent processes of globalisation, computerisation, and integration shape and constantly modify developmental factors and generate multidirectional social changes. Among social life fields, one of them has been particularly sensitive to the impact of those processes and has remained in clear feedback relationship with them is education, including university-level education. This article aims to present some reflections on the key processes which influence the environment of higher education institutions’ activity and on what their impact specifically is. The factors taken into account include: the transformation of the political and economic system, integration with the European higher education area, the market shift of education, evolving social demands towards higher education institutions and society’s attitude towards work. As knowledge has become an asset largely affecting the quality of life of people and society, universities have changed their focus from searching for and exploring truth, good and beauty in the world towards becoming innovation centres, transferring knowledge as offering their educational services. In this article, those trends have been exemplified in relation to geography degree programmes, and shown through an evolution of the model of the university. Based on a review of the literature, it seems that the processes discussed also concern geography degree programmes, and the future operation of these programmes closely depends on whether they can maintain their care for high quality education coupled with genuine efforts to ensure the smooth transition of graduates into the labour market.

  3. Key Research Issues in Clostridium difficile

    Directory of Open Access Journals (Sweden)

    George Zhanel

    2005-01-01

    Full Text Available Clostridium difficile is an emerging pathogen that causes C difficile-associated diarrhea, an important nosocomial infection. Control of this infection remains a challenge, and much needs to be determined about the antimicrobial resistance of the organism, antibiotic stewardship, contamination of the patient environment, and various host factors that determine susceptibility or resistance to infection. A national symposium focusing on C difficile infections, the Clostridium difficile Symposium on Emerging Issues and Research, was hosted on November 23, 2004, by the Department of Medical Microbiology and Infectious Diseases at the University of Manitoba, Winnipeg, Manitoba, in partnership with the Canadian Institutes of Health Research. This symposium, which aimed to summarize key research issues regarding C difficile infections in Canada, had the following objectives: to provide a forum for learning and discussion about C difficile and its impact on the health of Canadians; to identify the key research issues that should be addressed; and to explore potential research funding opportunities and collaboration. The present report summarizes key research issues identified for C difficile infections in Canada by addressing four major themes: diagnosis and surveillance, infection prevention and control, antibiotic stewardship, and clinical management.

  4. Identifying Methane Sources with an Airborne Pulsed IPDA Lidar System Operating near 1.65 µm

    Science.gov (United States)

    Yerasi, A.; Bartholomew, J.; Tandy, W., Jr.; Emery, W. J.

    2016-12-01

    Methane is a powerful greenhouse gas that is predicted to play an important role in future global climate trends. It would therefore be beneficial to locate areas that produce methane in significant amounts so that these trends can be better understood. In this investigation, some initial performance test results of a lidar system called the Advanced Leak Detector Lidar - Natural Gas (ALDL-NG) are discussed. The feasibility of applying its fundamental principle of operation to methane source identification is also explored. The ALDL-NG was originally created by the Ball Aerospace & Technologies Corp. to reveal leaks emanating from pipelines that transport natural gas, which is primarily composed of methane. It operates in a pulsed integrated path differential absorption (IPDA) configuration and it is carried by a piloted, single-engine aircraft. In order to detect the presence of natural gas leaks, the laser wavelengths of its online and offline channels operate in the 1.65 µm region. The functionality of the ALDL-NG was tested during a recent field campaign in Colorado. It was determined that the ambient concentration of methane in the troposphere ( 1.8 ppm) could indeed be retrieved from ALDL-NG data with a lower-than-expected uncertainty ( 0.2 ppm). Furthermore, when the ALDL-NG scanned over areas that were presumed to be methane sources (feedlots, landfills, etc.), significantly higher concentrations of methane were retrieved. These results are intriguing because the ALDL-NG was not specifically designed to observe anything beyond natural gas pipelines. Nevertheless, they strongly indicate that utilizing an airborne pulsed IPDA lidar system operating near 1.65 µm may very well be a viable technique for identifying methane sources. Perhaps future lidar systems could build upon the heritage of the ALDL-NG and measure methane concentration with even better precision for a variety of scientific applications.

  5. Soil fauna: key to new carbon models

    OpenAIRE

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; Jiménez, Juan José

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined ...

  6. Groundwater science in water-utility operations: global reflections on current status and future needs

    Science.gov (United States)

    Foster, Stephen; Sage, Rob

    2017-08-01

    The relevance of groundwater science to water-utility operations is analysed from a broad international perspective, identifying key concerns and specific opportunities for the future. The strategic importance worldwide of water utilities assuming the role of lead stakeholders for integrated groundwater resource management, recognizing their often considerable technical know-how and highly significant data holdings, is emphasized. Concurrently, the utilities themselves will need an ever-closer appreciation of groundwater-system behaviour if they are to manage efficiently their water-supply and wastewater operations.

  7. Unit costs of waste management operations

    International Nuclear Information System (INIS)

    Kisieleski, W.E.; Folga, S.M.; Gillette, J.L.; Buehring, W.A.

    1994-04-01

    This report provides estimates of generic costs for the management, disposal, and surveillance of various waste types, from the time they are generated to the end of their institutional control. Costs include monitoring and surveillance costs required after waste disposal. Available data on costs for the treatment, storage, disposal, and transportation of spent nuclear fuel and high-level radioactive, low-level radioactive, transuranic radioactive, hazardous, mixed (low-level radioactive plus hazardous), and sanitary wastes are presented. The costs cover all major elements that contribute to the total system life-cycle (i.e., ''cradle to grave'') cost for each waste type. This total cost is the sum of fixed and variable cost components. Variable costs are affected by operating rates and throughput capacities and vary in direct proportion to changes in the level of activity. Fixed costs remain constant regardless of changes in the amount of waste, operating rates, or throughput capacities. Key factors that influence cost, such as the size and throughput capacity of facilities, are identified. In many cases, ranges of values for the key variables are presented. For some waste types, the planned or estimated costs for storage and disposal, projected to the year 2000, are presented as graphics

  8. Superfund TIO videos. Set A. Identifying PRPS. Removal process: Removal site evaluation. Part 2. Audio-Visual

    International Nuclear Information System (INIS)

    1990-01-01

    The videotape is divided into three sections. Section 1 details the liability of Potentially Responsible Parties (PRPs) and describes the four classes of PRPs: current owners and operators, former owners and operators, generators, and transporters (if they selected the site). Section 2 lists the goals of the Potentially Responsible Party (PRP) search and explains how to identify key players during the PRP search. How to plan and conduct the PRP search is also outlined. Section 3 outlines the steps involved in conducting a removal site evaluation. A discussion of when to conduct a removal preliminary assessment, a removal site inspection, and an Engineering Evaluation/Cost Analysis (EE/AC) also is covered

  9. Food poisoning--a major threat to airline operations.

    Science.gov (United States)

    Burslem, C D; Kelly, M J; Preston, F S

    1990-01-01

    In the spring of 1984, British Airways was involved in a major food poisoning outbreak which affected nearly 1000 passengers, aircrew and ground personnel. The operational impact was worldwide and could have resulted in the cessation of the airline's day-to-day operations. The investigation paralleled a major aircraft disaster in the number of national and international agencies involved and in the variety of disciplines engaged. Although the causative organism was rapidly identified (salmonella), and its introduction into the food chain proved to be a key factor, the scale of the outbreak was the result of an interaction of other factors. As with a major aircraft accident, none of the factors alone would have caused the near disaster that occurred.

  10. Six key elements' analysis of FAC effective management in nuclear power plant

    International Nuclear Information System (INIS)

    Zhong Zhaojiang; Chen Hanming

    2010-01-01

    Corporate Commitment, Analysis, Operating Experience, Inspection, Training and Engineering Judgment, Long-Term Strategy are the six key elements of FAC effective management in nuclear power plant. Corporate commitment is the economy base of FAC management and ensure of management system, Analysis is the method of FAC's optimization and consummation, Operating experience is the reference and complementarity of FAC, Inspection is the base of accumulating FAC data, Training and engineering judgment is the technical complementarity and deepening, Long-term strategy is successful key of FAC management. Six key elements supplement each other, and make up of a full system of FAC effective management. For present FAC management in our national nuclear power plant, six key elements are the core and bring out the best in each other to found the FAC effective management system and prevent great FAC occurrence. (authors)

  11. Novel secret key generation techniques using memristor devices

    Science.gov (United States)

    Abunahla, Heba; Shehada, Dina; Yeun, Chan Yeob; Mohammad, Baker; Jaoude, Maguy Abi

    2016-02-01

    This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC) memristor based security.

  12. KEY PERFORMING FACTORS OF LEADING ROMANIAN COMPANIES

    Directory of Open Access Journals (Sweden)

    BURJA CAMELIA

    2014-08-01

    Full Text Available The analysis of financial economic ratios provides managers and external partners feedback on the results obtained from operational activities and the associated performance and risks. This paper studies the functional dependence of the companies’ success (on performance over internal financial management elements. The research was carried out for the most traded non-financial securities Bucharest listed companies and covers the period 2011- 2013. To carry out its purpose it analyzed the interdependence between the key financial ratios, studying the impact of liquidity ratios, solvency and efficiency on profitability. The study provides empirical evidences to identify factors that have ensured the performance of companies and their ranking in the segment of the most traded companies in Romania. Results suggest the view that the source of company success on the capital market lies in the positive signals sent to investors regarding profitability and the low risk of solvency. This study gives additional information for managerial decision-making in order to create more value and a better positioning of the companies in the market

  13. Key Technologies of Phone Storage Forensics Based on ARM Architecture

    Science.gov (United States)

    Zhang, Jianghan; Che, Shengbing

    2018-03-01

    Smart phones are mainly running Android, IOS and Windows Phone three mobile platform operating systems. The android smart phone has the best market shares and its processor chips are almost ARM software architecture. The chips memory address mapping mechanism of ARM software architecture is different with x86 software architecture. To forensics to android mart phone, we need to understand three key technologies: memory data acquisition, the conversion mechanism from virtual address to the physical address, and find the system’s key data. This article presents a viable solution which does not rely on the operating system API for a complete solution to these three issues.

  14. Transmission access and retail wheeling. The key questions

    International Nuclear Information System (INIS)

    Casazza, J.A.

    1996-01-01

    The key questions involving transmission access and retail wheeling are discussed, distinguishing between opposing views regarding the effect on system costs and the environment, particularly on optimal planning involving matching capacity and demand, generation use, demand side management, and economic operations. Also discussed are contrasting views regarding the effect of cost control pressures, regulatory advantages and disadvantages, the impact on system reliability, and the stranding of investment. The author's key concern is the effect of retail wheeling upon optimal planning and operation i.e., will competitors be willing to provide one another with the cost and technical information required for coordination? In his worst scenario, retail wheeling may lead to substantial production cost increases, lessened reliability, and unfair cost-shifting between customer classes. More optimistically, production costs and reliability may be unaffected and the cost-shifting could be salubrious. 7 figs., 11 refs

  15. The ligament of Parks as a key anatomical structure for safer hemorrhoidectomy: Anatomic study and a simple surgical note

    Directory of Open Access Journals (Sweden)

    Menelaos Zoulamoglou

    2017-12-01

    Full Text Available Hemorrhoids are a common anal disorder which affects both men and women of all ages. One out of ten patients with hemorrhoidal disease, requires surgical treatment. Unfortunately though, hemorrhoidectomy is closely related to complications that can be present early or late postoperatively. In the present manuscript, the safe surgical technique which emphasizes to the identification of the key anatomical structure of the ligament of Parks (Trietz's muscle is adequately described. A total of 200 patients with grades III and IV hemorrhoids, underwent Milligan-Morgan or Ferguson's hemorrhoidectomy. The mucosal ligament of Parks was identified to all patients and was used as a key anatomical structure through the excision of the hemorrhoids. Its identification guides surgeons during the operation and reduces the major problem of postoperative complications. Finally, since the mucosal ligament of Parks represents a constantly identifiable landmark, it allows simple and reliable identification of the internal sphincter muscle and minimizes the probability of postoperative complications.

  16. Identifying Key Features of Student Performance in Educational Video Games and Simulations through Cluster Analysis

    Science.gov (United States)

    Kerr, Deirdre; Chung, Gregory K. W. K.

    2012-01-01

    The assessment cycle of "evidence-centered design" (ECD) provides a framework for treating an educational video game or simulation as an assessment. One of the main steps in the assessment cycle of ECD is the identification of the key features of student performance. While this process is relatively simple for multiple choice tests, when…

  17. An Integrated Strategy to Identify Key Genes in Almond Adventitious Shoot Regeneration

    Science.gov (United States)

    Plant genetic transformation usually depends on efficient adventitious regeneration systems. In almond (Prunus dulcis Mill.), regeneration of transgenic adventitious shoots was achieved but with low efficiency. Histological studies identified two main stages of organogenesis in almond explants that ...

  18. Quantum key distribution without alternative measurements

    CERN Document Server

    Cabello, A

    2000-01-01

    Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to generate the same sequence of random bits in two remote places. A quantum key distribution protocol based on this idea is described. The scheme exhibits the following features. (a) It does not require that Alice and Bob choose between alternative measurements, therefore improving the rate of generated bits by transmitted qubit. (b) It allows Alice and Bob to generate a key of arbitrary length using a single quantum system (three EPR pairs), instead of a long sequence of them. (c) Detecting Eve requires the comparison of fewer bits. (d) Entanglement is an essential ingredient. The scheme assumes reliable measurements of the Bell operator. (20 refs).

  19. Improving the key biodiversity areas approach for effective conservation planning

    CSIR Research Space (South Africa)

    Knight, AT

    2007-03-01

    Full Text Available The key biodiversity areas (KBA) approach aims to identify globally important areas for species conservation. Although a similar methodology has been used successfully to identify important Bird Areas, the authors have identified five limitations...

  20. Bi-directional gene set enrichment and canonical correlation analysis identify key diet-sensitive pathways and biomarkers of metabolic syndrome

    Directory of Open Access Journals (Sweden)

    Gaora Peadar Ó

    2010-10-01

    Full Text Available Abstract Background Currently, a number of bioinformatics methods are available to generate appropriate lists of genes from a microarray experiment. While these lists represent an accurate primary analysis of the data, fewer options exist to contextualise those lists. The development and validation of such methods is crucial to the wider application of microarray technology in the clinical setting. Two key challenges in clinical bioinformatics involve appropriate statistical modelling of dynamic transcriptomic changes, and extraction of clinically relevant meaning from very large datasets. Results Here, we apply an approach to gene set enrichment analysis that allows for detection of bi-directional enrichment within a gene set. Furthermore, we apply canonical correlation analysis and Fisher's exact test, using plasma marker data with known clinical relevance to aid identification of the most important gene and pathway changes in our transcriptomic dataset. After a 28-day dietary intervention with high-CLA beef, a range of plasma markers indicated a marked improvement in the metabolic health of genetically obese mice. Tissue transcriptomic profiles indicated that the effects were most dramatic in liver (1270 genes significantly changed; p Conclusion Bi-directional gene set enrichment analysis more accurately reflects dynamic regulatory behaviour in biochemical pathways, and as such highlighted biologically relevant changes that were not detected using a traditional approach. In such cases where transcriptomic response to treatment is exceptionally large, canonical correlation analysis in conjunction with Fisher's exact test highlights the subset of pathways showing strongest correlation with the clinical markers of interest. In this case, we have identified selenoamino acid metabolism and steroid biosynthesis as key pathways mediating the observed relationship between metabolic health and high-CLA beef. These results indicate that this type of

  1. Structure of conceptual models in the senior operating staff of nuclear power plants

    Directory of Open Access Journals (Sweden)

    Oboznov A. A.

    2017-09-01

    Full Text Available Background. The relationships between conceptual model structures and an operator’s professional efficiency are of direct practical importance, particularly in the case of large-scale industrial complexes combining several human-machine systems. A typical example is the power unit of a nuclear power plant (NPP. Objective and methods. The purpose of this study was to explore the conceptual models of senior reactor operators (SROs of NPPs. The study involved 64 men working as SRO at five NPPs in Russia. The methods included: structured interviews, expert estimations, multidimensional scaling (ALSCAL, the K-means clustering algorithm, and frequency analysis. The procedure was as follows: 32 key characteristics of the power unit were defined, including shift operators’ jobs and duties, technical subsystems, types of equipment, and the crucial power unit parameters. The participants were offered a 32×32 matrix for pair-wise estimation of the strength of the links between these key characteristics on a seven-point scale (496 links in total. Results. A general scheme of key characteristics in the conceptual models was defined. is scheme was displayed in the operators regardless of their employment history. Within the scheme, however, two types of conceptual models were identified, which could be distinguished by the relative number of strong links between the key characteristics. With respect to intersystem links including key characteristics of the reactor and turbine NPP departments, this number was significantly higher in models of Type 1 than in those of Type 2. A positive correlation between the number of these links and the professional efficiency indicators was also established. Operators with Type 1 models were able to more predictably represent the power unit operation. Conclusion. The main role in creating predictable and efficient conceptual models was played by strong intersystem links in mental representations of workflow.

  2. ExplorOcean H2O SOS: Help Heal the Ocean-Student Operated Solutions: Operation Climate Change

    Science.gov (United States)

    Weiss, N.; Wood, J. H.

    2016-12-01

    The ExplorOcean H2O SOS: Help Heal the Ocean—Student Operated Solutions: Operation Climate Change, teaches middle and high school students about ocean threats related to climate change through hands-on activities and learning experiences in the field. During each session (in-class or after-school as a club), students build an understanding about how climate change impacts our oceans using resources provided by ExplorOcean (hands-on activities, presentations, multi-media). Through a student leadership model, students present lessons to each other, interweaving a deep learning of science, 21st century technology, communication skills, and leadership. After participating in learning experiences and activities related to 6 key climate change concepts: 1) Introduction to climate change, 2) Increased sea temperatures, 3) Ocean acidification, 4) Sea level rise, 5) Feedback mechanisms, and 6) Innovative solutions. H2O SOS- Operation Climate change participants select one focus issue and use it to design a multi-pronged campaign to increase awareness about this issue in their local community. The campaign includes social media, an interactive activity, and a visual component. All participating clubs that meet participation and action goals earn a field trip to ExplorOcean where they dive deeper into their selected issue through hands-on activities, real-world investigations, and interviews or presentations with experts. In addition to self-selected opportunities to showcase their focus issue, teams will participate in one of several key events identified by ExplorOcean, including ExplorOcean's annual World Oceans Day Expo.

  3. Water dynamics clue to key residues in protein folding

    International Nuclear Information System (INIS)

    Gao, Meng; Zhu, Huaiqiu; Yao, Xin-Qiu; She, Zhen-Su

    2010-01-01

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  4. IE Information No. 86-71: Recent identified problems with Limitorque motor operators

    International Nuclear Information System (INIS)

    Jordan, E.L.

    1992-01-01

    This notice is provided to alert recipients of two potential problems discovered with Limitorque motor operators. On November 8, 1985 Georgia Power Company submitted a preliminary report to the NRC indicating that it had discovered burn damage to internal wiring in several Limitorque motor operators installed in their Vogtle Unit 1 Power Plant. On March 20, 1986 Georgia Power Company submitted a final report to the NRC which suggested that the burn damage was a generic problem applicable to all Limitorque motor operators. This assumption was based on a sampling inspection of 104 Limitorque motor operators installed in Vogtle Unit 1. Forty-six of the motor operators examined were Limitorque type SMB-000, and six of these were found to have burnt internal wiring. Out of the 58 operators other than type SMB-000 which were inspected, 5 were found to contain wires deemed susceptible to damage because of their close proximity to the heater elements (less than 1/2 inch). Several licensees have submitted reports to the NRC concerning a problem with cracked limit switch rotors on Limitorque motor operators installed inside and outside of containment. The limit switches are used for control of the motor operator and also provide indication of valve position in the control room. The cracks have been found on white melamine limit switch rotors. Most of these cracks were found in the area where the limit switch rotors are pinned to the pinion shafts. Some cracks have been found to extend halfway through the melamine rotors, weakening them to the extent that they are easily broken

  5. Services Acquisition in the Department of Defense: Analysis of Operational and Performance Data to Identify Drivers of Success

    Science.gov (United States)

    2015-03-24

    improving the disclosure of CPARS program office Audit results (Black et al., 2014, pp. 48–49). Acquisition Research Program Graduate School of...improving the disclosure of CPARS program office audit results (Black et al., 2014, pp. 44–49). Recommendations Based on our conclusions, we identified...Fitzsimmons, J. A., & Fitzsimmons, M. J. (2006). Service management: Operations, strategy, and information technology (5th ed.). New York, NY: McGraw -Hill

  6. Structural identifiability of cyclic graphical models of biological networks with latent variables.

    Science.gov (United States)

    Wang, Yulin; Lu, Na; Miao, Hongyu

    2016-06-13

    Graphical models have long been used to describe biological networks for a variety of important tasks such as the determination of key biological parameters, and the structure of graphical model ultimately determines whether such unknown parameters can be unambiguously obtained from experimental observations (i.e., the identifiability problem). Limited by resources or technical capacities, complex biological networks are usually partially observed in experiment, which thus introduces latent variables into the corresponding graphical models. A number of previous studies have tackled the parameter identifiability problem for graphical models such as linear structural equation models (SEMs) with or without latent variables. However, the limited resolution and efficiency of existing approaches necessarily calls for further development of novel structural identifiability analysis algorithms. An efficient structural identifiability analysis algorithm is developed in this study for a broad range of network structures. The proposed method adopts the Wright's path coefficient method to generate identifiability equations in forms of symbolic polynomials, and then converts these symbolic equations to binary matrices (called identifiability matrix). Several matrix operations are introduced for identifiability matrix reduction with system equivalency maintained. Based on the reduced identifiability matrices, the structural identifiability of each parameter is determined. A number of benchmark models are used to verify the validity of the proposed approach. Finally, the network module for influenza A virus replication is employed as a real example to illustrate the application of the proposed approach in practice. The proposed approach can deal with cyclic networks with latent variables. The key advantage is that it intentionally avoids symbolic computation and is thus highly efficient. Also, this method is capable of determining the identifiability of each single parameter and

  7. The GOES-R/JPSS Approach for Identifying Hazardous Low Clouds: Overview and Operational Impacts

    Science.gov (United States)

    Calvert, Corey; Pavolonis, Michael; Lindstrom, Scott; Gravelle, Chad; Terborg, Amanda

    2017-04-01

    Low ceiling and visibility is a weather hazard that nearly every forecaster, in nearly every National Weather Service (NWS) Weather Forecast Office (WFO), must regularly address. In addition, national forecast centers such as the Aviation Weather Center (AWC), Alaska Aviation Weather Unit (AAWU) and the Ocean Prediction Center (OPC) are responsible for issuing low ceiling and visibility related products. As such, reliable methods for detecting and characterizing hazardous low clouds are needed. Traditionally, hazardous areas of Fog/Low Stratus (FLS) are identified using a simple stand-alone satellite product that is constructed by subtracting the 3.9 and 11 μm brightness temperatures. However, the 3.9-11 μm brightness temperature difference (BTD) has several major limitations. In an effort to address the limitations of the BTD product, the GOES-R Algorithm Working Group (AWG) developed an approach that fuses satellite, Numerical Weather Prediction (NWP) model, Sea Surface Temperature (SST) analyses, and other data sets (e.g. digital surface elevation maps, surface emissivity maps, and surface type maps) to determine the probability that hazardous low clouds are present using a naïve Bayesian classifier. In addition, recent research has focused on blending geostationary (e.g. GOES-R) and low earth orbit (e.g. JPSS) satellite data to further improve the products. The FLS algorithm has adopted an enterprise approach in that it can utilize satellite data from a variety of current and future operational sensors and NWP data from a variety of models. The FLS products are available in AWIPS/N-AWIPS/AWIPS-II and have been evaluated within NWS operations over the last four years as part of the Satellite Proving Ground. Forecaster feedback has been predominantly positive and references to these products within Area Forecast Discussions (AFD's) indicate that the products are influencing operational forecasts. At the request of the NWS, the FLS products are currently being

  8. Biometrics based key management of double random phase encoding scheme using error control codes

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  9. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  10. Operational experience and maintenance programs of Transamerica Delaval, Inc., diesel generators

    International Nuclear Information System (INIS)

    Rajan, J.R.

    1994-05-01

    Concerns regarding the reliability of large-bore, medium-speed diesel generators manufactured by Transamerica Delaval, Inc. (TDI) for application at domestic nuclear plants were first prompted by a crankshaft failure at Shoreham Nuclear Power Station in August 1983. A number of diesel generator components were identified which had potential deficiencies from a manufacturing and operational standpoint. In response to these problems, 11 (now 8) U.S. nuclear utility owners formed a TDI Diesel Generator Owners Group (Owners Group) to address operational and regulatory issues relative to diesel generator sets used for standby emergency power. The Owners' Group performed extensive design reviews of all key engine components and developed recommendations to be implemented by the individual owners concerning needed component replacements and modifications, component inspections to validate the open-quotes as-manufacturedclose quotes and open-quotes as-assembledclose quotes quality of key engine components, engine testing, and an enhanced maintenance and surveillance program

  11. Onset Dynamics of Action Potentials in Rat Neocortical Neurons and Identified Snail Neurons: Quantification of the Difference

    OpenAIRE

    Volgushev, Maxim; Malyshev, Aleksey; Balaban, Pavel; Chistiakova, Marina; Volgushev, Stanislav; Wolf, Fred

    2008-01-01

    The generation of action potentials (APs) is a key process in the operation of nerve cells and the communication between neurons. Action potentials in mammalian central neurons are characterized by an exceptionally fast onset dynamics, which differs from the typically slow and gradual onset dynamics seen in identified snail neurons. Here we describe a novel method of analysis which provides a quantitative measure of the onset dynamics of action potentials. This method captures the...

  12. A Framework for Human Performance Criteria for Advanced Reactor Operational Concepts

    Energy Technology Data Exchange (ETDEWEB)

    Jacques V Hugo; David I Gertman; Jeffrey C Joe

    2014-08-01

    This report supports the determination of new Operational Concept models needed in support of the operational design of new reactors. The objective of this research is to establish the technical bases for human performance and human performance criteria frameworks, models, and guidance for operational concepts for advanced reactor designs. The report includes a discussion of operating principles for advanced reactors, the human performance issues and requirements for human performance based upon work domain analysis and current regulatory requirements, and a description of general human performance criteria. The major findings and key observations to date are that there is some operating experience that informs operational concepts for baseline designs for SFR and HGTRs, with the Experimental Breeder Reactor-II (EBR-II) as a best-case predecessor design. This report summarizes the theoretical and operational foundations for the development of a framework and model for human performance criteria that will influence the development of future Operational Concepts. The report also highlights issues associated with advanced reactor design and clarifies and codifies the identified aspects of technology and operating scenarios.

  13. Identifying cognitive complexity factors affecting the complexity of procedural steps in emergency operating procedures of a nuclear power plant

    International Nuclear Information System (INIS)

    Park, Jinkyun; Jeong, Kwangsup; Jung, Wondea

    2005-01-01

    In complex systems such as a nuclear and chemical plant, it is well known that the provision of understandable procedures that allow operators to clarify what needs to be done and how to do it is one of the requisites to secure their safety. As a previous study in providing understandable procedures, the step complexity (SC) measure that can quantify the complexity of procedural steps in emergency operating procedures (EOPs) of a nuclear power plant (NPP) was suggested. However, the necessity of additional complexity factors that can consider a cognitive aspect in evaluating the complexity of procedural steps is raised. To this end, the comparisons between operators' performance data measured by the form of a step performance time with their behavior in carrying out the prescribed activities of procedural steps are conducted in this study. As a result, two kinds of complexity factors (the abstraction level of knowledge and the level of engineering decision) that could affect an operator's cognitive burden are identified. Although a well-designed experiment is indispensable for confirming the appropriateness of the additional complexity factors, it is strongly believed that the change of operators' performance data can be more authentically explained if the additional complexity factors are taken into consideration

  14. Identifying cognitive complexity factors affecting the complexity of procedural steps in emergency operating procedures of a nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jinkyun [Integrated Safety Assessment Division, Korea Atomic Energy Research Institute, P.O. Box 105, Duckjin-Dong, Yusong-Ku, Taejon 305-600 (Korea, Republic of)]. E-mail: kshpjk@kaeri.re.kr; Jeong, Kwangsup [Integrated Safety Assessment Division, Korea Atomic Energy Research Institute, P.O. Box 105, Duckjin-Dong, Yusong-Ku, Taejon 305-600 (Korea, Republic of); Jung, Wondea [Integrated Safety Assessment Division, Korea Atomic Energy Research Institute, P.O. Box 105, Duckjin-Dong, Yusong-Ku, Taejon 305-600 (Korea, Republic of)

    2005-08-01

    In complex systems such as a nuclear and chemical plant, it is well known that the provision of understandable procedures that allow operators to clarify what needs to be done and how to do it is one of the requisites to secure their safety. As a previous study in providing understandable procedures, the step complexity (SC) measure that can quantify the complexity of procedural steps in emergency operating procedures (EOPs) of a nuclear power plant (NPP) was suggested. However, the necessity of additional complexity factors that can consider a cognitive aspect in evaluating the complexity of procedural steps is raised. To this end, the comparisons between operators' performance data measured by the form of a step performance time with their behavior in carrying out the prescribed activities of procedural steps are conducted in this study. As a result, two kinds of complexity factors (the abstraction level of knowledge and the level of engineering decision) that could affect an operator's cognitive burden are identified. Although a well-designed experiment is indispensable for confirming the appropriateness of the additional complexity factors, it is strongly believed that the change of operators' performance data can be more authentically explained if the additional complexity factors are taken into consideration.

  15. Identifying cognitive complexity factors affecting the complexity of procedural steps in emergency operating procedures of a nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Jinkyun Park; Kwangsup Jeong; Wondea Jung [Korea Atomic Energy Research Institute, Taejon (Korea). Integrated Safety Assessment Division

    2005-08-15

    In complex systems such as a nuclear and chemical plant, it is well known that the provision of understandable procedures that allow operators to clarify what needs to be done and how to do it is one of the requisites to secure their safety. As a previous study in providing understandable procedures, the step complexity (SC) measure that can quantify the complexity of procedural steps in emergency operating procedures (EOPs) of a nuclear power plant (NPP) was suggested. However, the necessity of additional complexity factors that can consider a cognitive aspect in evaluating the complexity of procedural steps is raised. To this end, the comparisons between operator' performance data measured by the form of a step performance time with their behavior in carrying out the prescribed activities of procedural steps are conducted in this study. As a result, two kinds of complexity factors (the abstraction level of knowledge and the level of engineering decision) that could affect an operator's cognitive burden are identified. Although a well-designed experiment is indispensable for confirming the appropriateness of the additional complexity factors, it is strongly believed that the change of operators' performance data can be more authentically explained if the additional complexity factors are taken into consideration. (author)

  16. Key Issues for the control of refueling outage duration and costs in PWR Nuclear Power Plants

    International Nuclear Information System (INIS)

    Degrave, Claude

    2002-01-01

    For several years, EDF, within the framework of the CIDEM1 project and in collaboration with some German Utilities, has undertaken a detailed review of the operating experience both of its own NPP and of foreign units, in order to improve the performances of future units under design, particularly the French-German European Pressurized Reactor (EPR) project. This review made it possible to identify the key issues allowing to decrease the duration of refueling and maintenance outages. These key issues can be classified in 3 categories Design, Maintenance and Logistic Support, Outage Management. Most of the key issues in the design field and some in the logistic support field have been studied and could be integrated into the design of any future PWR unit, as for the EPR project. Some of them could also be adapted to current plants, provided they are feasible and profitable. The organization must be tailored to each country, utility or period: it widely depends on the power production environment, particularly in a deregulation context. (author)

  17. Diversity and consensus as key concepts for design of intelligent operator support system

    International Nuclear Information System (INIS)

    Kitamura, M.; Furukawa, H.; Sakuma, M.; Washio, T.

    2004-01-01

    A general framework and guiding principles for development of intelligent operator support system in nuclear plants are proposed in this paper. The main principle is to provide advisory information to the operators through consensus of multiple agents each of which can conduct operational decision- making by focusing on mutually dissimilar symptoms obtained from the plant. The applicability and credibility of the operator support system are expected to be significantly improved by implementing the proposed scheme. An efficient procedure for diversifying the symptom descriptions was developed together with a method for autonomous consensus formation among the agents. A prototype system was developed for the subtask of fault diagnosis by emulating multiple neural networks as the diagnostic agents. The advantage of the proposed methodology over the conventional ones was clearly demonstrated through numerical evaluations simulating anomalies in a pressurized water reactor. (author)

  18. Pilot program to identify valve failures which impact the safety and operation of light water nuclear power plants

    International Nuclear Information System (INIS)

    Tsacoyeanes, J.C.; Raju, P.P.

    1980-04-01

    The pilot program described has been initiated under the Department of Energy Light Water Reactor Safety Research and Development Program and has the following specific objectives: to identify the principal types and causes of failures in valves, valve operators and their controls and associated hardware, which lead to, or could lead to plant trip; and to suggest possible remedies for the prevention of these failures and recommend future research and development programs which could lead to minimizing these valve failures or mitigating their effect on plant operation. The data surveyed cover incidents reported over the six-year period, beginning 1973 through the end of 1978. Three sources of information on valve failures have been consulted: failure data centers, participating organizations in the nuclear power industry, and technical documents

  19. Challenges of Measuring Performance of the Sales and Operations Planning Process

    OpenAIRE

    Hulthén, Hana; Näslund, Dag; Norrman, Andreas

    2017-01-01

    The purpose of this study is to identify and structure challenges of measuring performance of the Sales and Operations Planning (S&OP) process. A multiple case study methodology was applied. Qualitative data was collected via 22 structured interviews with managers from six case companies in various industries. A process oriented framework was proposed by structuring the challenges based on two key areas of process performance (effectiveness and efficiency) and different maturity levels of the...

  20. A pilot study using scripted ventilation conditions to identify key factors affecting indoor pollutant concentration and air exchange rate in a residence.

    Science.gov (United States)

    Johnson, Ted; Myers, Jeffrey; Kelly, Thomas; Wisbith, Anthony; Ollison, Will

    2004-01-01

    A pilot study was conducted using an occupied, single-family test house in Columbus, OH, to determine whether a script-based protocol could be used to obtain data useful in identifying the key factors affecting air-exchange rate (AER) and the relationship between indoor and outdoor concentrations of selected traffic-related air pollutants. The test script called for hourly changes to elements of the test house considered likely to influence air flow and AER, including the position (open or closed) of each window and door and the operation (on/off) of the furnace, air conditioner, and ceiling fans. The script was implemented over a 3-day period (January 30-February 1, 2002) during which technicians collected hourly-average data for AER, indoor, and outdoor air concentrations for six pollutants (benzene, formaldehyde (HCHO), polycyclic aromatic hydrocarbons (PAH), carbon monoxide (CO), nitric oxide (NO), and nitrogen oxides (NO(x))), and selected meteorological variables. Consistent with expectations, AER tended to increase with the number of open exterior windows and doors. The 39 AER values measured during the study when all exterior doors and windows were closed varied from 0.36 to 2.29 h(-1) with a geometric mean (GM) of 0.77 h(-1) and a geometric standard deviation (GSD) of 1.435. The 27 AER values measured when at least one exterior door or window was opened varied from 0.50 to 15.8 h(-1) with a GM of 1.98 h(-1) and a GSD of 1.902. AER was also affected by temperature and wind speed, most noticeably when exterior windows and doors were closed. Results of a series of stepwise linear regression analyses suggest that (1) outdoor pollutant concentration and (2) indoor pollutant concentration during the preceding hour were the "variables of choice" for predicting indoor pollutant concentration in the test house under the conditions of this study. Depending on the pollutant and ventilation conditions, one or more of the following variables produced a small, but

  1. Beyond Public and Private: A Framework for Co-operative Higher Education

    Directory of Open Access Journals (Sweden)

    Mike Neary

    2017-07-01

    Full Text Available Universities in the UK are increasingly adopting corporate governance structures, a consumerist model of teaching and learning, and have the most expensive tuition fees in the world (McGettigan, 2013; OECD, 2015. This article discusses collaborative research that aimed to develop and define a conceptual framework of knowledge production grounded in co-operative values and principles. The main findings are outlined relating to the key themes of our research: knowledge, democracy, bureaucracy, livelihood, and solidarity. We consider how these five ‘catalytic principles’ relate to three identified routes to co-operative higher education (conversion, dissolution, or creation and argue that such work must be grounded in an adequate critique of labour and property, i.e. the capital relation. We identify both the possible opportunities that the latest higher education reform in the UK affords the co-operative movement as well as the issues that arise from a more marketised and financialised approach to the production of knowledge (HEFCE, 2015. Finally, we suggest ways that the co-operative movement might respond with democratic alternatives that go beyond the distinction of public and private education.

  2. Pocket radar guide key facts, equations, and data

    CERN Document Server

    Curry, G Richard

    2010-01-01

    ThePocket Radar Guideis a concise collection of key radar facts and important radar data that provides you with necessary radar information when you are away from your office or references. It includes statements and comments on radar design, operation, and performance; equations describing the characteristics and performance of radar systems and their components; and tables with data on radar characteristics and key performance issues.It is intended to supplement other radar information sources by providing a pocket companion to refresh memory and provide details whenever you need them such a

  3. Operational Windows for Dry-Wall and Wetted-Wall IFE Chambers

    International Nuclear Information System (INIS)

    Najmabadi, F.; Raffray, A.R.; Bromberg, L.

    2004-01-01

    The ARIES-IFE study was an integrated study of inertial fusion energy (IFE) chambers and chamber interfaces with the driver and target systems. Detailed analysis of various subsystems was performed parametrically to uncover key physics/technology uncertainties and to identify constraints imposed by each subsystem. In this paper, these constraints (e.g., target injection and tracking, thermal response of the first wall, and driver propagation and focusing) were combined to understand the trade-offs, to develop operational windows for chamber concepts, and to identify high-leverage research and development directions for IFE research. Some conclusions drawn in this paper are (a) the detailed characterization of the target yield and spectrum has a major impact on the chamber; (b) it is prudent to use a thin armor instead of a monolithic first wall for dry-wall concepts; (c) for dry-wall concepts with direct-drive targets, the most stringent constraint is imposed by target survival during the injection process; (d) for relatively low yield targets (<250 MJ), an operational window with no buffer gas may exist; (e) for dry-wall concepts with indirect-drive targets, a high buffer gas pressure would be necessary that may preclude propagation of the laser driver and require assisted pinch transport for the heavy-ion driver; and (f) generation and transport of aerosols in the chamber is the key feasibility issue for wetted-wall concepts

  4. High-Speed Large-Alphabet Quantum Key Distribution Using Photonic Integrated Circuits

    Science.gov (United States)

    2014-01-28

    polarizing beam splitter, TDC: time-to-digital converter. Extra&loss& photon/bin frame size QSER secure bpp ECC secure&key&rate& none& 0.0031 64 14...to-digital converter. photon/frame frame size QSER secure bpp ECC secure&key& rate& 1.3 16 9.5 % 2.9 layered LDPC 7.3&Mbps& Figure 24: Operating

  5. Novel secret key generation techniques using memristor devices

    Directory of Open Access Journals (Sweden)

    Heba Abunahla

    2016-02-01

    Full Text Available This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES and Advanced Encryption Standard (AES in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC memristor based security.

  6. DecreaseKeys are Expensive for External Memory Priority Queues

    OpenAIRE

    Eenberg, Kasper; Larsen, Kasper Green; Yu, Huacheng

    2016-01-01

    One of the biggest open problems in external memory data structures is the priority queue problem with DecreaseKey operations. If only Insert and ExtractMin operations need to be supported, one can design a comparison-based priority queue performing $O((N/B)\\lg_{M/B} N)$ I/Os over a sequence of $N$ operations, where $B$ is the disk block size in number of words and $M$ is the main memory size in number of words. This matches the lower bound for comparison-based sorting and is hence optimal fo...

  7. OPERATIONAL EXCELLENCE – A KEY TO WORLD-CLASS BUSINESS PERFORMANCE

    OpenAIRE

    NĂFTĂNĂILĂ Ion; RADU Cătălina; CIOANĂ Georgiana

    2013-01-01

    Continuous improvement implies a focus on solving a series of quality problems, reducing inventories, eliminating waste and increasing productivity. However, it is clear that being lean, cost-effective and of high quality is not enough and it does not guarantee the growth of any business. This paper aims to highlight the importance of operational excellence, which is a concept referring to an effective focus on customers in order to achieve excellence at business level.

  8. Operational Forces soldiers’ perceptions of attributes and skills for career success

    Directory of Open Access Journals (Sweden)

    Ishreen Rawoot

    2017-07-01

    Full Text Available Orientation: A career within the South African Operational Forces is physically, mentally and emotionally challenging. It is a diverse working environment with its own organisational culture and unique challenges. Research purpose: The aim of the study was to explore the perceptions of Operational Forces soldiers regarding the unique requirements that facilitated their career success. Motivation for the study: A low percentage of candidates successfully complete the Operational Forces training. The financial implications of training candidates make it important to be able to identify candidates who have the potential to be successful, early on in the process. Research design, approach and method: Data were collected through a self-administered qualitative survey (n = 98. All participants were permanent Operational Forces soldiers with varying ranks and years of experience. The data were thematically analysed in order to identify themes and specific attributes and skills associated with a successful career in the Operational Forces. Main findings: A number of themes emerged from the data, each of which contributed to our understanding of the research question. The themes included self-concept, personality, interests, cognitive and physical factors. Practical and managerial implications: The research findings may help to inform decisions about approaches, practices and methodologies of the South African Operational Forces recruitment and selection process. Results also provide military organisations with the key characteristics to consider when identifying candidates with the highest potential for successful careers. Contribution and value-add: The study extends previous career success research by contributing an additional base of information regarding career success and factors that are perceived to influence it.

  9. A Data Filter for Identifying Steady-State Operating Points in Engine Flight Data for Condition Monitoring Applications

    Science.gov (United States)

    Simon, Donald L.; Litt, Jonathan S.

    2010-01-01

    This paper presents an algorithm that automatically identifies and extracts steady-state engine operating points from engine flight data. It calculates the mean and standard deviation of select parameters contained in the incoming flight data stream. If the standard deviation of the data falls below defined constraints, the engine is assumed to be at a steady-state operating point, and the mean measurement data at that point are archived for subsequent condition monitoring purposes. The fundamental design of the steady-state data filter is completely generic and applicable for any dynamic system. Additional domain-specific logic constraints are applied to reduce data outliers and variance within the collected steady-state data. The filter is designed for on-line real-time processing of streaming data as opposed to post-processing of the data in batch mode. Results of applying the steady-state data filter to recorded helicopter engine flight data are shown, demonstrating its utility for engine condition monitoring applications.

  10. Identifying key factors for mobilising under-utilised low carbon land resources : A case study on Kalimantan

    NARCIS (Netherlands)

    Goh, Chun Sheng; Junginger, Martin; Potter, Lesley; Faaij, André; Wicke, Birka

    2018-01-01

    Mobilising under-utilised low carbon (ULC) land for future agricultural expansion helps minimising further carbon stock loss. This study examined the regency cases in Kalimantan, a carbon loss hotspot, to understand the key factors for mobilising ULC land via narrative interviews with a range of

  11. Identifying the impacts of climate change on key pests and diseases of plant and animal industries

    International Nuclear Information System (INIS)

    Luck, Jo; Aurambout, Jean-Philippe; Finlay, Kyla; Azuloas, Joe; Constable, Fiona; Rijswijk, Bonny Rowles-Van

    2007-01-01

    Full text: Full text: Climate change is increasingly recognised as a major threat to natural and agricultural systems. Understanding these threats will enable government and primary industries to better prepare and adapt to climate change. While observations of climate change are well documented, the potential effects on pests, pathogens and their hosts are not clearly understood. To address this, a review of the potential impacts on plant biosecurity was undertaken to determine the effects of climate change on the behaviour and distribution of emergent plant pests and pathogens. The review identified increasing C02 and temperature, decreasing frost events, heavy and unseasonal rains, increased humidity, drought, cyclones and hurricanes, and warmer winter temperatures as influencing the behaviour of plant pests and pathogens. To study the effects of these changes in detail, three key plant biosecurity threats were analysed in case studies; wheat stripe rust, silver leaf whitefly and citrus canker. The predicted distribution of citrus canker was examined with increasing temperature scenarios using the bioclimatic model CLIMEX. The model predicted a southerly shift in the geographic range of the causal organism which would threaten the major southern citrus growing regions in future climates. A similar study on Bluetongue disease of sheep, spread by the Culicoides midge, also predicted a southerly shift in the vector's geographic range. Significant limitations were identified with bioclimatic modelling when examining the effects of climate change on pests and diseases. The model was unable to assess the plant and animal response to increasing temperature in conjunction with the pest. Also the influence of temperature on the life cycle of the organism, pathogenicity of strains, competition with other species, host coverage and the general effect on the biology of the organism could not be assessed. To begin to address this, a dynamic model was constructed using daily

  12. Key regulatory challenges for future nuclear power plants

    International Nuclear Information System (INIS)

    Todreas, Neil E.

    2001-01-01

    Key regulatory challenges for future nuclear power plants are concerned with fuel and cladding materials taken to higher burnup and operated at higher temperatures. Particular challenges are related to reduction in waste toxicity, understanding and control of coolant corrosion, qualification of fuel particles, new maintenance practices

  13. Rendezvous, proximity operations and capture quality function deployment report

    Science.gov (United States)

    Lamkin, Stephen L. (Editor)

    1991-01-01

    Rendezvous, Proximity Operations, and Capture (RPOC) is a missions operations area which is extremely important to present and future space initiatives and must be well planned and coordinated. To support this, a study team was formed to identify a specific plan of action using the Quality Function Deployment (QFD) process. This team was composed of members from a wide spectrum of engineering and operations organizations which are involved in the RPOC technology area. The key to this study's success is an understanding of the needs of potential programmatic customers and the technology base available for system implementation. To this end, the study team conducted interviews with a variety of near term and future programmatic customers and technology development sponsors. The QFD activity led to a thorough understanding of the needs of these customers in the RPOC area, as well as the relative importance of these needs.

  14. Rendezvous, proximity operations and capture quality function deployment report

    Science.gov (United States)

    Lamkin, Stephen L.

    1991-12-01

    Rendezvous, Proximity Operations, and Capture (RPOC) is a missions operations area which is extremely important to present and future space initiatives and must be well planned and coordinated. To support this, a study team was formed to identify a specific plan of action using the Quality Function Deployment (QFD) process. This team was composed of members from a wide spectrum of engineering and operations organizations which are involved in the RPOC technology area. The key to this study's success is an understanding of the needs of potential programmatic customers and the technology base available for system implementation. To this end, the study team conducted interviews with a variety of near term and future programmatic customers and technology development sponsors. The QFD activity led to a thorough understanding of the needs of these customers in the RPOC area, as well as the relative importance of these needs.

  15. Knowledge management - A key issue for EnBW

    International Nuclear Information System (INIS)

    Zimmer, H.J.

    2007-01-01

    Full text: The motivation for knowledge management can be summarised with the words of EnBW CEO Prof. Claassen, 2002 'knowledge manager of the year' in Germany: 'Against the backdrop of the ever-increasing complexity of strategic planning and activities on the operational front, knowledge management is a key factor in the long-term success of our business.' Professional knowledge management motivates and supports employees, helping to create networks in which they can lay the foundations for the future success of the company. It must be emphasised that knowledge management is the responsibility of management, and EnBW has established a suitable framework consisting of different action levels and goals: 1) Normative level (corporate culture): creating a knowledge-aware and knowledge-friendly corporate culture 2) Strategic level (human resources): systematic gearing of internal intangible potentials towards future requirements. 3) Operational level (information/communication): making the required knowledge available in the necessary scope and quality, in the right place and at the right time. If knowledge management can generally be seen as basic requirement for successful companies, then it is even more important for nuclear operators. Today, nuclear energy is an important generating technology in Europe, for Germany and for EnBW with major future potential, but a technology that must be employed with great caution and attaching top priority to safe operation. For nuclear operators, the rule is always 'safety first'. But knowledge management implemented and used in the right way can also enhance both safety and competitive operation of the plants at the same time. In this connection, successful knowledge management plays a key role due to the complex interplay of many different disciplines within a demanding legal and regulatory framework, the paramount importance of collective past experience and the high demands on the expertise of the employees operating nuclear

  16. Mapping key antecedents of employee-driven innovations

    DEFF Research Database (Denmark)

    Smith, Pernille; Ulhøi, John Parm; Kesting, Peter

    2012-01-01

    Research on employee-driven innovation (EDI) is still in its infancy, and as yet there is no independent body of literature on the topic. The aim of this paper is to review existing insights into the key antecedents of EDI in other research contexts. In particular, we focus on: leader support......, autonomy, collaboration, and organisational norms of exploration. The main contribution of this paper is to discuss how these key antecedents apply to the specific case of EDI and to identify an agenda for new research....

  17. Two-party quantum key agreement based on four-particle GHZ states

    Science.gov (United States)

    He, Ye-Feng; Ma, Wen-Ping

    2016-04-01

    Based on four-particle GHZ states, the double CNOT operation and the delayed measurement technique, a two-party quantum key agreement (QKA) protocols is proposed. The double CNOT operation makes each four-particle GHZ state collapse into two independent quantum states without any entanglement. Furthermore, one party can directly know the two quantum states and the other party can be aware of the two quantum states by using the corresponding measurement. According to the initial states of the two quantum states, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Then the protocol achieves the fair establishment of a shared key. The security analysis shows that the new protocol can resist against participant attacks, the Trojan horse attacks and other outsider attacks. Furthermore, the new protocol also has no information leakage problem and has high qubit efficiency.

  18. Key Performance Indicators for Maintenance Management Effectiveness of Public Hospital Building

    Directory of Open Access Journals (Sweden)

    Farhana Omar Mardhiah

    2017-01-01

    Full Text Available Effectiveness of management in maintenance aspect holds the key element in influencing the performance of overall maintenance management. Similarly, public hospital building needs an effective maintenance management as this type of building in nature is one of the most complex issues in the field of maintenance. Improper building maintenance management adopted by the organization significantly will interrupt the overall operation of the building. Therefore, this paper is aim to identifying the key performance indicator (KPI of effectiveness of maintenance management for the public hospital building. A total of 32 set of questionnaires were distributed to the maintenance manager for each hospital in the northern region of peninsular Malaysia by using self-administration strategy. The survey answer was analyzed by performing descriptive analysis in SPSS. Overall, the result of descriptive analysis shows that all the ten factors of effectiveness of maintenance management are accepted as KPI since the mean value is at least 3.93 which classified as important and significant. The most significant factor of effectiveness of maintenance management is task planning and scheduling with the mean score of 4.35. While less significant factor is identify as maintenance approach with the value of mean score is 3.93. The both results indicates that the management need to have well-structured planning for the maintenance works and also need to embrace the exact strategy of maintenance approach in order to achieved better overall performance of maintenance management. This study may draw a standard practice for the government in assessing the performance of public facilities in terms of maintenance management.

  19. Operational risk quantification and modelling within Romanian insurance industry

    Directory of Open Access Journals (Sweden)

    Tudor Răzvan

    2017-07-01

    Full Text Available This paper aims at covering and describing the shortcomings of various models used to quantify and model the operational risk within insurance industry with a particular focus on Romanian specific regulation: Norm 6/2015 concerning the operational risk issued by IT systems. While most of the local insurers are focusing on implementing the standard model to compute the Operational Risk solvency capital required, the local regulator has issued a local norm that requires to identify and assess the IT based operational risks from an ISO 27001 perspective. The challenges raised by the correlations assumed in the Standard model are substantially increased by this new regulation that requires only the identification and quantification of the IT operational risks. The solvency capital requirement stipulated by the implementation of Solvency II doesn’t recommend a model or formula on how to integrate the newly identified risks in the Operational Risk capital requirements. In this context we are going to assess the academic and practitioner’s understanding in what concerns: The Frequency-Severity approach, Bayesian estimation techniques, Scenario Analysis and Risk Accounting based on risk units, and how they could support the modelling of operational risk that are IT based. Developing an internal model only for the operational risk capital requirement proved to be, so far, costly and not necessarily beneficial for the local insurers. As the IT component will play a key role in the future of the insurance industry, the result of this analysis will provide a specific approach in operational risk modelling that can be implemented in the context of Solvency II, in a particular situation when (internal or external operational risk databases are scarce or not available.

  20. Steady-state operation of tokamaks: Key physics and technology developments on Tore Supra

    International Nuclear Information System (INIS)

    Jacquinot, J.

    2005-01-01

    Important technological and physics issues related to long pulse operation required for a reactor are now being addressed in Tore Supra. experimental results in conditions where all the plasma facing components are actively cooled during pulses exceeding six minutes. Important physics issues related to continuous operation are observed in non inductively driven plasmas. (author)

  1. Logistics: An integral part of cost efficient space operations

    Science.gov (United States)

    Montgomery, Ann D.

    1996-01-01

    The logistics of space programs and its history within NASA are discussed, with emphasis on manned space flight and the Space Shuttle program. The lessons learned and the experience gained during these programs are reported on. Key elements of logistics are highlighted, and the problems and issues that can be expected to arise in relation to the support of long-term space operations and future space programs, are discussed. Such missions include the International Space Station program and the reusable launch vehicle. Possible solutions to the problems identified are outlined.

  2. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Science.gov (United States)

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  3. Applied Operations Research: Augmented Reality in an Industrial Environment

    Science.gov (United States)

    Cole, Stuart K.

    2015-01-01

    Augmented reality is the application of computer generated data or graphics onto a real world view. Its use provides the operator additional information or a heightened situational awareness. While advancements have been made in automation and diagnostics of high value critical equipment to improve readiness, reliability and maintenance, the need for assisting and support to Operations and Maintenance staff persists. AR can improve the human machine interface where computer capabilities maximize the human experience and analysis capabilities. NASA operates multiple facilities with complex ground based HVCE in support of national aerodynamics and space exploration, and the need exists to improve operational support and close a gap related to capability sustainment where key and experienced staff consistently rotate work assignments and reach their expiration of term of service. The initiation of an AR capability to augment and improve human abilities and training experience in the industrial environment requires planning and establishment of a goal and objectives for the systems and specific applications. This paper explored use of AR in support of Operation staff in real time operation of HVCE and its maintenance. The results identified include identification of specific goal and objectives, challenges related to availability and computer system infrastructure.

  4. Identifying key components for an effective case report poster: an observational study.

    Science.gov (United States)

    Willett, Lisa L; Paranjape, Anuradha; Estrada, Carlos

    2009-03-01

    Residents demonstrate scholarly activity by presenting posters at academic meetings. Although recommendations from national organizations are available, evidence identifying which components are most important is not. To develop and test an evaluation tool to measure the quality of case report posters and identify the specific components most in need of improvement. Faculty evaluators reviewed case report posters and provided on-site feedback to presenters at poster sessions of four annual academic general internal medicine meetings. A newly developed ten-item evaluation form measured poster quality for specific components of content, discussion, and format (5-point Likert scale, 1 = lowest, 5 = highest). Evaluation tool performance, including Cronbach alpha and inter-rater reliability, overall poster scores, differences across meetings and evaluators and specific components of the posters most in need of improvement. Forty-five evaluators from 20 medical institutions reviewed 347 posters. Cronbach's alpha of the evaluation form was 0.84 and inter-rater reliability, Spearman's rho 0.49 (p words. Our evaluation tool provides empirical data to guide trainees as they prepare posters for presentation which may improve poster quality and enhance their scholarly productivity.

  5. VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems

    OpenAIRE

    Benmalek , Mourad; Challal , Yacine; Derhab , Abdelouahid; Bouabdallah , Abdelmadjid

    2018-01-01

    International audience; In this paper, we propose four new key management schemes for Advanced Metering Infrastructure (AMI) to secure data communications in the Smart Grid (SG). The schemes are based on individual and batch rekeying operations using a novel multi-group key graph structure, are also versatile in the sense that they can support broadcast, unicast, as well as multicast communications. Security analysis shows that our schemes satisfy key management security properties. Furthermo...

  6. Key Factors of Quality in the Sector of Tourism Services Providers: Case Study: Czech Republic

    Directory of Open Access Journals (Sweden)

    Ida Vajčnerová

    2014-01-01

    Full Text Available The paper summarizes main results of partial research aimed at detection of the key factors affecting quality in the sector of tourism services providers, namely tour operators and travel agencies. A primary questionnaire survey was conducted; the researched factors were distributed in the context of service quality dimensions (Grönroos model; the dimensions were tested in relation to sex, age and education of the respondents (ANOVA; Brown-Forsythe test. Assurance was identified as the most important dimension. The output of the study is determining the significance of individual quality factors from the perspective of a potential customer when selecting a service provider.

  7. SNP interaction pattern identifier (SIPI)

    DEFF Research Database (Denmark)

    Lin, Hui Yi; Chen, Dung Tsa; Huang, Po Yu

    2017-01-01

    Motivation: Testing SNP-SNP interactions is considered as a key for overcoming bottlenecks of genetic association studies. However, related statistical methods for testing SNP-SNP interactions are underdeveloped. Results: We propose the SNP Interaction Pattern Identifier (SIPI), which tests 45...

  8. Human dimensions in cyber operations research and development priorities.

    Energy Technology Data Exchange (ETDEWEB)

    Forsythe, James Chris; Silva, Austin Ray; Stevens-Adams, Susan Marie; Bradshaw, Jeffrey [Institute for Human and Machine Cognition

    2012-11-01

    Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions. Research and development needs were identified that fell into three parallel paths: (1) human factors analysis and scientific studies to establish foundational knowledge concerning factors underlying the performance of cyber defenders; (2) development of models that capture key processes that mediate interactions between defenders, users, adversaries and the public; and (3) development of a multi-purpose test environment for conducting controlled experiments that enables systems and human performance measurement. These research and development investments would transform cyber operations from an art to a science, enabling systems solutions to be engineered to address a range of situations. Organizations would be able to move beyond the current state where key decisions (e.g. personnel assignment) are made on a largely ad hoc basis to a state in which there exist institutionalized processes for assuring the right people are doing the right jobs in the right way. These developments lay the groundwork for emergence of a professional class of cyber defenders with defined roles and career progressions, with higher levels of personnel commitment and retention. Finally, the operational impact would be evident in improved performance, accompanied by a shift to a more proactive response in which defenders have the capacity to exert greater control over the cyber battlespace.

  9. Updated requirements for control room annunciation: an operations perspective

    International Nuclear Information System (INIS)

    Davey, E.; Lane, L.

    2001-01-01

    The purpose of this paper is to describe the results of updating and aligning requirements for annunciation functionality and performance with current expectations for operational excellence. This redefinition of annunciation requirements was undertaken as one component of a project to characterize improvement priorities, establish the operational and economic basis for improvement, and identify preferred implementation options for Ontario Power Generation plants. The updated requirements express the kinds of information support annunciation should provide to Operations staff to support the detection, recognition and response to changes in plant conditions. The updated requirements were developed using several types of information: management and industry expectations for operations excellence, previous definitions of user needs for annunciation, and operational and ergonomic principles. Operations and engineering staff at several stations have helped refine and complete the initial requirements definition. Application of these updated requirements is expected to lead to more effective and task relevant annunciation system improvements that better serve plant operation needs. The paper outlines the project rationale, reviews development objectives, discusses the approaches applied for requirements definition and organization, describes key requirements findings in relation to current operations experience, and discusses the proposed application of these requirements for guiding future annunciation system improvements. (author)

  10. Kvanefjeld refinery pilot plant operations

    International Nuclear Information System (INIS)

    Krebs, Damien; Furfaro, Domenic

    2016-01-01

    Greenland Minerals and Energy is a junior project development company which is listed on the Australian Stock Exchange (asx:GGG). It is developing the Kvanefjeld rare earth and uranium project located in the southern tip of Greenland. The project has completed a Feasibility Study and is currently in the permitting phase. Last year was a busy time for the company as it completed a Feasibility Study, a mining licence application (draft submitted in December 2015) and pilot plant operations. Beneficiation pilot plant operations were completed at GTK in Finland in April 2015. This pilot plant treated approximately 30 tonnes of ore to producing almost 2 tonnes of rare earth mineral concentrate. Later in the year a hydrometallurgical pilot plant was performed which mimicked the Refinery process. This pilot plant was performed at Outotec’s Pori Research laboratories in Finland from September till October 2015. The pilot plant treated approximately 200 kilograms of concentrate over 4 split operating campaigns. Each campaign was performed to focus on the performance of a specific part of the refinery flowsheet. This allowed for full operating focus on a single unit operation to ensure that it was operating correctly. The pilot plant operations were quite successful with no major issues with the flowsheet identified through continuous operation. Some fine tuning of conditions was required to ensure adequate removal of impurities was performed with recycle streams incorporated. Overall the leach extractions observed in the pilot plant exceeded the design assumptions in the Feasibility Study. These programs were partially funded by the EURARE program. The EURARE program aims to encourage the sustainable development of European based rare earth projects. This has the goal of allowing Europe to become less reliant on importation of these key raw materials. The professionalism and performance of both GTK and Outotec contributed significantly to the success of the pilot plant

  11. Managing risks and hazardous in industrial operations

    Energy Technology Data Exchange (ETDEWEB)

    Almaula, S.C. [Woodward-Clyde International, Oakland, CA (United States)

    1996-12-31

    The main objective of this paper is to demonstrate that it makes good business sense to identify risks and hazards of an operation and take appropriate steps to manage them effectively. Developing and implementing an effective risk and hazard management plan also contibutes to other industry requirements and standards. Development of a risk management system, key elements of a risk management plan, and hazards and risk analysis methods are outlined. Comparing potential risk to the cost of prevention is also discussed. It is estimated that the cost of developing and preparing the first risk management plan varies between $50,000 to $200,000. 3 refs., 2 figs., 1 tab.

  12. THE ACTIVITIES OF THE NATIONAL BANK OF UKRAINE ON THE OPEN MARKET: OPERATION WITH CERTIFICATES OF DEPOSITS

    OpenAIRE

    Yuliia Harkusha

    2016-01-01

    In the article investigated the activities of the National Bank of Ukraine on the open market. The analysis of operations of the National Bank of Ukraine banks to raise funds placing deposit certificates. Defined impact operations of the central bank's own debt securities to trading volumes deposit certificates of the National Bank of Ukraine on the stock market and the credit activity of banks. Identified problems interest rate policy and the ways to overcome them. Key words: National Bank o...

  13. Now and Then: Combat Casualty Care Policies for Operation Iraqi Freedom and Operation Enduring Freedom Compared With Those of Vietnam

    National Research Council Canada - National Science Library

    Cordts, Paul R; Brosch, Laura A; Holcomb, John B

    2008-01-01

    Between December 2004 and June 2007, 13 key Operation Iraqi Freedom/ Operation Enduring Freedom combat casualty care policies were published to inform medical practice in the combat theater of operations...

  14. Intelligent Control and Operation of Distribution System

    DEFF Research Database (Denmark)

    Bhattarai, Bishnu Prasad

    methodology to ensure efficient control and operation of the future distribution networks. The major scientific challenge is thus to develop control models and strategies to coordinate responses from widely distributed controllable loads and local generations. Detailed models of key Smart Grid (SG) elements...... in this direction but also benefit distribution system operators in the planning and development of the distribution network. The major contributions of this work are described in the following four stages: In the first stage, an intelligent Demand Response (DR) control architecture is developed for coordinating...... the key SG actors, namely consumers, network operators, aggregators, and electricity market entities. A key intent of the architecture is to facilitate market participation of residential consumers and prosumers. A Hierarchical Control Architecture (HCA) having primary, secondary, and tertiary control...

  15. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  16. SARS: Key factors in crisis management.

    Science.gov (United States)

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  17. The SECOQC quantum key distribution network in Vienna

    Science.gov (United States)

    Peev, M.; Pacher, C.; Alléaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J. F.; Fasel, S.; Fossier, S.; Fürst, M.; Gautier, J.-D.; Gay, O.; Gisin, N.; Grangier, P.; Happe, A.; Hasani, Y.; Hentschel, M.; Hübel, H.; Humer, G.; Länger, T.; Legré, M.; Lieger, R.; Lodewyck, J.; Lorünser, T.; Lütkenhaus, N.; Marhold, A.; Matyus, T.; Maurhart, O.; Monat, L.; Nauerth, S.; Page, J.-B.; Poppe, A.; Querasser, E.; Ribordy, G.; Robyr, S.; Salvail, L.; Sharpe, A. W.; Shields, A. J.; Stucki, D.; Suda, M.; Tamas, C.; Themel, T.; Thew, R. T.; Thoma, Y.; Treiber, A.; Trinkler, P.; Tualle-Brouri, R.; Vannel, F.; Walenta, N.; Weier, H.; Weinfurter, H.; Wimberger, I.; Yuan, Z. L.; Zbinden, H.; Zeilinger, A.

    2009-07-01

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARCAustrian Research Centers GmbH—ARC is now operating under the new name AIT Austrian Institute of Technology GmbH following a restructuring initiative.), an entangled photons system by the University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Université Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent—the SECOQC node module, which enables the authentic

  18. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  19. AEOD (Office for Analysis and Evaluation of Operational Data)

    International Nuclear Information System (INIS)

    1989-06-01

    The annual report of the US Nuclear Regulatory Commission's Office for Analysis and Evaluation of Operational Data (AEOD) is devoted to the activities performed during 1988. The report is published in two separate parts. The report is published in two separate parts. NUREG-1272, Vol. 3, No. 1, covers Power Reactors and presents an overview of the operating experience of the nuclear power industry, including comments about the trends of some key performance measures. The report also includes the principal findings and issues identified in AEOD studies over the past year and summarizes information from Licensee Event Reports, Diagnostic Evaluations, and reports to the NRC's Operations Center. NUREG-1272, Vol. 3, No. 2, covers Nonreactors and presents a review of the nonreactor events and misadministrations that were reported in 1988 and a brief synopsis of AEOD studies published in 1988. Each volume contains a list of the AEOD reports issued for 1980--1988. 15 figs., 10 tabs

  20. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  1. Preventive maintenance program of motorized operated valves (MOV) at Cernavoda NPP

    International Nuclear Information System (INIS)

    Groza, M.; Moldoveanu, Edy

    2001-01-01

    This is a Power Point presentation. The following objectives are addressed: A. Determine the target of MOV program; B. Define the strategy for MOV; C. Establish the MOV program execution phases; D. Identification of key parameters; E. Examples. The target of MOV program is to improve the safety by ensuring the adequacy of safety valves and the reliability of safety equipment and, subsequently, to ensure the economic operation of the plant. Consequences of MV malfunction are indicated. The strategy for MOV program development is both general, namely, to define the minimal requirements of preventive /corrective maintenance activities for all MOV's according to design/ manufacture specification and particular, namely to identify MV's specific problems and the need for increasing/decreasing the preventing maintenance tasks or frequency established in 'general' MOV program. Strategy for MOV program development implies: - Establish MOV program applicability; - Develop diagnostic strategy (define key parameters ); - Perform program for engineering review; - Establish program for preventive maintenance; - Revise procedures for operating and maintenance tests; - Dynamic evaluation of MOV. The program execution phases are listed as follows: 1. Perform risk assessment of the MOV's to determine criticality level (program applicability); 2. Collect data to fill in MOV Application Data Sheet; 3. Perform engineering review to determine functional parameters acceptable range and determine key parameters; 4. Analysis for maintenance tasks / frequencies selection and determination of implementing actions (engineer review); 5. Prepare work packages for availability confirmation; 6. Schedule and plan corrective actions or provide input to other programs; 7. Schedule and plan implementing actions in preparation for program field execution; 8. Program field implementation; 9. Program monitoring, evaluation and optimization. The criteria defining the key operational and maintenance

  2. Operational safety of geological disposal: IRSN project 'EXREV' for developing a safety assessment strategy for the operation and reversibility of a geological repository

    International Nuclear Information System (INIS)

    Tichauer, M.; Pellegrini, D.; Serres, C.; Besnus, F.

    2014-01-01

    A high-level waste geological disposal facility is envisioned by the legislator in the French Planning Act no. 2006-739 of 28 June 2006. This act sets major milestones for the operator (Andra) in 2013 (public debate), 2015 (licensing) and 2025 (operation). In the framework of the regulatory review process, IRSN's mission is to conduct an assessment of the safety case provided by Andra at every stage of the process for the French regulator, namely the Nuclear Safety Authority (ASN). In 2005, IRSN gathered more than twenty years of research and expertise in order to provide a comprehensive appraisal of the 'Dossier 2005' prepared by Andra, related to the feasibility of a geological disposal in the Callovo-Oxfordian clay formation. At this time, the description of the operational phase was only at a preliminary stage, but this step paved the way for developing an assessment strategy of the operational phase. In this perspective, IRSN set up the EXREV project in 2008 in order to build up a doctrine and to identify key safety issues to be dealt with. (authors)

  3. Is operational research delivering the goods? The journey to success in low-income countries.

    Science.gov (United States)

    Zachariah, Rony; Ford, Nathan; Maher, Dermot; Bissell, Karen; Van den Bergh, Rafael; van den Boogaard, Wilma; Reid, Tony; Castro, Kenneth G; Draguez, Bertrand; von Schreeb, Johan; Chakaya, Jeremiah; Atun, Rifat; Lienhardt, Christian; Enarson, Don A; Harries, Anthony D

    2012-05-01

    Operational research in low-income countries has a key role in filling the gap between what we know from research and what we do with that knowledge-the so-called know-do gap, or implementation gap. Planned research that does not tangibly affect policies and practices is ineffective and wasteful, especially in settings where resources are scarce and disease burden is high. Clear parameters are urgently needed to measure and judge the success of operational research. We define operational research and its relation with policy and practice, identify why operational research might fail to affect policy and practice, and offer possible solutions to address these shortcomings. We also propose measures of success for operational research. Adoption and use of these measures could help to ensure that operational research better changes policy and practice and improves health-care delivery and disease programmes. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. A proposed operational risk management framework for small and medium enterprises

    Directory of Open Access Journals (Sweden)

    Micheline J. Naude

    2017-12-01

    Full Text Available Background: The gap between small and medium-sized enterprises (SMEs and large businesses that perform risk assessment is significant. SMEs continuously face many operational risks and uncertainties in their daily operations, and these risks threaten to reduce productivity, increase costs and reduce profits. Aim: The purpose of this article was to develop an operational risk management framework that SMEs can use to identify and analyse risks in their operations and take corrective actions to mitigate these risks. Setting: Small and medium-sized enterprises in South Africa do not view risk management as a key component of organisational success, despite evidence that businesses that adopt risk management strategies are more likely to survive and grow. Methods: The article is exploratory in nature, and a conceptual analysis approach was used to formulate the framework. This study reviewed relevant literature sources on risk published between 2002 and 2017. Results: The four process steps of risk management were used as a reference point and form the foundation for the operational risk management framework. The categories of operational; marketing; technical and financial risks were identified from a review of available literature on risk management. Conclusion: There is a dearth of research that deals with operational risk management frameworks for SMEs. The expected contribution of this article, therefore, is twofold: firstly, it is envisaged that managers or owners of SMEs could use the proposed framework as a tool to appraise and minimise their operational risks; secondly, it will add to the current body of knowledge on risk appraisal for SMEs.

  5. Thinking ahead of the surgeon. An interview study to identify scrub nurses' non-technical skills.

    Science.gov (United States)

    Mitchell, Lucy; Flin, Rhona; Yule, Steven; Mitchell, Janet; Coutts, Kathy; Youngson, George

    2011-07-01

    Efforts to reduce adverse event rates in healthcare have revealed the importance of identifying the essential non-technical (cognitive and social) skills for safe and effective performance. Previous research on non-technical skills for operating theatre staff has concentrated on doctors rather than nursing professionals. The aim of the study was to identify the critical non-technical skills that are essential for safe and effective performance as an operating theatre scrub nurse. Experienced scrub nurses (n = 25) and consultant surgeons (n = 9) from four Scottish hospitals were interviewed using a semi-structured format. The protocols were designed to identify the main social and cognitive skills required by scrub nurses. Interviews were digitally recorded, transcribed verbatim and independently coded to extract behaviours in order to produce a list of the main non-technical skills for safe and effective scrub nurse performance. The non-technical skills of situation awareness, communication, teamwork, task management and coping with stress were identified as key to successful scrub nurse task performance. Component sets of behaviours for each of these categories were also noted. The interviews with subject matter experts from scrub nursing and surgery produced preliminary evidence that situation awareness, communication, teamwork and coping with stress are the principal non-technical skills required for effective performance as a scrub nurse. Copyright © 2010 Elsevier Ltd. All rights reserved.

  6. Key Questions in Building Defect Prediction Models in Practice

    Science.gov (United States)

    Ramler, Rudolf; Wolfmaier, Klaus; Stauder, Erwin; Kossak, Felix; Natschläger, Thomas

    The information about which modules of a future version of a software system are defect-prone is a valuable planning aid for quality managers and testers. Defect prediction promises to indicate these defect-prone modules. However, constructing effective defect prediction models in an industrial setting involves a number of key questions. In this paper we discuss ten key questions identified in context of establishing defect prediction in a large software development project. Seven consecutive versions of the software system have been used to construct and validate defect prediction models for system test planning. Furthermore, the paper presents initial empirical results from the studied project and, by this means, contributes answers to the identified questions.

  7. KeyWare: an open wireless distributed computing environment

    Science.gov (United States)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  8. Organizing Special Operations Forces: Navigating the Paradoxical Requirements of Institutional-Bureaucratic and operational Environments

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja

    2017-01-01

    Increased focus on the potential of special operations has lead several countries to establish dedicated special operations organizations. Analysts have warned against bureaucratization, yet little research has explored the effect of organizational formalization or asked how best to organize....... This article draws from research into high-reliability organizations and interviews in Denmark’s Special Operations Command. It contrasts the demands of the command’s institutional-bureaucratic and operational environments and argues that the ability to straddle them is key to success. The high...

  9. Optimisation of key performance measures in air cargo demand management

    OpenAIRE

    Alexander May; Adrian Anslow; Udechukwu Ojiako; Yue Wu; Alasdair Marshall; Maxwell Chipulu

    2014-01-01

    This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that ...

  10. A pupal transcriptomic screen identifies Ral as a target of store-operated calcium entry in Drosophila neurons.

    Science.gov (United States)

    Richhariya, Shlesha; Jayakumar, Siddharth; Abruzzi, Katharine; Rosbash, Michael; Hasan, Gaiti

    2017-02-14

    Transcriptional regulation by Store-operated Calcium Entry (SOCE) is well studied in non-excitable cells. However, the role of SOCE has been poorly documented in neuronal cells with more complicated calcium dynamics. Previous reports demonstrated a requirement for SOCE in neurons that regulate Drosophila flight bouts. We refine this requirement temporally to the early pupal stage and use RNA-sequencing to identify SOCE mediated gene expression changes in the developing Drosophila pupal nervous system. Down regulation of dStim, the endoplasmic reticular calcium sensor and a principal component of SOCE in the nervous system, altered the expression of 131 genes including Ral, a small GTPase. Disruption of Ral function in neurons impaired flight, whereas ectopic expression of Ral in SOCE-compromised neurons restored flight. Through live imaging of calcium transients from cultured pupal neurons, we confirmed that Ral does not participate in SOCE, but acts downstream of it. These results identify neuronal SOCE as a mechanism that regulates expression of specific genes during development of the pupal nervous system and emphasizes the relevance of SOCE-regulated gene expression to flight circuit maturation.

  11. THE FUTURE OF PASSENGER AIR TRANSPORT – VERY LARGE AIRCRAFT AND OUT KEY HUMAN FACTORS AFFECTING THE OPERATION AND SAFETY OF PASSENGER AIR TRANSPORT

    Directory of Open Access Journals (Sweden)

    Petra Skolilova

    2017-12-01

    Full Text Available The article outlines some human factors affecting the operation and safety of passenger air transport given the massive increase in the use of the VLA. Decrease of the impact of the CO2 world emissions is one of the key goals for the new aircraft design. The main wave is going to reduce the burned fuel. Therefore, the eco-efficiency engines combined with reasonable economic operation of the aircraft are very important from an aviation perspective. The prediction for the year 2030 says that about 90% of people, which will use long-haul flights to fly between big cities. So, the A380 was designed exactly for this time period, with a focus on the right capacity, right operating cost and right fuel burn per seat. There is no aircraft today with better fuel burn combined with eco-efficiency per seat, than the A380. The very large aircrafts (VLAs are the future of the commercial passenger aviation. Operating cost versus safety or CO2 emissions versus increasing automation inside the new generation aircraft. Almost 80% of the world aircraft accidents are caused by human error based on wrong action, reaction or final decision of pilots, the catastrophic failures of aircraft systems, or air traffic control errors are not so frequent. So, we are at the beginning of a new age in passenger aviation and the role of the human factor is more important than ever.

  12. Office for Analysis and Evaluation of Operational Data

    International Nuclear Information System (INIS)

    1993-10-01

    The annual report of the US Nuclear Regulatory Commission's Office for Analysis and Evaluation of Operational Data (AEOD) is devoted to the activities performed during 1992. The report is published in two separate parts. NUREG-1272, Vol. 7, No. 1, covers power reactors and presents an overview of the operating experience of the nuclear power industry from the NRC perspective, including comments about the trends of some key performance measures. The report also includes the principal findings and issues identified in AEOD studies over the past year and summarizes information from such sources as licensee event reports, diagnostic evaluations, and reports to the NRC's Operations Center. NUREG-1272, Vol. 7, No. 2, covers nonreactors and presents a review of the events and concerns during 1992 associated with the use of licensed material in nonreactor applications, such as personnel overexposures and medical misadministrations. Both reports also contain a discussion of the Incident Investigation Team program and summarize both the Incident Investigation Team and Augmented Inspection Team reports. Each volume contains a list of the AEOD reports issued for 1981--1992

  13. Nurses' perceptions and experiences of communication in the operating theatre: a focus group interview

    Science.gov (United States)

    Nestel, Debra; Kidd, Jane

    2006-01-01

    Abstract Nurses' perceptions and experiences of communication in the operating theatre: a focus group interview Background Communication programmes are well established in nurse education. The focus of programmes is most often on communicating with patients with less attention paid to inter-professional communication or skills essential for working in specialised settings. Although there are many anecdotal reports of communication within the operating theatre, there are few empirical studies. This paper explores communication behaviours for effective practice in the operating theatre as perceived by nurses and serves as a basis for developing training. Methods A focus group interview was conducted with seven experienced theatre nurses from a large London teaching hospital. The interview explored their perceptions of the key as well as unique features of effective communication skills in the operating theatre. Data was transcribed and thematically analysed until agreement was achieved by the two authors. Results There was largely consensus on the skills deemed necessary for effective practice including listening, clarity of speech and being polite. Significant influences on the nature of communication included conflict in role perception and organisational issues. Nurses were often expected to work outside of their role which either directly or indirectly created barriers for effective communication. Perceptions of a lack of collaborative team effort also influenced communication. Conclusion Although fundamental communication skills were identified for effective practice in the operating theatre, there were significant barriers to their use because of confusion over clarity of roles (especially nurses' roles) and the implications for teamwork. Nurses were dissatisfied with several aspects of communication. Future studies should explore the breadth and depth of this dissatisfaction in other operating theatres, its impact on morale and importantly on patient safety

  14. Information needs in nuclear power plants during low power operation modes

    Energy Technology Data Exchange (ETDEWEB)

    Tommila, Teemu; Fantoni, Paolo F.; Zander, Ralf M.

    1998-02-01

    During the past few years an increasing attention has been paid to the safety of shutdown and refuelling operations. It has turned out that the risks during shutdown may be comparable to the risks of power operation. The goal of this report is to identify information requirements related to low power operating modes of nuclear power plants. These include, for example, warm and cold shutdowns, refuelling and maintenance, as well as related state transitions such as start-up and shut-down. The focus of the report is on planned refuelling outages and the role of the control room in managing the outage activities. As a starting point, the basic terminology and characteristics of low power operation are discussed. The current situation at nuclear power plants and some recent developments in information technology are reviewed. End-users' requirements and enabling technologies are combined in order to identify the opportunities for new information technology tools in low power operation. The required features of process control systems and maintenance information systems are described. Common plant modelling techniques, open software architectures and functional structuring of the process control system are suggested to be the key issues in the long-term development of operator support systems. On a shorter time scale, new tools solving limited practical problems should be developed and evaluated. This would provide a basis for the features needed for low power operation, including for example, outage planning, on-line risk monitoring, management of outage tasks, adaptive alarm handling, computerised procedures and task-oriented human interfaces. (author)

  15. Optimal attacks on qubit-based Quantum Key Recycling

    Science.gov (United States)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  16. Investigation of key parameters for the development of reliable ITER baseline operation scenarios using CORSICA

    Science.gov (United States)

    Kim, S. H.; Casper, T. A.; Snipes, J. A.

    2018-05-01

    ITER will demonstrate the feasibility of burning plasma operation by operating DT plasmas in the ELMy H-mode regime with a high ratio of fusion power gain Q ~ 10. 15 MA ITER baseline operation scenario has been studied using CORSICA, focusing on the entry to burn, flat-top burning plasma operation and exit from burn. The burning plasma operation for about 400 s of the current flat-top was achieved in H-mode within the various engineering constraints imposed by the poloidal field coil and power supply systems. The target fusion gain (Q ~ 10) was achievable in the 15 MA ITER baseline operation with a moderate amount of the total auxiliary heating power (~50 MW). It has been observed that the tungsten (W) concentration needs to be maintained low level (n w/n e up to the order of 1.0  ×  10-5) to avoid the radiative collapse and uncontrolled early termination of the discharge. The dynamic evolution of the density can modify the H-mode access unless the applied auxiliary heating power is significantly higher than the H-mode threshold power. Several qualitative sensitivity studies have been performed to provide guidance for further optimizing the plasma operation and performance. Increasing the density profile peaking factor was quite effective in increasing the alpha particle self-heating power and fusion power multiplication factor. Varying the combination of auxiliary heating power has shown that the fusion power multiplication factor can be reduced along with the increase in the total auxiliary heating power. As the 15 MA ITER baseline operation scenario requires full capacity of the coil and power supply systems, the operation window for H-mode access and shape modification was narrow. The updated ITER baseline operation scenarios developed in this work will become a basis for further optimization studies necessary along with the improvement in understanding the burning plasma physics.

  17. Safety assessment on the key equipment of coal gasification based on SDG-HAZOP method

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, B.; Xu, X.; Ma, X.; Wu, C. [Beijing University of Chemical Technology, Beijing (China)

    2008-07-15

    An example of the coal gasification process was introduced after the explanation of the graphical representation method known as the sign directed graph (SDG). The systematic modeling procedure was also introduced. Firstly, the key variables of the whole system were selected. Then the relationship equations were listed. Finally, the SDG-HAZOP (hazard and operability) model was derived after attaching the abnormal causes and adverse consequences. In order to get a credible SDG model, the model was checked by technicians in the factory. Based on computer-aided analysis, this model can express almost all the dangerous features of the gasification process. It can also reveal the mechanisms of danger propagation, which may effectively help safety engineers to identify potential hazards. 15 refs., 4 figs., 1 tab.

  18. Practical long-distance quantum key distribution system using decoy levels

    International Nuclear Information System (INIS)

    Rosenberg, D; Peterson, C G; Harrington, J W; Rice, P R; Dallmann, N; Tyagi, K T; McCabe, K P; Hughes, R J; Nordholt, J E; Nam, S; Baek, B; Hadfield, R H

    2009-01-01

    Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here, we report results obtained using a fully automated, robust QKD system based on the Bennett Brassard 1984 (BB84) protocol with low-noise superconducting nanowire single-photon detectors (SNSPDs) and decoy levels to produce a secret key with unconditional security over a record 140.6 km of optical fibre, an increase of more than a factor of five compared with the previous record for unconditionally secure key generation in a practical QKD system.

  19. Identifying Key Actors in Heterogeneous Networks

    Science.gov (United States)

    2017-11-29

    Department of Defense (DOD) present social situations that are outside the scope and violate the assumptions of existing formal social science models. SNA by...assumptions of these existing social science models. SNA by its very construction focuses on dyadic relations and standard SNA metrics are focused only on...problematic for our purposes of determining relative valuations among vertices, but it is in contrast to the behavior of valuations like the Shapley value

  20. Optimal Operations and Resilient Investments in Steam Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bungener, Stéphane L., E-mail: stephane.bungener@a3.epfl.ch [Industrial Process and Energy Systems Engineering, École Polytechnique Fédérale de Lausanne, Lausanne (Switzerland); Van Eetvelde, Greet [Environmental and Spatial Management, Faculty of Engineering and Architecture, Ghent University, Ghent (Belgium); Maréchal, François [Industrial Process and Energy Systems Engineering, École Polytechnique Fédérale de Lausanne, Lausanne (Switzerland)

    2016-01-20

    Steam is a key energy vector for industrial sites, most commonly used for process heating and cooling, cogeneration of heat and mechanical power as a motive fluid or for stripping. Steam networks are used to carry steam from producers to consumers and between pressure levels through letdowns and steam turbines. The steam producers (boilers, heat and power cogeneration units, heat exchangers, chemical reactors) should be sized to supply the consumers at nominal operating conditions as well as peak demand. First, this paper proposes an Mixed Integer Linear Programing formulation to optimize the operations of steam networks in normal operating conditions and exceptional demand (when operating reserves fall to zero), through the introduction of load shedding. Optimization of investments based on operational and investment costs are included in the formulation. Though rare, boiler failures can have a heavy impact on steam network operations and costs, leading to undercapacity and unit shutdowns. A method is therefore proposed to simulate steam network operations when facing boiler failures. Key performance indicators are introduced to quantify the network’s resilience. The proposed methods are applied and demonstrated in an industrial case study using industrial data. The results indicate the importance of oversizing key steam producing equipments and the value of industrial symbiosis to increase industrial site resilience.

  1. Optimal Operations and Resilient Investments in Steam Networks

    International Nuclear Information System (INIS)

    Bungener, Stéphane L.; Van Eetvelde, Greet; Maréchal, François

    2016-01-01

    Steam is a key energy vector for industrial sites, most commonly used for process heating and cooling, cogeneration of heat and mechanical power as a motive fluid or for stripping. Steam networks are used to carry steam from producers to consumers and between pressure levels through letdowns and steam turbines. The steam producers (boilers, heat and power cogeneration units, heat exchangers, chemical reactors) should be sized to supply the consumers at nominal operating conditions as well as peak demand. First, this paper proposes an Mixed Integer Linear Programing formulation to optimize the operations of steam networks in normal operating conditions and exceptional demand (when operating reserves fall to zero), through the introduction of load shedding. Optimization of investments based on operational and investment costs are included in the formulation. Though rare, boiler failures can have a heavy impact on steam network operations and costs, leading to undercapacity and unit shutdowns. A method is therefore proposed to simulate steam network operations when facing boiler failures. Key performance indicators are introduced to quantify the network’s resilience. The proposed methods are applied and demonstrated in an industrial case study using industrial data. The results indicate the importance of oversizing key steam producing equipments and the value of industrial symbiosis to increase industrial site resilience.

  2. Requirements for tokamak remote operation: Application to JT-60SA

    International Nuclear Information System (INIS)

    Innocente, Paolo; Barbato, Paolo; Farthing, Jonathan; Giruzzi, Gerardo; Ide, Shunsuke; Imbeaux, Frédéric; Joffrin, Emmanuel; Kamada, Yutaka; Kühner, Georg; Naito, Osamu; Urano, Hajime; Yoshida, Maiko

    2015-01-01

    Highlights: • We analyzed the data management system (DMS) appropriate for international collaboration. • We define the principal requirements for all components of the DMS. • We evaluated application of DMS requirements to the JT-60SA experiment. • We evaluated the role network bandwidth and time delay between EU and Japan. - Abstract: Remote operation and data analysis are becoming key requirements of any fusion devices. In this framework a well-conceived data management system integrated with a suite of analysis and support tools are essential components for an efficient remote exploitation of any fusion device. The following components must be considered: data archiving data model architecture; remote data and computers access; pulse schedule, data analysis software and support tools; remote control room specifications and security issues. The definition of a device-generic data model plays also important role in improving the ability to share solution and reducing learning time. As for the remote control room, the implementation of an Operation Request Gateway has been identified as an answer to security issues meanwhile remotely proving all the required features to effectively operate a device. Previous requirements have been analyzed for the new JT-60SA tokamak device. Remote exploitation is paramount in the JT-60SA case which is expected to be jointly operated between Japan and Europe. Due to the geographical distance of the two parties an optimal remote operation and remote data-analysis is considered as a key requirement in the development of JT-60SA. It this case the effects of network speed and delay have been also evaluated and tests have confirmed that the performance can vary significantly depending on the technology used.

  3. Requirements for tokamak remote operation: Application to JT-60SA

    Energy Technology Data Exchange (ETDEWEB)

    Innocente, Paolo, E-mail: paolo.innocente@igi.cnr.it [Consorzio RFX, Corso Stati Uniti 4, 35127 Padova (Italy); Barbato, Paolo [Consorzio RFX, Corso Stati Uniti 4, 35127 Padova (Italy); Farthing, Jonathan [CCFE, Culham Science Centre, Abingdon OX14 3DB (United Kingdom); Giruzzi, Gerardo [CEA, IRFM, F-13108 Saint-Paul-lez-Durance (France); Ide, Shunsuke [Japan Atomic Energy Agency, Naka, Ibaraki-ken 311-0193 (Japan); Imbeaux, Frédéric; Joffrin, Emmanuel [CEA, IRFM, F-13108 Saint-Paul-lez-Durance (France); Kamada, Yutaka [Japan Atomic Energy Agency, Naka, Ibaraki-ken 311-0193 (Japan); Kühner, Georg [Max-Planck-Institute for Plasma Physics, EURATOM Association, Wendelsteinstr. 1, 17491 Greifswald (Germany); Naito, Osamu; Urano, Hajime; Yoshida, Maiko [Japan Atomic Energy Agency, Naka, Ibaraki-ken 311-0193 (Japan)

    2015-10-15

    Highlights: • We analyzed the data management system (DMS) appropriate for international collaboration. • We define the principal requirements for all components of the DMS. • We evaluated application of DMS requirements to the JT-60SA experiment. • We evaluated the role network bandwidth and time delay between EU and Japan. - Abstract: Remote operation and data analysis are becoming key requirements of any fusion devices. In this framework a well-conceived data management system integrated with a suite of analysis and support tools are essential components for an efficient remote exploitation of any fusion device. The following components must be considered: data archiving data model architecture; remote data and computers access; pulse schedule, data analysis software and support tools; remote control room specifications and security issues. The definition of a device-generic data model plays also important role in improving the ability to share solution and reducing learning time. As for the remote control room, the implementation of an Operation Request Gateway has been identified as an answer to security issues meanwhile remotely proving all the required features to effectively operate a device. Previous requirements have been analyzed for the new JT-60SA tokamak device. Remote exploitation is paramount in the JT-60SA case which is expected to be jointly operated between Japan and Europe. Due to the geographical distance of the two parties an optimal remote operation and remote data-analysis is considered as a key requirement in the development of JT-60SA. It this case the effects of network speed and delay have been also evaluated and tests have confirmed that the performance can vary significantly depending on the technology used.

  4. From EGEE Operations Portal towards EGI Operations Portal

    Science.gov (United States)

    Cordier, Hélène; L'Orphelin, Cyril; Reynaud, Sylvain; Lequeux, Olivier; Loikkanen, Sinikka; Veyre, Pierre

    Grid operators in EGEE have been using a dedicated dashboard as their central operational tool, stable and scalable for the last 5 years despite continuous upgrade from specifications by users, monitoring tools or data providers. In EGEE-III, recent regionalisation of operations led the Operations Portal developers to conceive a standalone instance of this tool. We will see how the dashboard reorganization paved the way for the re-engineering of the portal itself. The outcome is an easily deployable package customized with relevant information sources and specific decentralized operational requirements. This package is composed of a generic and scalable data access mechanism, Lavoisier; a renowned php framework for configuration flexibility, Symfony and a MySQL database. VO life cycle and operational information, EGEE broadcast and Downtime notifications are next for the major reorganization until all other key features of the Operations Portal are migrated to the framework. Features specifications will be sketched at the same time to adapt to EGI requirements and to upgrade. Future work on feature regionalisation, on new advanced features or strategy planning will be tracked in EGI- Inspire through the Operations Tools Advisory Group, OTAG, where all users, customers and third parties of the Operations Portal are represented from January 2010.

  5. Scalable Multi-group Key Management for Advanced Metering Infrastructure

    OpenAIRE

    Benmalek , Mourad; Challal , Yacine; Bouabdallah , Abdelmadjid

    2015-01-01

    International audience; Advanced Metering Infrastructure (AMI) is composed of systems and networks to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy efficiency targets. AMI is a privileged target for security attacks with potentially great damage against infrastructures and privacy. For this reason, Key Management has been identified as one of the most challenging topics in AMI development. In this paper, we propose a new Scalable multi-group key ...

  6. Better-Than-Visual Technologies for Next Generation Air Transportation System Terminal Maneuvering Area Operations

    Science.gov (United States)

    Prinzel, Lawrence J., III; Bailey, Randall E.; Shelton, Kevin J.; Jones, Denise R.; Kramer, Lynda J.; Arthur, Jarvis J., III; Williams, Steve P.; Barmore, Bryan E.; Ellis, Kyle E.; Rehfeld, Sherri A.

    2011-01-01

    A consortium of industry, academia and government agencies are devising new concepts for future U.S. aviation operations under the Next Generation Air Transportation System (NextGen). Many key capabilities are being identified to enable NextGen, including the concept of Equivalent Visual Operations (EVO) replicating the capacity and safety of today's visual flight rules (VFR) in all-weather conditions. NASA is striving to develop the technologies and knowledge to enable EVO and to extend EVO towards a Better-Than-Visual (BTV) operational concept. The BTV operational concept uses an electronic means to provide sufficient visual references of the external world and other required flight references on flight deck displays that enable VFR-like operational tempos and maintain and improve the safety of VFR while using VFR-like procedures in all-weather conditions. NASA Langley Research Center (LaRC) research on technologies to enable the concept of BTV is described.

  7. Identifying ELIXIR Core Data Resources.

    Science.gov (United States)

    Durinx, Christine; McEntyre, Jo; Appel, Ron; Apweiler, Rolf; Barlow, Mary; Blomberg, Niklas; Cook, Chuck; Gasteiger, Elisabeth; Kim, Jee-Hyub; Lopez, Rodrigo; Redaschi, Nicole; Stockinger, Heinz; Teixeira, Daniel; Valencia, Alfonso

    2016-01-01

    The core mission of ELIXIR is to build a stable and sustainable infrastructure for biological information across Europe. At the heart of this are the data resources, tools and services that ELIXIR offers to the life-sciences community, providing stable and sustainable access to biological data. ELIXIR aims to ensure that these resources are available long-term and that the life-cycles of these resources are managed such that they support the scientific needs of the life-sciences, including biological research. ELIXIR Core Data Resources are defined as a set of European data resources that are of fundamental importance to the wider life-science community and the long-term preservation of biological data. They are complete collections of generic value to life-science, are considered an authority in their field with respect to one or more characteristics, and show high levels of scientific quality and service. Thus, ELIXIR Core Data Resources are of wide applicability and usage. This paper describes the structures, governance and processes that support the identification and evaluation of ELIXIR Core Data Resources. It identifies key indicators which reflect the essence of the definition of an ELIXIR Core Data Resource and support the promotion of excellence in resource development and operation. It describes the specific indicators in more detail and explains their application within ELIXIR's sustainability strategy and science policy actions, and in capacity building, life-cycle management and technical actions. The identification process is currently being implemented and tested for the first time. The findings and outcome will be evaluated by the ELIXIR Scientific Advisory Board in March 2017. Establishing the portfolio of ELIXIR Core Data Resources and ELIXIR Services is a key priority for ELIXIR and publicly marks the transition towards a cohesive infrastructure.

  8. The DIAMOND Model of Peace Support Operations

    National Research Council Canada - National Science Library

    Bailey, Peter

    2005-01-01

    DIAMOND (Diplomatic And Military Operations in a Non-warfighting Domain) is a high-level stochastic simulation developed at Dstl as a key centerpiece within the Peace Support Operations (PSO) 'modelling jigsaw...

  9. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  10. Demonstrator for objective driven SON operation

    NARCIS (Netherlands)

    Schmelz, L.C.; Eisenblätter, A.; Hahn, S.; Kürner, T.; Litjens, R.; Lobinger, A.; Lohmüller, S.; Sas, B.; Türke, U.

    2014-01-01

    The demonstrator shows a self-management system for heterogeneous mobile wireless networks that uses context-specific and weighted Key Performance Indicator (KPI) target values defined by the operator to automatically and autonomously configure and control the operation of Self-Organising Network

  11. Using Key Informant Method to Determine the Prevalence and Causes of Childhood Blindness in South-Eastern Nigeria.

    Science.gov (United States)

    Aghaji, Ada E; Ezegwui, Ifeoma R; Shiweobi, Jude O; Mamah, Cyril C; Okoloagu, Mary N; Onwasigwe, Ernest N

    2017-12-01

    To determine the prevalence and causes of childhood blindness in an underserved community in south-eastern Nigeria using the key informant method. This was a descriptive cross-sectional study. Key informants (KI) appointed by their respective communities received 1-day training on identification of blind children in their communities. Two weeks later, the research team visited the agreed sites within the community and examined the identified children. The World Health Organization eye examination record for blind children was used for data collection. Data entry and analysis were done with the Statistical Package for Social Sciences (SPSS) version 17.0. Fifteen blind or severely visually impaired children (age range 3 months to 15 years) were identified in this community; nine of these were brought by the KIs. The prevalence of childhood blindness/severe visual impairment (BL/SVI) was 0.12 per 1000 children. By anatomical classification, operable cataract in 6 (40.0%) was the leading cause of BL/SVI in the series; followed by optic nerve lesions (atrophy/hypoplasia) in 3 (20.0%). The etiology of BL/SVI is unknown for the majority of the children (66.7%). It was presumed hereditary in four children (26.7%). Sixty percent of the blindness was judged avoidable. Only three children (20.0%) were enrolled in the Special Education Centre for the Blind. The prevalence of childhood BL/SVI in our study population is low but over half of the blindness is avoidable. There may be a significant backlog of operable childhood cataract in south-eastern Nigeria. The KI method is a practical method for case finding of blind children in rural communities.

  12. Office of Analysis and Evaluation of Operational Data 1989 annual report, Power reactors

    International Nuclear Information System (INIS)

    1990-07-01

    The annual report of the US Nuclear Regulatory Commission's Office for Analysis and Evaluation of Operational Data (AEOD) is devoted to the activities performed during 1989. The report is published in two separate parts. This document, NUREG-1272, Vol. 4, No. 1, covers power reactors and presents an overview of the operating experience of the nuclear power industry from the NRC perspective, including comments about the trends of some key performance measures. The report also includes the principal findings and issues identified in AEOD studies over the past year and summarizes information from such sources as licensee event reports, diagnostic evaluations, and reports to the NRC's Operations Center. This report also compiles the status of staff actions resulting from previous Incident Investigation Team (IIT) reports. 16 figs., 9 tabs

  13. Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks

    International Nuclear Information System (INIS)

    Patel, K. A.; Dynes, J. F.; Lucamarini, M.; Choi, I.; Sharpe, A. W.; Yuan, Z. L.; Shields, A. J.; Penty, R. V.

    2014-01-01

    We demonstrate quantum key distribution (QKD) with bidirectional 10 Gb/s classical data channels in a single fiber using dense wavelength division multiplexing. Record secure key rates of 2.38 Mbps and fiber distances up to 70 km are achieved. Data channels are simultaneously monitored for error-free operation. The robustness of QKD is further demonstrated with a secure key rate of 445 kbps over 25 km, obtained in the presence of data lasers launching conventional 0 dBm power. We discuss the fundamental limit for the QKD performance in the multiplexing environment

  14. Identifying key genes in rheumatoid arthritis by weighted gene co-expression network analysis.

    Science.gov (United States)

    Ma, Chunhui; Lv, Qi; Teng, Songsong; Yu, Yinxian; Niu, Kerun; Yi, Chengqin

    2017-08-01

    This study aimed to identify rheumatoid arthritis (RA) related genes based on microarray data using the WGCNA (weighted gene co-expression network analysis) method. Two gene expression profile datasets GSE55235 (10 RA samples and 10 healthy controls) and GSE77298 (16 RA samples and seven healthy controls) were downloaded from Gene Expression Omnibus database. Characteristic genes were identified using metaDE package. WGCNA was used to find disease-related networks based on gene expression correlation coefficients, and module significance was defined as the average gene significance of all genes used to assess the correlation between the module and RA status. Genes in the disease-related gene co-expression network were subject to functional annotation and pathway enrichment analysis using Database for Annotation Visualization and Integrated Discovery. Characteristic genes were also mapped to the Connectivity Map to screen small molecules. A total of 599 characteristic genes were identified. For each dataset, characteristic genes in the green, red and turquoise modules were most closely associated with RA, with gene numbers of 54, 43 and 79, respectively. These genes were enriched in totally enriched in 17 Gene Ontology terms, mainly related to immune response (CD97, FYB, CXCL1, IKBKE, CCR1, etc.), inflammatory response (CD97, CXCL1, C3AR1, CCR1, LYZ, etc.) and homeostasis (C3AR1, CCR1, PLN, CCL19, PPT1, etc.). Two small-molecule drugs sanguinarine and papaverine were predicted to have a therapeutic effect against RA. Genes related to immune response, inflammatory response and homeostasis presumably have critical roles in RA pathogenesis. Sanguinarine and papaverine have a potential therapeutic effect against RA. © 2017 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  15. Diagnosing climate change impacts and identifying adaptation strategies by involving key stakeholder organisations and farmers in Sikkim, India: Challenges and opportunities.

    Science.gov (United States)

    Azhoni, Adani; Goyal, Manish Kumar

    2018-06-01

    Narrowing the gap between research, policy making and implementing adaptation remains a challenge in many parts of the world where climate change is likely to severely impact water security. This research aims to narrow this gap by matching the adaptation strategies being framed by policy makers to that of the perspectives of development agencies, researchers and farmers in the Himalayan state of Sikkim in India. Our case study examined the perspectives of various stakeholders for climate change impacts, current adaptation strategies, knowledge gaps and adaptation barriers, particularly in the context of implementing the Sikkim State Action Plan on Climate Change through semi-structured interviews carried out with decision makers in the Sikkim State Government, researchers, consultants, local academia, development agencies and farmers. Using Stakeholders Network Analysis tools, this research unravels the complexities of perceiving climate change impacts, identifying strategies, and implementing adaptation. While farmers are less aware about the global phenomenon of climate change impacts for water security, their knowledge of the local conditions and their close interaction with the State Government Agriculture Department provides them opportunities. Although important steps are being initiated through the Sikkim State Action Plan on Climate Change it is yet to deliver effective means of adaptation implementation and hence, strengthening the networks of close coordination between the various implementing agencies will pay dividends. Knowledge gaps and the need for capacity building identified in this research, based on the understandings of key stakeholders are highly relevant to both the research community and for informing policy. Copyright © 2018 Elsevier B.V. All rights reserved.

  16. Hierarchthis: An Interactive Interface for Identifying Mission-Relevant Components of the Advanced Multi-Mission Operations System

    Science.gov (United States)

    Litomisky, Krystof

    2012-01-01

    Even though NASA's space missions are many and varied, there are some tasks that are common to all of them. For example, all spacecraft need to communicate with other entities, and all spacecraft need to know where they are. These tasks use tools and services that can be inherited and reused between missions, reducing systems engineering effort and therefore reducing cost.The Advanced Multi-Mission Operations System, or AMMOS, is a collection of multimission tools and services, whose development and maintenance are funded by NASA. I created HierarchThis, a plugin designed to provide an interactive interface to help customers identify mission-relevant tools and services. HierarchThis automatically creates diagrams of the AMMOS database, and then allows users to show/hide specific details through a graphical interface. Once customers identify tools and services they want for a specific mission, HierarchThis can automatically generate a contract between the Multimission Ground Systems and Services Office, which manages AMMOS, and the customer. The document contains the selected AMMOS components, along with their capabilities and satisfied requirements. HierarchThis reduces the time needed for the process from service selections to having a mission-specific contract from the order of days to the order of minutes.

  17. Analysis of communication contents and the associated crew performance data collected from abnormal operating conditions of nuclear power plants

    International Nuclear Information System (INIS)

    Park, Jin Kyun; Kim, Seung Hwan; Kim, Man Cheol

    2010-11-01

    There would be no objection about the fact that, in the case of human operators working in a large process control system, the consequence of inappropriate communications would be more sensitive because they have to carry out many kinds of crucial activities (sharing key information or planning actions, etc.) based on communications. Accordingly, the reduction of inappropriate communications has been regarded as one of the key approaches in securing the safety of large process control systems, such as commercial airplanes, off-shore oil platforms and nuclear power plants (NPPs). This means that one of the practical methods would be the investigation of communication contents, through which we are able to identify useful insights pertaining to the prevention of inappropriate communications. For this reason, communications of main control room (MCR) operating crews that were faced with two kinds of abnormal operating conditions are analyzed to identify the variation of communication contents. To this end, in total 39 audio-visual records about abnormal training sessions, which were carried out by MCR operating crews, are collected from the full scope simulator of reference NPPs. Then communication contents and the associated crew performance data are compared for selected MCR operating crews. As a result, although additional effort is indispensable to draw a more concrete conclusion, it is strongly expected the performance of operating crews is proportional to the amount of '3-way communication.' In addition, it is necessary to develop a novel framework that can be used to analyze the communication characteristics of MCR operating crews because it is insufficient to retrieve insightful information from simple comparisons based on the empirical observation of crew communications

  18. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    International Nuclear Information System (INIS)

    Kiktenko, Evgeniy O.

    2017-01-01

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.

  19. Analysis and Evaluation of Operational Data 1991 annual report: Power reactors

    International Nuclear Information System (INIS)

    1992-07-01

    The annual report of the US Nuclear Regulatory Commission's Office for Analysis and Evaluation of Operational Data (AEOD) describes activities performed during 1991. The report is published in two separate parts. This document, NUREG-1272, Vol. 6, No. 1, covers power reactors and presents an overview of the operating experience of the nuclear power industry from the NRC perspective, including comments about the trends of some key performance measures. The report also includes the principal findings and issues identified in AEOD studies over the past year and summarizes information from such sources as licensee event reports, diagnostic evaluations, and reports to the NRC's Operations Center. NUREG-1272, Vol. 6, No. 2, covers nonreactors and presents a review of the events and concerns during 1991 associated with the use of licensed material in nonreactor applications. Each volume contains a list of the AEOD reports issued for 1984 through 1991

  20. Compatible discrete operator schemes on polyhedral meshes for elliptic and Stokes equations

    International Nuclear Information System (INIS)

    Bonelle, Jerome

    2014-01-01

    This thesis presents a new class of spatial discretization schemes on polyhedral meshes, called Compatible Discrete Operator (CDO) schemes and their application to elliptic and Stokes equations In CDO schemes, preserving the structural properties of the continuous equations is the leading principle to design the discrete operators. De Rham maps define the degrees of freedom according to the physical nature of fields to discretize. CDO schemes operate a clear separation between topological relations (balance equations) and constitutive relations (closure laws). Topological relations are related to discrete differential operators, and constitutive relations to discrete Hodge operators. A feature of CDO schemes is the explicit use of a second mesh, called dual mesh, to build the discrete Hodge operator. Two families of CDO schemes are considered: vertex-based schemes where the potential is located at (primal) mesh vertices, and cell-based schemes where the potential is located at dual mesh vertices (dual vertices being in one-to-one correspondence with primal cells). The CDO schemes related to these two families are presented and their convergence is analyzed. A first analysis hinges on an algebraic definition of the discrete Hodge operator and allows one to identify three key properties: symmetry, stability, and P0-consistency. A second analysis hinges on a definition of the discrete Hodge operator using reconstruction operators, and the requirements on these reconstruction operators are identified. In addition, CDO schemes provide a unified vision on a broad class of schemes proposed in the literature (finite element, finite element, mimetic schemes... ). Finally, the reliability and the efficiency of CDO schemes are assessed on various test cases and several polyhedral meshes. (author)

  1. Safety culture in nuclear installations: Bangladesh perspectives and key lessons learned from major events

    International Nuclear Information System (INIS)

    Jalil, A.; Rabbani, G.

    2002-01-01

    Steps necessary to be taken to ensure safety in nuclear installations are suggested. One of the steps suggested is enhancing the safety culture. It is necessary to gain a common understanding of the concept itself, the development stages of safety culture by way of good management practices and leadership for safety culture improvement in the long-term. International topical meetings on safety culture may serve as an important forum for exchange of experiences. From such conventions new initiatives and programmes may crop up which when implemented around the world is very likely to improve safety management and thus boost up the safety culture in nuclear installations. International co-operation and learning are to be prompted to facilitate the sharing of the achievements to face the challenges involved in the management of safety and fixing priorities for future work and identify areas of co-operations. Key lessons learned from some major events have been reported. Present status and future trend of nuclear safety culture in Bangladesh have been dealt with. (author)

  2. Optimation of Operation System Integration between Main and Feeder Public Transport (Case Study: Trans Jakarta-Kopaja Bus Services)

    Science.gov (United States)

    Miharja, M.; Priadi, Y. N.

    2018-05-01

    Promoting a better public transport is a key strategy to cope with urban transport problems which are mostly caused by a huge private vehicle usage. A better public transport service quality not only focuses on one type of public transport mode, but also concerns on inter modes service integration. Fragmented inter mode public transport service leads to a longer trip chain as well as average travel time which would result in its failure to compete with a private vehicle. This paper examines the optimation process of operation system integration between Trans Jakarta Bus as the main public transport mode and Kopaja Bus as feeder public transport service in Jakarta. Using scoring-interview method combined with standard parameters in operation system integration, this paper identifies the key factors that determine the success of the two public transport operation system integrations. The study found that some key integration parameters, such as the cancellation of “system setoran”, passenger get in-get out at official stop points, and systematic payment, positively contribute to a better service integration. However, some parameters such as fine system, time and changing point reliability, and information system reliability are among those which need improvement. These findings are very useful for the authority to set the right strategy to improve operation system integration between Trans Jakarta and Kopaja Bus services.

  3. Conceptual and Operational Considerations in Identifying Socioenvironmental Factors Associated with Disability among Community-Dwelling Adults

    Directory of Open Access Journals (Sweden)

    Mathieu Philibert

    2015-04-01

    Full Text Available Disability is conceived as a person–context interaction. Physical and social environments are identified as intervention targets for improving social participation and independence. In comparison to the body of research on place and health, relatively few reports have been published on residential environments and disability in the health sciences literature. We reviewed studies evaluating the socioenvironmental correlates of disability. Searches were conducted in Medline, Embase and CINAHL databases for peer-reviewed articles published between 1997 and 2014. We found many environmental factors to be associated with disability, particularly area-level socioeconomic status and rurality. However, diversity in conceptual and methodological approaches to such research yields a limited basis for comparing studies. Conceptual inconsistencies in operational measures of disability and conceptual disagreement between studies potentially affect understanding of socioenvironmental influences. Similarly, greater precision in socioenvironmental measures and in study designs are likely to improve inference. Consistent and generalisable support for socioenvironmental influences on disability in the general adult population is scarce.

  4. Multi-party Semi-quantum Key Agreement with Delegating Quantum Computation

    Science.gov (United States)

    Liu, Wen-Jie; Chen, Zhen-Yu; Ji, Sai; Wang, Hai-Bin; Zhang, Jun

    2017-10-01

    A multi-party semi-quantum key agreement (SQKA) protocol based on delegating quantum computation (DQC) model is proposed by taking Bell states as quantum resources. In the proposed protocol, the participants only need the ability of accessing quantum channel and preparing single photons {|0〉, |1〉, |+〉, |-〉}, while the complicated quantum operations, such as the unitary operations and Bell measurement, will be delegated to the remote quantum center. Compared with previous quantum key agreement protocols, this client-server model is more feasible in the early days of the emergence of quantum computers. In order to prevent the attacks from outside eavesdroppers, inner participants and quantum center, two single photon sequences are randomly inserted into Bell states: the first sequence is used to perform the quantum channel detection, while the second is applied to disorder the positions of message qubits, which guarantees the security of the protocol.

  5. A Novel Image Encryption Algorithm Based on DNA Subsequence Operation

    Directory of Open Access Journals (Sweden)

    Qiang Zhang

    2012-01-01

    Full Text Available We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc. combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.

  6. NASA Operational Environment Team (NOET): NASA's key to environmental technology

    Science.gov (United States)

    Cook, Beth

    1993-01-01

    NASA has stepped forward to face the environmental challenge to eliminate the use of Ozone-Layer Depleting Substances (OLDS) and to reduce our Hazardous Air Pollutants (HAP) by 50 percent in 1995. These requirements have been issued by the Clean Air Act, the Montreal Protocol, and various other legislative acts. A proactive group, the NASA Operational Environment Team or NOET, received its charter in April 1992 and was tasked with providing a network through which replacement activities and development experiences can be shared. This is a NASA-wide team which supports the research and development community by sharing information both in person and via a computerized network, assisting in specification and standard revisions, developing cleaner propulsion systems, and exploring environmentally-compliant alternatives to current processes.

  7. Using the Theory of Planned Behavior to identify key beliefs underlying chlamydia testing intentions in a sample of young people living in deprived areas.

    Science.gov (United States)

    Booth, Amy R; Norman, Paul; Harris, Peter R; Goyder, Elizabeth

    2015-09-01

    The Theory of Planned Behavior was used to identify the key behavioural, normative and control beliefs underlying intentions to test regularly for chlamydia among young people living in socially and economically deprived areas - a high-risk group for infection. Participants (N = 278, 53% male; mean age 17 years) were recruited from a vocational college situated in an area in the most deprived national quintile (England). Participants completed measures of behavioural, normative and control beliefs, plus intention to test regularly for chlamydia. The behavioural, normative and control beliefs most strongly correlated with intentions to test regularly for chlamydia were beliefs about stopping the spread of infection, partners' behaviour and the availability of testing. These beliefs represent potential targets for interventions to increase chlamydia testing among young people living in deprived areas. © The Author(s) 2013.

  8. Co-extinction in a host-parasite network: identifying key hosts for network stability.

    Science.gov (United States)

    Dallas, Tad; Cornelius, Emily

    2015-08-17

    Parasites comprise a substantial portion of total biodiversity. Ultimately, this means that host extinction could result in many secondary extinctions of obligate parasites and potentially alter host-parasite network structure. Here, we examined a highly resolved fish-parasite network to determine key hosts responsible for maintaining parasite diversity and network structure (quantified here as nestedness and modularity). We evaluated four possible host extinction orders and compared the resulting co-extinction dynamics to random extinction simulations; including host removal based on estimated extinction risk, parasite species richness and host level contributions to nestedness and modularity. We found that all extinction orders, except the one based on realistic extinction risk, resulted in faster declines in parasite diversity and network structure relative to random biodiversity loss. Further, we determined species-level contributions to network structure were best predicted by parasite species richness and host family. Taken together, we demonstrate that a small proportion of hosts contribute substantially to network structure and that removal of these hosts results in rapid declines in parasite diversity and network structure. As network stability can potentially be inferred through measures of network structure, our findings may provide insight into species traits that confer stability.

  9. The application of modern safety criteria to restarting and operating the USDOE K-Reactor

    International Nuclear Information System (INIS)

    Dimenna, R.A.; Taylor, G.A.; Brandyberry, M.D.

    1993-01-01

    The United States Department of Energy's (USDOE's) K-reactor, a defense production reactor located at the Savannah River Site in Aiken, South Carolina, was shut down in the summer of 1988 for safety upgrades to bring it into conformance with modern safety standards prior to restart. Over the course of the succeeding four years, all aspects of the 35-year old reactor, including hardware, operations, and analysis, were upgraded to ensure that the reactor could operate safely according to standards similar to those applied to modern nuclear reactors. This paper describes the decision making processes by which issues were identified, priorities assigned, and analysis improved to enhance reactor safety. Special emphasis is given to the probabilistic risk assessment (PRA) decision making processes used to quantify the risks and consequences of operating the K-reactor, the analytical hierarchy process (AHP) used to identify key phenomena, and modifications made to the RELAP5 computer code to make it applicable to K-reactor analysis. The success of the project was demonstrated when the K-reactor was restarted in the summer of 1992

  10. Improving CANDU plant operation and maintenance through retrofit information technology systems

    International Nuclear Information System (INIS)

    Lupton, L. R.; Judd, R. A.

    1998-01-01

    CANDU plant owners are facing an increasingly competitive environment for the generation of electricity. To meet this challenge, all owners have identified that information technology offers opportunities for significant improvements in CANDU operation, maintenance and administration (OM and A) costs. Targeted information technology application areas include instrumentation and control, engineering, construction, operations and plant information management. These opportunities also pose challenges and issues that must be addressed if the full benefits of the advances in information technology are to be achieved. Key among these are system hardware and software maintenance, and obsolescence protection. AECL has been supporting CANDU stations with the initial development and evaluation of systems to improve plant performance and cost. Five key initiatives that have been implemented or are in the process of being implemented in some CANDU plants to achieve cooperational benefits include: critical safety parameter monitor system; advanced computerized annunciation system; plant historical data system; plant display system; and digital protection system. Each system will be described in terms of its role in enhancing current CANDU plant performance and how they will contribute to future CANDU plant performance. (author). 8 refs., 3 figs

  11. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  12. Operational Radiological Protection and Aspects of Optimisation

    International Nuclear Information System (INIS)

    Lazo, E.; Lindvall, C.G.

    2005-01-01

    Since 1992, the Nuclear Energy Agency (NEA), along with the International Atomic Energy Agency (IAEA), has sponsored the Information System on Occupational Exposure (ISOE). ISOE collects and analyses occupational exposure data and experience from over 400 nuclear power plants around the world and is a forum for radiological protection experts from both nuclear power plants and regulatory authorities to share lessons learned and best practices in the management of worker radiation exposures. In connection to the ongoing work of the International Commission on Radiological Protection (ICRP) to develop new recommendations, the ISOE programme has been interested in how the new recommendations would affect operational radiological protection application at nuclear power plants. Bearing in mind that the ICRP is developing, in addition to new general recommendations, a new recommendation specifically on optimisation, the ISOE programme created a working group to study the operational aspects of optimisation, and to identify the key factors in optimisation that could usefully be reflected in ICRP recommendations. In addition, the Group identified areas where further ICRP clarification and guidance would be of assistance to practitioners, both at the plant and the regulatory authority. The specific objective of this ISOE work was to provide operational radiological protection input, based on practical experience, to the development of new ICRP recommendations, particularly in the area of optimisation. This will help assure that new recommendations will best serve the needs of those implementing radiation protection standards, for the public and for workers, at both national and international levels. (author)

  13. EDAM: an ontology of bioinformatics operations, types of data and identifiers, topics and formats

    Science.gov (United States)

    Ison, Jon; Kalaš, Matúš; Jonassen, Inge; Bolser, Dan; Uludag, Mahmut; McWilliam, Hamish; Malone, James; Lopez, Rodrigo; Pettifer, Steve; Rice, Peter

    2013-01-01

    Motivation: Advancing the search, publication and integration of bioinformatics tools and resources demands consistent machine-understandable descriptions. A comprehensive ontology allowing such descriptions is therefore required. Results: EDAM is an ontology of bioinformatics operations (tool or workflow functions), types of data and identifiers, application domains and data formats. EDAM supports semantic annotation of diverse entities such as Web services, databases, programmatic libraries, standalone tools, interactive applications, data schemas, datasets and publications within bioinformatics. EDAM applies to organizing and finding suitable tools and data and to automating their integration into complex applications or workflows. It includes over 2200 defined concepts and has successfully been used for annotations and implementations. Availability: The latest stable version of EDAM is available in OWL format from http://edamontology.org/EDAM.owl and in OBO format from http://edamontology.org/EDAM.obo. It can be viewed online at the NCBO BioPortal and the EBI Ontology Lookup Service. For documentation and license please refer to http://edamontology.org. This article describes version 1.2 available at http://edamontology.org/EDAM_1.2.owl. Contact: jison@ebi.ac.uk PMID:23479348

  14. Identification of facility constraints that impact transportation operations

    International Nuclear Information System (INIS)

    Peterson, R.W.; Pope, R.B.

    1990-01-01

    As Federal waste Management Systems (FWMS) receiving facilities become available, the US Department of Energy (DOE) intends to begin accepting spent nuclear fuel from US utilities for eventual permanent disposal. Transporting the radioactive spent fuel to the repository will require development of a complex network of equipment, services, and operations personnel that will comprise the Transportation Operations System. This paper identifies and discusses, in a qualitative manner, the key reactor facility constraints that will eventually need to be assessed in detail on a site-specific basis to guide the development of the FWMS transportation cask fleet. This evaluation of constraints is needed to assess their impact on the size, composition, availability, and use of the cask fleet and to assist in the development of the transportation system support facilities such as a cask maintenance facility. Such assessment will also be needed to support decisions on modifying shipping facilities (i.e., reactors), identification and design of interface hardware, and on the designs of receiving facilities

  15. Operations Plan for Support Network Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report describes the operational processes and strategies that are building a support network for the National Security Technology Incubator (NSTI) program. The NSTI program currently is under development as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA) Grant No. DE FG52-07NA28084. Although the NSTI program offers a wide array of in-house business services, there are a certain number of services that will be provided by entities outside of Arrowhead Center. This report identifies the steps needed to develop an appropriate support network. The Arrowhead Center is working with external service providers and key stakeholders to establish feasible referral and implementation mechanics offering NSTI program participants the most comprehensive incubation services possible.

  16. Communicating Sustainability: An Operational Model for Evaluating Corporate Websites

    Directory of Open Access Journals (Sweden)

    Alfonso Siano

    2016-09-01

    Full Text Available The interest in corporate sustainability has increased rapidly in recent years and has encouraged organizations to adopt appropriate digital communication strategies, in which the corporate website plays a key role. Despite this growing attention in both the academic and business communities, models for the analysis and evaluation of online sustainability communication have not been developed to date. This paper aims to develop an operational model to identify and assess the requirements of sustainability communication in corporate websites. It has been developed from a literature review on corporate sustainability and digital communication and the analysis of the websites of the organizations included in the “Global CSR RepTrak 2015” by the Reputation Institute. The model identifies the core dimensions of online sustainability communication (orientation, structure, ergonomics, content—OSEC, sub-dimensions, such as stakeholder engagement and governance tools, communication principles, and measurable items (e.g., presence of the materiality matrix, interactive graphs. A pilot study on the websites of the energy and utilities companies included in the Dow Jones Sustainability World Index 2015 confirms the applicability of the OSEC framework. Thus, the model can provide managers and digital communication consultants with an operational tool that is useful for developing an industry ranking and assessing the best practices. The model can also help practitioners to identify corrective actions in the critical areas of digital sustainability communication and avoid greenwashing.

  17. WANO Activities Related to Identifying and Reducing the Likelihood for Recurring Events

    International Nuclear Information System (INIS)

    Llewellyn, Michael

    2003-01-01

    Since its inception, WANO has encouraged members to share operating experience and events information through the WANO Operating Experience Programme. Preventing recurring events is a prime reason for sharing events information. Over 2500 events have been shared through WANO since 1989. However, a review of WANO activities in 1997 identified that this information was not being used very well by WANO members, and that WANO was not adding much 'value' to the events sharing process. At the time, WANO only provided the 'postal exchange' function for events sharing, and was not reviewing events across WANO to help members focus on the really important issues. Often, these very important issues involve recurring events. As a result of the 1997 review of the WANO operating experience process, WANO re-sourced and developed new analysis capabilities and began producing new types of reports for its members. The resource commitment includes four seconded engineers (one from each WANO Regional Centre) brought to Paris to staff a WANO Operating Experience Central Team. This team analyses events across WANO, writes WANO event reports, provides operating experience-related training, and provides technical support to members to improve their use of operating experience information. One focus area for events analysis by WANO is the identification and subsequent industry notification of recurring events. As a result of the 1997 review of WANO activities, in 1998 WANO began production of several new types of event-based reports to communicate significant industry events to our members. A key focus of analysis of these significant events is whether they are recurring events (that is, very similar to previous events either at that NPP or another NPP in the industry). The reports are called Significant Operating Experience Reports (SOERs) and Significant Event Reports (SERs). Significant Operating Experience Reports (SOERs) are written by WANO when several event reports indicate that

  18. Continuous-variable measurement-device-independent quantum key distribution with photon subtraction

    Science.gov (United States)

    Ma, Hong-Xin; Huang, Peng; Bai, Dong-Yun; Wang, Shi-Yu; Bao, Wan-Su; Zeng, Gui-Hua

    2018-04-01

    It has been found that non-Gaussian operations can be applied to increase and distill entanglement between Gaussian entangled states. We show the successful use of the non-Gaussian operation, in particular, photon subtraction operation, on the continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol. The proposed method can be implemented based on existing technologies. Security analysis shows that the photon subtraction operation can remarkably increase the maximal transmission distance of the CV-MDI-QKD protocol, which precisely make up for the shortcoming of the original CV-MDI-QKD protocol, and one-photon subtraction operation has the best performance. Moreover, the proposed protocol provides a feasible method for the experimental implementation of the CV-MDI-QKD protocol.

  19. The new challenges of energy operators. To bring strategic answers to market changes and to unprecedented competitive threats

    International Nuclear Information System (INIS)

    2016-02-01

    Because of regulatory and technological changes, energy operators have to reconsider their business model, i.e. to identify their tomorrow's key activities and skills, and to keep control of the value chain as a multitude of new and various operators try to be present on the production sector and on the distribution sector. In order to give an insight on these issues, this study proposes three reports and a video. While the video proposes an original presentation of the main conclusions of this study, the first document is an executive synthesis which outlines and discusses some important issues: regulatory and technological changes submit energy operators to an unprecedented competitive and strategic paradigm; an efficient management of transition requires a profession-based approach and renewed strategic assets; energy operators must take the risk of 'uberisation' of their profession into account in order to better respond. The second document is an analysis report which addresses the upheavals of the energy operator environment (regulatory changes, technological upheavals, focus on the new energy deal), and the main strategic challenges faced by energy operators (redesign of the energy model, projection on non-core activities, acquisition of new strategic assets). It also proposes a discussion on the reconfiguration of the energy value chain (an upstream disruption of the value chain, a risk of reversal of the whole value chain). The third document proposes presentations of the evolution of key figures of energy markets in France (electricity, gas, renewable energy, turnovers of specialised actors in gas production and distribution and of the electricity sectors), a presentation of the sector economic structure and competitive landscape (sites, personnel, market shares, market key figures, main operators, electric power producers, gas providers, and renewable plant operators), and an overview of main events (asset management strategy

  20. Mode Combinations and International Operations

    DEFF Research Database (Denmark)

    Benito, Gabriel R. G.; Petersen, Bent; Welch, Lawrence S.

    2011-01-01

    reveals that companies tend to combine modes of operation; thereby producing unique foreign operation mode “packages” for given activities and/or countries, and that the packages are liable to be modified over time – providing a potentially important optional path for international expansion. Our data...... key markets (China, UK and USA) as the basis for an exploration of the extent to which, and how and why, companies combine clearly different foreign operation modes. We examine their use of foreign operation mode combinations within given value activities as well as within given countries. The study...

  1. How to identify the key factors that affect driver perception of accident risk. A comparison between Italian and Spanish driver behavior.

    Science.gov (United States)

    de Oña, Juan; de Oña, Rocio; Eboli, Laura; Forciniti, Carmen; Mazzulla, Gabriella

    2014-12-01

    Road crashes can be caused by different factors, including infrastructure, vehicles, and human variables. Many research studies have focused solely on identifying the key factors that cause road crashes. From these studies, it emerged that human factors have the most relevant impact on accident severity. More specifically, accident severity depends on several factors related directly to the driver, i.e., driving experience, driver's socio-economic characteristics, and driving behavior and attitudes. In this paper, we investigate driver behaviors and attitudes while driving and specifically focus on different methods for identifying the factors that most affect the driver's perception of accident risk. To this end, we designed and conducted a survey in two different European contexts: the city of Cosenza, which is located in the south of Italy, and the city of Granada, which is located in the south of Spain. Samples of drivers were contacted for their opinions on certain aspects of driving rules and attitudes while driving, and different types of questions were addressed to the drivers to assess their judgments of these aspects. Consequently, different methods of data analysis were applied to determine the aspects that heavily influence driver perception of accident risk. An experiment based on the stated preferences (SP) was carried out with the drivers, and the SP data were analyzed using an ordered probit (OP) model. Interesting findings emerged from different analyses of the data and from the comparisons among the data collected in the two different territorial contexts. We found that both Italian and Spanish drivers consider driving in an altered psychophysical state and violating the overtaking rules to be the most risky behaviors. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Lifelong Learning Key Competence Levels of Graduate Students

    Science.gov (United States)

    Adabas, Abdurrahman; Kaygin, Hüseyin

    2016-01-01

    The European Union defines lifelong learning as all activities aimed at improving an individual's knowledge, skills and competences individually, socially or vocationally throughout his/her life. In 2007, eight key competences necessary for lifelong learning were identified by the European Union Education and Culture Commission. These competences…

  3. Key thrusts in next generation CANDU. Annex 10

    International Nuclear Information System (INIS)

    Shalaby, B.A.; Torgerson, D.F.; Duffey, R.B.

    2002-01-01

    Current electricity markets and the competitiveness of other generation options such as CCGT have influenced the directions of future nuclear generation. The next generation CANDU has used its key characteristics as the basis to leap frog into a new design featuring improved economics, enhanced passive safety, enhanced operability and demonstrated fuel cycle flexibility. Many enabling technologies spinning of current CANDU design features are used in the next generation design. Some of these technologies have been developed in support of existing plants and near term designs while others will need to be developed and tested. This paper will discuss the key principles driving the next generation CANDU design and the fuel cycle flexibility of the CANDU system which provide synergism with the PWR fuel cycle. (author)

  4. Identifying Opportunities for Vertical Integration of Biochemistry and Clinical Medicine.

    Science.gov (United States)

    Wendelberger, Karen J.; Burke, Rebecca; Haas, Arthur L.; Harenwattananon, Marisa; Simpson, Deborah

    1998-01-01

    Objectives: Retention of basic science knowledge, as judged by National Board of Medical Examiners' (NBME) data, suffers due to lack of apparent relevance and isolation of instruction from clinical application, especially in biochemistry. However, the literature reveals no systematic process for identifying key biochemical concepts and associated clinical conditions. This study systematically identified difficult biochemical concepts and their common clinical conditions as a critical step towards enhancing relevance and retention of biochemistry.Methods: A multi-step/ multiple stakeholder process was used to: (1) identify important biochemistry concepts; (2) determine students' perceptions of concept difficulty; (3) assess biochemistry faculty, student, and clinical teaching scholars' perceived relevance of identified concepts; and (4) identify associated common clinical conditions for relevant and difficult concepts. Surveys and a modified Delphi process were used to gather data, subsequently analyzed using SPSS for Windows.Results: Sixteen key biochemical concepts were identified. Second year medical students rated 14/16 concepts as extremely difficult while fourth year students rated nine concepts as moderately to extremely difficult. On average, each teaching scholar generated common clinical conditions for 6.2 of the 16 concepts, yielding a set of seven critical concepts and associated clinical conditions.Conclusions: Key stakeholders in the instructional process struggle to identify biochemistry concepts that are critical, difficult to learn and associated with common clinical conditions. However, through a systematic process beginning with identification of concepts and associated clinical conditions, relevance of basic science instruction can be enhanced.

  5. E-Commerce Performance. Shopping Cart Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Mihaela I. MUNTEAN

    2016-01-01

    Full Text Available In an e-commerce performance framework is important to identify the key performance indicators that measure success and together provide the greatest context into the business perfor-mance. Shopping carts are an essential part of ecommerce, a minimal set of key performance indicators being the subject of our debate. The theoretical approach is sustained by a case study, an e-shop implemented using PHP and MySQL, for simulating main business processes within the considered performance framework. Our approach opens a perspective for future research using additional indicators in order to properly evaluate the global performance of any e-shop.

  6. Active Rehabilitation-a community peer-based approach for persons with spinal cord injury: international utilisation of key elements.

    Science.gov (United States)

    Divanoglou, A; Tasiemski, T; Augutis, M; Trok, K

    2017-06-01

    Active Rehabilitation (AR) is a community peer-based approach that started in Sweden in 1976. As a key component of the approach, AR training camps provide intensive, goal-oriented, intentional, group-based, customised training and peer-support opportunities in a community environment for individuals with spinal cord injury. Prospective cross-sectional study. To describe the profile of the organisations that use components of the AR approach, and to explore the characteristics and the international variations of the approach. Twenty-two organisations from 21 countries from Europe, Asia and Africa reported using components of the AR approach during the past 10 years. An electronic survey was developed and distributed through a personalised email. Sampling involved a prospective identification of organisations that met the inclusion criteria and snowball strategies. While there were many collaborating links between the organisations, RG Active Rehabilitation from Sweden and Motivation Charitable Trust from the United Kingdom were identified as key supporting organisations. The 10 key elements of the AR approach were found to be used uniformly across the participating organisations. Small variations were associated with variations in country income and key supporting organisation. This is the first study to describe the key elements and international variations of the AR approach. This will provide the basis for further studies exploring the effectiveness of the approach, it will likely facilitate international collaboration on research and operational aspects and it could potentially support higher integration in the health-care system and long-term funding of these programmes.

  7. The SECOQC quantum key distribution network in Vienna

    International Nuclear Information System (INIS)

    Peev, M; Pacher, C; Boxleitner, W; Happe, A; Hasani, Y; Alleaume, R; Diamanti, E; Barreiro, C; Fasel, S; Gautier, J-D; Gisin, N; Bouda, J; Debuisschert, T; Fossier, S; Dianati, M; Dynes, J F; Fuerst, M; Gay, O; Grangier, P; Hentschel, M

    2009-01-01

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARC ), an entangled photons system by University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Universite Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent-the SECOQC node module, which enables the authentic classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network

  8. Role of operator response guidelines in CANDU 9 design program

    International Nuclear Information System (INIS)

    Jaitly, R.K.

    2000-01-01

    The CANDU 9 is a large version of the CANDU Pressurized Heavy Water Reactor (PHWR) system developed in Canada. With an electrical output of approximately 935 MWe, the CANDU 9 complements the established mid-size CANDU 6 (700 MWe) and makes use of proven technology updated with state of the art features resulting from ongoing development. The CANDU 9 builds on the reactor and process system designs of the operating Darlington and Bruce B plants, and incorporates a modified CANDU 6 station layout, as well as improved construction methods and operational features. A high level of standardization has always been a feature of CANDU reactors. This theme is emphasized in the CANDU 9; all key components (reactor core, steam generators, coolant pumps, pressure tubes, etc.) are of the same design as those proven in service in the operating CANDU power stations. Including Probabilistic Safety Assessment (PSA) as part of the CANDU 9 design process from the outset of the program was seen as key to ensuring completeness of safety related requirements. The PSA work provided an in-depth understanding of the plant response to various postulated accidents. As well, the time frame for recovery and the related operator actions were identified. This information together with AECL's experience in supporting the development of Emergency Operating Procedures (EOPs) for the operating CANDU reactors are the basis for preparation of CANDU 9 Operator Response Guidelines (ORGs). Technical content, format and human factors considerations adopted for the ORGs are such that these can be readily converted to EOPs. The scope of ORGs includes generic as well as event specific ORGs. This dual approach is required to provide defense-in-depth. This paper describes the process used to prepare ORGs for the CANDU 9 reactor and discusses important benefits gained from the application of ORGs as input to the control center design and future preparation of the EOPs. (author)

  9. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  10. How Are You Doing? Key Performance Indicators and Benchmarking

    Science.gov (United States)

    Fahey, John P.

    2011-01-01

    School business officials need to "know and show" that their operations are well managed. To do so, they ask themselves questions, such as "How are they doing? How do they compare with others? Are they making progress fast enough? Are they using the best practices?" Using key performance indicators (KPIs) and benchmarking as regular parts of their…

  11. Energy conservation in China: Key provincial sectors at two-digit level

    International Nuclear Information System (INIS)

    Liao, Hua; Du, Jian; Wei, Yi-Ming

    2013-01-01

    Highlights: ► We identify the keys for energy conversation across China’s 31 provinces × 65 sectors. ► The results are visualized in map and matrix tables, and easy for use. ► 39 Industrial sectors by province are classified into three categories for conservation. ► There is large energy wasting in the public management sector. ► There are both urban–rural gap and provincial inequality on electricity consumption. - Abstract: In March 2011, China’s central government set a new challenging target of reducing its energy intensity by 16% during 2011–2015, after it had achieved a reduction of 19.1% during 2006–2010. And this new target was assigned to provincial authorities in August 2011. However, China’s provincial energy-economic developments are unbalanced and different provinces have different key sectors for energy conservation. Most previous studies focused on provincial energy efficiency at the aggregate level, or the three-industry level (or one-digit level). However, whether for policy decision or academic research, it is necessary to further subdivide the sectors. In this paper, we use three indicators (Gini Coefficient, energy consumption share and energy intensity) to compare provincial energy conservation potentials at the two-digit sector level. To our knowledge, this paper is the first one to identify the keys for energy conversation across the 31 provinces × 65 sectors. And the results are shown in visualized maps and matrix tables to help identify the key province × sectors for energy conservation easier. This also helps the central and provincial governments to distinguish key sectors when they monitor the energy conservation progress

  12. Conduct of operations training - An innovative approach to team building

    International Nuclear Information System (INIS)

    Widen, W.C.; Kurth, W.; Broccolo, A.

    1987-01-01

    The conduct of nuclear power plant operations is a key parameter for station management and regulators alike. Indeed, the basic methods and demeanor in which operating crews approach overall plant operations is perhaps the principal factor leading to safe and efficient operations. Hence, Commonwealth Edison's Zion Station has initiated an innovative and positive training program designed to increase operator awareness of conducting station operations in an attentive, diligent, and conscientious manner. This Conduct of Operations Training Program is a collaborative joint effort between Commonwealth Edison and the Westinghouse Nuclear Training Center. In particular, the key managers of Zion's operating department brainstormed various philosophies and strategies with senior training staff members of the Westinghouse Nuclear Training Center. The outcome of these sessions has formed the skeleton of an intensified, one-day Conduct of Operations course. Several unique aspects of this innovative course are described

  13. Characteristics of evolving models of care for arthritis: A key informant study

    Directory of Open Access Journals (Sweden)

    Veinot Paula

    2008-07-01

    Full Text Available Abstract Background The burden of arthritis is increasing in the face of diminishing health human resources to deliver care. In response, innovative models of care delivery are developing to facilitate access to quality care. Most models have developed in response to local needs with limited evaluation. The primary objective of this study is to a examine the range of models of care that deliver specialist services using a medical/surgical specialist and at least one other health care provider and b document the strengths and challenges of the identified models. A secondary objective is to identify key elements of best practice models of care for arthritis. Methods Semi-structured interviews were conducted with a sample of key informants with expertise in arthritis from jurisdictions with primarily publicly-funded health care systems. Qualitative data were analyzed using a constant comparative approach to identify common types of models of care, strengths and challenges of models, and key components of arthritis care. Results Seventy-four key informants were interviewed from six countries. Five main types of models of care emerged. 1 Specialized arthritis programs deliver comprehensive, multidisciplinary team care for arthritis. Two models were identified using health care providers (e.g. nurses or physiotherapists in expanded clinical roles: 2 triage of patients with musculoskeletal conditions to the appropriate services including specialists; and 3 ongoing management in collaboration with a specialist. Two models promoting rural access were 4 rural consultation support and 5 telemedicine. Key informants described important components of models of care including knowledgeable health professionals and patients. Conclusion A range of models of care for arthritis have been developed. This classification can be used as a framework for discussing care delivery. Areas for development include integration of care across the continuum, including primary

  14. The DESCARTES-Nantes survey of kidney transplant recipients displaying clinical operational tolerance identifies 35 new tolerant patients and 34 almost tolerant patients.

    Science.gov (United States)

    Massart, Annick; Pallier, Annaïck; Pascual, Julio; Viklicky, Ondrej; Budde, Klemens; Spasovski, Goce; Klinger, Marian; Sever, Mehmet Sukru; Sørensen, Søren Schwartz; Hadaya, Karine; Oberbauer, Rainer; Dudley, Christopher; De Fijter, Johan W; Yussim, Alexander; Hazzan, Marc; Wekerle, Thomas; Berglund, David; De Biase, Consuelo; Pérez-Sáez, María José; Mühlfeld, Anja; Orlando, Giuseppe; Clemente, Katia; Lai, Quirino; Pisani, Francesco; Kandus, Aljosa; Baas, Marije; Bemelman, Frederike; Ponikvar, Jadranka Buturovic; Mazouz, Hakim; Stratta, Piero; Subra, Jean-François; Villemain, Florence; Hoitsma, Andries; Braun, Laura; Cantarell, Maria Carmen; Colak, Hulya; Courtney, Aisling; Frasca, Giovanni Maria; Howse, Matthew; Naesens, Maarten; Reischig, Tomas; Serón, Daniel; Seyahi, Nurhan; Tugmen, Cem; Alonso Hernandez, Angel; Beňa, Luboslav; Biancone, Luigi; Cuna, Vania; Díaz-Corte, Carmen; Dufay, Alexandre; Gaasbeek, André; Garnier, Arnaud; Gatault, Philippe; Gentil Govantes, Miguel Angel; Glowacki, François; Gross, Oliver; Hurault de Ligny, Bruno; Huynh-Do, Uyen; Janbon, Bénédicte; Jiménez Del Cerro, Luis Antonio; Keller, Frieder; La Manna, Gaetano; Lauzurica, Ricardo; Le Monies De Sagazan, Hervé; Thaiss, Friedrich; Legendre, Christophe; Martin, Séverine; Moal, Marie-Christine; Noël, Christian; Pillebout, Evangeline; Piredda, Gian Benedetto; Puga, Ana Ramírez; Sulowicz, Wladyslaw; Tuglular, Serhan; Prokopova, Michaela; Chesneau, Mélanie; Le Moine, Alain; Guérif, Pierrick; Soulillou, Jean-Paul; Abramowicz, Marc; Giral, Magali; Racapé, Judith; Maggiore, Umberto; Brouard, Sophie; Abramowicz, Daniel

    2016-06-01

    Kidney recipients maintaining a prolonged allograft survival in the absence of immunosuppressive drugs and without evidence of rejection are supposed to be exceptional. The ERA-EDTA-DESCARTES working group together with Nantes University launched a European-wide survey to identify new patients, describe them and estimate their frequency for the first time. Seventeen coordinators distributed a questionnaire in 256 transplant centres and 28 countries in order to report as many 'operationally tolerant' patients (TOL; defined as having a serum creatinine <1.7 mg/dL and proteinuria <1 g/day or g/g creatinine despite at least 1 year without any immunosuppressive drug) and 'almost tolerant' patients (minimally immunosuppressed patients (MIS) receiving low-dose steroids) as possible. We reported their number and the total number of kidney transplants performed at each centre to calculate their frequency. One hundred and forty-seven questionnaires were returned and we identified 66 TOL (61 with complete data) and 34 MIS patients. Of the 61 TOL patients, 26 were previously described by the Nantes group and 35 new patients are presented here. Most of them were noncompliant patients. At data collection, 31/35 patients were alive and 22/31 still operationally tolerant. For the remaining 9/31, 2 were restarted on immunosuppressive drugs and 7 had rising creatinine of whom 3 resumed dialysis. Considering all patients, 10-year death-censored graft survival post-immunosuppression weaning reached 85% in TOL patients and 100% in MIS patients. With 218 913 kidney recipients surveyed, cumulative incidences of operational tolerance and almost tolerance were estimated at 3 and 1.5 per 10 000 kidney recipients, respectively. In kidney transplantation, operational tolerance and almost tolerance are infrequent findings associated with excellent long-term death-censored graft survival. © The Author 2016. Published by Oxford University Press on behalf of ERA-EDTA. All rights reserved.

  15. Method for identifying process reuse opportunities to enhance the operating model

    CSIR Research Space (South Africa)

    De Vries, M

    2011-12-01

    Full Text Available the volatility of strategy and suggests the use of an operating model (OM), which is a commitment to a way of doing business. The OM creates a company-wide vision for process standardization and data centralization and guides decisions about how a company...

  16. THE ACTIVITIES OF THE NATIONAL BANK OF UKRAINE ON THE OPEN MARKET: OPERATION WITH CERTIFICATES OF DEPOSITS

    Directory of Open Access Journals (Sweden)

    Yuliia Harkusha

    2016-06-01

    Full Text Available In the article investigated the activities of the National Bank of Ukraine on the open market. The analysis of operations of the National Bank of Ukraine banks to raise funds placing deposit certificates. Defined impact operations of the central bank's own debt securities to trading volumes deposit certificates of the National Bank of Ukraine on the stock market and the credit activity of banks. Identified problems interest rate policy and the ways to overcome them. Key words: National Bank of Ukraine, certificates of deposits, open market, interest rate policy, banks, stock exchange. JEL: E 58

  17. Key Features of the Manufacturing Vision Development Process

    DEFF Research Database (Denmark)

    Dukovska-Popovska, Iskra; Riis, Jens Ove; Boer, Harry

    2005-01-01

    of action research. The methodology recommends wide participation of people from different hierarchical and functional positions, who engage in a relatively short, playful and creative process and come up with a vision (concept) for the future manufacturing system in the company. Based on three case studies......This paper discusses the key features of the process of Manufacturing Vision Development, a process that enables companies to develop their future manufacturing concept. The basis for the process is a generic five-phase methodology (Riis and Johansen 2003) developed as a result of ten years...... of companies going through the initial phases of the methodology, this research identified the key features of the Manufacturing Vision Development process. The paper elaborates the key features by defining them, discussing how and when they can appear, and how they influence the process....

  18. Operator Representations of Frames: Boundedness, Duality, and Stability

    DEFF Research Database (Denmark)

    Christensen, Ole; Hasannasab, Marzieh

    2017-01-01

    The purpose of the paper is to analyze frames (Formula presented.) having the form (Formula presented.) for some linear operator (Formula presented.). A key result characterizes boundedness of the operator T in terms of shift-invariance of a certain sequence space. One of the consequences is a ch...... in frame theory. Various ways of avoiding this problem will be discussed. Throughout the paper the results will be connected with the operators and function systems appearing in applied harmonic analysis, as well as with general group representations.......The purpose of the paper is to analyze frames (Formula presented.) having the form (Formula presented.) for some linear operator (Formula presented.). A key result characterizes boundedness of the operator T in terms of shift-invariance of a certain sequence space. One of the consequences...... is a characterization of the case where the representation (Formula presented.) can be achieved for an operator T that has an extension to a bounded bijective operator (Formula presented.) In this case we also characterize all the dual frames that are representable in terms of iterations of an operator V; in particular...

  19. Network analysis of patient flow in two UK acute care hospitals identifies key sub-networks for A&E performance.

    Science.gov (United States)

    Bean, Daniel M; Stringer, Clive; Beeknoo, Neeraj; Teo, James; Dobson, Richard J B

    2017-01-01

    The topology of the patient flow network in a hospital is complex, comprising hundreds of overlapping patient journeys, and is a determinant of operational efficiency. To understand the network architecture of patient flow, we performed a data-driven network analysis of patient flow through two acute hospital sites of King's College Hospital NHS Foundation Trust. Administration databases were queried for all intra-hospital patient transfers in an 18-month period and modelled as a dynamic weighted directed graph. A 'core' subnetwork containing only 13-17% of all edges channelled 83-90% of the patient flow, while an 'ephemeral' network constituted the remainder. Unsupervised cluster analysis and differential network analysis identified sub-networks where traffic is most associated with A&E performance. Increased flow to clinical decision units was associated with the best A&E performance in both sites. The component analysis also detected a weekend effect on patient transfers which was not associated with performance. We have performed the first data-driven hypothesis-free analysis of patient flow which can enhance understanding of whole healthcare systems. Such analysis can drive transformation in healthcare as it has in industries such as manufacturing.

  20. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  1. Maintaining operational excellence: building capability beyond knowledge transfer

    International Nuclear Information System (INIS)

    Ramjist, S.

    2013-01-01

    This paper describes the issues relating to human resources and maintaining capabilities in an organization. The sustaining elements are: vision and plan for excellence; invest in the plant; invest in human capital; find and fix problems. There is much discussion about knowledge transfer and retention that is mainly focused on technical attributes and proficiency. We are losing more people with the requisite managerial and leadership capability than we can develop and backfill at a Time when our industry is facing increased competition and decreased margins. We are vulnerable because this Increases our dependence on augmented staff for certain key leadership roles. Previous methods for developing people will take too long and does not appeal to current generation. A solution, not the only solution, but the one we have chosen is initial hiring of operators, maintainers and engineers, internal promotion for key roles (FLM, FSOS, Shift Supervisor, Section Manager, ANO) and focus on all three aspects of capability and looking for leadership traits. Look for ambition, drive, initiative and motivation. Identify, separate and stream. Take specific measures to accelerate growth.

  2. Maintaining operational excellence: building capability beyond knowledge transfer

    Energy Technology Data Exchange (ETDEWEB)

    Ramjist, S. [Ontario Power Generation, Darlington Nuclear Generating Station, Bowmanville, Ontario (Canada)

    2013-07-01

    This paper describes the issues relating to human resources and maintaining capabilities in an organization. The sustaining elements are: vision and plan for excellence; invest in the plant; invest in human capital; find and fix problems. There is much discussion about knowledge transfer and retention that is mainly focused on technical attributes and proficiency. We are losing more people with the requisite managerial and leadership capability than we can develop and backfill at a Time when our industry is facing increased competition and decreased margins. We are vulnerable because this Increases our dependence on augmented staff for certain key leadership roles. Previous methods for developing people will take too long and does not appeal to current generation. A solution, not the only solution, but the one we have chosen is initial hiring of operators, maintainers and engineers, internal promotion for key roles (FLM, FSOS, Shift Supervisor, Section Manager, ANO) and focus on all three aspects of capability and looking for leadership traits. Look for ambition, drive, initiative and motivation. Identify, separate and stream. Take specific measures to accelerate growth.

  3. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  4. Habitat Restoration as a Key Conservation Lever for Woodland Caribou: A review of restoration programs and key learnings from Alberta

    Directory of Open Access Journals (Sweden)

    Paula Bentham

    2015-12-01

    Full Text Available The Recovery Strategy for the Woodland Caribou (Rangifer tarandus caribou, Boreal Population in Canada (EC, 2012, identifies coordinated actions to reclaim woodland caribou habitat as a key step to meeting current and future caribou population objectives. Actions include restoring industrial landscape features such as roads, seismic lines, pipelines, cut-lines, and cleared areas in an effort to reduce landscape fragmentation and the changes in caribou population dynamics associated with changing predator-prey dynamics in highly fragmented landscapes. Reliance on habitat restoration as a recovery action within the federal recovery strategy is high, considering all Alberta populations have less than 65% undisturbed habitat, which is identified in the recovery strategy as a threshold providing a 60% chance that a local population will be self-sustaining. Alberta’s Provincial Woodland Caribou Policy also identifies habitat restoration as a critical component of long-term caribou habitat management. We review and discuss the history of caribou habitat restoration programs in Alberta and present outcomes and highlights of a caribou habitat restoration workshop attended by over 80 representatives from oil and gas, forestry, provincial and federal regulators, academia and consulting who have worked on restoration programs. Restoration initiatives in Alberta began in 2001 and have generally focused on construction methods, revegetation treatments, access control programs, and limiting plant species favourable to alternate prey. Specific treatments include tree planting initiatives, coarse woody debris management along linear features, and efforts for multi-company and multi-stakeholder coordinated habitat restoration on caribou range. Lessons learned from these programs have been incorporated into large scale habitat restoration projects near Grande Prairie, Cold Lake, and Fort McMurray. A key outcome of our review is the opportunity to provide a

  5. Defense waste processing facility radioactive operations. Part 1 - operating experience

    International Nuclear Information System (INIS)

    Little, D.B.; Gee, J.T.; Barnes, W.M.

    1997-01-01

    The Savannah River Site's Defense Waste Processing Facility (DWPF) near Aiken, SC is the nation's first and the world's largest vitrification facility. Following a ten year construction program and a 3 year non-radioactive test program, DWPF began radioactive operations in March 1996. This paper presents the results of the first 9 months of radioactive operations. Topics include: operations of the remote processing equipment reliability, and decontamination facilities for the remote processing equipment. Key equipment discussed includes process pumps, telerobotic manipulators, infrared camera, Holledge trademark level gauges and in-cell (remote) cranes. Information is presented regarding equipment at the conclusion of the DWPF test program it also discussed, with special emphasis on agitator blades and cooling/heating coil wear. 3 refs., 4 figs

  6. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  7. Identifying and Ranking the Determinants of Tourism Performance

    DEFF Research Database (Denmark)

    Assaf, A.George; Josiassen, Alexander

    2012-01-01

    , their tourism industries, and tourism businesses seek to improve the performance of the tourism industry and its constituents by vigorously promoting themselves to international tourists, cutting costs, and identifying synergies in their tourism endeavors. In seeking to improve the tourism industry......, the determinants that affect tourism performance are of key interest to the stakeholders. A key obstacle toward improving performance is the multitude of determinants that can affect tourism performance. The literature has yet to provide concrete insights into the determinants of tourism performance...... and their relative importance. The present study addresses this important gap. We identify and rank the determinants of tourism performance. We also provide performance measures of international tourism destinations. The results are derived using the Data Envelopment Analysis (DEA) and bootstrap truncated regression...

  8. Language Differences and Operation Mode

    DEFF Research Database (Denmark)

    Dasi, Angels; Pedersen, Torben

    2013-01-01

    Language serves different purposes depending on the international activity in question. Language has many dimensions and firms’ communicative requirements vary by operational platform. We argue that different dimensions of language vary in their importance depending on the operation mode chosen...... for a foreign market, so that language distance matters in the case of a home-based sales force, while language incidence is key when operating through a local agent. The hypotheses are tested on a large data set encompassing 462 multinational corporations headquartered in Finland, South Korea, New Zealand......, and Sweden that have undertaken a business operation in a foreign country....

  9. Key determinants of managing the marketing asset of global companies

    Directory of Open Access Journals (Sweden)

    Tatyana Tsygankova

    2016-12-01

    Full Text Available As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development. The article identified the optimal set of key elements of the system of marketing assets, which are the brand, customer loyalty, reputation, network cooperation, marketing strategy, internal marketing, marketing information system and marketing innovation. Due to correlation and regression analysis of the impact of each system elements on performance of global companies, the model of the "marketing asset octagon" was built as an integrative management tool. Also, as a result of construction of the said model, the authors identified the most profitable marketing assets, return on investment and development of competencies in the field of efficient management will bring the highest profit to the company. On the basis of summarizing the regional and branch features of managing the disparate elements of the marketing assets of global companies, the key regional and sectoral priorities of formation, development and improvement of existing concepts of the international marketing management were identified, particularly in terms of building an author’s integrative octagon model.

  10. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  11. KEY PERFORMANCE INDICATORS FOR HEALTHCARE RESEARCH ORGANIZATIONS BETWEEN 2011 AND 2015

    OpenAIRE

    ANISKEVICH A.S.; HALFIN R.A.

    2017-01-01

    In this work we identify 16 key indicators to evaluate the performance of healthcare research organizations. These indicators comprehensively characterize such aspects of performance as research output and relevance, human resource development, integration into the international scientific community, distribution of scientific knowledge, promotion of the prestige of science, and resource provision. Below, we review the existing classification of medical research institutions and their key fea...

  12. Gene Network Construction from Microarray Data Identifies a Key Network Module and Several Candidate Hub Genes in Age-Associated Spatial Learning Impairment.

    Science.gov (United States)

    Uddin, Raihan; Singh, Shiva M

    2017-01-01

    As humans age many suffer from a decrease in normal brain functions including spatial learning impairments. This study aimed to better understand the molecular mechanisms in age-associated spatial learning impairment (ASLI). We used a mathematical modeling approach implemented in Weighted Gene Co-expression Network Analysis (WGCNA) to create and compare gene network models of young (learning unimpaired) and aged (predominantly learning impaired) brains from a set of exploratory datasets in rats in the context of ASLI. The major goal was to overcome some of the limitations previously observed in the traditional meta- and pathway analysis using these data, and identify novel ASLI related genes and their networks based on co-expression relationship of genes. This analysis identified a set of network modules in the young, each of which is highly enriched with genes functioning in broad but distinct GO functional categories or biological pathways. Interestingly, the analysis pointed to a single module that was highly enriched with genes functioning in "learning and memory" related functions and pathways. Subsequent differential network analysis of this "learning and memory" module in the aged (predominantly learning impaired) rats compared to the young learning unimpaired rats allowed us to identify a set of novel ASLI candidate hub genes. Some of these genes show significant repeatability in networks generated from independent young and aged validation datasets. These hub genes are highly co-expressed with other genes in the network, which not only show differential expression but also differential co-expression and differential connectivity across age and learning impairment. The known function of these hub genes indicate that they play key roles in critical pathways, including kinase and phosphatase signaling, in functions related to various ion channels, and in maintaining neuronal integrity relating to synaptic plasticity and memory formation. Taken together, they

  13. Turn-key SRF accelerators to drive subcritical reactors

    International Nuclear Information System (INIS)

    Johnson, Rolland P.

    2011-01-01

    Large particle accelerator projects, both accomplished and proposed, have been used to engage US industry through contracts and grants to develop efficient capabilities to design, develop, produce, and deliver entire accelerator systems or any needed subsystems. Staffed in many cases by experienced scientists and engineers from National Laboratories and Universities, existing companies could extend their portfolios to offer turn-key accelerators with parameters to match the needs of ADS. If the reactors were based on molten salt fuel such that trip rate requirements were relaxed, the developments needed for a multi-MW proton accelerator for ADS would be minimal. Turn-key SRF proton linacs for ADS operation can be ordered now to enable GW-level power generation from natural thorium, natural uranium, or nuclear waste from conventional reactors. (author)

  14. Phase I and II feasibility study report for the 300-FF-5 operable unit

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-12-31

    The purpose of this Phase I/II feasibility study is to assemble and screen a list of alternatives for remediation of the 300-FF-5 operable site on the Hanford Reservation. This screening is based on information gathered in the Phase I Remedial Investigation (RI) and on currently available information on remediation technologies. The alternatives remaining after screening provide a range of response actions for remediation. In addition, key data needs are identified for collection during a Phase II RI (if necessary). This Phase I/II FS represents a primary document as defined by the Tri-Party Agreement, but will be followed by a Phase III FS that will further develop the alternatives and provide a detailed evaluation of them. The following remedial action objectives were identified for the 300-FF-5 operable unit: Limit current human exposure to contaminated groundwater in the unit; Limit discharge of contaminated groundwater to the Columbia River; Reduce contaminant concentrations in groundwater below acceptable levels by the year 2018.

  15. ORSERG resource book. Operational reactor safety engineering and review group. Final report, March 1992

    International Nuclear Information System (INIS)

    1992-03-01

    EPRI has prepared this resource book to help utilities with their Self-Assessment Programs at nuclear power plants. Self-assessments are reviews performed by nuclear power plant utilities to monitor plant performance status and adequacy, identify trends in operational activities important to safety, and assess the impact of these trends on plant safety. Activities performed as self-assessments include reviews and evaluations of plant performance and abnormal events, technical evaluations of plant activities to identify potential problem areas, and reviews of other sources of plant design and operating experience for applicability to safety. This resource book is based on information obtained from utilities and includes examples of activities and methods that have proven effective. The resource book includes a summary of NRC requirements, guidelines for self-assessment program planning, descriptions and examples of investigative techniques, and key references that can be consulted for additional information. It can serve as a training guide for plant staff members who are assigned to self-assessment activities. (author)

  16. Phase I and II feasibility study report for the 300-FF-5 operable unit

    International Nuclear Information System (INIS)

    1993-01-01

    The purpose of this Phase I/II feasibility study is to assemble and screen a list of alternatives for remediation of the 300-FF-5 operable site on the Hanford Reservation. This screening is based on information gathered in the Phase I Remedial Investigation (RI) and on currently available information on remediation technologies. The alternatives remaining after screening provide a range of response actions for remediation. In addition, key data needs are identified for collection during a Phase II RI (if necessary). This Phase I/II FS represents a primary document as defined by the Tri-Party Agreement, but will be followed by a Phase III FS that will further develop the alternatives and provide a detailed evaluation of them. The following remedial action objectives were identified for the 300-FF-5 operable unit: Limit current human exposure to contaminated groundwater in the unit; Limit discharge of contaminated groundwater to the Columbia River; Reduce contaminant concentrations in groundwater below acceptable levels by the year 2018

  17. Key Lake Mining Corporation metallurgical complex

    International Nuclear Information System (INIS)

    Lendrum, F.C.

    1984-02-01

    The Key Lake uranium mine is located in Saskatchewan, 550 km northeast of Saskatoon. It began operations in 1983, and is licensed and regulated by both Saskatchewan government agencies and the Canadian Atomic Energy Control Board. This report examines the metallurgical processes used at the mill and discusses the spills that occurred in the first four months the mine was in operation. It finds that all spills of an acidic nature in the mill were small amounts in the CCD or solution pretreatment sections. Contingency procedures are in place and sumps are capable of handling spills. The only major change in design contemplated will be converting the secondary crushing from the use of an impact crusher to the use of a semi-autogeneous grinding mill. The monitoring program set out by the AECB and Saskatchewan Environment is thorough. It monitors effluents and water pathways, and includes aquatic biota and sediments. Air monitoring is also required by Saskatchewan Environment

  18. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.; Ferreira, Luciana C.; Sequeira, Ana M.M.; Meekan, Mark G.; Duarte, Carlos M.; Bailey, Helen; Bailleul, Fred; Bowen, W. Don; Caley, M. Julian; Costa, Daniel P.; Eguí luz, Victor M.; Fossette, Sabrina; Friedlaender, Ari S.; Gales, Nick; Gleiss, Adrian C.; Gunn, John; Harcourt, Rob; Hazen, Elliott L.; Heithaus, Michael R.; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L.; Lowe, Christopher G.; Madsen, Peter T.; Marsh, Helene; Phillips, Richard A.; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A.; Simpfendorfer, Colin A.; Sims, David W.; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N.; Wikelski, Martin; Womble, Jamie N.; Thums, Michele

    2016-01-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  19. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  20. Almost-sure identifiability of multidimensional harmonic retrieval

    NARCIS (Netherlands)

    Jiang, T; Sidiropoulos, ND; ten Berge, JMF

    Two-dimensional (2-D) and, more generally, multidimensional harmonic retrieval is of interest in a variety of applications, including transmitter localization and joint time and frequency offset estimation in wireless communications. The associated identifiability problem is key in understanding the

  1. A key to the Mexican and Central America Genera of Anthonomini (Curculionidae, Curculioninae)

    Science.gov (United States)

    Hernández, Macotulio Soto; Jones, Robert W.; Castillo, Pedro Reyes

    2013-01-01

    Abstract Presently the only keys available for identification of genera of Anthonomini are limited to those of the United States of America and Canada. A dichotomous key is presented to identify all genera of Mexican and Central American Anthonomini. Previous keys do not include the genera Achia, Botanebius, Loncophorus, Loncophorellus and Melexerus. A brief synopsis is given for each genus and photographs of representative species are included. PMID:23717181

  2. Extended analysis of the Trojan-horse attack in quantum key distribution

    Science.gov (United States)

    Vinay, Scott E.; Kok, Pieter

    2018-04-01

    The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.

  3. Experimental quantum key distribution at 1.3 gigabit-per-second secret-key rate over a 10 dB loss channel

    Science.gov (United States)

    Zhang, Zheshen; Chen, Changchen; Zhuang, Quntao; Wong, Franco N. C.; Shapiro, Jeffrey H.

    2018-04-01

    Quantum key distribution (QKD) enables unconditionally secure communication ensured by the laws of physics, opening a promising route to security infrastructure for the coming age of quantum computers. QKD’s demonstrated secret-key rates (SKRs), however, fall far short of the gigabit-per-second rates of classical communication, hindering QKD’s widespread deployment. QKD’s low SKRs are largely due to existing single-photon-based protocols’ vulnerability to channel loss. Floodlight QKD (FL-QKD) boosts SKR by transmitting many photons per encoding, while offering security against collective attacks. Here, we report an FL-QKD experiment operating at a 1.3 Gbit s‑1 SKR over a 10 dB loss channel. To the best of our knowledge, this is the first QKD demonstration that achieves a gigabit-per-second-class SKR, representing a critical advance toward high-rate QKD at metropolitan-area distances.

  4. Non-resonant electromagnetic energy harvester for car-key applications

    Science.gov (United States)

    Li, X.; Hehn, T.; Thewes, M.; Kuehne, I.; Frey, A.; Scholl, G.; Manoli, Y.

    2013-12-01

    This paper presents a novel non-resonant electromagnetic energy harvester for application in a remote car-key, to extend the lifetime of the battery or even to realize a fully energy autonomous, maintenance-free car-key product. Characteristic for a car-key are low frequency and large amplitude motions during normal daily operation. The basic idea of this non-resonant generator is to use a round flat permanent magnet moving freely in a round flat cavity, which is packaged on both sides by printed circuit boards embedded with multi-layer copper coils. The primary goal of this structure is to easily integrate the energy harvester with the existing electrical circuit module into available commercial car-key designs. The whole size of the energy harvester is comparable to a CR2032 coin battery. To find out the best power-efficient and optimal design, several magnets with different dimensions and magnetizations, and various layouts of copper coils were analysed and built up for prototype testing. Experimental results show that with an axially magnetized NdFeB magnet and copper coils of design variant B a maximum open circuit voltage of 1.1V can be observed.

  5. Key considerations and safety issues for the stretch power uprate at Chinshan Nuclear Power Station

    Energy Technology Data Exchange (ETDEWEB)

    Huang, P., E-mail: u808966@taipower.com.tw [Taiwan Power Company, Taipei, Taiwan (China)

    2014-07-01

    The Taiwan Power Company (TPC) has elected in recent years to implement the power uprate program as a key measure to improve the performance for TPC's nuclear power plants. The Measurement Uncertainty Recapture (MUR) power uprate for the TPC's three operating plants (reported in 16th PBNC) had been successfully implemented by July 2009. For the stretch power uprate (SPU) followed, the magnitude of uprate (~3%) is determined based on the available margins for original plant design, constant pressure approach (BWR) is adopted to simplify the evaluation, and major plant modifications are not considered. As the first application, the SPU safety analysis report (SAR) for the Chinshan plant was submitted to the ROCAEC in December 2010. A review task force was organized by the ROCAEC to perform a very thorough review. As the licensing bases are fully re-examined during the review process, many important issues have been identified and addressed. The key issues resolved include: conformance of SAR to ROCAEC's review guidance; re-examination of post-Fukushima comprehensive safety assessment; qualification of containment protective coatings; GL 96-06 (Assurance of Equipment Operability and Containment Integrity During DBA Conditions); credit for Containment Accident Pressure; issue for Annulus Pressurization Loads Evaluation. These issues required very extensive efforts to resolve. With the cooperative efforts by TPC and contractor (Institute of Nuclear Energy Research), however, all the issues were fully clarified and SAR was approved by ROCAEC on November 15, 2012. The first step SPU (2% OLTP) was successfully implemented in November 2012 at both units. (author)

  6. Field test of a continuous-variable quantum key distribution prototype

    International Nuclear Information System (INIS)

    Fossier, S; Debuisschert, T; Diamanti, E; Villing, A; Tualle-Brouri, R; Grangier, P

    2009-01-01

    We have designed and realized a prototype that implements a continuous-variable quantum key distribution (QKD) protocol based on coherent states and reverse reconciliation. The system uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation. The security of the system is guaranteed against general coherent eavesdropping attacks. The performance of the prototype was tested over preinstalled optical fibres as part of a quantum cryptography network combining different QKD technologies. The stable and automatic operation of the prototype over 57 h yielded an average secret key distribution rate of 8 kbit s -1 over a 3 dB loss optical fibre, including the key extraction process and all quantum and classical communication. This system is therefore ideal for securing communications in metropolitan size networks with high-speed requirements.

  7. Identifying PHM market and network opportunities.

    Science.gov (United States)

    Grube, Mark E; Krishnaswamy, Anand; Poziemski, John; York, Robert W

    2015-11-01

    Two key processes for healthcare organizations seeking to assume a financially sustainable role in population health management (PHM), after laying the groundwork for the effort, are to identify potential PHM market opportunities and determine the scope of the PHM network. Key variables organizations should consider with respect to market opportunities include the patient population, the overall insurance/employer market, and available types of insurance products. Regarding the network's scope, organizations should consider both traditional strategic criteria for a viable network and at least five additional criteria: network essentiality and PHM care continuum, network adequacy, service distribution right-sizing, network growth strategy, and organizational agility.

  8. Competitively Distinct Operations as a Key for Superior and Sustainable Business Performance: An Example from Walmart

    Directory of Open Access Journals (Sweden)

    Binod Timilsina

    2015-09-01

    Full Text Available Existing research on the resource-based view (RBV has provided limited evidence on how firms achieve superior and sustainable business performance; this failure is because current literature de-emphasizes the importance of operations. This paper argues that to gain and sustain superior business performance, a firm’s sustainable competitive advantage is not enough, its operations also needs to be competitively distinct. Therefore, through unifying the necessary conditions of superior and sustainable business performance the paper presents a better understanding of the RBV. The success story of Walmart, from existing literature, is considered as an example to support the proposed framework. The paper concludes that the cost of operations, opportunity cost, cost of resources and possible output are the crucial factors in resource choice and operations decision to secure competitively distinct operations. Finally, theoretical and managerial implications, research limitations and future research possibilities are discussed.

  9. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  10. Predicting Key Events in the Popularity Evolution of Online Information.

    Science.gov (United States)

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  11. Predicting Key Events in the Popularity Evolution of Online Information.

    Directory of Open Access Journals (Sweden)

    Ying Hu

    Full Text Available The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  12. Human-Automation Allocations for Current Robotic Space Operations

    Science.gov (United States)

    Marquez, Jessica J.; Chang, Mai L.; Beard, Bettina L.; Kim, Yun Kyung; Karasinski, John A.

    2018-01-01

    Within the Human Research Program, one risk delineates the uncertainty surrounding crew working with automation and robotics in spaceflight. The Risk of Inadequate Design of Human and Automation/Robotic Integration (HARI) is concerned with the detrimental effects on crew performance due to ineffective user interfaces, system designs and/or functional task allocation, potentially compromising mission success and safety. Risk arises because we have limited experience with complex automation and robotics. One key gap within HARI, is the gap related to functional allocation. The gap states: We need to evaluate, develop, and validate methods and guidelines for identifying human-automation/robot task information needs, function allocation, and team composition for future long duration, long distance space missions. Allocations determine the human-system performance as it identifies the functions and performance levels required by the automation/robotic system, and in turn, what work the crew is expected to perform and the necessary human performance requirements. Allocations must take into account each of the human, automation, and robotic systems capabilities and limitations. Some functions may be intuitively assigned to the human versus the robot, but to optimize efficiency and effectiveness, purposeful role assignments will be required. The role of automation and robotics will significantly change in future exploration missions, particularly as crew becomes more autonomous from ground controllers. Thus, we must understand the suitability of existing function allocation methods within NASA as well as the existing allocations established by the few robotic systems that are operational in spaceflight. In order to evaluate future methods of robotic allocations, we must first benchmark the allocations and allocation methods that have been used. We will present 1) documentation of human-automation-robotic allocations in existing, operational spaceflight systems; and 2) To

  13. KEY COMPARISON: CCQM-K27-Subsequent: Key Comparison (subsequent) for the determination of ethanol in aqueous matrix

    Science.gov (United States)

    Schantz, Michele M.; Duewer, David L.; Parris, Reenie M.; May, Willie E.; Archer, Marcellé; Mussell, Chris; Carter, David; Konopelko, Leonid A.; Kustikov, Yury A.; Krylov, Anatoli I.; Fatina, Olga V.

    2005-01-01

    Ethanol is important both forensically ('drunk driving' or driving while under the influence, 'DWI', regulations) and commercially (alcoholic beverages). Blood- and breath-alcohol testing can be imposed on individuals operating private vehicles such as cars, boats, or snowmobiles, or operators of commercial vehicles like trucks, planes, and ships. The various levels of blood alcohol that determine whether these operators are considered legally impaired vary depending on the circumstances and locality. Accurate calibration and validation of instrumentation is critical in areas of forensic testing where quantitative analysis directly affects the outcome of criminal prosecutions, as is the case with the determination of ethanol in blood and breath. Additionally, the accurate assessment of the alcoholic content of beverages is a commercially important commodity. In 2002, the CCQM conducted a Key Comparison (CCQM-K27) for the determination of ethanol in aqueous matrix with nine participants. A report on this project has been approved by the CCQM and can be found at the BIPM website and in this Technical Supplement. CCQM-K27 comprised three samples, one at low mass fraction of ethanol in water (nominal concentration of 0.8 mg/g), one at high level (nominal concentration of 120 mg/g), and one wine matrix (nominal concentration of 81 mg/g). Overall agreement among eight participants using gas chromatography with flame ionization detection (GC-FID), titrimetry, isotope dilution gas chromatography/mass spectrometry (GC-IDMS), and gas chromatography-combustion-isotope ratio mass spectrometry (ID-GC-C-IRMS) was good. The ninth participant used a headspace GC-FID method that had not been validated in an earlier pilot study (CCQM-P35). A follow-on Key Comparison, CCQM-K27-Subsequent, was initiated in 2003 to accommodate laboratories that had not been ready to benchmark their methods in the original CCQM-K27 study or that wished to benchmark a different method. Four levels of

  14. Risk monitor - a tool for operational safety assessment risk monitor - user's manual

    International Nuclear Information System (INIS)

    Hari Prasad, M.; Vinod, Gopika; Saraf, R.K.; Ghosh, A.K.

    2006-06-01

    Probabilistic Safety Assessment has become a key tool as on today to identify and understand Nuclear Power Plant vulnerabilities. As a result of the availability of these PSA studies, there is a desire to use them to enhance plant safety and to operate the nuclear stations in the most efficient manner. Risk Monitor is a PC based tool, which computes the real time safety level and assists plant personnel to manage day-to-day activities. Risk Monitor is a PC based user friendly software tool used for modification and re-analysis of a nuclear Power plant. Operation of Risk Monitor is based on PSA methods for assisting in day to day applications. Risk Monitoring programs can assess the risk profile and are used to optimize the operation of Nuclear Power Plants with respect to a minimum risk level over the operating time. This report presents the background activities of Risk Monitor, its application areas and the step by step procedure for the user.to interact with the software. This software can be used with the PSA model of any Nuclear Power Plant. (author)

  15. Dynamic operator actions analysis for inherently safe fast reactors and light water reactors

    International Nuclear Information System (INIS)

    Ho, V.; Apostolakis, G.

    1988-01-01

    A comparative dynamic human actions analysis of inherently safe fast reactors (ISFRs) and light water reactors (LWRs) in terms of systems response and estimated human error rates is presented. Brief overviews of the ISFR and LWR systems are given to illustrate the design differences. Key operator actions required by the ISFR reactor shutdown and decay heat removal systems are identified and are compared with those of the LWR. It is observed that, because of the passive nature of the ISFR safety-related systems, a large time window is available for operator actions during transient events. Furthermore, these actions are fewer in number, are less complex, and have lower error rates and less severe consequences than those of the LWRs. We expect the ISFR operator errors' contribution to risk is smaller (at least in the context of the existing human reliability models) than that of the LWRs. (author)

  16. Pedagogy in Operations Research: Where has the discipline been ...

    African Journals Online (AJOL)

    ... recognized inception during World War II. Recent and current trends are examined and ongoing activities and initiatives in operations research pedagogy are discussed. Finally, implications for the future of operations research are considered. Key words: Education, pedagogy, operations research, management science, ...

  17. Development of key indicators to quantify the health impacts of climate change on Canadians

    OpenAIRE

    Cheng, June J.; Berry, Peter

    2013-01-01

    Objectives This study aimed at developing a list of key human health indicators for quantifying the health impacts of climate change in Canada. Methods A literature review was conducted in OVID Medline to identify health morbidity and mortality indicators currently used to quantify climate change impacts. Public health frameworks and other studies of climate change indicators were reviewed to identify criteria with which to evaluate the list of proposed key indicators and a rating scale was d...

  18. Clinical risk management in hospitals: strategy, central coordination and dialogue as key enablers.

    Science.gov (United States)

    Briner, Matthias; Manser, Tanja; Kessler, Oliver

    2013-04-01

    The study aims to identify key enablers fostering clinical risk management (CRM) in hospitals to guide health care in this vital area of patient safety. A cross-sectional survey was conducted at the national level in 324 Swiss hospitals in 2007-2008 to assess the relationship between key elements and systematic CRM. Therefore, a comprehensive monitoring instrument for CRM was used for the first time. Organizational factors (e.g. strategy, coordination, resources) and structural conditions (e.g. hospital size) were tested as key elements. CRM was assessed by evaluating its maturity (i.e. the level of CRM development) by 12 theoretically derived indices joining together essential aspects of CRM at the hospital level and the service level. Chi-square measures were used to analyse the relationships between organizational factors or structural conditions and maturity of CRM. Participation in this voluntary survey was good, with CRM experts of 138 out of 324 hospitals responding (response rate 43%). Three key enablers for CRM were identified: implementing a function for central CRM coordination, assuring dialogue with and between the different hospital services, and developing strategic CRM objectives. This study offers, for the first time, an assessment of the maturity of hospitals' CRM and identifies key enablers related to CRM. This is a feasible first step in guiding hospitals to shape their CRM and presents a basis for future studies, for example, linking CRM to outcome data. © 2012 Blackwell Publishing Ltd.

  19. Identifying a "default" visual search mode with operant conditioning.

    Science.gov (United States)

    Kawahara, Jun-ichiro

    2010-09-01

    The presence of a singleton in a task-irrelevant domain can impair visual search. This impairment, known as the attentional capture depends on the set of participants. When narrowly searching for a specific feature (the feature search mode), only matching stimuli capture attention. When searching broadly (the singleton detection mode), any oddball captures attention. The present study examined which strategy represents the "default" mode using an operant conditioning approach in which participants were trained, in the absence of explicit instructions, to search for a target in an ambiguous context in which one of two modes was available. The results revealed that participants behaviorally adopted the singleton detection as the default mode but reported using the feature search mode. Conscious strategies did not eliminate capture. These results challenge the view that a conscious set always modulates capture, suggesting that the visual system tends to rely on stimulus salience to deploy attention.

  20. Academic Primer Series: Eight Key Papers about Education Theory.

    Science.gov (United States)

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-02-01

    Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.

  1. Identifying key controls on the behavior of an acidic-U(VI) plume in the Savannah River Site using reactive transport modeling.

    Science.gov (United States)

    Bea, Sergio A; Wainwright, Haruko; Spycher, Nicolas; Faybishenko, Boris; Hubbard, Susan S; Denham, Miles E

    2013-08-01

    Acidic low-level waste radioactive waste solutions were discharged to three unlined seepage basins at the F-Area of the Department of Energy (DOE) Savannah River Site (SRS), South Carolina, USA, from 1955 through 1989. Despite many years of active remediation, the groundwater remains acidic and contaminated with significant levels of U(VI) and other radionuclides. Monitored Natural Attenuation (MNA) is a desired closure strategy for the site, based on the premise that regional flow of clean background groundwater will eventually neutralize the groundwater acidity, immobilizing U(VI) through adsorption. An in situ treatment system is currently in place to accelerate this in the downgradient portion of the plume and similar measures could be taken upgradient if necessary. Understanding the long-term pH and U(VI) adsorption behavior at the site is critical to assess feasibility of MNA along with the in-situ remediation treatments. This paper presents a reactive transport (RT) model and uncertainty quantification (UQ) analyses to explore key controls on the U(VI)-plume evolution and long-term mobility at this site. Two-dimensional numerical RT simulations are run including the saturated and unsaturated (vadose) zones, U(VI) and H(+) adsorption (surface complexation) onto sediments, dissolution and precipitation of Al and Fe minerals, and key hydrodynamic processes are considered. UQ techniques are applied using a new open-source tool that is part of the developing ASCEM reactive transport modeling and analysis framework to: (1) identify the complex physical and geochemical processes that control the U(VI) plume migration in the pH range where the plume is highly mobile, (2) evaluate those physical and geochemical parameters that are most controlling, and (3) predict the future plume evolution constrained by historical, chemical and hydrological data. The RT simulation results show a good agreement with the observed historical pH and concentrations of U(VI), nitrates

  2. Identifying the nontechnical skills required of nurses in general surgical wards.

    Science.gov (United States)

    Marshall, Dianne C; Finlayson, Mary P

    2018-04-01

    To identify the nontechnical skills (NTS) required of nurses in general surgical wards for safe and effective care. As the largest occupational group, nurses are in an ideal position to block the vulnerabilities of patient adverse events in a surgical ward. Previous studies in the surgical environment have identified the NTS required of nurses for safe care in operating rooms; however, these skills have not been identified for nurses in general surgical wards. A nonparticipant observational descriptive design was used. A purposive sample of 15 registered nurses was recruited from four surgical wards and observed for a full shift on a morning, afternoon or night shift. Nonparticipant observations were conducted using field notes to collect data. A coding frame was developed, and an inductive process was used to analyse the data. A taxonomy comprising seven NTS required of nurses in their roles in surgical ward teams emerged from the data analysis. They are communication, leadership and management, planning, decision-making, situation awareness, teamwork and patient advocacy. Patient care provided by general surgical nurses involved the seven identified key NTS. These particular NTS are an important component of safe nursing practice as they underpin the provision of safe and effective care for general surgical patients. Nurses block the trajectory of error by using NTS to address the vulnerabilities in the system that can lead to adverse patient events. Identifying general surgical nurses' NTS enables the development of teaching strategies that target the learning of those skills to achieve successful work outcomes and improve patient safety. © 2018 John Wiley & Sons Ltd.

  3. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  4. Key determinants of managing the marketing asset of global companies

    OpenAIRE

    Tatyana Tsygankova; Roman Ponomarenko

    2016-01-01

    As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development). The article identified the optimal set of key elements of the system of marketing assets, which are th...

  5. Mergeomics: a web server for identifying pathological pathways, networks, and key regulators via multidimensional data integration.

    Science.gov (United States)

    Arneson, Douglas; Bhattacharya, Anindya; Shu, Le; Mäkinen, Ville-Petteri; Yang, Xia

    2016-09-09

    Human diseases are commonly the result of multidimensional changes at molecular, cellular, and systemic levels. Recent advances in genomic technologies have enabled an outpour of omics datasets that capture these changes. However, separate analyses of these various data only provide fragmented understanding and do not capture the holistic view of disease mechanisms. To meet the urgent needs for tools that effectively integrate multiple types of omics data to derive biological insights, we have developed Mergeomics, a computational pipeline that integrates multidimensional disease association data with functional genomics and molecular networks to retrieve biological pathways, gene networks, and central regulators critical for disease development. To make the Mergeomics pipeline available to a wider research community, we have implemented an online, user-friendly web server ( http://mergeomics. idre.ucla.edu/ ). The web server features a modular implementation of the Mergeomics pipeline with detailed tutorials. Additionally, it provides curated genomic resources including tissue-specific expression quantitative trait loci, ENCODE functional annotations, biological pathways, and molecular networks, and offers interactive visualization of analytical results. Multiple computational tools including Marker Dependency Filtering (MDF), Marker Set Enrichment Analysis (MSEA), Meta-MSEA, and Weighted Key Driver Analysis (wKDA) can be used separately or in flexible combinations. User-defined summary-level genomic association datasets (e.g., genetic, transcriptomic, epigenomic) related to a particular disease or phenotype can be uploaded and computed real-time to yield biologically interpretable results, which can be viewed online and downloaded for later use. Our Mergeomics web server offers researchers flexible and user-friendly tools to facilitate integration of multidimensional data into holistic views of disease mechanisms in the form of tissue-specific key regulators

  6. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    Science.gov (United States)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  7. Exploring the psychological health of emergency dispatch centre operatives: a systematic review and narrative synthesis.

    Science.gov (United States)

    Golding, Sarah E; Horsfield, Claire; Davies, Annette; Egan, Bernadette; Jones, Martyn; Raleigh, Mary; Schofield, Patricia; Squires, Allison; Start, Kath; Quinn, Tom; Cropley, Mark

    2017-01-01

    The study objective was to investigate and synthesize available evidence relating to the psychological health of Emergency Dispatch Centre (EDC) operatives, and to identify key stressors experienced by EDC operatives. Eight electronic databases (Embase, PubMed, Medline, CINAHL, PsycInfo, PsycArticles, The Psychology and Behavioural Sciences Collection, and Google Scholar) were searched. All study designs were included, and no date limits were set. Studies were included if they were published in English, and explored the psychological health of any EDC operatives, across fire, police, and emergency medical services. Studies were excluded if they related solely to other emergency workers, such as police officers or paramedics. Methodological quality of included studies was assessed using checklists adapted from the Critical Appraisal Skills Programme. A narrative synthesis was conducted, using thematic analysis. A total of 16 articles were included in the review. Two overarching themes were identified during the narrative synthesis: 'Organisational and Operational Factors' and 'Interactions with Others'. Stressors identified included being exposed to traumatic calls, lacking control over high workload, and working in under-resourced and pressured environments. Lack of support from management and providing an emotionally demanding service were additional sources of stress. Peer support and social support from friends and family were helpful in managing work-related stress. EDC operatives experience stress as a result of their work, which appears to be related to negative psychological health outcomes. Future research should explore the long-term effects of this stress, and the potential for workplace interventions to alleviate the negative impacts on psychological health. CRD42014010806.

  8. Tracking the Key Constituents of Concern of the WTP LAW Stream

    Energy Technology Data Exchange (ETDEWEB)

    Mabrouki, Ridha B. [The Catholic Univ. of America, Washington, DC (United States); Matlack, Keith S. [The Catholic Univ. of America, Washington, DC (United States); Abramowitz, Howard [The Catholic Univ. of America, Washington, DC (United States); Muller, Isabelle S. [The Catholic Univ. of America, Washington, DC (United States); Joseph, Innocent [The Catholic Univ. of America, Washington, DC (United States); Pegg, Ian L. [The Catholic Univ. of America, Washington, DC (United States)

    2017-05-31

    The testing results presented in the present report were also obtained on a DM10 melter system operated with the primary WTP LAW offgas system components with recycle, as specified in the statement of work (SOW) [6] and detailed in the Test Plan for this work [7]. The primary offgas system components include the SBS, the WESP, and a recycle system that allows recycle of liquid effluents back to the melter, as in the present baseline for the WTP LAW vitrification. The partitioning of technetium and other key constituents between the glass waste form, the offgas system liquid effluents, the offgas stream that exits the WESP, and the liquid condensate from the vacuum evaporator were quantified in this work. The tests employed three different LAW streams spanning a range of waste compositions anticipated for WTP. Modifications to the offgas system and operational strategy were made to expedite the approach to steady state concentrations of key constituents in the glass and offgas effluent solutions during each test.

  9. Operating System Concepts for Reconfigurable Computing: Review and Survey

    OpenAIRE

    Marcel Eckert; Dominik Meyer; Jan Haase; Bernd Klauer

    2016-01-01

    One of the key future challenges for reconfigurable computing is to enable higher design productivity and a more easy way to use reconfigurable computing systems for users that are unfamiliar with the underlying concepts. One way of doing this is to provide standardization and abstraction, usually supported and enforced by an operating system. This article gives historical review and a summary on ideas and key concepts to include reconfigurable computing aspects in operating systems. The arti...

  10. Quayside Operations Planning Under Uncertainty

    DEFF Research Database (Denmark)

    Iris, Cagatay; Jin, Jian Gang; Lee, Der-Hong

    The quayside operation problem is one of the key components in the management system for a container terminal. This work focuses on three important problems that represent a bottleneck on terminal operations: Berth Allocation Problem (BAP), Quay Crane Assignment and Scheduling Problems (QCASP......).The state-of-art models mostly rely on forecasted, deterministic vessel arrivals, and they mostly assume that uniform QC operations is maintained. However, in reality, these parameters are mostly random. In this study, we present a stochastic programming approach based on a decomposition algorithm to solve...

  11. 41 CFR Appendix A to Subpart C of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart C of Part 102 Public Contracts and Property Management Federal Property... 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied to situations not...

  12. Lead-acid batteries in micro-hybrid applications. Part I. Selected key parameters

    Science.gov (United States)

    Schaeck, S.; Stoermer, A. O.; Kaiser, F.; Koehler, L.; Albers, J.; Kabza, H.

    Micro-hybrid electric vehicles were launched by BMW in March 2007. These are equipped with brake energy regeneration (BER) and the automatic start and stop function (ASSF) of the internal combustion engine. These functions are based on common 14 V series components and lead-acid (LA) batteries. The novelty is given by the intelligent onboard energy management, which upgrades the conventional electric system to the micro-hybrid power system (MHPS). In part I of this publication the key factors for the operation of LA batteries in the MHPS are discussed. Especially for BER one is high dynamic charge acceptance (DCA) for effective boost charging. Vehicle rest time is identified as a particular negative parameter for DCA. It can be refreshed by regular fully charging at elevated charge voltage. Thus, the batteries have to be outstandingly robust against overcharge and water loss. This can be accomplished for valve-regulated lead-acid (VRLA) batteries at least if they are mounted in the trunk. ASSF goes along with frequent high-rate loads for warm cranking. The internal resistance determines the drop of the power net voltage during cranking and is preferably low for reasons of power net stability even after years of operation. Investigations have to be done with aged 90 Ah VRLA-absorbent glass mat (AGM) batteries. Battery operation at partial state-of-charge gives a higher risk of deep discharging (overdischarging). Subsequent re-charging then is likely to lead to the formation of micro-short circuits in the absorbent glass mat separator.

  13. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  14. Preoperational assessment of solute release from waste rock at proposed mining operations

    International Nuclear Information System (INIS)

    Lapakko, Kim A.

    2015-01-01

    Highlights: • Modeling to estimate solute release from waste rock at proposed mines is described. • Components of the modeling process are identified and described. • Modeling inputs required are identified and described. • Examples of data generated and their application are presented. • Challenges inherent to environmental review are identified. - Abstract: Environmental assessments are conducted prior to mineral development at proposed mining operations. Among the objectives of these assessments is prediction of solute release from mine wastes projected to be generated by the proposed mining and associated operations. This paper provides guidance to those engaged in these assessments and, in more detail, provides insights on solid-phase characterization and application of kinetic test results for predicting solute release from waste rock. The logic guiding the process is consistent with general model construction practices and recent publications. Baseline conditions at the proposed site are determined and a detailed operational plan is developed and imposed upon the site. Block modeling of the mine geology is conducted to identify the mineral assemblages present, their masses and compositional variations. This information is used to select samples, representative of waste rock to be generated, that will be analyzed and tested to describe characteristics influencing waste rock drainage quality. The characterization results are used to select samples for laboratory dissolution testing (kinetic tests). These tests provide empirical data on dissolution of the various mineral assemblages present as waste rock. The data generated are used, in conjunction with environmental conditions, the proposed method of mine waste storage, and scientific and technical principles, to estimate solute release rates for the operational scale waste rock. Common concerns regarding waste rock are generation of acidic drainage and release of heavy metals and sulfate. Key solid

  15. Universal operations in Hochschild homology

    DEFF Research Database (Denmark)

    Wahl, Nathalie

    2016-01-01

    operations is approximated by a certain chain complex of formal operations, for which we provide an explicit model that we can calculate in a number of cases. When E encodes the structure of open topological conformal field theories, we identify this last chain complex, up quasi-isomorphism, with the moduli...... space of Riemann surfaces with boundaries, thus establishing that the operations constructed by Costello and Kontsevich-Soibelman via different methods identify with all formal operations. When E encodes open topological quantum field theories (or symmetric Frobenius algebras) our chain complex...... topology operations, which had so far been elusive....

  16. Key Future Engineering Capabilities for Human Capital Retention

    Science.gov (United States)

    Sivich, Lorrie

    Projected record retirements of Baby Boomer generation engineers have been predicted to result in significant losses of mission-critical knowledge in space, national security, and future scientific ventures vital to high-technology corporations. No comprehensive review or analysis of engineering capabilities has been performed to identify threats related to the specific loss of mission-critical knowledge posed by the increasing retirement of tenured engineers. Archival data from a single diversified Fortune 500 aerospace manufacturing engineering company's engineering career database were analyzed to ascertain whether relationships linking future engineering capabilities, engineering disciplines, and years of engineering experience could be identified to define critical knowledge transfer models. Chi square, logistic, and linear regression analyses were used to map patterns of discipline-specific, mission-critical knowledge using archival data of engineers' perceptions of engineering capabilities, key developmental experiences, and knowledge learned from their engineering careers. The results from the study were used to document key engineering future capabilities. The results were then used to develop a proposed human capital retention plan to address specific key knowledge gaps of younger engineers as veteran engineers retire. The potential for social change from this study involves informing leaders of aerospace engineering corporations on how to build better quality mentoring or succession plans to fill the void of lost knowledge from retiring engineers. This plan can secure mission-critical knowledge for younger engineers for current and future product development and increased global competitiveness in the technology market.

  17. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    Coslovi, S.; Zulian, A.

    1992-01-01

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  18. The Low-Frequency Array (LOFAR) and EoR Key-Science Project

    NARCIS (Netherlands)

    Brentjens, Michiel; Koopmans, L. V. E.; de Bruyn, A. G.; Zaroubi, S.

    The Low-Frequency ARray (LOFAR) is a novel radio-telescope facility with its core and operation center in the Netherlands. LOFAR is one of several current pathfinders toward SKA. One of LOFAR's key science projects is the detection and characterization of the redshifted 21-cm emission from neutral

  19. 41 CFR Appendix A to Subpart D of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart D of Part 102 Public Contracts and Property Management Federal Property... Subpart D of Part 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied...

  20. Network-Guided Key Gene Discovery for a Given Cellular Process

    DEFF Research Database (Denmark)

    He, Feng Q; Ollert, Markus

    2018-01-01

    Identification of key genes for a given physiological or pathological process is an essential but still very challenging task for the entire biomedical research community. Statistics-based approaches, such as genome-wide association study (GWAS)- or quantitative trait locus (QTL)-related analysis...... have already made enormous contributions to identifying key genes associated with a given disease or phenotype, the success of which is however very much dependent on a huge number of samples. Recent advances in network biology, especially network inference directly from genome-scale data...

  1. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  2. The Impact of Business Excellence on Operational Performance among Halal Certified Food Manufacturers in Malaysia

    Directory of Open Access Journals (Sweden)

    Masrom Nor Ratna

    2017-01-01

    Full Text Available The impact of business excellence with key elements embedded can be a tool for organization to determine opportunities and gain knowledge. This will help the organization to learn how to adopt highperformance and achieve competitive advantage. Through the business excellence model, the organization can execute their strategies to determine, forecast and survive in highly competitive market. This paper presents on identifying those elements in business excellence model (leadership, strategy and planning, customer focus, measurement, analysis, and knowledge management, operation focus that impact on operational performance in halal certified food manufacturers in Malaysia. Data for the study were collected from 100 halal certified food manufacturers and the relationship proposed in the framework were tested using structural equation modelling (SEM. The result indicated that all the elements of Business Excellence cannot lead to operational performance except for customer focus.

  3. EZID: Long term identifiers made easy (Invited)

    Science.gov (United States)

    Starr, J.

    2013-12-01

    Scholarly research is producing ever increasing amounts of digital research data, and this data should be managed throughout the research life cycle both as part of good scientific practice, but also to comply with funder mandates, such as the 2013 OSTP Public Access Memo (http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf). By assigning unique and persistent identifiers to data objects, data managers can gain control and flexibility over what can be a daunting task. This is due to the fact that the objects can be moved to new locations without disruption to links, as long as the identifier target is maintained. EZID is a tool that makes assigning and maintaining unique, persistent identifiers easy. It was designed and built by California Digital Library (CDL) and has both a user interface and a RESTful API. EZID currently offers services for two globally unique, persistent identifier schemes: Digital Object Identifiers (DOIs) and Archival Resource Keys (ARKs). DOIs are identifiers originating from the publishing world and are in widespread use for journal articles. CDL is able to offer DOIs because of being a founding member of DataCite (http://www.datacite.org/), an international consortium established to provide easier access to scientific research data on the Internet. ARKs are identifiers originating from the library, archive and museum community. Like DOIs, they become persistent when the objects and identifier forwarding information is maintained. DOIs and ARKs have a key role in data management and, therefore, in data management plans. DOIs are the recommended identifier for use in data citation, and ARKs provide the maximum flexibility needed for data documentation and management throughout the early phases of a project. The two identifier schemes are able to be used together, and EZID is made to work with both. EZID clients, coming from education, research, government, and the private sector, are utilizing the

  4. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  5. Analyzing key performance indicators (KPIs) for E-commerce and Internet marketing of elderly products: a review.

    Science.gov (United States)

    Tsai, Yuan-Cheng; Cheng, Yu-Tien

    2012-01-01

    With the transformation of its population structure and economic environment, Taiwan is rapidly becoming an aging society. There is a growing need for elderly products, and therefore the operation of web shops that sell elderly products is important. In an era which values performance management, searching for key performance indicators (KPIs) helps to reveal, if the goals of a web shop are achieved. In the current study, researchers adopted the constructs of the Balanced Scorecard (BSC) to evaluate web shop performance. Additionally, the Delphi method, along with questionnaires, was used to develop 29 indicators. Finally, the decision making trial and evaluation laboratory (DEMATEL) method assisted in identifying the level of importance of the constructs, in which "internal process" ranked top, followed by "learning and growth", "customer", and "financial". "Internal process" was the key construct that impacted other factors, while "customer" was an important construct affected by other factors. By understanding the influences and relationships among the constructs, enterprises can conduct additional monitoring and management to achieve functions of prevention, continuous improvement, and innovation in order to shape their core competence. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  6. High speed and adaptable error correction for megabit/s rate quantum key distribution.

    Science.gov (United States)

    Dixon, A R; Sato, H

    2014-12-02

    Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.

  7. General description of discriminating quantum operations

    International Nuclear Information System (INIS)

    Zhang Ke-Jia; Gao Fei; Qin Su-Juan; Wen Qiao-Yan; Zhu Ping; Guo Fen-Zhuo

    2011-01-01

    The discrimination of quantum operations plays a key role in quantum information and computation. Unlike discriminating quantum states, it has some special properties which can be carried out in practice. In this paper, we provide a general description of discriminating quantum operations. Concretely speaking, we describe the distinguishability between quantum operations using a measure called operator fidelity. It is shown that, employing the theory of operator fidelity, we can not only verify some previous results to discriminate unitary operations, but also exhibit a more general discrimination condition. We further apply our results to analysing the security of some quantum cryptographic protocols and discuss the realization of our method using well-developed quantum algorithms. (general)

  8. Assessment Approach for Identifying Compatibility of Restoration Projects with Geomorphic and Flooding Processes in Gravel Bed Rivers.

    Science.gov (United States)

    DeVries, Paul; Aldrich, Robert

    2015-08-01

    A critical requirement for a successful river restoration project in a dynamic gravel bed river is that it be compatible with natural hydraulic and sediment transport processes operating at the reach scale. The potential for failure is greater at locations where the influence of natural processes is inconsistent with intended project function and performance. We present an approach using practical GIS, hydrologic, hydraulic, and sediment transport analyses to identify locations where specific restoration project types have the greatest likelihood of working as intended because their function and design are matched with flooding and morphologic processes. The key premise is to identify whether a specific river analysis segment (length ~1-10 bankfull widths) within a longer reach is geomorphically active or inactive in the context of vertical and lateral stabilities, and hydrologically active for floodplain connectivity. Analyses involve empirical channel geometry relations, aerial photographic time series, LiDAR data, HEC-RAS hydraulic modeling, and a time-integrated sediment transport budget to evaluate trapping efficiency within each segment. The analysis segments are defined by HEC-RAS model cross sections. The results have been used effectively to identify feasible projects in a variety of alluvial gravel bed river reaches with lengths between 11 and 80 km and 2-year flood magnitudes between ~350 and 1330 m(3)/s. Projects constructed based on the results have all performed as planned. In addition, the results provide key criteria for formulating erosion and flood management plans.

  9. Assessment Approach for Identifying Compatibility of Restoration Projects with Geomorphic and Flooding Processes in Gravel Bed Rivers

    Science.gov (United States)

    DeVries, Paul; Aldrich, Robert

    2015-08-01

    A critical requirement for a successful river restoration project in a dynamic gravel bed river is that it be compatible with natural hydraulic and sediment transport processes operating at the reach scale. The potential for failure is greater at locations where the influence of natural processes is inconsistent with intended project function and performance. We present an approach using practical GIS, hydrologic, hydraulic, and sediment transport analyses to identify locations where specific restoration project types have the greatest likelihood of working as intended because their function and design are matched with flooding and morphologic processes. The key premise is to identify whether a specific river analysis segment (length ~1-10 bankfull widths) within a longer reach is geomorphically active or inactive in the context of vertical and lateral stabilities, and hydrologically active for floodplain connectivity. Analyses involve empirical channel geometry relations, aerial photographic time series, LiDAR data, HEC-RAS hydraulic modeling, and a time-integrated sediment transport budget to evaluate trapping efficiency within each segment. The analysis segments are defined by HEC-RAS model cross sections. The results have been used effectively to identify feasible projects in a variety of alluvial gravel bed river reaches with lengths between 11 and 80 km and 2-year flood magnitudes between ~350 and 1330 m3/s. Projects constructed based on the results have all performed as planned. In addition, the results provide key criteria for formulating erosion and flood management plans.

  10. Identifying 21st Century STEM Competencies Using Workplace Data

    Science.gov (United States)

    Jang, Hyewon

    2016-04-01

    Gaps between science, technology, engineering, and mathematics (STEM) education and required workplace skills have been identified in industry, academia, and government. Educators acknowledge the need to reform STEM education to better prepare students for their future careers. We pursue this growing interest in the skills needed for STEM disciplines and ask whether frameworks for 21st century skills and engineering education cover all of important STEM competencies. In this study, we identify important STEM competencies and evaluate the relevance of current frameworks applied in education using the standardized job-specific database operated and maintained by the US Department of Labor. Our analysis of the importance of 109 skills, types of knowledge and work activities, revealed 18 skills, seven categories of knowledge, and 27 work activities important for STEM workers. We investigate the perspectives of STEM and non-STEM job incumbents, comparing the importance of each skill, knowledge, and work activity for the two groups. We aimed to condense dimensions of the 52 key areas by categorizing them according to the Katz and Kahn (1978) framework and testing for inter-rater reliability. Our findings show frameworks for 21st century skills and engineering education do not encompass all important STEM competencies. Implications for STEM education programs are discussed, including how they can bridge gaps between education and important workplace competencies.

  11. Key Biodiversity Areas in the Philippines: Priorities for Conservation

    Directory of Open Access Journals (Sweden)

    R.G.R. Ambal

    2012-08-01

    Full Text Available A process for identifying Key Biodiversity Areas (KBAs for the Philippines was undertaken in two phases. The 128 terrestrial and freshwater KBAs were identified in 2006 and the 123 marine KBAs were identified in 2009. A total of 228 KBAs resulted from the integration of the terrestrial, freshwater and marine KBAs. These KBAs represent the known habitat of 855 globally important species of plants, corals, molluscs, elasmobranchs, fishes, amphibians, reptiles, birds and mammals in the country. Inclusion of these KBAs in the country’s protected area system will be a significant step towards ensuring the conservation of the full scope of the country’s natural heritage.

  12. Assessment of Biotechnology Policies and International Trade in Key Markets for U.S. Agriculture

    OpenAIRE

    Marchant, Mary A.; Song, Baohui

    2005-01-01

    The United States leads the world in agricultural biotechnology research, adoption, commercialization, and exports. Our biotech commodities are highly dependent on international markets. Thus, any biotech policy changes by key importing countries may affect U.S. agricultural biotech product exports. This article identifies key markets for U.S. agricultural exports including biotech commodities and discusses current and proposed biotech policies in key markets for U.S. agricultural exports foc...

  13. Key components of financial-analysis education for clinical nurses.

    Science.gov (United States)

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  14. Implementation of ISO 22000 in Romanian Companies: Motivations, Difficulties and Key Benefits

    Directory of Open Access Journals (Sweden)

    Carmen Păunescu

    2018-02-01

    Full Text Available The development of well-designed food safety management systems that take into consideration the potential risks and threats to an organization and their associated impacts to business operations should be a key goal for each organization operating in the food supply chain. This study provides quantitative empirical evidence about the motivations for implementing a food safety management system based on ISO 22000. By employing factor analysis and multiple linear regression, it analyses the benefits that the ISO 22000 certified companies gained through certification, as well as the main constraints that may prevent the adoption of the standard in the food industry. The survey is based on a sample of Romanian companies distributed at all levels of the food chain, but mainly at the production level. While there exist external pressures that lead companies to adopt a food safety management system based on ISO 22000, the motivations that are most relevant in this decision are generally internal in nature. The results of our study identify three major benefits of ISO 22000 certification: food safety improvement and provision of safer products, reduction of illness and other risks arising from food and improvement of consumers’ confidence. Also, it points out three constraints limiting the dissemination and use of ISO 22000: employees’ qualification, costs associated with food safety management system implementation and legal requirements.

  15. Concept of Operations for RCO SPO

    Science.gov (United States)

    Matessa, Michael; Strybel, Thomas; Vu, Kim; Battiste, Vernol; Schnell, Thomas

    2017-01-01

    Reduced crew operations (RCO) refers to the reduction of crew members flying long-haul or military operations with more than one pilot onboard. Single pilot operations (SPO) refers to flying a commercial transport aircraft with only one pilot on board the aircraft, assisted by advanced onboard automation andor ground operators providing piloting support services. Properly implemented, RCO/SPO could provide operating cost savings while maintaining a level of safety no less than conventional two-pilot commercial operations. A concept of operations (ConOps) for any paradigm describes the characteristics of its various components and their integration in a multi-dimensional design space. This paper presents key options for humanautomation function allocation being considered by NASA in its ongoing development of RCO/SPO ConOps.

  16. Selected Aspects of Wear Affecting Keyed Joints and Spline Connections During Operation of Aircrafts

    Directory of Open Access Journals (Sweden)

    Gębura Andrzej

    2014-12-01

    Full Text Available The paper deals with selected deficiencies of spline connections, such as angular or parallel misalignment (eccentricity and excessive play. It is emphasized how important these deficiencies are for smooth operation of the entire driving units. The aim of the study is to provide a kind of a reference list with such deficiencies with visual symptoms of wear, specification of mechanical measurements for mating surfaces, mathematical description of waveforms for dynamic variability of motion in such connections and visualizations of the connection behaviour acquired with the use of the FAM-C and FDM-A. Attention is paid to hazards to flight safety when excessively worn spline connections are operated for long periods of time

  17. GIS plays key role in NYC Rescue and Relief Operation

    Science.gov (United States)

    Showstack, Randy

    New York City, Sept. 17—The posters of missing loved ones are pasted onto New York City walls and street signs six days after 2 hijacked commercial airlines destroyed the World Trade Center in lower Manhattan on September 11. Several miles uptown from “ground zero,” heightened security hovers around the city's Office of Emergency Management rescue and relief command center, an around-the-clock operation. Police, firefighters, military, officials with the Federal Emergency Management Agency, communications technicians, and a beehive of others work in controlled chaos in this cavernous, convention center-sized hall, lined with computers and adorned with several American flags.After the original command center at 7 World Trade Center collapsed to rubble as an after-effect of the plane strikes, city officials scrambled to recreate it. Alan Leidner, director of New York's citywide geographic information systems (GIS), and who is with the Department of Information Technology and Telecommunications, knew that maps would be an integral component of the rescue and relief efforts. Maps provide emergency workers and others with accurate and detailed scientific data in the form of visual aids upon which they can make informed decisions.

  18. Stego Keys Performance on Feature Based Coding Method in Text Domain

    Directory of Open Access Journals (Sweden)

    Din Roshidi

    2017-01-01

    Full Text Available A main critical factor on embedding process in any text steganography method is a key used known as stego key. This factor will be influenced the success of the embedding process of text steganography method to hide a message from third party or any adversary. One of the important aspects on embedding process in text steganography method is the fitness performance of the stego key. Three parameters of the fitness performance of the stego key have been identified such as capacity ratio, embedded fitness ratio and saving space ratio. It is because a better as capacity ratio, embedded fitness ratio and saving space ratio offers of any stego key; a more message can be hidden. Therefore, main objective of this paper is to analyze three features coding based namely CALP, VERT and QUAD of stego keys in text steganography on their capacity ratio, embedded fitness ratio and saving space ratio. It is found that CALP method give a good effort performance compared to VERT and QUAD methods.

  19. Field Keys to Common Hawaiian Marine Animals and Plants.

    Science.gov (United States)

    Hawaii State Dept. of Education, Honolulu. Office of Instructional Services.

    Presented are keys for identifying common Hawaiian marine algae, beach plants, reef corals, sea urchins, tidepool fishes, and sea cucumbers. Nearly all species considered can be distinguished by characteristics visible to the naked eye. Line drawings illustrate most plants and animals included, and a list of suggested readings follows each…

  20. Improving the Financial Resourcing Process for Civil/Military Operations

    National Research Council Canada - National Science Library

    Gadbois, Karen

    2004-01-01

    .... This was evident in the most recent stability operation in Afghanistan. Although financial resourcing is key to the planning process prior to operational commencement the intricacies of the rules and financial mechanisms are not sufficiently addressed...

  1. Key lessons: Twelve factors critical to the success of WDM at the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    English · Français ... Key lessons: Twelve factors critical to the success of WDM at the policy and at the operational levels ... from slums in central New Delhi to the city's desolate periphery face daily indignities and danger as they collect water o.

  2. Science-based HRA: experimental comparison of operator performance to IDAC (Information-Decision-Action Crew) simulations

    Energy Technology Data Exchange (ETDEWEB)

    Shirley, Rachel [The Ohio State Univ., Columbus, OH (United States); Smidts, Carol [The Ohio State Univ., Columbus, OH (United States); Boring, Ronald [Idaho National Lab. (INL), Idaho Falls, ID (United States); Li, Yuandan [Univ. of Maryland, College Park, MD (United States); Mosleh, Ali [Univ. of Maryland, College Park, MD (United States)

    2015-02-01

    Information-Decision-Action Crew (IDAC) operator model simulations of a Steam Generator Tube Rupture are compared to student operator performance in studies conducted in the Ohio State University’s Nuclear Power Plant Simulator Facility. This study is presented as a prototype for conducting simulator studies to validate key aspects of Human Reliability Analysis (HRA) methods. Seven student operator crews are compared to simulation results for crews designed to demonstrate three different decision-making strategies. The IDAC model used in the simulations is modified slightly to capture novice behavior rather that expert operators. Operator actions and scenario pacing are compared. A preliminary review of available performance shaping factors (PSFs) is presented. After the scenario in the NPP Simulator Facility, student operators review a video of the scenario and evaluate six PSFs at pre-determined points in the scenario. This provides a dynamic record of the PSFs experienced by the OSU student operators. In this preliminary analysis, Time Constraint Load (TCL) calculated in the IDAC simulations is compared to TCL reported by student operators. We identify potential modifications to the IDAC model to develop an “IDAC Student Operator Model.” This analysis provides insights into how similar experiments could be conducted using expert operators to improve the fidelity of IDAC simulations.

  3. RF Regional Technical Centers for MPC and A Sustainability Operations

    International Nuclear Information System (INIS)

    Lambert, L D; Toth, W J; Hendrickson, S

    2004-01-01

    The National Nuclear Security Administration (NNSA) programmatic vision to be a catalyst in Russia's assumption of responsibility for long-term system operation is exemplified in the sustainability cooperation with the RF Ministry of Defense (MOD). An identified goal for the MPC and A Program is to encourage the development of Russian Federation (RF) capabilities and commitments to operate and maintain safeguard improvements. The RF MOD Technical Support Center development fulfills the NNSA mission and MPC and A Program goal. The regional technical center concept involves a systematic approach to aid in the determination of the level of sustainability assistance required to transition operators, maintenance, training, and testing of MPC and A systems to the RF MOD. This paper describes the process used to create the RF MOD Technical support center. First are described the needs analyses conducted to determine the key system sustainability factors requiring support. These sustainability functions are then compiled to influence the form and ultimate physical design of the technical support center. Operational interfaces are described, in detail that show the benefit of the center to the individual sites. Finally, benefits relating to information accessibility and other economies of scale are described that highlight the central center concept's strengths

  4. Demand side resource operation on the Irish power system with high wind power penetration

    International Nuclear Information System (INIS)

    Keane, A.; Tuohy, A.; Meibom, P.; Denny, E.; Flynn, D.; Mullane, A.; O'Malley, M.

    2011-01-01

    The utilisation of demand side resources is set to increase over the coming years with the advent of advanced metering infrastructure, home area networks and the promotion of increased energy efficiency. Demand side resources are proposed as an energy resource that, through aggregation, can form part of the power system plant mix and contribute to the flexible operation of a power system. A model for demand side resources is proposed here that captures its key characteristics for commitment and dispatch calculations. The model is tested on the all island Irish power system, and the operation of the model is simulated over one year in both a stochastic and deterministic mode, to illustrate the impact of wind and load uncertainty. The results illustrate that demand side resources can contribute to the efficient, flexible operation of systems with high penetrations of wind by replacing some of the functions of conventional peaking plant. Demand side resources are also shown to be capable of improving the reliability of the system, with reserve capability identified as a key requirement in this respect. - Highlights: → Demand side resource model presented for use in unit commitment and dispatch calculations. → Benefits of demand side aggregation demonstrated specifically as a peaking unit and provider of reserve. → Potential to displace or defer construction of conventional peaking units.

  5. The Key Pieces of the Career Survival and Success Puzzle.

    Science.gov (United States)

    Simonetti, Jack L.

    1999-01-01

    Analysis of career-success factors identified by 5,000 managers yielded 10 key pieces: excellent performance record, communication skills, interpersonal skills, personality, skill currency, significant work experiences, power, ability to withstand pressure, ability to make difficult decisions, and having a mentor. (SK)

  6. A systems toxicology approach identifies Lyn as a key signaling phosphoprotein modulated by mercury in a B lymphocyte cell model

    Energy Technology Data Exchange (ETDEWEB)

    Caruso, Joseph A.; Stemmer, Paul M. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Dombkowski, Alan [Department of Pediatrics, Wayne State University, Detroit, MI (United States); Caruthers, Nicholas J. [Institute of Environmental Health Sciences, Wayne State University, Detroit, MI (United States); Gill, Randall [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States); Rosenspire, Allen J., E-mail: arosenspire@wayne.edu [Department of Immunology and Microbiology, Wayne State University, Detroit, MI (United States)

    2014-04-01

    Network and protein–protein interaction analyses of proteins undergoing Hg{sup 2+}-induced phosphorylation and dephosphorylation in Hg{sup 2+}-intoxicated mouse WEHI-231 B cells identified Lyn as the most interconnected node. Lyn is a Src family protein tyrosine kinase known to be intimately involved in the B cell receptor (BCR) signaling pathway. Under normal signaling conditions the tyrosine kinase activity of Lyn is controlled by phosphorylation, primarily of two well known canonical regulatory tyrosine sites, Y-397 and Y-508. However, Lyn has several tyrosine residues that have not yet been determined to play a major role under normal signaling conditions, but are potentially important sites for phosphorylation following mercury exposure. In order to determine how Hg{sup 2+} exposure modulates the phosphorylation of additional residues in Lyn, a targeted MS assay was developed. Initial mass spectrometric surveys of purified Lyn identified 7 phosphorylated tyrosine residues. A quantitative assay was developed from these results using the multiple reaction monitoring (MRM) strategy. WEHI-231 cells were treated with Hg{sup 2+}, pervanadate (a phosphatase inhibitor), or anti-Ig antibody (to stimulate the BCR). Results from these studies showed that the phosphoproteomic profile of Lyn after exposure of the WEHI-231 cells to a low concentration of Hg{sup 2+} closely resembled that of anti-Ig antibody stimulation, whereas exposure to higher concentrations of Hg{sup 2+} led to increases in the phosphorylation of Y-193/Y-194, Y-501 and Y-508 residues. These data indicate that mercury can disrupt a key regulatory signal transduction pathway in B cells and point to phospho-Lyn as a potential biomarker for mercury exposure. - Highlights: • Inorganic mercury (Hg{sup 2+}) induces changes in the WEHI-231 B cell phosphoproteome. • The B cell receptor (BCR) signaling pathway was the pathway most affected by Hg{sup 2+}. • The Src family phosphoprotein kinase Lyn was the

  7. Identifying Key Features of Effective Active Learning: The Effects of Writing and Peer Discussion

    Science.gov (United States)

    Pangle, Wiline M.; Wyatt, Kevin H.; Powell, Karli N.; Sherwood, Rachel E.

    2014-01-01

    We investigated some of the key features of effective active learning by comparing the outcomes of three different methods of implementing active-learning exercises in a majors introductory biology course. Students completed activities in one of three treatments: discussion, writing, and discussion + writing. Treatments were rotated weekly between three sections taught by three different instructors in a full factorial design. The data set was analyzed by generalized linear mixed-effect models with three independent variables: student aptitude, treatment, and instructor, and three dependent (assessment) variables: change in score on pre- and postactivity clicker questions, and coding scores on in-class writing and exam essays. All independent variables had significant effects on student performance for at least one of the dependent variables. Students with higher aptitude scored higher on all assessments. Student scores were higher on exam essay questions when the activity was implemented with a writing component compared with peer discussion only. There was a significant effect of instructor, with instructors showing different degrees of effectiveness with active-learning techniques. We suggest that individual writing should be implemented as part of active learning whenever possible and that instructors may need training and practice to become effective with active learning. PMID:25185230

  8. Medical Logistics Lessons Observed During Operations Enduring Freedom and Iraqi Freedom.

    Science.gov (United States)

    Dole, Mark J; Kissane, Jonathan M

    2016-01-01

    Medical Logistics (MEDLOG) is a function of the Army's integrated System for Health that provides the medical products and specialized logistics services required to deliver health protection and care under all operational conditions. In unified land operations, MEDLOG is an inherent function of Health Service Support (HSS), which also includes casualty care and medical evacuation. This paper focuses on a few key lessons observed during Operations Enduring Freedom and Iraqi Freedom with direct implications for the support of HSS in future operations as envisioned in the Army Operating Concept and the Joint Concept for Health Services. It also examines a few key enablers that helped mitigate these challenges that are not yet fully acknowledged in Army Medical Department doctrine, policy, and planning.

  9. On the problem of non-zero word error rates for fixed-rate error correction codes in continuous variable quantum key distribution

    International Nuclear Information System (INIS)

    Johnson, Sarah J; Ong, Lawrence; Shirvanimoghaddam, Mahyar; Lance, Andrew M; Symul, Thomas; Ralph, T C

    2017-01-01

    The maximum operational range of continuous variable quantum key distribution protocols has shown to be improved by employing high-efficiency forward error correction codes. Typically, the secret key rate model for such protocols is modified to account for the non-zero word error rate of such codes. In this paper, we demonstrate that this model is incorrect: firstly, we show by example that fixed-rate error correction codes, as currently defined, can exhibit efficiencies greater than unity. Secondly, we show that using this secret key model combined with greater than unity efficiency codes, implies that it is possible to achieve a positive secret key over an entanglement breaking channel—an impossible scenario. We then consider the secret key model from a post-selection perspective, and examine the implications for key rate if we constrain the forward error correction codes to operate at low word error rates. (paper)

  10. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  11. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  12. Integrated network analysis identifies fight-club nodes as a class of hubs encompassing key putative switch genes that induce major transcriptome reprogramming during grapevine development.

    Science.gov (United States)

    Palumbo, Maria Concetta; Zenoni, Sara; Fasoli, Marianna; Massonnet, Mélanie; Farina, Lorenzo; Castiglione, Filippo; Pezzotti, Mario; Paci, Paola

    2014-12-01

    We developed an approach that integrates different network-based methods to analyze the correlation network arising from large-scale gene expression data. By studying grapevine (Vitis vinifera) and tomato (Solanum lycopersicum) gene expression atlases and a grapevine berry transcriptomic data set during the transition from immature to mature growth, we identified a category named "fight-club hubs" characterized by a marked negative correlation with the expression profiles of neighboring genes in the network. A special subset named "switch genes" was identified, with the additional property of many significant negative correlations outside their own group in the network. Switch genes are involved in multiple processes and include transcription factors that may be considered master regulators of the previously reported transcriptome remodeling that marks the developmental shift from immature to mature growth. All switch genes, expressed at low levels in vegetative/green tissues, showed a significant increase in mature/woody organs, suggesting a potential regulatory role during the developmental transition. Finally, our analysis of tomato gene expression data sets showed that wild-type switch genes are downregulated in ripening-deficient mutants. The identification of known master regulators of tomato fruit maturation suggests our method is suitable for the detection of key regulators of organ development in different fleshy fruit crops. © 2014 American Society of Plant Biologists. All rights reserved.

  13. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  14. Operator models for delivering municipal solid waste management services in developing countries: Part B: Decision support.

    Science.gov (United States)

    Soós, Reka; Whiteman, Andrew D; Wilson, David C; Briciu, Cosmin; Nürnberger, Sofia; Oelz, Barbara; Gunsilius, Ellen; Schwehn, Ekkehard

    2017-08-01

    This is the second of two papers reporting the results of a major study considering 'operator models' for municipal solid waste management (MSWM) in emerging and developing countries. Part A documents the evidence base, while Part B presents a four-step decision support system for selecting an appropriate operator model in a particular local situation. Step 1 focuses on understanding local problems and framework conditions; Step 2 on formulating and prioritising local objectives; and Step 3 on assessing capacities and conditions, and thus identifying strengths and weaknesses, which underpin selection of the operator model. Step 4A addresses three generic questions, including public versus private operation, inter-municipal co-operation and integration of services. For steps 1-4A, checklists have been developed as decision support tools. Step 4B helps choose locally appropriate models from an evidence-based set of 42 common operator models ( coms); decision support tools here are a detailed catalogue of the coms, setting out advantages and disadvantages of each, and a decision-making flowchart. The decision-making process is iterative, repeating steps 2-4 as required. The advantages of a more formal process include avoiding pre-selection of a particular com known to and favoured by one decision maker, and also its assistance in identifying the possible weaknesses and aspects to consider in the selection and design of operator models. To make the best of whichever operator models are selected, key issues which need to be addressed include the capacity of the public authority as 'client', management in general and financial management in particular.

  15. An approach to identify issues affecting ERP implementation in Indian SMEs

    Directory of Open Access Journals (Sweden)

    Rana Basu

    2012-06-01

    Full Text Available Purpose: The purpose of this paper is to present the findings of a study which is based on the results of a comprehensive compilation of literature and subsequent analysis of ERP implementation success issues in context to Indian Small and Medium scale Enterprises (SME’s. This paper attempts to explore the existing literature and highlight those issues on ERP implementation and further to this the researchers applied TOPSIS (Technique for order preference by similarity to ideal solution method to prioritize issues affecting successful implementation of ERP. Design/methodology/approach: Based on the literature review certain issues leading to successful ERP implementation have been identified and to identify key issues Pareto Analysis (80-20 Rule have been applied. Further to extraction of key issues a survey based on TOPSIS was carried out in Indian small and medium scale enterprises. Findings: Based on review of literature 25 issues have been identified and further Pareto analysis has been done to extract key issues which is further prioritized by applying Topsis method. Research limitations/implications: Beside those identified issues there may be other issues that need to be explored. There is scope to enhance this study by taking into consideration different type of industries and by extending number of respondents. Practical implications: By identifying key issues for SMEs, managers can better prioritize issues to make implementation process smooth without disruption. ERP vendors can take inputs from this study to change their implementation approach while targeting small scale enterprises. Originality/value: There is no published literature available which followed a similar approach in identification of the critical issues affecting ERP in small and mid-sized companies in India or in any developing economy.

  16. A quantitative metric to identify critical elements within seafood supply networks.

    Directory of Open Access Journals (Sweden)

    Éva E Plagányi

    Full Text Available A theoretical basis is required for comparing key features and critical elements in wild fisheries and aquaculture supply chains under a changing climate. Here we develop a new quantitative metric that is analogous to indices used to analyse food-webs and identify key species. The Supply Chain Index (SCI identifies critical elements as those elements with large throughput rates, as well as greater connectivity. The sum of the scores for a supply chain provides a single metric that roughly captures both the resilience and connectedness of a supply chain. Standardised scores can facilitate cross-comparisons both under current conditions as well as under a changing climate. Identification of key elements along the supply chain may assist in informing adaptation strategies to reduce anticipated future risks posed by climate change. The SCI also provides information on the relative stability of different supply chains based on whether there is a fairly even spread in the individual scores of the top few key elements, compared with a more critical dependence on a few key individual supply chain elements. We use as a case study the Australian southern rock lobster Jasus edwardsii fishery, which is challenged by a number of climate change drivers such as impacts on recruitment and growth due to changes in large-scale and local oceanographic features. The SCI identifies airports, processors and Chinese consumers as the key elements in the lobster supply chain that merit attention to enhance stability and potentially enable growth. We also apply the index to an additional four real-world Australian commercial fishery and two aquaculture industry supply chains to highlight the utility of a systematic method for describing supply chains. Overall, our simple methodological approach to empirically-based supply chain research provides an objective method for comparing the resilience of supply chains and highlighting components that may be critical.

  17. A Quantitative Metric to Identify Critical Elements within Seafood Supply Networks

    Science.gov (United States)

    Plagányi, Éva E.; van Putten, Ingrid; Thébaud, Olivier; Hobday, Alistair J.; Innes, James; Lim-Camacho, Lilly; Norman-López, Ana; Bustamante, Rodrigo H.; Farmery, Anna; Fleming, Aysha; Frusher, Stewart; Green, Bridget; Hoshino, Eriko; Jennings, Sarah; Pecl, Gretta; Pascoe, Sean; Schrobback, Peggy; Thomas, Linda

    2014-01-01

    A theoretical basis is required for comparing key features and critical elements in wild fisheries and aquaculture supply chains under a changing climate. Here we develop a new quantitative metric that is analogous to indices used to analyse food-webs and identify key species. The Supply Chain Index (SCI) identifies critical elements as those elements with large throughput rates, as well as greater connectivity. The sum of the scores for a supply chain provides a single metric that roughly captures both the resilience and connectedness of a supply chain. Standardised scores can facilitate cross-comparisons both under current conditions as well as under a changing climate. Identification of key elements along the supply chain may assist in informing adaptation strategies to reduce anticipated future risks posed by climate change. The SCI also provides information on the relative stability of different supply chains based on whether there is a fairly even spread in the individual scores of the top few key elements, compared with a more critical dependence on a few key individual supply chain elements. We use as a case study the Australian southern rock lobster Jasus edwardsii fishery, which is challenged by a number of climate change drivers such as impacts on recruitment and growth due to changes in large-scale and local oceanographic features. The SCI identifies airports, processors and Chinese consumers as the key elements in the lobster supply chain that merit attention to enhance stability and potentially enable growth. We also apply the index to an additional four real-world Australian commercial fishery and two aquaculture industry supply chains to highlight the utility of a systematic method for describing supply chains. Overall, our simple methodological approach to empirically-based supply chain research provides an objective method for comparing the resilience of supply chains and highlighting components that may be critical. PMID:24633147

  18. A quantitative metric to identify critical elements within seafood supply networks.

    Science.gov (United States)

    Plagányi, Éva E; van Putten, Ingrid; Thébaud, Olivier; Hobday, Alistair J; Innes, James; Lim-Camacho, Lilly; Norman-López, Ana; Bustamante, Rodrigo H; Farmery, Anna; Fleming, Aysha; Frusher, Stewart; Green, Bridget; Hoshino, Eriko; Jennings, Sarah; Pecl, Gretta; Pascoe, Sean; Schrobback, Peggy; Thomas, Linda

    2014-01-01

    A theoretical basis is required for comparing key features and critical elements in wild fisheries and aquaculture supply chains under a changing climate. Here we develop a new quantitative metric that is analogous to indices used to analyse food-webs and identify key species. The Supply Chain Index (SCI) identifies critical elements as those elements with large throughput rates, as well as greater connectivity. The sum of the scores for a supply chain provides a single metric that roughly captures both the resilience and connectedness of a supply chain. Standardised scores can facilitate cross-comparisons both under current conditions as well as under a changing climate. Identification of key elements along the supply chain may assist in informing adaptation strategies to reduce anticipated future risks posed by climate change. The SCI also provides information on the relative stability of different supply chains based on whether there is a fairly even spread in the individual scores of the top few key elements, compared with a more critical dependence on a few key individual supply chain elements. We use as a case study the Australian southern rock lobster Jasus edwardsii fishery, which is challenged by a number of climate change drivers such as impacts on recruitment and growth due to changes in large-scale and local oceanographic features. The SCI identifies airports, processors and Chinese consumers as the key elements in the lobster supply chain that merit attention to enhance stability and potentially enable growth. We also apply the index to an additional four real-world Australian commercial fishery and two aquaculture industry supply chains to highlight the utility of a systematic method for describing supply chains. Overall, our simple methodological approach to empirically-based supply chain research provides an objective method for comparing the resilience of supply chains and highlighting components that may be critical.

  19. Measuring social inclusion--a key outcome in global mental health.

    Science.gov (United States)

    Baumgartner, Joy Noel; Burns, Jonathan K

    2014-04-01

    Social inclusion is increasingly recognized as a key outcome for evaluating global mental health programmes and interventions. Whereas social inclusion as an outcome is not a new concept in the field of mental health, its measurement has been hampered by varying definitions, concepts and instruments. To move the field forward, this paper reviews the currently available instruments which measure social inclusion and are reported in the literature, realizing that no single measure will be appropriate for all studies or contexts. A systematic literature search of English language peer-reviewed articles published through February 2013 was undertaken to identify scales specifically developed to measure social inclusion or social/community integration among populations with mental disorders. Five instruments were identified through the search criteria. The scales are discussed in terms of their theoretical underpinnings, domains and/or key items and their potential for use in global settings. Whereas numerous reviewed abstracts discussed mental health and social inclusion or social integration, very few were concerned with direct measurement of the construct. All identified scales were developed in high-income countries with limited attention paid to how the scale could be adapted for cross-cultural use. Social inclusion is increasingly highlighted as a key outcome for global mental health policies and programmes, yet its measurement is underdeveloped. There is need for a global cross-cultural measure that has been developed and tested in diverse settings. However, until that need is met, some of the scales presented here may be amenable to adaptation.

  20. Report to the US Nuclear Regulatory Commission on Analysis and Evaluation of Operational Data, 1987: Nonreactors

    International Nuclear Information System (INIS)

    1988-10-01

    This annual report of the US Nuclear Regulatory Commission's Office for Analysis and Evaluation of Operational Data (AEOD) is devoted to the activities performed during 1987. The report is published in two volumes. NUREG-1272, Vol. 2, No. 1, covers Power Reactors and presents an overview of the operating experience of the nuclear power industry, with comments regarding the trends of some key performance measures. The report also includes the principal findings and issues identified in AEOD studies over the past year, and summarizes information from Licensee Event Reports, the NRC's Operations Center, and Diagnostic Evaluations. NUREG-1272, Vol. 2, No. 2, covers Nonreactors and presents a review of the nonreactor events and misadministration reports that were reported in 1987 and a brief synopsis of AEOD studies published in 1987. Each volume contains a list of the AEOD reports issued for 1980-1987